search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(77)
Article
(3)
Keywords
« Previous
1
2
3
4
5
6
7
8
Next »
28%
Tested: Autoconfiguring IPv6 clients
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
which name server to use, or where the other network services are located. RFC 5006 [
3
] thus defines an extension to the router advertisements that lets the clients find the name server. Another important
28%
Connecting dissimilar IPsec implementations
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
expects as the PSK from the password of test123. I set the encryption algorithm for the first negotiation phase to
3
DES and the hash algorithm for authentication was SHA1. The setting for PFS was set
28%
Optimizing Hyper-V network settings
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
Version
3
.0 of Hyper-V in Windows Server 8 offers several improvements in terms of networking that improve the system's performance. Examples include direct access by virtual machines to the network
28%
Intelligent Stack
07.12.2025
Home
»
Articles
»
[1] openEuler Intelligence: https://www.openeuler.org/en/projects/intelligence/ [2] GMEM: https://www.openeuler.org/en/blog/G11
N
-SIG/20240116-memory-management/20240116-memory-management.html [
3
28%
Remote desktop based on HTML5
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
quickly view the password hash at the command line with the md5sum utility: # echo -
n
| md5sum -t 319f4d26e
3
c536b5dd871bb2c52e3178 - Next, add this hash value instead of the password
28%
Introduction to OpenMP programming
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
[
3
] to solving the questions. Although not the most efficient or fastest method for solving the problem, it does illustrate how one can use OpenMP to parallelize applications. I will be using
28%
Modern network diagnostics on Windows and Linux
27.05.2025
Home
»
Archive
»
2025
»
Issue 87: Light...
»
to focus on this protocol. One of the most commonly used flags is -
n
, which prevents the resolution of IP addresses into hostnames and ports into service names, ensuring faster execution and numerical
28%
Configuration management with Chef
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
-certs, make, gcc, and g++. The certificates from ssl-cert will be required later. According to the how-to http://1, Chef prefers RubyGems version 1.
3
.6 or newer, but not 1.
3
.7. This version contains a bug
28%
Configuring the JBoss application server
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
container. As its popularity increased and the server became more widespread, the JBoss community expanded and extended the product until, finally, application server version
3
(AS
3
) became a full
28%
An IP-based load balancing solution
30.11.2025
Home
»
CloudAge
»
Articles
»
and least connected, and they are also the most commonly used in LVS clusters. Configuration Piranha [
3
] is a clustering product from Red Hat based on the LVS concept. It includes the IPVS kernel code ...
3
« Previous
1
2
3
4
5
6
7
8
Next »