99%
01.08.2019
for the service [6]. The idea is that professional penetration testers are the most likely people to want AWS access to a cloud installation. At the time of writing, a one-year membership was EUR10 and EUR5 per ... 52
99%
01.08.2019
of the file continuously to your screen:
$ sudo tail -f /var/log/osquery/osqueryd.results.log
Now you can forward the results logs to any external application (e.g., Zentral [5] or Elasticsearch [6]) for log ... 52
99%
01.08.2019
frameworks as DIY plugins. On the same principle, Karma plugins support continuous integration with Jenkins [5], Travis [6], or Semaphore [7].
After launching, Karma first loads all the plugins and parses its ... 52
69%
06.08.2012
IPv6 is establishing itself in everyday IT life, and all modern operating systems from Windows, through Mac OS X, to Linux have it on board; but if you let IPv6 introduce itself into your ...
In 1995, the Internet Engineering Task Force (IETF) chose IPv6 as the successor to IPv4. Initially, this was not an issue that raised much interest. But this changed when Microsoft added IPv6 ...
IPv6 is establishing itself in everyday IT life, and all modern operating systems from Windows, through Mac OS X, to Linux have it on board; but if you let IPv6 introduce itself into your ... Neglected IPv6 Features ... Securing IPv6
66%
16.08.2018
, but still a little too cumbersome to set up and use.
At least for the latter group, Rails 5.2 (Figure 1) is a good thing: The developers abolished Secrets and replaced it with simpler credentials. Thus Ro ... Ruby on Rails 5.2 was released during RailsConf, which took place in Pittsburgh in mid-April 2018. Although not much has changed for old Rails applications, you'll find a few notable additions ... Version 5.2 of the Ruby framework
64%
02.06.2020
Rubén Llorente ... .
Citadel Rooms
Citadel's main characteristic is that everything is a room, at least internally. Rooms are arranged by floors (Figure 6). For example, on a floor called Animal Talk
, you might have the rooms
64%
04.12.2024
Rubén Llorente ... them in an orderly manner. Proxmox VE has been covered before in other articles [5][6], so I suggest you check them out if you want an in-depth review
64%
25.09.2023
Rubén Llorente ... ).
Figure 4: A VPN allows computers in a network to contact devices located in a separate office over a secure connection. Ludovic.ferre CC BY-SA 4.0 [6
64%
30.01.2024
Rubén Llorente ... of domains for which you host email, managing quotas, and viewing the logs (Figures 6 and 7).
Figure 6: iRedAdmin lets you create email accounts for users
64%
03.02.2022
Rubén Llorente ... obtaining the password is no longer enough for the attacker.
The steps for using the Nitrokey in such a way are documented [6], but setting up the configuration involves messing with PAM configuration files