search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%25x20mm%253%25390 Llorente 08
?
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(50)
Keywords
« Previous
1
2
3
4
5
77%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
version [
9
]. Listing
3
/etc/openvpn/ccd/John_Doe 01 # John Doe 02 ifconfig-push 192.168.1.
3
255.255.255.0 03 push "topology subnet" 04 push "redirect-gateway" 05 push "dhcp-option DNS 192
76%
Securing email communication with GnuPG
07.10.2025
Home
»
Archive
»
2025
»
Issue 89: Autom...
»
for different security requirements: GnuPG Desktop [
3
] and Gpg4win [4] are user-friendly desktop versions. GnuPG VS-Desktop [5] is available for particularly secure use in government agencies and companies
76%
A Btrfs field test and workshop
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
. Enterprise-Level Features Btrfs is a copy-on-write (COW) filesystem. Whereas a filesystem like ext
3
logs block changes in a journal, Btrfs always writes changes to a block at a new location on the disk
76%
Server virtualization with Citrix XenServer
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
about the I/O performance on the guest systems, I was able to measure these speed hits on the HP system compared with the bare metal system. Installing a battery-buffered, 512
MB
write cache module vastly
76%
Exploring Nmap's scripting engine
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
– A common language makes the script portable to Nmap systems on other platforms. (
A
Bash script, on the other hand, would work well in Linux but might not work on a Windows system.) Community
76%
The RADOS object store and Ceph filesystem
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
: mkcephfs -
a
-
c
/etc/ceph/ceph.conf -k /etc/ceph/admin.keyring Now you need to ensure that ceph.conf exists on all the hosts belonging to the cluster (Figure
3
). If this is the case, you just need to start ...
9
76%
Warding off the rise of VoIP spam
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
:alice@somesipprovider.de>;tag=42 07 Call-ID:
a
84b4
c
76e66710de5f90ae275
08
Contact: Alice
09 ... The media data transferred in the course of a voice or video call are typically transported one
75%
Reading email in the browser with Horde
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
/www/webmail. Following this, the installation proper can begin: /var/www/webmail/pear/pear -
c
/var/www/webmail/pear.conf install -
a
-B horde/webmail The script terminates with the following message: ... install ok
75%
An IP-based load balancing solution
30.11.2025
Home
»
CloudAge
»
Articles
»
and least connected, and they are also the most commonly used in LVS clusters. Configuration Piranha [
3
] is a clustering product from Red Hat based on the LVS concept. It includes the IPVS kernel code ...
3
74%
Introduction to behavior-driven monitoring
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
Scenarios: 21 cucumber /usr/lib/nagios/plugins/cucumber-nagios/checks/features/www.xing.com/startpage.feature:4 # Scenario: Visiting home page 22 23 1 scenario (1 failed) 24 4 steps (1 failed,
3
skipped)
25
0 ...
3
« Previous
1
2
3
4
5