search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(98)
Article
(43)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
3
4
5
6
7
8
9
10
11
12
13
14
15
Next »
13%
Connecting dissimilar IPsec implementations
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
aes
256
-sha1; 13 } 14 vpn racoonvpn { 15 bind-interface st
0.0
; 16 ike { 17 gateway racoon; 18 proxy-identity { 19 local 192.168.1.0/24; 20 remote
13%
SHA-3 – The New Hash Standard
15.04.2013
Home
»
Articles
»
researchers were not content just to attack MD5. In 2005, Wang’
s
team improved known attacks on the SHA-1 standard, which was regarded as secure at the time. Although these attacks remain theoretical – nobody
13%
Tools for hardware diagnostics under Windows
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
(Figure 1). Although you will need to install the freeware program on the computer you want to examine first, the program is quite small, occupying less than 5
MB
of space on the hard drive
13%
CPU affinity in OpenMP and MPI applications
03.02.2022
Home
»
Archive
»
2022
»
Issue 67: syst...
»
is turned on, which means 32 "real" cores and 32 SMT cores. Listing 1 lscpu $ lscpu Architecture: x86_64 CPU op-mode(
s
): 32-bit, 64-bit Byte Order
13%
Correctly integrating containers
09.10.2017
Home
»
Archive
»
2017
»
Issue 41: Kuber...
»
, but it quite quickly reaches its limits, because this network model generates a maximum of
256
nodes. Although
256
nodes is rather a small cluster for a project with the ambitions of Kubernetes, they can
13%
Bare metal deployment with OpenStack
02.08.2021
Home
»
Archive
»
2021
»
Issue 64: Bare...
»
environment. Listing 2 shows the servers.yml configuration file for server(
s
) to be installed. It is important to use the MAC address of the deployment network interface controller (NIC) here and not, say
13%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
/sbin/named ... 774 ?? SsJ 0:
00
,12 /usr/sbin/sshd ... 781 ?? IsJ 0:
00
,87 /usr/sbin/cron -
s
... The jls command lets you view all the currently active jails, as shown in Listing 6. Listing 6 Active Jails
13%
Program GUIs in Go with Fyne
28.11.2021
Home
»
Archive
»
2021
»
Issue 66: Inci...
»
}) 051 labelHash := widget.NewLabel("Hash:") 052 053 radioGroup := widget.NewRadioGroup([]string{"md5", "sha1", "sha
256
", "sha512"}, func(
s
string) { 054 055 }) 056 057 radioGroup.SetSelected("md5
13%
Shell scripts: Equal rights for Unix derivatives and Linux
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
the target host once. In order to ping continuously, as on Linux, you will need to specify the -
s
option. Listing 2 Ping on Solaris # uname -sr SunOS 5.10 # ping server server is alive # ping -
s
13%
Kernel and driver development for the Linux kernel
07.10.2014
Home
»
Archive
»
2014
»
Issue 23: 10 Ti...
»
proc_create_data: Instead of
S
_IRUGO, you need
S
_IRUGO |
S
_IWUGO. Finally, four lines need to be added to the program header: #include
static char kernel_buffer[
256
]; #define TEXT
« Previous
1
...
3
4
5
6
7
8
9
10
11
12
13
14
15
Next »