public marks

PUBLIC MARKS with tags network & documentation

2013

Social Login - Gigya's Documentation

by Xavier Lacot
Gigya is a social login / users management solution. This guide describes how to interact with social login platforms, and explains the workflow involved in Gigya's way of working

2009

DataInput (Java 2 Platform SE 5.0)

by sylvainulg
Silverbullet when doing networking IO. Features readLine, readInt, readFully(byte[])

2008

Nimbus

by camel
Nimbus provides a free, open source infrastructure for remote deployment and management of virtual machines, allowing you to: * Create compute clouds (make your own EC2 style service). For examples, see the science clouds page. * Deploy "one-click" auto-configuring virtual clusters (see the cloud clusters page). They adapt on the fly into new network and security contexts so you can set them up once and run them over and over again, even across different clouds. * Serve clients that are compatible with the Amazon EC2 service, see What is the EC2 frontend? * Integrate VMs on a set of resources already configured to manage jobs (i.e., already using a batch scheduler like PBS). See What is the Workspace Pilot? * Interface to Amazon EC2 resources, see What is the EC2 backend? * Easily experiment with new remote protocols and backends, see What is the RM API?

Using Nagios to Monitor Networks

by lecyborg
Nagios is a powerful, modular network monitoring system that can be used to monitor many network services like smtp, http and dns on remote hosts. It also has support for snmp to allow you to check things like processor loads on routers and servers. I couldn't begin to cover all of the things that nagios can do in this article, so I'll just cover the basics to get you up and running.

How-To: Monitoring a Server with Munin

by lecyborg
Munin is a simple to configure tool that make real nice graph about your server status. It can actually deal with almost any aspect of your server (load average, network cards status, CPU usage, memory usage, postfix, exim4, mysql ...) without spending much time in configuring it. Munin produce MRTG likes graph so you can easily see how your server health is going.

2007

Automatic_Bridge_Ubuntu - VirtualBox

by lecyborg
This is a quick tutorial on how to setup your Linux environment and VirtualBox, so that it can automatically create network interfaces and put them in bridge when the VM is launched.

Howto crack (or hack) a wireless network with Wired Equivalent Privacy (WEP)

by lecyborg
WEP was intended to provide comparable confidentiality to a traditional wired network (in particular it does not protect users of the network from each other), hence the name. Several serious weaknesses were identified by cryptanalysts — any WEP key can be cracked with readily available software in two minutes or less — and WEP was superseded by Wi-Fi Protected Access (WPA) in 2003, and then by the full IEEE 802.11i standard (also known as WPA2) in 2004. Despite the weaknesses, WEP provides a level of security that can deter casual snooping

2006

PortForward.com

by jlemoine & 3 others
Liste des ports utilisés par différentes applications. Très utile pour configurer son routeur.

List of TCP and UDP port numbers

by jlemoine & 2 others
La liste permet d'identifier les logiciels utilisant ces ports. Merci Wikipedia !

Open Source Community for Network Monitoring and Server Alerts | Hyperic Forums and Documentation

by camel
Hyperic HQ is the robust IT management platform and web-based portal that lets you manage your systems, services, servers, and applications - and it's freely available under an open source license, the GNU GPL. Hyperic HQ Open Source features monitoring, alerting, auto- discovery, auto-inventory, performance monitoring over time, and the ability to determine the health of your IT environment with pinpoint accuracy. The Enterprise Subscription adds support, automated updates, and a few features.

2005

Breaking Firewalls with OpenSSH and PuTTY

by Riduidel & 1 other
This article shows how remote Linux and Windows users can gain access to firewalled samba, mail, and http servers.

How to setup ssh to tunnel VNC traffic throught the Internet

by Riduidel
This tutorial shows how to use ssh to tunnel VNC traffic (tcp port 5900) through the Internet, so that you can safely view/control your home Windows PC from a remote location, under the strong encryption of ssh.

PUBLIC TAGS related to tag network

ajax +   api +   applications +   backup +   books +   business +   code +   css +   database +   delicious +   design +   development +   documentation +   ebooks +   english +   faq +   firefox +   free +   guide +   hosting +   html +   java +   javascript +   library +   linux +   management +   monitoring +   opensource +   photos +   php +   programming +   reference +   remote +   resources +   rss +   scripts +   security +   social +   software +   technology +   tools +   tutorial +   tutorials +   utile +   utilities +   webdesign +   wiki +   windows +   xml +   yahoo +  

Active users

Xavier Lacot
last mark : 08/01/2013 17:14

sylvainulg
last mark : 20/06/2009 08:25

camel
last mark : 26/09/2008 15:18

lecyborg
last mark : 20/02/2008 14:24

kamquebec
last mark : 11/01/2007 08:49

jlemoine
last mark : 24/12/2006 00:25

gvlx
last mark : 06/10/2006 08:57

zoom2au
last mark : 18/06/2006 22:33

Riduidel
last mark : 14/02/2006 07:53