search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcomm%3 00 Llorente"22
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(64)
Keywords
« Previous
1
2
3
4
5
6
7
Next »
70%
Troubleshooting SELinux
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
SELinux Information with -Z 01 # id -Z 02 user_u:system_r:unconfined_t 03 # ls -dZ /var/www/html 04 drwxr-xr-
x
root root system_u:object_r:httpd_sys_content_t /var/www/html 05 # ps -efZ | grep httpd 06
70%
Galera Cluster for MySQL
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
Ver 14.14 Distrib 5.5.
22
, for Linux (
x
86_64) using readline 5.1 ... Server version: 5.5.
20
MySQL Community Server (GPL), wsrep_23.4.r3713, wsrep_23.4.r3713 Protocol
69%
The Swiss Army knife of fault management
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
="retry" value="
3
"/> 18
19
20
21
69%
A Btrfs field test and workshop
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
System, DUP: total=8.
00
MB, used=4.
00
KB Metadata, DUP: total=1.
00
GB, used=79.
20
MB If Btrfs only has one device available when the filesystem is created, it automatically generates a duplicate
69%
Neglected IPv6 features endanger the LAN
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
40 1 ::/0 IPv6 addresses 30 2 2002::/16 6to4 addresses
20
3
::/96 IPv4-compatible addresses (obsolete) 10 4 ... IPv6 is establishing itself in everyday IT life, and all modern operating systems from Windows, through Mac OS
X
, to Linux have it on board; but if you let IPv6 introduce itself into your environment
69%
Boost performance of your Python programs
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
() 15 p1.start() 16 p
3
.start() 17 18 p1.join() 19 p2.join()
20
p
3
.join() To see that multiprocessing creates multiple subprocesses, run the code shown in Listing 2 (counting
69%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
under the 18 # following copyright: 19 #
20
# (c) 2002-2005 International Business Machines, Inc. 21 # 2005-2010 Linux-HA contributors
22
# 23 # See usage() function below for more details ... 24 # 25
69%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
. Tokens and Certificates Of course, the VPN dial-up no longer uses a simple pre-shared key (PSK) but, instead, uses secure, centrally manageable
X
.509 certificates [
3
] that automatically expire. You can
68%
Building a custom Cyberdeck
07.10.2025
Home
»
Archive
»
2025
»
Issue 89: Autom...
»
launched nary
20
years ago (Figure 1). Its underpowered early Atom CPU cannot support a modern graphical environment, but the intended use as a terminal in init
3
mode moots that concern entirely. Sadly, I
68%
Targeted defense against brute force attacks
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
, most likely, (
3
/2)
x
15 seconds. Finally, -s defines the number of seconds to wait before sshguard "forgets" the attacker's IP address. The line sshguard -l /var/log/auth.log -s
20
instructs sshguard ...
3
« Previous
1
2
3
4
5
6
7
Next »