Our latest tutorial reveals how you can use VMware Player's Virtual Network Editor to create custom virtual adapters and then assign them to VMs.
Section Index - Page 2
Displaying recent articles. Go back further in the Server Tutorials Archives »
With the advent of cloud computing and mass virtualization of server operating systems, the need for high speed, highly available networking becomes even more pressing.
Having difficulties when trying to set a network adapter on a VMware Player machine in Bridged mode? Our latest tutorial reveals a solution for the bridged network issue.
Chomping at the bit to test out the official release of Windows Server 2012? Check out what to watch for and avoid as we put the new server OS through its paces.
The latest version of VMware View debuts with new functionality to improve the overall user experience, but are the enhancements enough to warrant an upgrade for your environment?
While many Amazon Web Services are region specific, fortunately there are several workarounds for running EC2 instances in different zones.
You have to balance adequate failover capacity with the ability to remain productive and cost-efficient. Admission control in VMware allows you to do both.
For better virtual machine performance and better management integration, install XenServer Tools. But for Microsoft's newest operating systems, there's a catch.
Virtual Network Computing (VNC) enables you to use a GUI instead of a command-line interface when remotely connecting to a Linux or Unix machine, but security's another matter entirely. Discover how to make sure your VNC server connections stay secure.
Working in vCenter is great until the unthinkable happens -- you have a "stuck" VM. You can't do anything with it except use some command-line magic.
While Amazon Elastic Compute Cloud offers only SSH access by default to Linux cloud servers, if you aren't a command-line fan or your application requires a GUI, discover how you can set up remote desktop access to most Linux cloud servers.
A processor refresh doesn't necessarily mean you need a new server. Sometimes, simply dropping in new chips gives your server a huge performance boost. Paul Ferrill demonstrates how AMD's new 16-core chip ups the compute capacity of the HP ProLiant DL 385 G7 by 25 percent.
Etckeeper makes it easy to keep your /etc directory and its related config files in a revision control system of your choice.
Assistants are no longer just for execs. With a virtual assistant, you can hand off repetitive tasks and focus on the work that matters. Fancy Hands and Amazon's Mechanical Turk are two examples of affordable assistants, each effective at meeting a different set of needs.
If you're looking to script backups or other operations, a reliable CLI tool that works with S3 is a must. s3cmd fits the bill.
Prototyping Web applications? Trying to test and tune your Web servers? httperf makes it easy to test HTTP server workloads.
The latest GNU fdisk is now in alpha. Not anywhere ready for production, but ready for the adventurous to take out for a spin.
Learn tips for keeping your Linux system safe in this post-kernel.org-breach world.
Completing filenames when using Vim in command mode can be tricky. These tips will make it a simpler task.
Linux admins looking for an easy way to set hard and soft limits for users will find much to like about the pam_limits module. With pam_limits, you can set parameters on system resources on a per-user (or per-group) basis for all variables--from the maximum number of files a user can have open to the amount of CPU time.
Linux and other Unix-type systems contain a wealth of features under the surface. Oftentimes, however, these features are non-obvious and hard to find. Compgen, a GNU Bash builtin that shows all possible completions, is one such feature.
Is your hardware inadequate for your site? Throwing more resources at it may not be the best answer. For WordPress sites, W3 Total Cache is an inexpensive way to wring the most out of what you already have.
Most admins know kill and pkill. But those looking for a quick, clean kill use slay.
If security is a primary concern for you (it should be), introduce yourself to 10 secure Linux distributions ready to work in any environment from small to enterprise to cloud.
WordPress is one of the most popular CMSes, which means it is among the more commonly exploited. Use the Exploit Scanner plugin to help lock it down.