search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%220mb 12%A9n Llorente 22
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(42)
Keywords
1
2
3
4
5
Next »
100%
Give your servers the once over with Nmap
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
.34.56.78 -o
N
filename If you want screeds of detail, then it's also simple just to add the verbosity switch (twice for even more detail): # nmap -vv -sS
12
.34.56.78 To truly avoid detection (in conjunction
97%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
# Header for user-specific report 19 printf("%2s\t%4s\t%4s\tD=%2d\
n
", "
N
", "Xdat", "Xpdq", MAXDUMMIES); 20 21 foreach $users (sort {$
a
<=> $b} @vusers) {
22
pdq::Init($model); 23 $pdq::streams = pdq
94%
Workshop: Container virtualization with LXC on Ubuntu 10.04
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
you additionally need in /cgroup. The following command is all the root user needs to run a single command – such as a shell – in an application container: lxc-execute -
n
foo -f /usr
93%
ARP cache poisoning and packet sniffing
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
Destination MAC address Listing 1 Nemesis arp Packets 01 $ while true 02 > do 03 > sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 -D 192.168.1.133 -h 00:
22
:6E:71:04:BB -m 00:0C:29:B2:78:
9
92%
Data acquisition with shell tools
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
"------------------------------------------------------" 18 echo -
n
"Replace stored data line (y)? ";read we 19 if [ "$we" = "y" ]; 20 then 21
22
# Delete line and write to 23 # temporary file 24 25 # Build sed instruction 26
92%
Managing virtual machines
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
filesystem, if so desired [5]: $ guestfish -
N
fs:ext3 When you call Guestfish with the new image, $ guestfish -
a
you are taken to a shell where you first need to enter run to toggle the system ...
9
90%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
07 if [ -
n
"$OCF_RESKEY_monitor_sipuri" ]; then 08 check_binary sipsak 09 fi 10 11 if [ ! -f $OCF_RESKEY_config ]; then
12
ocf_log err "Config $OCF_RESKEY_config doesn
89%
Mandatory access control with Tomoyo Linux
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
.0
2.2
.x. 2.6.30 through 2.6.35 Debian 6 (Squeeze) 2.3.x. 2.6.36 through 3.0 Ubuntu 11.10 2.4.x. 3.1. openSUSE
12
.1 2.5.x. 3 ...
9
89%
A simple approach to the OCFS2 cluster filesystem
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
_dlm] root 3467 7 0 20:07 ? 00:00:00 [o2net] root 3965 7 0 20:24 ? 00:00:00 [ocfs2_wq] root 7921 7 0
22
:40 ? 00:00:00 [o2hb-BD5
A
574EC8] root 7935 7
89%
Strategies for routing voice calls around a firewall
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
.atlanta.com:5060; branch=z
9
hG4bKnashds8 03 Max-Forwards: 70 04 To: Bob
05 From: Alice
;tag=1928301774 06 Call-ID:
a
84b4c76e66710 07 CSeq: 314159 INVITE 08 Contact
1
2
3
4
5
Next »