search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcode Llorente"22
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(112)
News
(3)
Article
(2)
Keywords
« Previous
1
2
3
4
5
6
7
8
9
10
11
12
Next »
11%
Server virtualization with Citrix XenServer
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
/** 16 * @param args 17 */ 18 public static void main(String[] args) throws Exception { 19 20 if (args.length != 3 && args.length != 5) 21 {
22
System
11%
Maatkit tools for database administrators
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
of the stress test shown in Figure 2, shows that some 19,200 queries composed of 55 different commands were issued. The system, a server with 768MB of RAM and a Pentium 3 CPU, took a total of
22
seconds to answer
11%
Quick patches with Ansible
27.05.2025
Home
»
Archive
»
2025
»
Issue 87: Light...
»
:
22
ansible_ssh_private_key_file: /home/treuss/.ssh/pihole 23 ansible_user: thomas As you can see, I defined my hosts in the file (Figure 1). In this specific case
11%
Modern network diagnostics on Windows and Linux
27.05.2025
Home
»
Archive
»
2025
»
Issue 87: Light...
»
incoming connections. Looking closely at this output, you should be familiar with what normal, expected services are running on your machine. For instance, you might see services like SSH on port
22
, HTTP
11%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
="**/*.jar" /> 20 21
22
23 24
25
11%
Touring the top Knoppix debugging and rescue tools
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
: 1487680 0 IO-APIC-fasteoi uhci_hcd:usb3 14
22
: 22998855 0 IO-APIC-fasteoi psb@pci:0000:00:02.0 15 23: 3084145 0 IO-APIC-fasteoi hda_intel 16 24: 1 0
11%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
depends on the liblzo
2-2
, libpkcs11-helper1, openssl-blacklist, and openvpn-blacklist packages. The next step is to set up your own Public Key Infrastructure (PKI). OpenVPN provides a software tool
11%
High availability clustering on a budget with KVM
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
/sda 20 Account information: 21 ACL information:
22
ALL Network Bonding To prevent the network cards and thus the connection to the cluster and storage network from becoming a single
11%
Warding off the rise of VoIP spam
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
:alice@somesipprovider.de>;tag=42 07 Call-ID: a84b4c76e66710de5f
90
ae275 08 Contact: Alice
09 ... The media data transferred in the course of a voice or video call are typically transported one
11%
Risk mitigation for Active Directory
27.05.2025
Home
»
Archive
»
2025
»
Issue 87: Light...
»
and computers from the outset. You will always want to use scripts to assign permissions in AD, because it already provides
90
percent of the code you need to check later for correct permissions and helps you
« Previous
1
2
3
4
5
6
7
8
9
10
11
12
Next »