search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(111)
Article
(1)
Keywords
« Previous
1
2
3
4
5
6
7
8
9
10
...
12
Next »
65%
The next generation of Internet connectivity
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
, which makes for a ridiculously large address space, although back when IPv4 was created, I'
m
sure they thought the same thing (see the "IPv6 Logging" box). IPv6 Logging For any logging of network
64%
Managing mailing lists with Mlmmj
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
-Post:
08 List-Help:
09
List-Subscribe:
10 List-Owner:
64%
Using the Expect scripting environment
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
for a command within a script, as shown in Listing 1. Listing 1 Input Redirection 01 for jobname in $jobs; do 02 for molecule in $mlist; do 03 04 g
09
<
$molecule.log 05 @$jobname 06 07 $charge
62%
Continuous integration with Jenkins
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
't even ask for a paycheck, because I'
m
talking here about Jenkins, the butler – some readers may know him as Hudson. Jenkins [1] is a web-based Java application that runs in any modern servlet container
62%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
.0" encoding="utf-
8
"?>
1
This completes the "Hello World" example
62%
Protecting web servers with ModSecurity
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
, a request like http://www.example.
com
/index.html?file=/etc/passwd would trigger the sample rule in line
8
. Then the action defined in line 9 would block the request. The client sees an HTTP 403 Forbidden
60%
Compressed Archives for User Projects
11.08.2025
Home
»
Articles
»
will use that in a bit. Listing 1: Check Directory Content $ ls -lstar total 62310 31150 drwxrwxr-x 0 laytonjb laytonjb 31897275 Dec 31 1969 DATA1 31152 -rw-rw-r-- 1 laytonjb laytonjb 31897275 Aug 2
09
60%
Boost performance of your Python programs
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
if '__main__' == __name__:
09
10 p1 = Process(target = test, args = ('Rich',)) 11 p2 = Process(target = test, args = ('Nus',)) 12 p3 = Process(target = test, args = ('Geeks',)) 13 14 p2.start
60%
Fast system management from Puppet Labs
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
. In combination with the configuration management tools, such as Puppet [
8
], MCollective is an extremely powerful but easy-to-handle system management tool. Thanks to its middleware approach, MCollective
60%
An IT nomad's diary
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
/app/repo/RPM-GPG-KEY-redhat-beta 07 ggpkey=https://openshift.redhat.
com
/app/repo/RPM-GPG-KEY-redhat-release 08 enabled=1
09
gpgcheck=1 Next, yum install rhc downloads the client tools to the local machine. Before you can really
« Previous
1
2
3
4
5
6
7
8
9
10
...
12
Next »