search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcomm%3 00 Llorente"22
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(67)
Keywords
« Previous
1
2
3
4
5
6
7
Next »
70%
Troubleshooting SELinux
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
SELinux Information with -Z 01 # id -Z 02 user_u:system_r:unconfined_t 03 # ls -dZ /var/www/html 04 drwxr-xr-
x
root root system_u:object_r:httpd_sys_content_t /var/www/html 05 # ps -efZ | grep httpd 06
70%
Galera Cluster for MySQL
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
Ver 14.14 Distrib 5.5.
22
, for Linux (
x
86_64) using readline 5.1 ... Server version: 5.5.
20
MySQL Community Server (GPL), wsrep_23.4.r3713, wsrep_23.4.r3713 Protocol
69%
The Swiss Army knife of fault management
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
="retry" value="
3
"/> 18
19
20
21
69%
A Btrfs field test and workshop
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
System, DUP: total=8.
00
MB, used=4.
00
KB Metadata, DUP: total=1.
00
GB, used=79.
20
MB If Btrfs only has one device available when the filesystem is created, it automatically generates a duplicate
69%
Neglected IPv6 features endanger the LAN
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
40 1 ::/0 IPv6 addresses 30 2 2002::/16 6to4 addresses
20
3
::/96 IPv4-compatible addresses (obsolete) 10 4 ... IPv6 is establishing itself in everyday IT life, and all modern operating systems from Windows, through Mac OS
X
, to Linux have it on board; but if you let IPv6 introduce itself into your environment
69%
Boost performance of your Python programs
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
() 15 p1.start() 16 p
3
.start() 17 18 p1.join() 19 p2.join()
20
p
3
.join() To see that multiprocessing creates multiple subprocesses, run the code shown in Listing 2 (counting
69%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
under the 18 # following copyright: 19 #
20
# (c) 2002-2005 International Business Machines, Inc. 21 # 2005-2010 Linux-HA contributors
22
# 23 # See usage() function below for more details ... 24 # 25
69%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
. Tokens and Certificates Of course, the VPN dial-up no longer uses a simple pre-shared key (PSK) but, instead, uses secure, centrally manageable
X
.509 certificates [
3
] that automatically expire. You can
68%
Building a custom Cyberdeck
07.10.2025
Home
»
Archive
»
2025
»
Issue 89: Autom...
»
launched nary
20
years ago (Figure 1). Its underpowered early Atom CPU cannot support a modern graphical environment, but the intended use as a terminal in init
3
mode moots that concern entirely. Sadly, I
68%
Targeted defense against brute force attacks
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
, most likely, (
3
/2)
x
15 seconds. Finally, -s defines the number of seconds to wait before sshguard "forgets" the attacker's IP address. The line sshguard -l /var/log/auth.log -s
20
instructs sshguard ...
3
« Previous
1
2
3
4
5
6
7
Next »