search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcode 22!600 Llorente"22
?
Refine your search
[x]
Creation time
: Last month
Sort order
Date
Score
Content type
Article (Print)
(76)
Keywords
1
2
3
4
5
6
7
8
Next »
100%
A first look at Apache 2.4: Web server for the cloud
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
) as a reverse proxy. Although Apache is already being used in this way by quite a few organizations, it's clear that the
2.2
series is not optimized for that use case, which is one reason why Nginx is seeing ... High performance and cloud suitability are the thrust of Apache 2.4. We give you the lowdown on transitioning your Apache HTTP Server from
2.2
to 2.4.
59%
Taking that Unix and Linux feeling tothe Windows desktop with MobaXterm
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
of a large number of photos that have different output formats (e.g., for a picture gallery), as shown in the following code example: Cd photos mkdir standardphotos For i in .jpg ; do convert $i -resize
600
x
59%
ARP cache poisoning and packet sniffing
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
Destination MAC address Listing 1 Nemesis arp Packets 01 $ while true 02 > do 03 > sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 -D 192.168.1.133 -h 00:
22
:6E:71:04:BB -m 00:0C:29:B2
59%
Configuration management with Chef
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
18 validation_client_name "validator" 19 validation_key "/etc/chef/validation.pem" 20 client_key "/etc/chef/client.pem" 21 web_ui_client_name "chef-webui"
22
web
58%
Connecting dissimilar IPsec implementations
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
192.168.2.0/24; 21 service any;
22
} 23 IPsec-policy pfs2-aes256-sha1; 24 } 25 } 26 } 27 } Again you can reuse the proposal and the policy. Assuming
58%
Strategies for routing voice calls around a firewall
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
and then rewrites the Contact header to contain the publicly reachable NAT gateway socket. Listing 3 shows an Invite request that has been modified by the SIP proxy: 18.17.16.15 is the gateway's public address; 20.
22
57%
Mandatory access control with Tomoyo Linux
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
compared with version 1.x are noticeable in Tomoyo versions
2.2
.x and 2.3.x; the current version 2.5 only lacks a couple of features. Unfortunately, version 2.5 is only available in Linux kernel 3.2, which
57%
Dispatches from the world of IT
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
gas prices. The company announced its VMware Ready Desktop Solutions program on June
22
. Ready Desktop Solutions is a validation program for "desktop virtualization solution architectures" provided
57%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
and arrival rate 19 $pdq::streams = pdq::CreateOpen($Workload, $ArrivalRate); 20 # Define the service rate for customers at the cash desk 21 pdq::SetDemand($ServerName, $Workload, $SeviceTime);
22
57%
The fail2ban intrusion prevention framework
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
in the directory structure is clear once you've installed it. Script Kiddies and Port
22
As I mentioned, the most popular usage of fail2ban is stopping probes that try every username ever conceived by mankind
1
2
3
4
5
6
7
8
Next »