search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%220mb 12%A9n Llorente 22
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(44)
Keywords
1
2
3
4
5
Next »
100%
Give your servers the once over with Nmap
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
.34.56.78 -o
N
filename If you want screeds of detail, then it's also simple just to add the verbosity switch (twice for even more detail): # nmap -vv -sS
12
.34.56.78 To truly avoid detection (in conjunction
97%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
# Header for user-specific report 19 printf("%2s\t%4s\t%4s\tD=%2d\
n
", "
N
", "Xdat", "Xpdq", MAXDUMMIES); 20 21 foreach $users (sort {$
a
<=> $b} @vusers) {
22
pdq::Init($model); 23 $pdq::streams = pdq
94%
Workshop: Container virtualization with LXC on Ubuntu 10.04
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
you additionally need in /cgroup. The following command is all the root user needs to run a single command – such as a shell – in an application container: lxc-execute -
n
foo -f /usr
93%
ARP cache poisoning and packet sniffing
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
Destination MAC address Listing 1 Nemesis arp Packets 01 $ while true 02 > do 03 > sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 -D 192.168.1.133 -h 00:
22
:6E:71:04:BB -m 00:0C:29:B2:78:
9
92%
Data acquisition with shell tools
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
"------------------------------------------------------" 18 echo -
n
"Replace stored data line (y)? ";read we 19 if [ "$we" = "y" ]; 20 then 21
22
# Delete line and write to 23 # temporary file 24 25 # Build sed instruction 26
91%
Managing virtual machines
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
filesystem, if so desired [5]: $ guestfish -
N
fs:ext3 When you call Guestfish with the new image, $ guestfish -
a
you are taken to a shell where you first need to enter run to toggle the system ...
9
90%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
07 if [ -
n
"$OCF_RESKEY_monitor_sipuri" ]; then 08 check_binary sipsak 09 fi 10 11 if [ ! -f $OCF_RESKEY_config ]; then
12
ocf_log err "Config $OCF_RESKEY_config doesn
89%
Mandatory access control with Tomoyo Linux
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
.0
2.2
.x. 2.6.30 through 2.6.35 Debian 6 (Squeeze) 2.3.x. 2.6.36 through 3.0 Ubuntu 11.10 2.4.x. 3.1. openSUSE
12
.1 2.5.x. 3 ...
9
89%
A simple approach to the OCFS2 cluster filesystem
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
_dlm] root 3467 7 0 20:07 ? 00:00:00 [o2net] root 3965 7 0 20:24 ? 00:00:00 [ocfs2_wq] root 7921 7 0
22
:40 ? 00:00:00 [o2hb-BD5
A
574EC8] root 7935 7
89%
Strategies for routing voice calls around a firewall
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
.atlanta.com:5060; branch=z
9
hG4bKnashds8 03 Max-Forwards: 70 04 To: Bob
05 From: Alice
;tag=1928301774 06 Call-ID:
a
84b4c76e66710 07 CSeq: 314159 INVITE 08 Contact
1
2
3
4
5
Next »