search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(137)
Keywords
« Previous
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Next »
25%
A standard cloud computing API
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
total = summary.values.inject(
0
) { |sum, i| sum += i }
12
puts "Found #{total} instances in the following states:" 13 summary.keys.sort.each do |s| 14 printf "%20s %d\
n
", s, summary[s] 15 end 16 puts
25%
Shell scripts: Equal rights for Unix derivatives and Linux
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
="" 04 PING="ping -c1 -w 3" 05 PING2="" 06 07 case $OS in 08 HP-UX*) 09 PING=ping 10 PING2="-
n
1" 11 RSH="remsh"
12
RSH2="-l user" 13 ;; 14 Sun
25%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1
MB
) and simple
25%
Galera Cluster for MySQL
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
to install the Pen load balancer, and Listing
12
shows a query to Pen. Listing 11 Installing and Starting Pen wget http://siag.nu/pub/pen/pen-
0.18.0
.tar.gz tar xf /download/pen-
0.18.0
.tar
25%
Enterprise communication with IRC
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
. If a hostname is used it 06 * must match the reverse dns of the server. 07 * / 08 host = "10.42.
0
.1"; 09 10 /* passwords: the passwords we send (OLD C:) and accept (OLD
N
:). 11
25%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
/openvpn/keys/CA.crt 08 cert /etc/openvpn/keys/server.crt 09 key /etc/openvpn/keys/server.key 10 tls-auth /etc/openvpn/keys/tls-auth.key 11
12
server 192.168.1.
0
255.255.255.
0
13 14 keepalive 10 60 15 comp-lzo 16 17
25%
Overview of cloud platforms and appliances
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
Index for Various Providers Product Static IP Address (
0
.2) Software Appliances and Images Used (
0
.4) Web Storage (
0
.2) CDN (
0
.2) IPv6 (
0
.2) Pay As You Go
25%
Creating and evaluating kernel crash dumps
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
], where X is the size of the reserved area in megabytes and Y specifies the start address. If you omit the second parameter or set it to
0
M, the system automatically selects an appropriate location
25%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
.setContentType("text/plain"); 10 resp.getWriter().println("Hello World!"); 11 }
12
} Listing 2 Java web.xml for "Hello World!" 01 0" encoding="utf-8"?> 02
25%
Performance testing monitoring solutions
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
were run on a virtual system (using ESX as the hypervisor) with fixed reservations for CPU and memory. To be more precise, I used a virtual CPU running at 1.5GHz and with 512
MB
of RAM in the virtual
« Previous
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Next »