search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%2522Rub%253%25390 Llorente"22
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(98)
Article
(1)
Keywords
« Previous
1
2
3
4
5
6
7
8
9
10
Next »
43%
Password protection with Phpass
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
: " . $password . "\
n
"; 13 echo "Hash: " . $hashvalue . "\
n
"; 14 15 // Compare $password with the store has: 16 $passwordfromdb = '$P$
9
IQRaTwmfeRo7ud
9
Fh4E2PdI0S3r.L0'; 17 // stored hash, would
43%
The Swiss Army knife of fault management
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
="walk" value="true"/>
22
23
24
25
43%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days. Brute force is a single-character-at-
a
43%
Server virtualization with Citrix XenServer
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
/** 16 * @param args 17 */ 18 public static void main(String[] args) throws Exception { 19 20 if (args.length != 3 && args.length != 5) 21 {
22
System
43%
Maatkit tools for database administrators
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
of the stress test shown in Figure 2, shows that some 19,200 queries composed of 55 different commands were issued. The system, a server with 768MB of RAM and a Pentium 3 CPU, took a total of
22
seconds to answer
43%
VMware Server 2.0 on recent Linux distributions
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
/usr/lib/vmware/bin/vmware-hostd |awk '{print $3}'|grep lib | \ 19 xargs rpm --queryformat '%{NAME}\
n
' -qf |sort -u 20 glibc 21 libgcc
22
libstdc++ 23 libxml2 24 nss-softokn-freebl
25
zlib 26
43%
Quick patches with Ansible
27.05.2025
Home
»
Archive
»
2025
»
Issue 87: Light...
»
:
22
ansible_ssh_private_key_file: /home/treuss/.ssh/pihole 23 ansible_user: thomas As you can see, I defined my hosts in the file (Figure 1). In this specific case
43%
Modern network diagnostics on Windows and Linux
27.05.2025
Home
»
Archive
»
2025
»
Issue 87: Light...
»
to focus on this protocol. One of the most commonly used flags is -
n
, which prevents the resolution of IP addresses into hostnames and ports into service names, ensuring faster execution and numerical
43%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
="**/*.jar" /> 20 21
22
23 24
25
43%
Touring the top Knoppix debugging and rescue tools
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
23 echo -
n
-e "\rTrying $offset..." 24 if mount -o loop="$LOOP",ro,offset=$offset $DEV $MNT >>mount.log 2>&1 ; then
25
echo -e "\
n
Found a filesystem, now mounted on $MNT" 26 break 27 fi 28
« Previous
1
2
3
4
5
6
7
8
9
10
Next »