AMD Opteron™ and Intel® Xeon® x86 processors in industry-standard servers C02731435.pdf

October 15th, 2011
Hewlett-Packard Technology brief, 2nd edition. APR/2011. This paper summarizes the technologies in the latest generation of AMD Opteron and Intel Xeon processors. These technologies include: Microarchitecture, I/O, Power management, Virtualization, Data security.

AMD Opteron™ and Intel® Xeon® x86 processors in industry-standard servers C02731435.pdf

October 15th, 2011
Hewlett-Packard Technology brief, 2nd edition. APR/2011. This paper summarizes the technologies in the latest generation of AMD Opteron and Intel Xeon processors. These technologies include: Microarchitecture, I/O, Power management, Virtualization, Data security.

AWS Developer Forums: Red Hat repository broken …

October 12th, 2011
RHEL 5.6 images on Amazon are broken, you need to install an additional RPM package to fix the repo setup

AWS Developer Forums: Red Hat repository broken …

October 12th, 2011
RHEL 5.6 images on Amazon are broken, you need to install an additional RPM package to fix the repo setup

Reverse Proxy Bypass – Bug in Apache mod_proxy

October 5th, 2011
It is possible for an attacker to reach internal resources in a DMZ if RewriteRule or ProxyPassMatch directives are used in mod_proxy config

Reverse Proxy Bypass – Bug in Apache mod_proxy

October 5th, 2011
It is possible for an attacker to reach internal resources in a DMZ if RewriteRule or ProxyPassMatch directives are used in mod_proxy config

redhat.com | JBOSS NA Channel SKUs [ i.e redhat jboss pricing ]

October 5th, 2011
Pricing and SKU numbers for Redhat JBOSS offerings

redhat.com | JBOSS NA Channel SKUs [ i.e redhat jboss pricing ]

October 5th, 2011
Pricing and SKU numbers for Redhat JBOSS offerings

[How to Encrypt and Decrypt Strings in JAVA using Standard Java JCE library] Cipher : Java Glossary

October 2nd, 2011
Here’s how to encrypt and decrypt a message using CipherOutputStream/ CipherInputStream The methods used are all part of Sun’s JCE. Sun’s JCE documenation is all but useless. You pretty well have to Google the web to find sample code to use these methods for particular algorithms and block modes. Pay attention to string encoding/decoding and padding issues.

[How to Encrypt and Decrypt Strings in JAVA using Standard Java JCE library] Cipher : Java Glossary

October 2nd, 2011
Here’s how to encrypt and decrypt a message using CipherOutputStream/ CipherInputStream The methods used are all part of Sun’s JCE. Sun’s JCE documenation is all but useless. You pretty well have to Google the web to find sample code to use these methods for particular algorithms and block modes. Pay attention to string encoding/decoding and padding issues.