search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcomm%3 00 Llorente
?
Refine your search
[x]
Creation time
: Last month
Sort order
Date
Score
Content type
Article (Print)
(16)
Keywords
« Previous
1
2
82%
Troubleshooting SELinux
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
SELinux Information with -Z 01 # id -Z 02 user_u:system_r:unconfined_t 03 # ls -dZ /var/www/html 04 drwxr-xr-
x
root root system_u:object_r:httpd_sys_content_t /var/www/html 05 # ps -efZ | grep httpd 06
81%
Touring the top Knoppix debugging and rescue tools
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
: 1487680 0 IO-APIC-fasteoi uhci_hcd:usb
3
14 22: 22998855 0 IO-APIC-fasteoi psb@pci:0000:
00
:02.0 15 23: 3084145 0 IO-APIC-fasteoi hda_intel 16 24: 1 0
81%
Neglected IPv6 features endanger the LAN
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
40 1 ::/0 IPv6 addresses 30 2 2002::/16 6to4 addresses
20
3
::/96 IPv4-compatible addresses (obsolete) 10 4 ... IPv6 is establishing itself in everyday IT life, and all modern operating systems from Windows, through Mac OS
X
, to Linux have it on board; but if you let IPv6 introduce itself into your environment
80%
High availability clustering on a budget with KVM
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
with nearly native performance. However, KVM does need a state-of-the-art CPU generation with virtualization functionality (VT-
X
/AMD-V). All the virtual machines in this article will run on the KVM hypervisor
80%
Managing virtual machines
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
to give you consistent results with a running system. A cleaner approach would be to use an image backup program for Linux, such as Clonezilla [2] or Partimage [
3
], which means shutting down the system
79%
Network analysis with Wireshark
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
runs with root privileges. The exceptions are Mac OS
X
and Solaris, where the user only needs access privileges for the network interface card device file. By default, Tcpdump reads all the data
« Previous
1
2