search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcode%3 400 Llorente"52
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(43)
Article
(2)
Keywords
« Previous
1
2
3
4
5
Next »
25%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
qemu_x86_defconfigmake menuconfig (build-option, Kernel-Version
3
.2, gdb, tty1)makemake linux-menuconfig (debug info) make
3
. Compile the module and copy it to the root directory:cd driverexport CROSS
25%
Exploring the differences between MariaDB and MySQL
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
because, if you choose not to use it, there is no effect. All of the above features and others are described in greater detail in the MariaDB Knowledgebase [
3
]. Compatibility With MariaDB, every effort
25%
Remote desktop based on HTML5
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
quickly view the password hash at the command line with the md5sum utility: # echo -n
| md5sum -t 319f4d26e
3
c536b5dd871bb2c
52
e3178 - Next, add this hash value instead of the password
25%
SSH Administration – Windows in a Unix World
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
with ; or \g. 03 Your MySQL connection id is
3
to server version 5.0.22 01 Type 'help;' or '\h' for help. Type '\c' to clear the buffer. 01 mysql> Your connection to the MySQL server on the remote Unix
25%
Container and hardware e-virtualization under one roof
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
; whereas KVM [
3
] supports genuine hardware virtualization in combination with the right CPU. Both virtualization technologies support maximum performance for the guest system in line with the current state
25%
Managing virtual machines
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
to give you consistent results with a running system. A cleaner approach would be to use an image backup program for Linux, such as Clonezilla [2] or Partimage [
3
], which means shutting down the system
25%
Neglected IPv6 features endanger the LAN
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
::1 (all nodes; Figure
3
). The payload of this message includes all valid IPv6 prefixes on the local subnet and other flags that allow a sophisticated configuration. The RA message is also repeated
25%
High availability clustering on a budget with KVM
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
" domain="kvm-node1"/> 47
48
49
50 51 -->
52
25%
Monitor your nodes with collectl
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
has some capabilities [
3
] that sar does not have. A collection of supporting tools [4] can also help collectl gather and post-process data. Collectl is easy to install if Perl is already installed
25%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
on hand; it is available on the web [2]. You will also find it useful to have the current version 1.0.2 [
3
] of the OCF Resource Agent Developer's Guide , created by Hastexo's Florian Haas. The Developer
« Previous
1
2
3
4
5
Next »