search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%200mb%3%A9n Llorente"22
?
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(91)
Article
(1)
Keywords
« Previous
1
2
3
4
5
6
7
8
9
10
Next »
43%
A simple approach to the OCFS2 cluster filesystem
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
from backup block#262144? <
n
> y Checking OCFS2 filesystem in /dev/sda1: label: backup uuid: 31 18 de 29 69 f
3
4d 95
a
0 99
a
7 23 ab 27 f5 04 number of blocks: 367486
43%
Creating an SFTP jail
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
be replaced solely with the sshd configuration directives shown in Listing
3
. Line 16 specifies that SFTP will listen on port 2202 instead of the default SSH port
22
. This option is configurable and left ...
3
43%
SSH Administration – Windows in a Unix World
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
with ; or \g. 03 Your MySQL connection id is
3
to server version 5.0.
22
01 Type 'help;' or '\h' for help. Type '\c' to clear the buffer. 01 mysql> Your connection to the MySQL server on the remote Unix
43%
Dispatches from the world of IT
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
will be accepted through April 10, 2011. Look for more on the Contegix website http://www.contegix.com/. Icinga v1.
3
.0 Released with Dual-Stack Support By now ...
3
43%
Monitoring daemons with shell tools
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
is not accessible! ****************" >> dba.log 15 /usr/local/etc/rc.d/002pgsql.sh start 16 sleep 15 17 psql -U monitor -d monitor -c "select * from watch;" 18 19 if [ $? -eq 0 ]; 20 21 then
22
43%
Boost performance of your Python programs
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
understanding of parallel computing [1]. I used the Ubuntu
9
.10 x86_64 desktop distribution along with Python 2.7 to test the code in this article and to generate the screen shots. Breaking GIL and Extracting
43%
Targeted defense against brute force attacks
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
-
N
sshguard The second command handles IPv6 packets. The next step is to extend the input chain so that network traffic is routed through the sshguard chain (Figure 2): sudo iptables -
A
INPUT -j ...
3
43%
Monitoring network computers with the Icinga Nagios fork
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
active_checks_enabled 1
22
passive_checks_enabled 0 23 check_command check_ssh 24 max_check_attempts
3
25
43%
Fast system management from Puppet Labs
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
], Fabric [
3
], or Capistrano [4], MCollective relies on middleware based on the publish/subscribe method to launch jobs on various nodes. The middleware supported by the framework can be any kind of STOMP
43%
Virtualization via Zones
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
directories, sets up links, and copies files into the zone to create the new system's layout (Listings 2 and
3
). The installation also creates the zone's chrooted directory /zones/web1 and sets the appropriate
« Previous
1
2
3
4
5
6
7
8
9
10
Next »