search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcomm 22 08 Llorente"5432
?
Refine your search
[x]
Creation time
: Last month
Sort order
Date
Score
Content type
Article (Print)
(33)
Keywords
« Previous
1
2
3
4
Next »
84%
Managing virtual machines
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
-net.rules -e "s/$oldmac/$newmac/" 19 virt-edit $vmname /etc/sysconfig/network -e "s/vm1/$vmname/"
20
21 echo $newid >> vm-list.txt
22
23 echo "cloning finished, starting vm" 24 virsh start $vmname
84%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
="**/*.jar" />
20
21
22
23 24
25
83%
Server virtualization with VirtualBox
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
, Mac OS
X
, and Solaris), and it supports a wide number of guest systems, including exotics such as DOS/WIN 3.1 and OS/2. Installing VirtualBox is easy on any platform because it usually only involves
83%
Touring the top Knoppix debugging and rescue tools
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
119422514 07 hda: dma_intr: status=0
x
51 { DriveReady SeekComplete Error }
08
hda: dma_intr: error=0
x
40 { UncorrectableError }, LBAsect=119422536, high=7, low=1982024, sector=119422522\ 2. rsync
83%
High availability clustering on a budget with KVM
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
/sda
20
Account information: 21 ACL information:
22
ALL Network Bonding To prevent the network cards and thus the connection to the cluster and storage network from becoming a single
83%
Get the best out of your bandwidth with tc
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
help point out which line is the culprit. Simply run your script as follows: # bash -
x
./bandwidth_throttler Typing dmesg could give direct feedback from the kernel too. Cooking with Gas Now I
83%
Targeted defense against brute force attacks
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
, most likely, (3/2)
x
15 seconds. Finally, -s defines the number of seconds to wait before sshguard "forgets" the attacker's IP address. The line sshguard -l /var/log/auth.log -s
20
instructs sshguard
83%
Monitor your nodes with collectl
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
X
4 920 CPU (quad core) 8GB of memory (DDR2-800) The operating system and boot drive are on an IBM DTLA-307020 (
20
GB drive at Ultra ATA/100) /home is on a Seagate ST1360827AS A 64GB Intel
X
82%
Server virtualization with Citrix XenServer
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
/** 16 * @param args 17 */ 18 public static void main(String[] args) throws Exception { 19
20
if (args.length != 3 && args.length != 5) 21 {
22
System
82%
Business continuity for small to medium-sized enterprises
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
. In the test scenario, I defined a backup schedule with the following settings: Schedule: weekly Daily full backup: Monday – Friday
20
:00 Daily incremental backup: Monday – Friday
08
:00--18:00, 30
« Previous
1
2
3
4
Next »