search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xsede%3 00s Llorente 08
?
Refine your search
[x]
Creation time
: Last month
Sort order
Date
Score
Content type
Article (Print)
(61)
Keywords
« Previous
1
2
3
4
5
6
7
Next »
25%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
:add-symbol-file module.ko text_address -
s
.data data_address -
s
.bss bss_address 9. Debug: Set breakpoints and so on. In Toolchain , enable the Build gdb for the Host option; in Kernel | Kernel version , type
3
25%
Shell scripts: Equal rights for Unix derivatives and Linux
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
environments. The example in Listing
3
shows how you could handle scripting if this is relevant to your environment. Listing
3
Handling Special Cases 01 OS=`uname -
s
` 02 RSH="rsh -l user" 03 RSH2
25%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
_NOT_RUNNING
08
fi 09 10 pid=`cat $ASTRUNDIR/asterisk.pid` 11 ocf_run kill -
s
0 $pid 12 rc=$? 13 14 if [ $rc -eq 0 ]; then 15 if ocf_is_true "$OCF_RESKEY_realtime"; then 16
25%
Archiving email and documents for small businesses
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
.tex att
3
.tex > attach.tex 28 pdflatex attach.tex 29 30 # Generate filename from date and random number 31 32 dn=$(date +%Y-%m-%d-%H-%M-%
S
.$$) 33 34 # Merge PDF files 35 36 pdftk A=copy.pdf B=attach.pdf CAT
25%
Cgroups for resource management in Linux
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
cgroup, which has no restrictions. You can test this by sending a SIGUSR1 to the process: # kill -USR1 $pid 578804+0 records in 578804+0 records out 296347648 bytes (296 MB) copied, 7.00803
s
, 42.
3
MB/
s
25%
Using the Expect scripting environment
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
tcsh\r" 06 expect "#" 07 send "cp .ssh/authorized_keys ~root/.ssh\r"
08
expect "#" 09 send "cd /etc/ssh; cp sshd_config{,.0}\r" 10 expect "#" 11 send "cat sshd_config.0 | sed -e '
s
24%
High availability clustering on a budget with KVM
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
. Current enterprise solutions for the virtualization of servers and desktops [
3
] are all based on KVM. Setup and Software The example discussed in this article uses two physical nodes: host1 and host2
24%
The fail2ban intrusion prevention framework
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
Users$ 07 ^%(__prefix_line)sauthentication failure; logname=\
S
* uid=\
S
* euid=\
S
* tty=\
S
* ruser=\
S
* rhost=
(?:\
s+user=.*)?\s
*$
08
^%(__prefix_line)srefused connect from \
S
+ \(
\)\
s
24%
Apache 2.4 with mod_lua
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
type="text" name="firstname"> 07
08
09 10