search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%25x20mm%2222%21490 Llorente%2012
?
Refine your search
[x]
Creation time
: Last month
Sort order
Date
Score
Content type
Article (Print)
(56)
Keywords
« Previous
1
2
3
4
5
6
Next »
45%
Targeted defense against brute force attacks
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
, most likely, (3/
2
)
x
15 seconds. Finally, -s defines the number of seconds to wait before sshguard "forgets" the attacker's IP address. The line sshguard -l /var/log/auth.log -s
20
instructs sshguard
45%
With great PowerShell comes great responsibility
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
Shell
2.0
, which I use here. Windows 8 and Windows Server 8 will use the new PowerShell 3.0, to be released soon. To begin, I introduce PowerShell information retrieval to you via the "Get" commands
45%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
or newer. Python programmers need to use version
2.5
; the SDK and the environment on the Google servers do not support the current Python 3.0. The SDK for Go exists at the moment only for Linux and Mac OS
X
45%
Zarafa on the Univention Corporate Server
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
.list file below /etc/apt/sources.list.d/, taking care that its name starts with a number greater than the last existing source list file (typically
20
) – for example,
25
_zarafa4ucs.list. Depending on the UCS
45%
Enterprise communication with IRC
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
countless IRC server variants. Almost all originate from the original code, which is still in use today on IRCNet [1] and comes closest to the original IRC RFC [
2
]. Additionally, you will find a plethora
45%
Server virtualization with Citrix XenServer
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
.out.println("Expected arguments:
[nfs server] [nfs path]"); 23 return; 24 }
25
26 Server server = new Server(args[0], args[1], args[
2
]); 27 URL url = new URL ...
2
45%
Clustering with OpenAIS and Corosync
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
and maintained only by Red Hat. In more recent versions (e.g.,
2.0
in RHEL 5 and Fedora Core 6 or later), the legacy CMAN implementation was replaced by an open implementation based on the Application Interface
45%
pfSense firewall and router distribution
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
. Because it had to run in RAM, extensions were difficult. This situation prompted the two to start working on their own distribution and spawned the development of pfSense [1]. The core of version
2.0
from
45%
Single sign-on with SSSD, LDAP, and Kerberos
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
cache_credentials = True 19 ldap_id_use_start_tls = False
20
debug_level = 0 21 enumerate = True 22 krb5_kpasswd = tiffy.tuxgeek.de 23 ldap_schema = rfc2307bis 24 ldap_search_base = dc=tuxgeek,dc=de
25
...
2
45%
Network backup with Burp, Obnam, and Backshift
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
When Graham Keeling became annoyed with the complexity of network backup software program Bacula [1], he fired up his program editor. The result was the compact network backup solution Burp [
2
« Previous
1
2
3
4
5
6
Next »