17%
17.06.2011
is useful if you can't actively check the computer because it resides behind a firewall, for example. A large number of plugins [4] already exist for various styles in Nagios and Icinga. But before the first
17%
27.09.2024
Collaboration Open Telekom Cloud [4].
A Full Stack Re-Engineered
The grommunio developers chose a completely different approach: Instead of plugins and workarounds, they have been (re-)implementing more than 50
17%
28.07.2025
] and Nagios Plugins [4]; Checkmk developers use the Monitoring Plugins version and quickly rejected the possibility of modernizing the existing check with pull requests. The maintainers would have been burdened
17%
07.10.2025
with commands such as top or by looking in the /proc filesystem.
However, clever rootkits nest themselves into the kernel and conceal the existence of the virus process there, which is where Rootkit Hunter [4
17%
30.11.2025
debuted in Ubuntu 11.10. The initctl show-config command that gives an overview of the jobs has been around since Upstart 0.6.4 (Figure 3):
initctl show-config -e > output
17%
30.11.2025
Cannon, and Eclipse. The goal of Cloud Engine is to implement an open source cloud broker (Figures 4 and 5). The Deltacloud API is used here to facilitate views on the virtual clouds of each user, as well
17%
30.11.2025
machines with a 32-bit operating system and 64-bit system, but not the other way around. Using a 64-bit kernel as your basis also has the advantage that you can use more than 4GB of RAM. Thus, you can run
17%
30.11.2025
and computational resources.
The processor saves the most energy in the C3 and C4 states, which is where you want it to spend the most time. Ideally, the CPU will sleep for 95 percent of the time in one of these two
17%
30.11.2025
client requests (1) in the auth.log file (2). Then sshguard (3) monitors the file and creates a firewall rule (4) that blocks the client (5) if it notices to many login attempts.
If the attacker
17%
30.11.2025
a firewall). A large number of plugins [4] already exist for various styles in Nagios and Icinga. But before the first check, the administrator needs to configure the computers and the services to monitor