15.05.2013 01:41 - Windows is no longer the system for mouse pushers. In the latest server version, the default installation installs without a GUI, and management vi... more ..
15.05.2013 00:44 - Once you have successfully exploited a target machine, you might be faced with a dilemma common among penetration testers: Do I have shell access o... more ..
08.05.2013 16:42 - The world is swimming in data, and the pool is getting deeper at an alarming rate. At some point you will have to migrate data from one set of stor... more ..
30.04.2013 18:12 - If you really want your evenings to belong to your job, you don’t need to depend on configuration management. But is all your overtime really neces... more ..
30.04.2013 17:10 - In computer forensics, memory analysis is becoming increasingly important as a means for investigating security incidents. In this article, we prov... more ..
23.04.2013 22:46 - Hadoop has been growing clusters in data centers at a rapid pace. Is Hadoop the new corporate HPC? more ..
16.04.2013 14:22 - IPv6 includes Mobile IPv6, a new standard for communication with mobile devices, which ensures permanent accessibility regardless of your ... more ..
15.04.2013 21:39 - NIST has chosen the Keccak algorithm as the new cryptographic hash standard, but in real life, many users are still waiting to move to its predeces... more ..
05.04.2013 23:23 - Cloud computing is most definitely here – there are even commercials about it – but does it have a role in HPC? In this article, we discuss changes... more ..
05.04.2013 19:16 - more ..
02.04.2013 14:04 - Making your systems really secure can be a bit more complicated than resorting to the use of regular passwords. In this article, we provide an over... more ..
02.04.2013 06:46 - Windows Firewall with Advanced Security was introduced in Vista/Windows Server 2008. Compared with the old Windows Firewall, it offers many new fea... more ..
27.03.2013 15:24 - We look at the new features in Ceph version 0.56, alias “Bobtail,” talk about who would benefit from CephX Ceph encryption, and show you how a Ceph... more ..
18.03.2013 13:43 - Hardly a day goes by without reports of hackers breaking into government, military, or enterprise servers. If you analyze the details of the hacker... more ..
18.03.2013 13:05 - Cron jobs are essential to managing Linux and Unix systems; however, the syntax is limited and prone to errors. A modern cron substitute – Whe... more ..