search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
谷歌seo优化【电报e1000】google代发推广.bad.0x00
?
Refine your search
[x]
Creation time
: Last month
Sort order
Date
Score
Content type
Article (Print)
(24)
Keywords
1
2
3
Next »
100%
Monitor your nodes with collectl
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
: AuthenticAMD Speed(MHz): 2812.629 Cores: 4 Siblings: 4 Nodes: 1 13 # Kernel: 2.6.32-220.4.1.el6.
x
86_64 Memory: 7540044 Swap: 14 # NumDisks: 2 DiskNames: sdb sda 15 # NumNets: 2 NetNames: lo: eth
0:100
16 # Num
99%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
#! /usr/bin/perl 02 # groxq.pl 03 use pdq; 04 #--------------- INPUTS ---------------
05
$ArrivalRate = 3/4; # customers per second 06 $ServiceRate = 1.
0
; # customers per second 07 $SeviceTime = 1/$Service
96%
The next generation of Internet connectivity
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
100
.net) 56 data bytes 03 64 bytes from iy-in-
x
63.1e
100
.net: icmp_seq=1 ttl=52 time=99.6 ms 04 64 bytes from iy-in-
x
63.1e
100
.net: icmp_seq=2 ttl=52 time=
100
ms
05
64 bytes from iy-in-
x
63.1e
100
.net: icmp
95%
SSH Administration – Windows in a Unix World
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
server, such as Xming [3] or the Mocha
X
Server [4]. Listing 2 Xeyes Test 01 $ xeyes & 02 03 [1] 4342 04 $
X
connection to localhost:
10.0
broken (explicit kill or server shutdown).
05
[1 ...
0
95%
The fine art of allocating memory
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
presence provides the system with a last chance for a soft landing before more drastic action is taken. This month, I examine the darker side of the picture: Swap hits
100
%, and hard out-of-memory errors
93%
Port-based access protection with NAP and 802.1X
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
Catalyst 01 Switch# configure terminal 02 Switch(config)# aaa new-model 03 Switch(config)# aaa authentication dot1
x
default group radius 04 Switch(config)# aaa authorization network group radius
05
... Mobile devices require special security considerations. In combination with IEEE 802.1
X
, Network Access Protection can ensure that mobile devices maintain the necessary security standards before they ... NAP with 802.1
X
... Port-based access protection with NAP and 802.1
X
92%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
$ john -wordlist:password.lst passfile.txt 02 Loaded 2 passwords with 2 different salts (FreeBSD MD5 [32/64]) 03 admin (root) 04 t-bone (khess)
05
guesses: 2 time:
0
:00:00:00
100
% c
92%
Get the best out of your bandwidth with tc
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
filters to your child class, three IP Addresses can share
100
Mbit in this case 04 tc filter add dev $DEV protocol ip parent 1:
0
prio
100
u32 match ip $DIR 1.2.3.4 flowid 1:14
05
tc filter add dev $DEV
92%
High availability clustering on a budget with KVM
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
/share/doc/kernel-doc/Documentation/networking/bonding.txt ). Listing 5 ifcfg-bond
0
01 DEVICE=bond
0
02 IPADDR=192.168.10.200 03 NETMASK=255.255.255.
0
04 ONBOOT=yes
05
USERCTL=no 06 BONDING_OPTS="mode=1 miimon=
100
" When the system is running, the /proc ...
0
92%
Cgroups for resource management in Linux
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
.reset_stats= 04 blkio.io_queued=Total
0
05
blkio.io_merged=Total
0
06 blkio.io_wait_time=Total
0
07 blkio.io_service_time=Total
0
08 blkio.io_serviced=Total
0
09 blkio.io_service_bytes=Total
0
10
1
2
3
Next »