Bob Puff writes:
> /dev/hda:
>
It should be /dev/vda.. it means you're not taking advantage of KVM's
paravirtualisation capabilities. That probably explains the crappy
performance. Run your disk and network with virtio and it should be much
faster.
In terms of management tools, check
http:/
How much did you paid for this?
On 20/02/2012 07:26 AM, Bob Puff wrote:
> Hi Gang,
>
> I recently rented a server at a datacenter with Centos 5.7 X64, Q9550
> Processor, 8GB Ram, and dual 250GB SATA HDs (with 16mb cache). They had
> loaded it with KVM, and installed a 30-day trial of Virtualizor
Hi Gang,
I recently rented a server at a datacenter with Centos 5.7 X64, Q9550
Processor, 8GB Ram, and dual 250GB SATA HDs (with 16mb cache). They had
loaded it with KVM, and installed a 30-day trial of Virtualizor as the
front-end for KVM.
I was so impressed with how fasts the guests ran that
I am new to Linux so I do not have any special preferences.
Yes I have a root access and the VPS is un managed.
I am newbie to the Linux world.
I will have a new website or maybe 3.
I've found that un managed costs vary a lot, as I've found various ways
for settings ... some using Xen, others usin
Al writes:
> Any suggestions on what to run on a centos box to verify that the
> server isn't compromised or being sniffed? Thanks!
> ___
> CentOS mailing list
> CentOS@centos.org
> http://lists.centos.org/mailman/listinfo/centos
>
This is very handy
On 19/02/12 15:38, Edson - PMSS wrote:
> I would like to know which all of you point me as the best training
> course of CentOS in the world or in the USA. I am a Brazilian and I
> would like to have this information. I have a good background in
> GNU/Linux, CentOS and Debian like operating systems
I would like to know which all of you point me as the best training
course of CentOS in the world or in the USA. I am a Brazilian and I
would like to have this information. I have a good background in
GNU/Linux, CentOS and Debian like operating systems, network and general
knowledge. I would li
I remember I sent weeks ago next email to other guy with same doubts:
Hello,
just if it helps, please find below these lines the steps I have used to
analyze several suspicious machines in some customers, to check if they
have been compromised or not:
* Chrootkit && rkhunter -> To search for k
8 matches
Mail list logo