search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcode%3 09 Llorente 22
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(60)
Article
(1)
Keywords
1
2
3
4
5
6
7
Next »
100%
Creating an SFTP jail
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
be replaced solely with the sshd configuration directives shown in Listing
3
. Line 16 specifies that SFTP will listen on port 2202 instead of the default SSH port
22
. This option is configurable and left ...
3
99%
VMware Server 2.0 on recent Linux distributions
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
06 yum downgrade perl\* 07 rpm -e man-db 08 rpm -e pam_ldap --nodeps
09
yum downgrade nss_ldap 10 ... Fortunately, Yum introduced a downgrade option in version
3
.2.27 that makes it easier to step ...
3
99%
Clustering with OpenAIS and Corosync
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
ID. Version
3
.0 of the cluster suite (in RHEL 6 and Fedora 10 or later), replaces OpenAIS with Corosync [
3
]. Viewed superficially, not too many changes are seen between the two cluster managers ...
3
98%
Targeted defense against brute force attacks
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
client requests (1) in the auth.log file (2). Then sshguard (
3
) monitors the file and creates a firewall rule (4) that blocks the client (5) if it notices to many login attempts. If the attacker ...
3
98%
Introduction to behavior-driven monitoring
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
Scenarios: 21 cucumber /usr/lib/nagios/plugins/cucumber-nagios/checks/features/www.xing.com/startpage.feature:4 # Scenario: Visiting home page
22
23 1 scenario (1 failed) 24 4 steps (1 failed,
3
skipped) 25 0 ...
3
98%
An IP-based load balancing solution
30.11.2025
Home
»
CloudAge
»
Articles
»
and least connected, and they are also the most commonly used in LVS clusters. Configuration Piranha [
3
] is a clustering product from Red Hat based on the LVS concept. It includes the IPVS kernel code ...
3
27%
Data acquisition with shell tools
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
the database connection (Listing 2). Listing 2 Database Connection 01 #! /bin/sh 02 echo "Demo for database write access" 03 rm input.sql 04 touch input.sql 05 sleep
3
06 clear 07 08 # Entry
09
10
26%
Strategies for routing voice calls around a firewall
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
and then rewrites the Contact header to contain the publicly reachable NAT gateway socket. Listing
3
shows an Invite request that has been modified by the SIP proxy: 18.17.16.15 is the gateway's public address; 20.
22
26%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
on hand; it is available on the web [2]. You will also find it useful to have the current version 1.0.2 [
3
] of the OCF Resource Agent Developer's Guide , created by Hastexo's Florian Haas. The Developer
26%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
: Grocery Store Checkout *** 06 *** Ver: PDQ Analyzer v
3
.0 111904 *** 07 ************************************* 08 ****** RESOURCE Performance *******
09
10 Metric Resource Work Value Unit 11
1
2
3
4
5
6
7
Next »