search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
"0mb 12!490 Llorente 100
?
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(92)
Article
(22)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
5
6
7
8
9
10
11
12
21%
Processing streaming events with Apache Kafka
02.02.2021
Home
»
Archive
»
2021
»
Issue 61: Secur...
»
(KafkaProducerString,
producer = new KafkaProducer
(props)) { 03 04 for (long i =**
0
; i <**10; i++) { 05 final String orderId = "id" + Long.toString(i); 06 final Payment
21%
Open Source Security Information and Event Management system
20.05.2014
Home
»
Archive
»
2014
»
Issue 20: IPv6...
»
and lets you know of changes or foul play on the data link layer. P
0
f – An effective passive fingerprinting tool to identify OS and software on endpoints and to show how the machine is connected
21%
Microsoft Exchange replacement
20.06.2022
Home
»
Archive
»
2022
»
Issue 69: Terra...
»
!), and requires at least Windows Server 2012 R2 and PowerShell 2.
0
. Listing 1 shows the first lines of the migration loop. Listing 1 Migration by Script 01 foreach ($Mailbox in (Get-Mailbox)) { 02
20%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home
»
Archive
»
2013
»
Issue 14: Samba 4
»
. Depending on the manufacturer and the method used, a distinction is made between time-based or time-synchronized tokens, TOTP (time-based one-time password algorithm, as defined in RFC 6238 [
12
]), and event
« Previous
1
...
5
6
7
8
9
10
11
12