158
click to vote
LISA
15 years 2 months ago
2008
Two common tools in Linux- and UNIX-based environments are SSH for secure communications and sudo for performing administrative tasks. These are independent programs with substant...
128
click to vote
LISA
15 years 2 months ago
2008
Play-on-demand is usually regarded as a feasible access mode for web content (including streaming video, web pages and so on), web services and some Software-As-A-Service (SaaS) a...
124
click to vote
LISA
15 years 2 months ago
2008
Signature matching, which includes packet classification and content matching, is the most expensive operation of a signature-based network intrusion detection system (NIDS). In t...
106
Voted
LISA
15 years 2 months ago
2008
System administrators regularly use the top utility for understanding the resource consumption of the processes running on UNIX computers. Top provides an accurate and real-time d...
129
Voted
LISA
15 years 2 months ago
2008
Application problem diagnosis in complex enterprise environments is a challenging problem, and contributes significantly to the growth in IT management costs. While application pr...
|