search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(70)
Keywords
« Previous
1
2
3
4
5
6
7
12%
Free backup tool for data centers
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
Password = "YdhKKoy2Huq1CVHwIR" 05 Pid Directory = "/var/run" 06 Query File = "/usr/lib/bacula/query.sql" 07 Working Directory = "/var/lib/bacula" 08 } 09 10 Fileset { 11 Name = "Full Set"
12
12%
Building more efficient database applications with a graph database
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
= database.createNode(); 09 // Set properties: 10 dortmund.setProperty("Name", "Dortmund"); 11 cologne.setProperty("Name", "Köln");
12
// Create edges:
13
Relationship a1_do_k = dortmund
12%
Password protection with Phpass
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
: " . $password . "\n
";
13
echo "Hash: " . $hashvalue . "\n
"; 14 15 // Compare $password with the store has: 16 $passwordfromdb = '$P$9IQRaTwmfeRo7ud9Fh4E2PdI0
S
3r.L0'; 17 // stored hash, would
12%
The RADOS object store and Ceph filesystem
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
/ceph/$name.keyring 04 [mon] 05 mon data = /srv/mon.$id 06 [mds] 07 [osd] 08 osd data = /srv/osd.$id 09 osd journal = /srv/osd.$id.journal 10 osd journal size = 1000 11 [mon.a]
12
host = alice
13
mon
12%
Intrusion detection with Prelude
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
11
12
13
Order allow,deny 14 Allow from all 15 16 17 Alias /prewikka/ /usr/share/prewikka/htdocs/ 18 ScriptAlias / /usr/share/prewikka/cgi-bin/prewikka.cgi 19
12%
With great PowerShell comes great responsibility
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
-Process cmdlet reports system process information in the format shown in Listing 1. Listing 1 Default Get-Process Format 01 Handles NPM(K) PM(K) WS(K) VM(M) CPU(
s
) Id ProcessName 02
12%
Proactive threat detection
07.10.2025
Home
»
Archive
»
2025
»
Issue 89: Autom...
»
[
12
], and Icinga [
13
], with the advantage that existing alert chains and escalation levels can be rehashed without any problems. Once Falco is connected to the existing monitoring system, alerts
12%
Apache 2.4 with mod_lua
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
:puts("
Answer
") 07 r:puts("") 08 09 for k, v in pairs(r:parseargs()) do 10 if k=='firstname' then 11 firstname=v
12
elseif k=='lastname' then
13
lastname=v 14 end 15
12%
Introduction to behavior-driven monitoring
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
/usr/lib64/ruby/1.8/logger.rb:487:in `initialize'
12
/usr/lib64/ruby/1.8/logger.rb:263:in `new'
13
/usr/lib64/ruby/1.8/logger.rb:263:in `initialize' 14 /usr/lib/nagios
12%
Create a high availability VM with DRBD9 and Reactor
07.10.2025
Home
»
Archive
»
2025
»
Issue 89: Autom...
»
consuming and expensive, which is what prompted Linbit to build an alternative to Pacemaker that specializes in handling simple use cases: DRBD Reactor [
6
]. In this article, I describe how DRBD and DRBD
« Previous
1
2
3
4
5
6
7