search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%200mb%2222%A9n Llorente"523
?
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(71)
Article
(1)
Keywords
« Previous
1
2
3
4
5
6
7
8
Next »
46%
Targeted defense against brute force attacks
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
-
N
sshguard The second command handles IPv6 packets. The next step is to extend the input chain so that network traffic is routed through the sshguard chain (Figure
2
): sudo iptables -
A
INPUT -j
46%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
# start. 32 if [ -
n
"$OCF_RESKEY_monitor_sipuri" ]; then 33 ocf_run sipsak -s "$OCF_RESKEY_monitor_sipuri" 34 rc=$? 35 case "$rc" in 36 1|
2
) return $OCF
46%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
VPN. The free SSL virtual private network (VPN) joined the mainstream with release
2
.1, and it is useful for large-scale setups. Aladdin [
2
] dominates the market for USB stick-based cryptographic access control
45%
Demystified: The facts about green IT
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
, and IZES Institut für ZukunftsEnergieSysteme (Institute for Future Energy Systems) GmbH [1] [
2
] investigated precisely this topic. The question the researchers set out to answer was: How economical
45%
Remote desktop based on HTML5
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
quickly view the password hash at the command line with the md5sum utility: # echo -
n
| md5sum -t 319f4d26e3c536b5dd871bb
2
c52e3178 - Next, add this hash value instead of the password
45%
New approaches for forensics in cloud environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
on the cloud security problem and on corresponding legal issues [1]. This paucity of information was confirmed by other publications [
2
] [3]. Despite this, the topic is still largely overlooked and a huge amount
45%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days. Brute force is a single-character-at-
a
45%
Create a high availability VM with DRBD9 and Reactor
07.10.2025
Home
»
Archive
»
2025
»
Issue 89: Autom...
»
://launchpad.net/~linbit/+archive/ubuntu/linbit-drbd
9
-stack LVM: https://sourceware.org/lvm
2
Attribution-ShareAlike 3.0 Unported: https://creativecommons.org/licenses/by-sa/3.0/deed.en virter: https://github.com/LINBIT/virter Linstor: https ... DRBD
9
and DRBD Reactor create a Linux high-availability stack for virtual instances with replicated storage comparable to the classic Corosync and Pacemaker solution. ... DRBD
9
and DRBD Reactor ... Create a high availability VM with DRBD
9
and Reactor
45%
Introduction to OpenMP programming
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
) ! Delta (x and y directions) ... 117 ! Solution Initialization 118 ! +++ !$OMP PARALLEL DO SHARED(m,
n
,u) 119 DO j=
2
,m-1 120 DO i=
2
,m-1 121 u(i,j)=0.0d0 122 ENDDO 123 ENDDO +++ !$OMP END
45%
A Btrfs field test and workshop
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
: Balancing can free up unneeded but assigned chunks. Running btrfs fi df and btrfs fi show – before and after balancing – show that the metadata chunk size has been reduced to 256
MB
; thus, 1.5GB (
2
x750
MB
... SUSE has officially supported Btrfs in Service Pack
2
of its Enterprise Server 11 since February 2012. Oracle followed soon after with Btrfs support in its own Linux. We explore the possibilities
« Previous
1
2
3
4
5
6
7
8
Next »