search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcode Llorente"22
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(119)
Article
(3)
News
(3)
Keywords
« Previous
1
2
3
4
5
6
7
8
9
10
11
12
13
Next »
11%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
="**/*.jar" /> 20 21
22
23 24
25
11%
Touring the top Knoppix debugging and rescue tools
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
: 1487680 0 IO-APIC-fasteoi uhci_hcd:usb3 14
22
: 22998855 0 IO-APIC-fasteoi psb@pci:0000:00:02.0 15 23: 3084145 0 IO-APIC-fasteoi hda_intel 16 24: 1 0
11%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
depends on the liblzo
2-2
, libpkcs11-helper1, openssl-blacklist, and openvpn-blacklist packages. The next step is to set up your own Public Key Infrastructure (PKI). OpenVPN provides a software tool
11%
High availability clustering on a budget with KVM
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
/sda 20 Account information: 21 ACL information:
22
ALL Network Bonding To prevent the network cards and thus the connection to the cluster and storage network from becoming a single
11%
ASM tools and strategies for threat management
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
on those attack surfaces that a professional attacker would tend to exploit. IBM refers to a Forrester survey, according to which users of the IBM Randori tool require
90
percent less time for vulnerability
11%
Warding off the rise of VoIP spam
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
:alice@somesipprovider.de>;tag=42 07 Call-ID: a84b4c76e66710de5f
90
ae275 08 Contact: Alice
09 ... The media data transferred in the course of a voice or video call are typically transported one
11%
Kick-start your AI projects with Kubeflow
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
the required cluster in just a few minutes. The following example assumes that all commands are run on Ubuntu
22
.04, but most of the commands will probably work on other distributions with just a few minor
11%
Compressed Archives for User Projects
11.08.2025
Home
»
Articles
»
.jpg 15 cat.9874.jpg 5 cat.9927.jpg 51 cat.997.jpg 37 dog.9809.jpg 32 dog.9862.jpg 25 dog.9915.jpg 27 cat.9821.jpg 14 cat.9875.jpg 24 cat.9928.jpg 29 cat.9980.jpg 23 dog.9810.jpg
22
dog.9863
11%
Managing virtual infrastructures with oVirt 3.1
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
, 50GB of memory, and a 1Gb NIC. However, the CPU must be a 64-bit system with a mandatory virtualization extension: either AMD-V or Intel VT. In contrast to RHEV
2.2
, RHEV 3 is no longer based on RHEL
11%
Reading and understanding database execution plans
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
----------------------------------------------------------------- 21
22
Predicate Information (identified by operation id): 23 --------------------------------------------------- 24 1 - access("S"."EMPLOYEE_ID"="E"."EMPLOYEE_ID") 25 2 - filter<+>5<+>( "S
« Previous
1
2
3
4
5
6
7
8
9
10
11
12
13
Next »