search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%220mb 12%A9n Llorente 22
?
Refine your search
[x]
Creation time
: Last month
Sort order
Date
Score
Content type
Article (Print)
(36)
Keywords
1
2
3
4
Next »
100%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
# Header for user-specific report 19 printf("%2s\t%4s\t%4s\tD=%2d\
n
", "
N
", "Xdat", "Xpdq", MAXDUMMIES); 20 21 foreach $users (sort {$
a
<=> $b} @vusers) {
22
pdq::Init($model); 23 $pdq::streams = pdq
97%
Workshop: Container virtualization with LXC on Ubuntu 10.04
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
you additionally need in /cgroup. The following command is all the root user needs to run a single command – such as a shell – in an application container: lxc-execute -
n
foo -f /usr
96%
ARP cache poisoning and packet sniffing
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
Destination MAC address Listing 1 Nemesis arp Packets 01 $ while true 02 > do 03 > sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 -D 192.168.1.133 -h 00:
22
:6E:71:04:BB -m 00:0C:29:B2:78:
9
95%
Data acquisition with shell tools
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
"------------------------------------------------------" 18 echo -
n
"Replace stored data line (y)? ";read we 19 if [ "$we" = "y" ]; 20 then 21
22
# Delete line and write to 23 # temporary file 24 25 # Build sed instruction 26
94%
Managing virtual machines
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
filesystem, if so desired [5]: $ guestfish -
N
fs:ext3 When you call Guestfish with the new image, $ guestfish -
a
you are taken to a shell where you first need to enter run to toggle the system ...
9
92%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
07 if [ -
n
"$OCF_RESKEY_monitor_sipuri" ]; then 08 check_binary sipsak 09 fi 10 11 if [ ! -f $OCF_RESKEY_config ]; then
12
ocf_log err "Config $OCF_RESKEY_config doesn
92%
Mandatory access control with Tomoyo Linux
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
.0
2.2
.x. 2.6.30 through 2.6.35 Debian 6 (Squeeze) 2.3.x. 2.6.36 through 3.0 Ubuntu 11.10 2.4.x. 3.1. openSUSE
12
.1 2.5.x. 3 ...
9
91%
A simple approach to the OCFS2 cluster filesystem
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
_dlm] root 3467 7 0 20:07 ? 00:00:00 [o2net] root 3965 7 0 20:24 ? 00:00:00 [ocfs2_wq] root 7921 7 0
22
:40 ? 00:00:00 [o2hb-BD5
A
574EC8] root 7935 7
91%
Strategies for routing voice calls around a firewall
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
.atlanta.com:5060; branch=z
9
hG4bKnashds8 03 Max-Forwards: 70 04 To: Bob
05 From: Alice
;tag=1928301774 06 Call-ID:
a
84b4c76e66710 07 CSeq: 314159 INVITE 08 Contact
91%
Storage system with OpenSolaris and Comstar
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
-b81d-c42b-c008-
a
70649501262 05 # stmfadm add-view -h myiscsiclient -t myiscsiserver -
n
1 600144f05f71070000004bc999020002 # cat /etc/iscsi/initiatorname.iscsi InitiatorName=iqn.1993-08.org
1
2
3
4
Next »