search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%2522Rub%2222%25390 Llorente"523
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(47)
Article
(1)
Keywords
« Previous
1
2
3
4
5
46%
An IP-based load balancing solution
30.11.2025
Home
»
CloudAge
»
Articles
»
balancer is considered the single point of entry of server cluster systems. It runs IP Virtual Server (IPVS) [
2
], which implements IP load balancing techniques inside the Linux kernel. With IPVS, all real
46%
The latest developments in Open-Xchange 6.20
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
&1, for example, will be familiar with the software under the name of 1&1 Webmail and 1&1 MailXchange. On top of the
2.5
million 1&1 customers, another 1.4 million users with Host Europe, and 40,000 root and v
46%
With great PowerShell comes great responsibility
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
.50 1164 atieclxx 06 102
9
2024 2380 34 0.08 960 atiesrxx 07 118
9
15648 15772 50 2664 audiodg 08 1337 528 42548 61444 284
2
...
9
46%
Galera Cluster for MySQL
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
temporarily with Listing 5 Error Messages sh: /sbin/ifconfig: Permission denied 120405 8:29:02 [ERROR] WSREP: Failed to read output of: '/sbin/ifconfig | \ grep -m1 -1 -E '^[
a
-z]?eth[0-
9
46%
Dynamic routing in Linux with Quagga
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
with the Zebra Routing Daemon by Japanese developer Kunihiro Ishiguro [
2
]. The software is included in all popular Linux distributions and also runs on Unix derivatives like Solaris and Free/Net/OpenBSD. Quagga
45%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
VPN. The free SSL virtual private network (VPN) joined the mainstream with release
2
.1, and it is useful for large-scale setups. Aladdin [
2
] dominates the market for USB stick-based cryptographic access control
45%
New approaches for forensics in cloud environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
on the cloud security problem and on corresponding legal issues [1]. This paucity of information was confirmed by other publications [
2
] [3]. Despite this, the topic is still largely overlooked and a huge amount
45%
File access optimization discovery and visualization
27.05.2025
Home
»
Archive
»
2025
»
Issue 87: Light...
»
described in this article: https://linuxnewmedia.thegood.cloud/s/
9
n
FQcFb
2
p8oRMEJ pandas.DataFrame: https://pandas.pydata.org/docs/reference/api/pandas.DataFrame.html The Author Andreas
« Previous
1
2
3
4
5