9%
31.10.2017
, and you’re ready to go.
I’ve been working with Linux for a long time. I ran a sysop team before I came to AMD. I used to run big clusters and storage arrays. We were all CentOS-based back then. I brought
9%
11.02.2016
requests from "starvation." For this purpose, it takes note of an expiration time for each request and pushes it into respective read and write queues sorted by time (deadline queues). The Deadline scheduler
9%
17.08.2011
Meter’s running - How to avoid spending all your money—
Ever been in a cab, stuck in traffic watching the meter run. You watch each 50-cent increment nudge the fair up dollar by dollar, wondering
9%
07.01.2024
filesystem so users can access it.
Listing Mount Options
When I first get on a new system, I like to poke around the filesystem to better understand what’s going on. I do this as a user, and of course I don
9%
02.10.2012
TCP Wrappers are versatile, sophisticated, and surprisingly easy to use, and they can secure your servers from attack with run-time ACL reconfiguration.
... \n\
Host\: %c\n\
Date\: $(date)\n\
" | /usr/bin/mail -s "Connection to %d blocked" chrisbinnie@email.com) &
Each time a running service port is probed, you can do far more than just logging ...
TCP Wrappers are versatile, sophisticated, and surprisingly easy to use, and they can secure your servers from attack with run-time ACL reconfiguration.
9%
25.03.2021
the commercial version of HAProxy: In addition to support, it comes with a few plugins for additional functions, such as a single sign-on (SSO) module and a real-time dashboard in which various HAProxy metrics can
9%
22.05.2023
, it's time to open the wizard in the browser for web-based configuration by typing http://:8004
. The secured URL (https
) is available on port 8003. The configuration
9%
17.04.2017
-Packard.
Horizon: Visualize
When it comes to the last component on the list, whether Horizon is needed for an OpenStack installation or not is a moot point. After all, each OpenStack service comes with its own API
9%
10.06.2015
browser below https://portal.office.com and using a synchronized user account. After entering the user's UPN, the Office 365 login page will redirect the browser to ADFS. There, the user
9%
12.09.2013
talked about CephX Ceph encryption and how a Ceph cluster could be used as a replacement for classic block storage in virtual environments [3]. Now, it's time to talk about what to do when things go wrong