search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%220mb%3 00s Llorente 22
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(69)
Article
(1)
Keywords
« Previous
1
2
3
4
5
6
7
73%
An IP-based load balancing solution
30.11.2025
Home
»
CloudAge
»
Articles
»
and least connected, and they are also the most commonly used in LVS clusters. Configuration Piranha [
3
] is a clustering product from Red Hat based on the LVS concept. It includes the IPVS kernel code ...
3
73%
Configuration management with Chef
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
lines on each of the systems involved: file_cache_path "/tmp/chef-solo" cookbook_path "/tmp/chef-solo/cookbooks" recipe_url "http://
s
3
.amazonaws.com/chef-solo/bootstrap-latest.tar.gz" This tells Chef
73%
Passwords, passphrases, and passkeys
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
password, and the need to remember it. Unrealistic Rulesets Bill Burr wrote the official password guide for the U.
S
. National Institute of Standards and Technology (NIST). According to the guide
72%
Finding cracks with Nmap, Portbunny, and Nessus
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
will default to this mode. You can select it manually by setting the -
sS
switch, as in nmap -
sS
www.lemon.com . Figure
3
: The SYN scan is similar to the three
72%
Creating KVM machines with BoxGrinder and VMBuilder
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
Service (Amazon
S
3
) 19 - ami plugin for Amazon Simple Storage Service (Amazon
S
3
) 20 - sftp plugin for SSH File Transfer Protocol 21 - ebs plugin for Elastic Block Storage
22
- local plugin
72%
Free backup tool for data centers
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
Include { 13 File = /usr/sbin 14 Options { 15 Signature = MD5 16 } 17 } 18 Exclude { 19 File = /var/lib/bacula 20 File = /tmp 21 }
22
} 23 24 Messages { 25 Name = Daemon 26
72%
Remote Access with Tactical RMM
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
recommended as the technical underpinnings. If you prefer to work with Ubuntu, you can go for Ubuntu
22
.04. SSL and DNS Required Before the installation can start, you have to meet a few requirements
72%
Professional backup solutions compared
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
used a virtual machine on a VMware ESX server. The physical underpinnings were a ProServ II server by Exu
S
Data with two Xeon quad-core processors and 16GB of RAM (Figure 1, top
71%
Introduction to behavior-driven monitoring
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
Scenarios: 21 cucumber /usr/lib/nagios/plugins/cucumber-nagios/checks/features/www.xing.com/startpage.feature:4 # Scenario: Visiting home page
22
23 1 scenario (1 failed) 24 4 steps (1 failed,
3
skipped) 25 0 ...
3
71%
Using the Expect scripting environment
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
or a password, and the current user will be allowed to run remote commands as root using ssh. This script is called ec2_ssh_init, and Listing
3
shows its initial section. Listing
3
ec2_ssh_init (Part
« Previous
1
2
3
4
5
6
7