search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcode%3 400 Llorente"52
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(43)
Article
(1)
Keywords
« Previous
1
2
3
4
5
Next »
25%
Exploring the differences between MariaDB and MySQL
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
because, if you choose not to use it, there is no effect. All of the above features and others are described in greater detail in the MariaDB Knowledgebase [
3
]. Compatibility With MariaDB, every effort
25%
Remote desktop based on HTML5
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
quickly view the password hash at the command line with the md5sum utility: # echo -n
| md5sum -t 319f4d26e
3
c536b5dd871bb2c
52
e3178 - Next, add this hash value instead of the password
25%
SSH Administration – Windows in a Unix World
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
with ; or \g. 03 Your MySQL connection id is
3
to server version 5.0.22 01 Type 'help;' or '\h' for help. Type '\c' to clear the buffer. 01 mysql> Your connection to the MySQL server on the remote Unix
25%
Container and hardware e-virtualization under one roof
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
; whereas KVM [
3
] supports genuine hardware virtualization in combination with the right CPU. Both virtualization technologies support maximum performance for the guest system in line with the current state
25%
Managing virtual machines
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
to give you consistent results with a running system. A cleaner approach would be to use an image backup program for Linux, such as Clonezilla [2] or Partimage [
3
], which means shutting down the system
25%
Neglected IPv6 features endanger the LAN
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
::1 (all nodes; Figure
3
). The payload of this message includes all valid IPv6 prefixes on the local subnet and other flags that allow a sophisticated configuration. The RA message is also repeated
25%
High availability clustering on a budget with KVM
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
" domain="kvm-node1"/> 47
48
49
50 51 -->
52
25%
Monitor your nodes with collectl
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
has some capabilities [
3
] that sar does not have. A collection of supporting tools [4] can also help collectl gather and post-process data. Collectl is easy to install if Perl is already installed
25%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
on hand; it is available on the web [2]. You will also find it useful to have the current version 1.0.2 [
3
] of the OCF Resource Agent Developer's Guide , created by Hastexo's Florian Haas. The Developer
25%
Win-win with Cygwin
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
'll receive the following response: The authenticity of host '192.168.1.250' can't be established. RSA key fingerprint is 87:17:c
3
:92:44:ba: 1a:df:d7:9c:44:b2:5b:73:
52
:09. Are you sure you want to continue
« Previous
1
2
3
4
5
Next »