search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(274)
Article
(9)
News
(9)
Keywords
« Previous
1
2
3
4
5
6
7
8
9
10
11
12
13
...
30
Next »
11%
Network backup with Burp, Obnam, and Backshift
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
can exclude files of a certain size (e.g., those of
0
MB
). The Burp configuration language also provides two size parameters: min_file_size and max_file_size; for example: min_file_size =
0
Mb
11%
Dispatches from the world of IT
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
XPS13 laptop: 13.3-inch screen with edge-to-edge glass (1366x768 resolution), i7 2GHz Intel Core2 Duo processor, 4GB of RAM, and 256GB SSD, all in a
0
.88x
12
.56x9.3-inch device weighing 2.99 pounds
11%
Configuring the JBoss application server
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
environment, make sure the JAVA_HOME variable points to the Java root directory (Listing 1). Listing 1 Java Environment 01 # export JAVA_HOME=/usr/lib/jvm/jre-1.6.
0
-openjdk 02 # echo $JAVA
11%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1
MB
) and simple
11%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
.setContentType("text/plain"); 10 resp.getWriter().println("Hello World!"); 11 }
12
} Listing 2 Java web.xml for "Hello World!" 01 0" encoding="utf-8"?> 02
11%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
in your kernel configuration and possibly rebuild the kernel. Including the symbols, vmlinux weighs in at more than 40
MB
. Next, open a connection to the debug server by typing target remote :1234 (Figure 3
11%
Workshop: Container virtualization with LXC on Ubuntu 10.04
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
#auto eth
0
06 #iface eth
0
inet dhcp 07 auto br
0
08 iface br
0
inet dhcp 09 bridge_ports eth
0
10 bridge_stp off 11 bridge_maxwait 5
12
post-up /usr/sbin/brctl setfd br
0
0
Next, create a directory
11%
Performance testing monitoring solutions
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
were run on a virtual system (using ESX as the hypervisor) with fixed reservations for CPU and memory. To be more precise, I used a virtual CPU running at 1.5GHz and with 512
MB
of RAM in the virtual
11%
Overview of cloud platforms and appliances
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
Index for Various Providers Product Static IP Address (
0
.2) Software Appliances and Images Used (
0
.4) Web Storage (
0
.2) CDN (
0
.2) IPv6 (
0
.2) Pay As You Go
11%
Give your servers the once over with Nmap
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
, in case that triggers a firewall's ruleset: # nmap -P
0
12
.34.56.78 Then, run the UDP and SYN (Stealth) scans concurrently, as mentioned previously: # nmap -sUS
12
.34.56.78 With the use of the -f
« Previous
1
2
3
4
5
6
7
8
9
10
11
12
13
...
30
Next »