search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last month
Sort order
Date
Score
Content type
Article (Print)
(120)
Keywords
« Previous
1
...
4
5
6
7
8
9
10
11
12
Next »
19%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
( ) Used for grouping and back references \n Back reference: Expands to whatever matched the n th ( ) pattern Suffixes How Many to Match ?
0
or 1 *
0
19%
Reading email in the browser with Horde
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
: channel://pear.horde.org/webmail-4.
0
.6 The directory Horde uses to deliver existing static content in an efficient way is /var/www/webmail/static/. The web server needs write permissions for this directory
19%
Operating system virtualization with OpenVZ
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
.g., for migrating over secure connections). The exact syntax and other examples of applications are discussed [
12
]. Additionally, OpenVZ can create what it refers to as checkpoints (snapshots) of VEs: A checkpoint
19%
News
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
center and campus environments. Dell also released Open Manage Network Manager 5.
0
(OMNM), which provides a single console for all network management functions of Dell networking platforms in branch
19%
Open source remote access to Windows
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
/raddb/server file: vi /etc/raddb/server Next, below the line 127.
0.0
.1 secret 1 add routableIPaddress shared_secret 1 substituting the IP address of the WiKID server. Configuring the WiKID Token
19%
Performance monitoring in Windows Server 2008 R2
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
and documentation on the topic of server performance monitoring. If you manage a complex structure, it's good idea to read the guides on this site. To run the tool, you also need Log Parser
2.2
[2], which is also
19%
The Swiss Army knife of fault management
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
12
The monitor is set up by /etc/opennms/poller-configuration.xml: 13 14 ... 15
17
19%
Free backup tool for data centers
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
Password = "YdhKKoy2Huq1CVHwIR" 05 Pid Directory = "/var/run" 06 Query File = "/usr/lib/bacula/query.sql" 07 Working Directory = "/var/lib/bacula" 08 } 09 10 Fileset { 11 Name = "Full Set"
12
19%
Modern MySQL Forks and Patches
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
mysql> select * from information_schema.TABLE_STATISTICS ORDER BY ROWS_READ DESC LIMIT
0
,5; +--------------------+---------------+-------------+--------------+------------------------+ | TABLE
19%
Network analysis with Wireshark
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
to many administrators by that name. The tool was renamed when version
0
.99.1 of Wireshark was released, because Ethereal developer Gerald Combs left Ethereal Software. He launched a successor project under
« Previous
1
...
4
5
6
7
8
9
10
11
12
Next »