Logging and Log Management
Log Data Log data is the intrinsic meaning of a log message. In other words, log data is the information extracted from a log message that tells you why that log message was generated. For exampl...
Log Data Log data is the intrinsic meaning of a log message. In other words, log data is the information extracted from a log message that tells you why that log message was generated. For exampl...
Overview Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on Internet Protocol (IP) networks to automatically assign IP addresses and other communication parameter...
What is the VPN? VPN stands for the Virtual Private Network. A virtual private network (VPN) is a technology that creates a safe and encrypted connection over a less secure network, such as the i...
Overview There is a need for a standardized way of representing the physical network connections pertaining to a given management domain. A standardized discovery mechanism is also required to in...
QEMU QEMU is a generic and open source machine emulator and virtualizer. When used as a machine emulator, QEMU can run OSes and programs made for one machine (e.g. an ARM board) on a different m...
What is IPC and Why we need it? IPC is a mechanism using which two or more process running on the same machine exchange their personal data with each other. Communication between processes runni...
Vi You can use vi to edit any text file. vi copies the file to be edited into a buffer, displays the buffer, and lets you add, delete, and change text. When you save your edtis, vi copies the edi...
Operation System Linux Kernel Development, 3rd Edition Operating System Concepts Core Algorithm in Linux Kernel Linux Professional Linux Kernel Architecture Understanding Linux Kernel Linux Devi...
Hardware Support Development Tools Kernel Considerations Root Filesystem Content Storage Device Manipulation Root Filesystem Setup Setting Up the Bootloader Setting Up Networking Serv...
802.11 Frame Types Frame Type Function Message Management Establish and maintain connections Beacon, Probe, Authentication ...