search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%220mb%3%A9n Llorente 22
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(48)
Article
(1)
Keywords
« Previous
1
2
3
4
5
Next »
85%
Galera Cluster for MySQL
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
temporarily with Listing 5 Error Messages sh: /sbin/ifconfig: Permission denied 120405 8:29:02 [ERROR] WSREP: Failed to read output of: '/sbin/ifconfig | \ grep -m1 -1 -E '^[
a
-z]?eth[0-
9
85%
Targeted defense against brute force attacks
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
-
N
sshguard The second command handles IPv6 packets. The next step is to extend the input chain so that network traffic is routed through the sshguard chain (Figure 2): sudo iptables -
A
INPUT -j ...
3
85%
Archiving email and documents for small businesses
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
} 20 \usepackage{ngerman} 21 \usepackage[official,right]{eurosym}
22
\\\begin{document}" > att1.tex 23 echo "\end{document}" > att
3
.tex 24 25 # Merge Latex file components 26 27 cat att1.tex searchkey
85%
High availability clustering on a budget with KVM
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
: 09 bb:0f:e
3
:7f:
3
e:ab:c
3
:5d:32:78:85:04:
a
2:da:f1:61 root@host1 You need to distribute the public part, that is the /root/.ssh/id_rsa_cluster.pub file, to all nodes in the cluster. The Strict
84%
An IT nomad's diary
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
is all it takes to create your own application, just like for the domain (Listing
3
). Listing
3
Creating the Application 01 # rhc-create-app -
a
spaceuploader -t perl-5.10 -l tscherf
84%
Security without firewalls
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
and then explicitly allow certain users access. It's similar to the deny by default approach I touched on in another article [
3
]. To achieve this, the /etc/hosts.deny file would look like this: sshd: ALL To allow
84%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
version [
9
]. Listing
3
/etc/openvpn/ccd/John_Doe 01 # John Doe 02 ifconfig-push 192.168.1.
3
255.255.255.0 03 push "topology subnet" 04 push "redirect-gateway" 05 push "dhcp-option DNS 192
84%
Tracing applications with OProfile and SystemTap
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
686 oprofile-0.
9
.5-4.fc12.i686 To profile the kernel, you need to tell OProfile where the kernel image is located with the --vmlinux option: opcontrol --setup --vmlinux=/usr/lib/debug/lib/ modules
83%
Managing virtual infrastructures with oVirt 3.1
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
.1_release_notes oVirt Installation Guide: http://www.ovirt.org/w/images/
a/a
9
/OVirt-
3
.0-Installation_Guide-en-US.pdf ... Version
3
.1 of the oVirt management platform for virtual infrastructures has recently become available. On Fedora 17, the new release is easy to install and deploy. ... oVirt
3
.1 ... Managing virtual infrastructures with oVirt
3
.1
82%
Monitor your nodes with collectl
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
25-E SSD [
9
] courtesy of Intel is mounted as /dev/sdd ext4 filesystem with the default options Open MPI [10] v1.5.4 NAS Parallel Benchmarks
3.3
.1-MPI [11] Iozone [12] Daemon ...
9
« Previous
1
2
3
4
5
Next »