Mind your head!
All code on this website is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
When using physical machines, virtual snapshots are not an option
Whenever a hacker breaks in to a system, there are a few steps they take to keep the access without being caught red handed.
Redundant IP-Address assignment simply means that if one node goes down, another takes over the Virtual IP. This can be useful in many different scenarios like firewalling or reverse proxy.
Nimp J.
Computer Security Enthusiast & Full Stack Developer
UNIX is basically a simple operating system, but you have to be a genius to understand the simplicity.
-Dennis M. Ritchie