search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcomm"22 09 Llorente
?
Refine your search
[x]
Creation time
: Last month
Sort order
Date
Score
Content type
Article (Print)
(32)
Keywords
« Previous
1
2
3
4
Next »
84%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
_copied=copy_to_user(user,hello_world,to_copy); 19 return to_copy-not_copied;
20
} 21
22
static struct file_operations fops = { 23 .owner= THIS_MODULE, 24 .read= driver_read, 25 }; 26 27 static int __init mod_init( void ) 28 { 29
84%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
="**/*.jar" />
20
21
22
23 24
25
84%
Monitor your nodes with collectl
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
X
4 920 CPU (quad core) 8GB of memory (DDR2-800) The operating system and boot drive are on an IBM DTLA-307020 (
20
GB drive at Ultra ATA/100) /home is on a Seagate ST1360827AS A 64GB Intel
X
84%
Single sign-on with SSSD, LDAP, and Kerberos
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
: tscherf@TUXGEEK.DE 15 SASL SSF: 56 16 SASL data security layer installed. 17 dn: uid=TScherf,ou=People,dc=tuxgeek, dc=de 18 givenName: Thorsten 19 sn: Scherf
20
loginShell: /bin/bash 21 uidNumber: 9999
22
84%
High availability clustering on a budget with KVM
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
/sda
20
Account information: 21 ACL information:
22
ALL Network Bonding To prevent the network cards and thus the connection to the cluster and storage network from becoming a single
84%
Targeted defense against brute force attacks
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
, most likely, (3/2)
x
15 seconds. Finally, -s defines the number of seconds to wait before sshguard "forgets" the attacker's IP address. The line sshguard -l /var/log/auth.log -s
20
instructs sshguard
83%
Server virtualization with Citrix XenServer
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
/** 16 * @param args 17 */ 18 public static void main(String[] args) throws Exception { 19
20
if (args.length != 3 && args.length != 5) 21 {
22
System
82%
Touring the top Knoppix debugging and rescue tools
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
="4096" 12 13 # Last offset to try 14 final_offset="$(du -b "$DEV" | cut -f 1)" 15 16 # A free loop device 17 LOOP="/dev/loop2" 18 19 # Start
20
offset=0 21
22
while [ "$offset" -lt "$final_offset" ]; do
82%
A standard cloud computing API
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
"Polling for changes (Ctrl-C to end)" 17 loop do 18 sleep 2 19 client.instances.each do |inst|
20
if state[inst.id] != inst.state 21 if state[inst.id]
22
puts "#{inst.id} changed from
82%
Container and hardware e-virtualization under one roof
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
an official Linux kernel component in kernel version 2.6.
20
. KVM Inside As a kind of worst-case fallback, KVM can provide a slow but functional emulator for privileged functions, but it provides genuine
« Previous
1
2
3
4
Next »