search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
0mb"2010 Llorente
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(18)
Keywords
« Previous
1
2
29%
A Btrfs field test and workshop
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
0
, 1, and 10 RAID level conversion on the fly Background process for detecting and correcting errors proactively ("scrubbing") Growing and shrinking a filesystem on the fly Defragmentation
29%
The PHP FastCGI process manager, PHP-FPM
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
. Launch Ramp PHP-FPM has been part of the official PHP package since PHP 5.4.
0
and is therefore also included by most current Linux distributions and available through their package managers. The package
28%
Web applications with Julia
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
, or for the default. For Apache, the files live in /etc/apache2/sites-enabled/. Listing 1 Apache Gateway Config ProxyRequests Off AllowEncodedSlashes On ProxyPass "/sliders/" "http://127.
0.0
28%
Creating KVM machines with BoxGrinder and VMBuilder
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
boxgrinder-build --version 02 BoxGrinder Build
0
.10.2 03 04 Available os plugins: 05 - rhel plugin for Red Hat Enterprise Linux 06 - centos plugin for CentOS 07 - fedora plugin for Fedora 08
28%
Creating and evaluating kernel crash dumps
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
], where X is the size of the reserved area in megabytes and Y specifies the start address. If you omit the second parameter or set it to
0
M, the system automatically selects an appropriate location
28%
Tools for troubleshooting the network
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
, and you are given minimum, maximum, and average values for the speed of ICMP responses. In addition to performing the simple ping test, you can access a freely configurable website, or transfer 1
MB
of test
28%
ASM tools and strategies for threat management
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
such as login credentials and vulnerabilities in third-party software code that an attacker could exploit – think of the SolarWinds compromise in
2020
or the recent attack on the open source XZ Utils toolbox
28%
Designing a Secure Active Directory
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
admin groups necessary, if you have not already done so. No normal user needs to be able to list administrators, highly privileged groups, and Tier
0
systems. Also, consider the permissions of the Admin
« Previous
1
2