19%
09.06.2018
(handshake, alert, CCS, or application data) (Figure 3). After symmetric keys are programmed, inline TLS functionality is enabled; henceforth, the TLS layer bypasses all crypto operations, and plain text
19%
05.08.2024
so, for a combination of open source software with extension modules and commercial support.
Starting Point
The backup software originally used was IBM's Tivoli Storage Manager [3]. However, a review
19%
30.01.2024
vulnerabilities. If you don't want to fire OpenVAS at your servers, you can use the leaner Lynis [3]. The tool runs more than 200 tests and after a few minutes presents its report in the terminal or by email
19%
03.04.2024
on the GitHub platform [2] under the GNU Affero General Public License version 3 (AGPLv3). In this article, I look at the free version's basic feature set.
Relay Servers
Depending on the operating system
19%
16.05.2013
In PowerShell 3.0, Microsoft lets admins manage, install, or adapt virtually any service on a Windows server via the shell. In this article, I introduce some of the new and interesting commandlets
19%
13.02.2017
.g., www.example.com
). To that end, a corresponding A record (or AAAA [quad-A] record for IPv6) must be stored for a domain, and a corresponding PTR record (which refers to the A record) must be created
19%
12.09.2013
Compute Engine, Rackspace, Microsoft Azure). The service is now available in the US as part of the Early Access Program, with a plan for it to go on general sale in 2013Q3; the rumored release date
19%
03.09.2013
and data, PCoIP can allow or prohibit looped USB devices explicitly.
Workstation with Host Card
With a host card, you can turn a powerful Windows or Linux PC (and probably Macintosh computers from 2013Q3
19%
17.09.2013
-keygen -t rsa
(optionally, ssh-keygen -t dsa
) to generate a new RSA or DSA key pair of public and private keys (Figure 3).
Figure 3: Generating a RSA key
19%
26.10.2012
, or simulated by the honeypot. The set of services visible to the attacker on the target system is equal to the total set of the services offered by the server and the analysis system (Figures 3 and 4