23%
31.10.2025
applications from Asterisk to OpenERP, Drupal or Mediawiki, Zarafa, vTiger, Moodle, and so on. All told, we counted 15 in-house applications and more than 20 from third parties.
In enterprise use, the Disk
23%
31.10.2025
for Local file system
23 - elastichosts plugin for ElasticHosts
24 - openstack plugin for OpenStack
25 - libvirt plugin for libvirt Virtualisation API
The Appliance Definition File
Before you
23%
30.11.2025
interfaces. You can permanently set traffic forwarding on most distributions by opening the file /etc/sysctl.conf in a favorite text editor and adding or uncommenting:
net.ipv4.ip_forward = 1
To enable
23%
30.11.2025
libraries. Functions that would compromise the security of the sandbox have been removed, including, for example, functions for opening sockets or writing to files. For the same reasons, the run
23%
30.11.2025
, the server doesn't store any user or system information; all of that is stored at a different location, such as on a directory server.
The initial Kerberos login is very simple. The client opens a connection
23%
30.11.2025
://backports.debian.org/
"DRBD – Storage Replikation mit Open Source" by Martin Gerhard Loschwitz. ADMIN Magazine
, 04/2011, pg. 80 (in German only).
The Author
Martin Gerhard Loschwitz works as a principal
23%
30.11.2025
because the redirection, and thus the opening of the file, has precedence over the sudo
command and fails if you are not already root.
Instead, use echo -n 1 | sudo tee /sys
23%
30.11.2025
managed network switches only do IPv4, sigh.) However, much open source firmware, like DD-WRT, does support IPv6 (but only certain builds), and every major version of Linux shipped in the last decade or so
23%
30.11.2025
packages for large to mid-range distributions, whereas Horde 4 is still trying to catch up. Right now, packages are available for openSUSE and FreeBSD, and Debian will be available in the near future
23%
30.11.2025
no listening sockets available, shutting down
04 Unable to open logs
05 [FAILED]
Listing 12
Looking at the Audit Log File
01 # egrep '^type