48%
30.11.2025
. In the test scenario, I defined a backup schedule with the following settings:
Schedule: weekly
Daily full backup: Monday – Friday 20:00
Daily incremental backup: Monday – Friday 08:00--18:00, 30
48%
30.11.2025
initial tests are quite reasonable: 1GB memory, a virtual CPU, about 20GB of disk space, and a bridged network adapter with an Internet connection will do for now. Sun xVM VirtualBox is a good choice
48%
30.11.2025
X4 920 CPU (quad core)
8GB of memory (DDR2-800)
The operating system and boot drive are on an IBM DTLA-307020 (20GB drive at Ultra ATA/100)
/home is on a Seagate ST1360827AS
A 64GB Intel X
48%
30.11.2025
, to monitoring and controlling complete systems.
Identifying Services
OpenNMS can automatically identify the services you need to monitor. In versions up to 1.8.x, this task is handled by the capabilities daemon
48%
30.11.2025
-address remotelan;
16 application any;
17 }
18 then {
19 permit;
20 }
21 }
22 }
You need to define trustnet and remotelan in the zone address book because Juniper only processes
48%
30.11.2025
/**
16 * @param args
17 */
18 public static void main(String[] args) throws Exception {
19
20 if (args.length != 3 && args.length != 5)
21 {
22 System
48%
30.11.2025
-tuxgeek.rhcloud.com,174.129.129.190' (RSA) to the list of known hosts.
20 Enter passphrase for key '/home/tscherf/.ssh/libra_id_rsa':
21 Confirming application spaceuploader is available
22 Attempt # 1
23
24 Success
47%
30.11.2025
_copied=copy_to_user(user,hello_world,to_copy);
19 return to_copy-not_copied;
20 }
21
22 static struct file_operations fops = {
23 .owner= THIS_MODULE,
24 .read= driver_read,
25 };
26
27 static int __init mod_init( void )
28 {
29
47%
30.11.2025
: tscherf@TUXGEEK.DE
15 SASL SSF: 56
16 SASL data security layer installed.
17 dn: uid=TScherf,ou=People,dc=tuxgeek, dc=de
18 givenName: Thorsten
19 sn: Scherf
20 loginShell: /bin/bash
21 uidNumber: 9999
22
47%
30.11.2025
lists locally logged in users only; -x leaves out the login times. The PsLoggedOn tool is useful when you need to investigate unauthorized access to your network and see the computers on which a user