6%
28.11.2022
/en_us/blog/learn/log-management.html
Splunk alternatives: https://www.mezmo.com/blog/5-splunk-alternatives-for-logging-their-benefits-shortcomings-and-which-one-to-choose
Elastic: https://www.elastic.co/
Logstash: https://www.elastic.co/guide/en/logstash/current/getting
6%
10.10.2012
available for major distributions such as Red Hat 5 and 6, CentOS 5 and 6, and openSUSE.
Although openlava is tremendously easy to install, you have to pay attention to a few gotchas. (In my first attempt I
6%
15.04.2020
Ever since Python was created, users have been looking for ways to achieve multiprocessing with threads, which the Python global interpreter lock (GIL) prevents. One common approach to getting
6%
17.06.2011
and Deb or RPM packages off the project website. To quickly download and start using an individual tool, you can also try:
wget http://www.maatkit.org/get/ toolname
Maatkit currently includes 30 tools
6%
30.11.2025
lists how quickly the server responds on average (see Figure 6). Time windows of 1, 5, and 15 minutes are used by default to evaluate responsiveness; however, you can change the defaults as needed
6%
14.08.2017
no exception. I have lots of data that I want to keep available, yet rarely touch.
Even though you can now get 10TB hard drives and high-performance computing (HPC) systems routinely have more than 1PB
6%
08.10.2015
One unpleasant experience for any system administrator is a server that does not respond as expected. Difficult questions follow: Why did the reboot fail? How can the server be resuscitated
6%
18.03.2013
-life examples of SQL injection attack vectors, explains how carelessness can cause them, and shows how far-reaching the impact can be. I will start by demonstrating these SQL attack techniques manually, then I
6%
05.02.2019
that it knows how to serve up the SuiteCRM application. Again, change the directory to the folder where Apache keeps track of the sites it has available and create a new virtual host configuration file for your
6%
14.03.2013
-life examples of SQL injection attack vectors, explains how carelessness can cause them, and shows how far-reaching the impact can be. I will start by demonstrating these SQL attack techniques manually, then I