search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(249)
News
(4)
Article
(3)
Keywords
« Previous
1
2
3
4
5
6
7
8
9
10
11
12
13
...
26
Next »
11%
Network backup with Burp, Obnam, and Backshift
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
can exclude files of a certain size (e.g., those of
0
MB
). The Burp configuration language also provides two size parameters: min_file_size and max_file_size; for example: min_file_size =
0
Mb
11%
Dispatches from the world of IT
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
XPS13 laptop: 13.3-inch screen with edge-to-edge glass (1366x768 resolution), i7 2GHz Intel Core2 Duo processor, 4GB of RAM, and 256GB SSD, all in a
0
.88x
12
.56x9.3-inch device weighing 2.99 pounds
11%
Configuring the JBoss application server
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
environment, make sure the JAVA_HOME variable points to the Java root directory (Listing 1). Listing 1 Java Environment 01 # export JAVA_HOME=/usr/lib/jvm/jre-1.6.
0
-openjdk 02 # echo $JAVA
11%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1
MB
) and simple
11%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
.setContentType("text/plain"); 10 resp.getWriter().println("Hello World!"); 11 }
12
} Listing 2 Java web.xml for "Hello World!" 01 0" encoding="utf-8"?> 02
11%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
in your kernel configuration and possibly rebuild the kernel. Including the symbols, vmlinux weighs in at more than 40
MB
. Next, open a connection to the debug server by typing target remote :1234 (Figure 3
11%
Workshop: Container virtualization with LXC on Ubuntu 10.04
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
#auto eth
0
06 #iface eth
0
inet dhcp 07 auto br
0
08 iface br
0
inet dhcp 09 bridge_ports eth
0
10 bridge_stp off 11 bridge_maxwait 5
12
post-up /usr/sbin/brctl setfd br
0
0
Next, create a directory
11%
Performance testing monitoring solutions
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
were run on a virtual system (using ESX as the hypervisor) with fixed reservations for CPU and memory. To be more precise, I used a virtual CPU running at 1.5GHz and with 512
MB
of RAM in the virtual
11%
Overview of cloud platforms and appliances
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
Index for Various Providers Product Static IP Address (
0
.2) Software Appliances and Images Used (
0
.4) Web Storage (
0
.2) CDN (
0
.2) IPv6 (
0
.2) Pay As You Go
11%
Give your servers the once over with Nmap
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
, in case that triggers a firewall's ruleset: # nmap -P
0
12
.34.56.78 Then, run the UDP and SYN (Stealth) scans concurrently, as mentioned previously: # nmap -sUS
12
.34.56.78 With the use of the -f
« Previous
1
2
3
4
5
6
7
8
9
10
11
12
13
...
26
Next »