search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%200mb%3%A9n Llorente"52
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(69)
Article
(2)
Keywords
1
2
3
4
5
6
7
8
Next »
100%
Automating Migration to openEuler
30.11.2025
Home
»
Archive
»
2025
»
Issue 90 VoIP N...
»
Rubén
Llorente
... an Enterprise Linux-like system for servers and cloud environments. It boasts a number of unique utilities, such as iSulad, a lightweight container runtime daemon;
A
-Tune, an AI-powered performance tuning tool
61%
Monitor your nodes with collectl
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
25-E SSD [
9
] courtesy of Intel is mounted as /dev/sdd ext4 filesystem with the default options Open MPI [10] v1.5.4 NAS Parallel Benchmarks
3.3
.1-MPI [11] Iozone [12] Daemon ...
9
56%
Give your servers the once over with Nmap
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
.nmap.org (64.13.134.
52
): Not shown: 994 filtered ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 4.
3
(protocol 2.0) 25/tcp closed smtp
55%
Workshop: Container virtualization with LXC on Ubuntu 10.04
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
and modifying the IP address in line 8. The line lxc-create -
n
guest -f /lxc/conf.guest Listing
3
Container Configuration: conf.guest 01 lxc.utsname = guest 02 lxc.tty = 4 03 lxc
53%
A Btrfs field test and workshop
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
. Enterprise-Level Features Btrfs is a copy-on-write (COW) filesystem. Whereas a filesystem like ext
3
logs block changes in a journal, Btrfs always writes changes to a block at a new location on the disk
52%
Managing virtual machines
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
filesystem, if so desired [5]: $ guestfish -
N
fs:ext
3
When you call Guestfish with the new image, $ guestfish -
a
you are taken to a shell where you first need to enter run to toggle the system ...
9
52%
Julia: A new language for technical computing
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
)* Julia Python MATLAB Octave R JavaScript v
3
f670da0 v2.7.1 vR2011
a
v
3
.4 v2.14.2 v8
3
.6.6.11 fib 1.97 31
52%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days. Brute force is a single-character-at-
a
52%
Win-win with Cygwin
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
'll receive the following response: The authenticity of host '192.168.1.250' can't be established. RSA key fingerprint is 87:17:c
3
:92:44:ba: 1
a
:df:d7:
9
c:44:b2:5b:73:
52
:09. Are you sure you want to continue
51%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
:add-symbol-file module.ko text_address -s .data data_address -s .bss bss_address
9
. Debug: Set breakpoints and so on. In Toolchain , enable the Build gdb for the Host option; in Kernel | Kernel version , type
3
1
2
3
4
5
6
7
8
Next »