search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%220mb%3%A9n Llorente"52
?
Refine your search
[x]
Creation time
: Last month
Sort order
Date
Score
Content type
Article (Print)
(60)
Article
(1)
Keywords
1
2
3
4
5
6
7
Next »
100%
Automating Migration to openEuler
30.11.2025
Home
»
Archive
»
2025
»
Issue 90 VoIP N...
»
Rubén
Llorente
... an Enterprise Linux-like system for servers and cloud environments. It boasts a number of unique utilities, such as iSulad, a lightweight container runtime daemon;
A
-Tune, an AI-powered performance tuning tool
61%
Data acquisition with shell tools
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
|21|" | cut -d\| -f
3
` 48 b=`cat $newdat | grep "50|25|" | cut -d\| -f
3
` 49 50
a
=$(echo $
a
| tr \, \.) 51 b=$(echo $b | tr \, \.)
52
53 54 psum=$(echo "$
a
+$b" | bc ) 55 echo -
n
"Invoice amount: $psum, continue
60%
Workshop: Container virtualization with LXC on Ubuntu 10.04
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
and modifying the IP address in line 8. The line lxc-create -
n
guest -f /lxc/conf.guest Listing
3
Container Configuration: conf.guest 01 lxc.utsname = guest 02 lxc.tty = 4 03 lxc
58%
Managing virtual machines
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
filesystem, if so desired [5]: $ guestfish -
N
fs:ext
3
When you call Guestfish with the new image, $ guestfish -
a
you are taken to a shell where you first need to enter run to toggle the system ...
9
56%
Julia: A new language for technical computing
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
)* Julia Python MATLAB Octave R JavaScript v
3
f670da0 v2.7.1 vR2011
a
v
3
.4 v2.14.2 v8
3
.6.6.11 fib 1.97 31
55%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
_ERR_GENERIC;; 37
3
) return $OCF_NOT_RUNNING;; 38 esac 39 fi 40 41 ocf_log debug "Asterisk PBX monitor succeeded" 42 return $OCF_SUCCESS 43 } Listing
9
asterisk
54%
High availability clustering on a budget with KVM
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
" domain="kvm-node1"/> 47
48
49
50 51 -->
52
53%
Monitor your nodes with collectl
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
25-E SSD [
9
] courtesy of Intel is mounted as /dev/sdd ext4 filesystem with the default options Open MPI [10] v1.5.4 NAS Parallel Benchmarks
3.3
.1-MPI [11] Iozone [12] Daemon ...
9
52%
ARP cache poisoning and packet sniffing
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
Destination MAC address Listing 1 Nemesis arp Packets 01 $ while true 02 > do 03 > sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 -D 192.168.1.133 -h 00:
22
:6E:71:04:BB -m 00:0C:29:B2:78:
9
51%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days. Brute force is a single-character-at-
a
1
2
3
4
5
6
7
Next »