search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%220mb%3%A9n Llorente 22
?
Refine your search
[x]
Creation time
: Last month
Sort order
Date
Score
Content type
Article (Print)
(39)
Keywords
« Previous
1
2
3
4
Next »
84%
An IT nomad's diary
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
is all it takes to create your own application, just like for the domain (Listing
3
). Listing
3
Creating the Application 01 # rhc-create-app -
a
spaceuploader -t perl-5.10 -l tscherf
84%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
version [
9
]. Listing
3
/etc/openvpn/ccd/John_Doe 01 # John Doe 02 ifconfig-push 192.168.1.
3
255.255.255.0 03 push "topology subnet" 04 push "redirect-gateway" 05 push "dhcp-option DNS 192
84%
Tracing applications with OProfile and SystemTap
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
686 oprofile-0.
9
.5-4.fc12.i686 To profile the kernel, you need to tell OProfile where the kernel image is located with the --vmlinux option: opcontrol --setup --vmlinux=/usr/lib/debug/lib/ modules
82%
Monitor your nodes with collectl
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
25-E SSD [
9
] courtesy of Intel is mounted as /dev/sdd ext4 filesystem with the default options Open MPI [10] v1.5.4 NAS Parallel Benchmarks
3.3
.1-MPI [11] Iozone [12] Daemon ...
9
82%
Configuration management with Chef
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
://wiki.opscode.com/display/chef/Installation RabbitMQ: http://www.rabbitmq.com/server.html openSUSE build service for RabbitMQ: http://software.opensuse.org/search?q=rabbitmq-server&baseproject=openSUSE%
3
A
11.2 Information on full-text searches
81%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days. Brute force is a single-character-at-
a
81%
Getting started with I/O profiling
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
fsync 21 21 21 21 21
22
26 31 lseekm
3
,848 766 2,946 762 739 738 757
3
80%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
:add-symbol-file module.ko text_address -s .data data_address -s .bss bss_address
9
. Debug: Set breakpoints and so on. In Toolchain , enable the Build gdb for the Host option; in Kernel | Kernel version , type
3
80%
Using the Expect scripting environment
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
} 19 20 -re "($|%|>) " { interact } 21
22
timeout { 23 send_tty "No response from $host\
n
" 24 exit 25 } 26 } The script begins as usual by saving its arguments into variables
80%
An IP-based load balancing solution
30.11.2025
Home
»
CloudAge
»
Articles
»
and least connected, and they are also the most commonly used in LVS clusters. Configuration Piranha [
3
] is a clustering product from Red Hat based on the LVS concept. It includes the IPVS kernel code ...
3
« Previous
1
2
3
4
Next »