search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcomm%2n2222a Llorente 22
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(28)
Keywords
« Previous
1
2
3
Next »
92%
Galera Cluster for MySQL
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
MySQL-shared-compat-5.5.
22-2
.el6.
x
86_64.rpm rpm -i MySQL-client-5.5.
22
-1.el6.
x
86_64.rpm With CentOS 6, the following additional package is necessary: yum install openssl098e.
x
86_64 The easiest way
92%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
_RESKEY_user doesn't exist"
20
return $OCF_ERR_INSTALLED 21 fi
22
23 getent group $OCF_RESKEY_group >/dev/null
2
>&1 24 rc=$? 25 if [ $rc -ne 0 ]; then 26 ocf_log err "Group $OCF
91%
Managing virtual machines
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
-net.rules -e "s/$oldmac/$newmac/" 19 virt-edit $vmname /etc/sysconfig/network -e "s/vm1/$vmname/"
20
21 echo $newid >> vm-list.txt
22
23 echo "cloning finished, starting vm" 24 virsh start $vmname
91%
Configuration management with Chef
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
20
-kl-listing-bold]zlib[/UCC] and [UCC:
x
20
-kl-listing-bold]libxml[/UCC] . Debian and Ubuntu call them [UCC:
x
20
-kl-listing-bold]zlib1g-dev[/UCC] and [UCC:
x
20
-kl-listing-bold]libxml
2
-dev[/UCC] ; open
91%
Monitor your nodes with collectl
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
m Memory
n
Networks s Sockets t TCP
x
Interconnect y Slabs Table
2
lists the aspects that can be measured
91%
Connecting dissimilar IPsec implementations
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
/inet/IPsecinit.conf: Contains the policy, like the setkey script on Kame/Racoon; however, the file also contains the algorithms for Phase
2
. A tunnel interface is also typically configured. /etc/hostname.ip.tun
X
: Typically
90%
Targeted defense against brute force attacks
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
, most likely, (3/
2
)
x
15 seconds. Finally, -s defines the number of seconds to wait before sshguard "forgets" the attacker's IP address. The line sshguard -l /var/log/auth.log -s
20
instructs sshguard
90%
Archiving email and documents for small businesses
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
}
20
\usepackage{ngerman} 21 \usepackage[official,right]{eurosym}
22
\\\begin{document}" > att1.tex 23 echo "\end{document}" > att3.tex 24 25 # Merge Latex file components 26 27 cat att1.tex searchkey
90%
Building a port scanner in Python
28.07.2025
Home
»
Archive
»
2025
»
Issue 88: 5 Net...
»
in range(start_port, end_port + 1): 18 thread = threading.Thread(target=scan_port, args=(host, port)) 19 thread.start()
20
21 if __name__ == "__main__":
22
if len(sys.argv) != 4: 23 print
90%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
=TR/CN=John_Doe/emailAddress=jd@example.com 07 Serial: 03 08 Serialized id: SafeNet\
x
20
Inc\
x
2
E/eToken/xxxxxxxx/eToken/xxxxxxxxxxxxxxxxxx OpenVPN Management Interface Because Linux systems don't have a crypto store, you need
« Previous
1
2
3
Next »