9%
26.10.2012
programs propagate through various networks can differ widely. At the same time, honeypots often detect propagating malware within their own networks with a higher probability (Figure 5
9%
25.11.2012
/cmdline
root=/dev/disk/by-uuid/10a83ffe-5a9f-48a2-b8cb-551c2cc6b42d resume=/dev/sda3 \
splash=silent text showopts crashkernel=128
sles:~ # /etc/init.d/boot.kdump status
kdump kernel loaded
9%
14.05.2013
in PowerShell
Administrators can manage all editions of Office 365 in PowerShell, even without running local servers (Figure 5).
Figure 5: Office 365 can
9%
02.04.2013
, or content management systems by means of a two-factor authentication solution. Mydigipass.com cloud authentication by Vasco is ideal for this (Figure 5
9%
08.07.2013
Shift (Figure 5).
Figure 5: CloudForms facilitates building and managing hybrid cloud mixes of infrastructure components.
The current version 1.1 was also
9%
12.08.2013
.tool
The output is given in JSON format (Figure 5), so piping it to python -m json.tool
makes the output readable (Figure 6).
Figure 5: Performance data queried
9%
22.06.2014
running: The OpenStack Dashboard (Figure 5) is accessible at http:///horizon
(e.g., on http://192.168.122.111/horizon
for Alice). The credentials required for logging in can be found
9%
22.08.2011
is to implement an open source cloud broker (Figures 4 and 5). The Deltacloud API is used here to facilitate views on the virtual clouds of each user, as well as for communication with the clouds themselves. Steam
9%
27.10.2011
a bit dirtier. Figure 5 illustrates iftop getting down to a granular network level and displaying traffic types, as opposed to just individual network connections. If you think along the lines of output
9%
04.11.2011
an imminent failure. The lm_sensors tool [5] lets you monitor the fan and temperature. With just a little scripting, you can even create a heat map of the cluster to identify hotspots.
The smartmontools [6