search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%6mbps Llorente"52
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(84)
Article
(1)
Keywords
« Previous
1
2
3
4
5
6
7
8
9
Next »
43%
Data acquisition with shell tools
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
|21|" | cut -d\| -f3` 48 b=`cat $newdat | grep "50|25|" | cut -d\| -f3` 49 50 a=$(echo $a | tr \, \.) 51 b=$(echo $b | tr \, \.)
52
53 54 psum=$(echo "$a+$b" | bc ) 55 echo -n "Invoice amount: $psum, continue
43%
Workshop: Container virtualization with LXC on Ubuntu 10.04
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
lxc.cgroup.devices.allow = c 1:9 rwm 25 lxc.cgroup.devices.allow = c 1:8 rwm 26 lxc.cgroup.devices.allow = c 136:* rwm 27 lxc.cgroup.devices.allow = c
5:2
rwm 28 # rtc 29 lxc.cgroup.devices.allow = c ...
6
43%
An IT nomad's daily diary
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
is adding these entries to the Cobbler database. A typical example looks something like Listing 1. Listing 1 System Settings 01 # cobbler system add --name=foo --profile=ksprofile-devel-rhel
6
...
6
43%
Risk mitigation for Active Directory
27.05.2025
Home
»
Archive
»
2025
»
Issue 87: Light...
»
and computers from the outset. You will always want to use scripts to assign permissions in AD, because it already provides
90
percent of the code you need to check later for correct permissions and helps you
43%
The next generation of Internet connectivity
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
100.net) 56 data bytes 03 64 bytes from iy-in-x63.1e100.net: icmp_seq=1 ttl=
52
time=99.
6
ms 04 64 bytes from iy-in-x63.1e100.net: icmp_seq=2 ttl=
52
time=100 ms 05 64 bytes from iy-in-x63.1e100.net: icmp ... Transitioning from IPv4 to IPv
6
will be messy; we describe IPv
6
served three ways. ... IPv
6
... IPv
6
and Linux
43%
Building more efficient database applications with a graph database
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
comparison in Table 1. Table 1 Five Graph Databases Name Neo4j 1.
6
Sones Graph DB 2.0 InfoGrid 2.9.5 HyperGraphDB 1.1 VertexDB Homepage http
43%
Creating an SFTP jail
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
relatively easy if you opt to download the package from the website (Listing 2). Listing 2 Installing TCP Wrappers 01 bash#> cd /tmp 02 bash#> ls tcp_wrap* 03 tcp_wrappers-7.
6
.sol10-sparc
43%
Container and hardware e-virtualization under one roof
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
an official Linux kernel component in kernel version 2.
6
.20. KVM Inside As a kind of worst-case fallback, KVM can provide a slow but functional emulator for privileged functions, but it provides genuine
43%
SSH Administration – Windows in a Unix World
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
saved in /home/khess/.ssh/id_rsa.pub. 09 the key fingerprint is: 10
6
d:2c:04:dd:bf:b2:de:e1:fc:
52
:e9:7f:59:10:98:bb khess@windows 11 The key's randomart image is: 12 +--[ RSA 2048]----+ 13 | .. . o
43%
Managing virtual machines
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
CentOS 5 to
6
would work – a procedure the release notes advise against – a virtual environment seemed like the prudent decision. The first step is to create a copy of the current system, which should
« Previous
1
2
3
4
5
6
7
8
9
Next »