search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%2522Rub&253%25390 Llorente%2222
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(3)
Keywords
100%
Intruder detection with tcpdump
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
expressions # tcpdump -
n
-I eth1 host 10.10.
253
.34 and host 10.10.33.10# tcpdump -
n
-I eht1 src net 10.10.
253
.0/24 and dst net 10.10.33.0/24 or 192.5.5.241# tcpdump -
n
-I eth1 src net 10
93%
Security without firewalls
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
software, Postfix [
2
]. The story goes that the talented Venema needed to keep track of attacks on workstations at a university and wrote a piece of software capable of limiting port access by rules
90%
Julia: A new language for technical computing
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
julia> limulus limulus limulus limulus
n
2
n
0
n
2
n
0 To get a better feel for parallel computation, I can run the example from the Julia documentation [
9
]. First, see how it works on one node