search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%2522Rub%253%25390 Llorente"22
?
Refine your search
[x]
Creation time
: Last month
Sort order
Date
Score
Content type
Article (Print)
(78)
Keywords
« Previous
1
2
3
4
5
6
7
8
Next »
42%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days. Brute force is a single-character-at-
a
42%
Server virtualization with Citrix XenServer
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
/** 16 * @param args 17 */ 18 public static void main(String[] args) throws Exception { 19 20 if (args.length != 3 && args.length != 5) 21 {
22
System
42%
Maatkit tools for database administrators
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
of the stress test shown in Figure 2, shows that some 19,200 queries composed of 55 different commands were issued. The system, a server with 768MB of RAM and a Pentium 3 CPU, took a total of
22
seconds to answer
42%
VMware Server 2.0 on recent Linux distributions
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
/usr/lib/vmware/bin/vmware-hostd |awk '{print $3}'|grep lib | \ 19 xargs rpm --queryformat '%{NAME}\
n
' -qf |sort -u 20 glibc 21 libgcc
22
libstdc++ 23 libxml2 24 nss-softokn-freebl
25
zlib 26
42%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
="**/*.jar" /> 20 21
22
23 24
25
42%
Touring the top Knoppix debugging and rescue tools
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
23 echo -
n
-e "\rTrying $offset..." 24 if mount -o loop="$LOOP",ro,offset=$offset $DEV $MNT >>mount.log 2>&1 ; then
25
echo -e "\
n
Found a filesystem, now mounted on $MNT" 26 break 27 fi 28
42%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
depends on the liblzo
2-2
, libpkcs11-helper1, openssl-blacklist, and openvpn-blacklist packages. The next step is to set up your own Public Key Infrastructure (PKI). OpenVPN provides a software tool
42%
High availability clustering on a budget with KVM
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
22
23 24
25
26
27
42%
Monitoring KVM instances with Opsview
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
for the KVM host: Connectivity (LAN) Unix load RAM/Swap load Storage utilization SSH availability (typically on port
22
) Optional extensions: If you use libvirt, you can check
42%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
_copied=copy_to_user(user,hello_world,to_copy); 19 return to_copy-not_copied; 20 } 21
22
static struct file_operations fops = { 23 .owner= THIS_MODULE, 24 .read= driver_read,
25
}; 26 27 static int __init mod_init( void ) 28 { 29
« Previous
1
2
3
4
5
6
7
8
Next »