search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(1189)
Article
(302)
News
(182)
Blog post
(3)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
76
77
78
79
80
81
82
83
84
85
86
87
88
89
...
168
Next »
16%
Stack Overflow Survey: 66% of Developers Frustrated by AI Inaccuracy
07.08.2025
Home
»
News
»
.6%) 16 to 20 years (11.8%) 21 to 30 years (14.6%) 31 to 40 years (7%) 41 to 50 years (3.1%) More than 50 years (
0
.5%) Read more at Stack Overflow.
16%
Kali Linux 2025.3 Released with New Hacking Tools
30.09.2025
Home
»
News
»
to the images are now part of the virtual machine build scripts, and those scripts have also been upgraded to the Packer 2.
0
standards. As far as the new hacking tools are concerned, you get Caido and Caido CLI
16%
New Products
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
smartphone users, which was 2.9 per 1,000 smartphone users in 2011, is expected to climb to 4.
0
in 2013." The Azaleos Managed MDM service provides device security management for lost, non-compliant, offline
16%
Monitoring daemons with shell tools
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
exit codes when it terminates, you can use Unix conventions.
0
stands for error-free processing, whereas 1 indicates some problems were encountered. This value is stored in the $? shell variable, which
16%
A simple approach to the OCFS2 cluster filesystem
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
name. In OCFS2's case, a single ASCII file is all it takes (Listing 1). Listing 1 /etc/ocfs2/cluster.conf node: ip_port = 7777 ip_address = 192.168.
0
.1 number =
0
16%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
approach to setting up the PKI; you will find the scripts in /usr/share/doc/openvpn/examples/easy-rsa/2.
0
. You can start by modifying a couple of things in the vars; this is mainly to make the procedure more
16%
The fine art of allocating memory
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
main(int argc, char *argv[]) 06 { 07 char *newblock = NULL; 08 09 for (int allocation =
0
; newblock = (void *) malloc(1024 * 1024); allocation++) 10 { 11 //for (int i=
0
; i < (1024 * 1024
16%
Customizing PortSentry
30.03.2012
Home
»
Articles
»
to "
0
" to make the # command run *after* the blocking has occurred. # KILL_RUN_CMD_FIRST = "
0
" # # KILL_RUN_CMD="commands_to_run" Customization I came across a few limitations with the way a third
16%
PowerShell Part 3: Keeping PowerShell in the Loop
10.05.2012
Home
»
Articles
»
need is a little patience and light scripting skills. PowerShell versions 1.
0
and 2.
0
have a somewhat limited ability to grab information from remote systems singly or in bulk. Therefore, you have
16%
Build system images with Kiwi
02.08.2021
Home
»
Archive
»
2021
»
Issue 64: Bare...
»
Kiwi XML Profile 0" encoding="utf-8"?>
1.15.2
« Previous
1
...
76
77
78
79
80
81
82
83
84
85
86
87
88
89
...
168
Next »