search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(79)
Keywords
« Previous
1
2
3
4
5
6
7
8
12%
Web applications with Julia
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
.0.0.1", PORT) do ws 08 for msg in ws 09 d = Meta.parse(JSON.parse(msg)["
s
"]) 10 @info d 11 @info typeof(d)
12
WebSockets.send(ws, """
You picked $d
12%
File access optimization discovery and visualization
27.05.2025
Home
»
Archive
»
2025
»
Issue 87: Light...
»
type of suboptimal file I/O is inefficient file access patterns. Our script [
6
] can help with the problem of unnecessary frequent and small reads and writes of data inside a file. In this article, we
12%
Intrusion detection with Prelude
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
11
12
13
Order allow,deny 14 Allow from all 15 16 17 Alias /prewikka/ /usr/share/prewikka/htdocs/ 18 ScriptAlias / /usr/share/prewikka/cgi-bin/prewikka.cgi 19
12%
With great PowerShell comes great responsibility
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
-Process cmdlet reports system process information in the format shown in Listing 1. Listing 1 Default Get-Process Format 01 Handles NPM(K) PM(K) WS(K) VM(M) CPU(
s
) Id ProcessName 02
12%
Proactive threat detection
07.10.2025
Home
»
Archive
»
2025
»
Issue 89: Autom...
»
[
12
], and Icinga [
13
], with the advantage that existing alert chains and escalation levels can be rehashed without any problems. Once Falco is connected to the existing monitoring system, alerts
12%
Apache 2.4 with mod_lua
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
:puts("
Answer
") 07 r:puts("") 08 09 for k, v in pairs(r:parseargs()) do 10 if k=='firstname' then 11 firstname=v
12
elseif k=='lastname' then
13
lastname=v 14 end 15
12%
Introduction to behavior-driven monitoring
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
/usr/lib64/ruby/1.8/logger.rb:487:in `initialize'
12
/usr/lib64/ruby/1.8/logger.rb:263:in `new'
13
/usr/lib64/ruby/1.8/logger.rb:263:in `initialize' 14 /usr/lib/nagios
12%
Intelligent observability with AI and Coroot
27.05.2025
Home
»
Archive
»
2025
»
Issue 87: Light...
»
offer options that automatically identify and warn you about distributed denial of service (DDo
S
) attacks so that you can immediately block the attack at the network level. Although these solutions
12%
Create a high availability VM with DRBD9 and Reactor
07.10.2025
Home
»
Archive
»
2025
»
Issue 89: Autom...
»
consuming and expensive, which is what prompted Linbit to build an alternative to Pacemaker that specializes in handling simple use cases: DRBD Reactor [
6
]. In this article, I describe how DRBD and DRBD
« Previous
1
2
3
4
5
6
7
8