search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(119)
Article
(52)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
5
6
7
8
9
10
11
12
13
14
15
16
17
18
Next »
30%
Guarding against social engineering attacks
01.08.2019
Home
»
Archive
»
2019
»
Issue 52: Stop...
»
), the venerable ZAP (automated security testing) [
9
], and Zenmap (
a
graphical front end to the prodigious and unmatched Nmap security tool). A click on the Auditing link in the right-hand menu presents
30%
Installing and operating the Graylog SIEM solution
13.12.2018
Home
»
Archive
»
2018
»
Issue 48: Secur...
»
. The pwgen command generates a password and encrypts with sh
256
sum: pwgen -
N
1 -s 100 echo -
n
| sha
256
sum The encrypted password is then assigned to the parameter root_password_sha2. Table 1 gives
30%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home
»
Archive
»
2015
»
Issue 25: Safe...
»
need to make a few more purchases. The following list indicates what you will need to complete this project: Raspberry Pi Model B+. 5V, 1
A
USB power supply. 4GB MicroSD card (minimum); I
30%
ZAP provides automated security tests in continuous integration pipelines
23.08.2017
Home
»
Archive
»
2017
»
Issue 41: Kuber...
»
03736 bash zap@03736c2
a
2088:/zap$ x11vnc --forever --usepw --create Enter VNC password: Verify password: Write password to /home/zap//.vnc/passwd? [y]/
n
y Password written to: /home
30%
Error-correcting code memory keeps single-bit errors at bay
14.11.2013
Home
»
Archive
»
2013
»
Issue 17: Cloud...
»
of an uncorrectable error by factors of
9
-400. Uncorrectable errors following a correctable error are still small at 0.1%-2.3% per year. + The incidence of correctable errors increases with age
30%
Acquiring a Memory Image
20.05.2014
Home
»
Archive
»
2014
»
Issue 20: IPv6...
»
a hash of the input and also of any outputs (specified using hof=, hofs=, phod=, or fhod=. ALGORITHM options include md5, sha1, sha
256
, or sha512. hashlog=FILE – Log total hashes and piecewise hashes
30%
Understanding the Status of Your Filesystem
18.06.2014
Home
»
HPC
»
Articles
»
Size Intervals (KB): [ 0- 1 KB]: 156455 ( 40.31%) ( 40.31% cumulative) [
1- 2
KB]: 38278 (
9
.86%) ( 50.18% cumulative) [ 2- 4 KB]: 30822 ( 7.94%) ( 58.
12
% cumulative) [ 4
30%
Security first with the Hiawatha web server
11.04.2016
Home
»
Archive
»
2016
»
Issue 32: Measu...
»
toolkit for joomla UrlToolkit { ToolkitID = joomla Match base64_encode[^(]*\([^)]*\) DenyAccess Match (<|%3C)([^s]*s)+cript.*(>|%3E) DenyAccess Match GLOBALS(=|\[|\%[0-
9
A
-Z]{0,2}) Deny
30%
Posteo, Mailbox.org, Tutanota, and ProtonMail compared
10.04.2015
Home
»
Archive
»
2015
»
Issue 26: OpenS...
»
Qualys SSL-Test
A
+ Qualys SSL-Test A Syss GmbH Audits [2] TLS
1.2
Yes Yes Yes Yes HTTPS/HSTS Yes Yes Yes Yes
30%
Transport Encryption with DANE and DNSSEC
17.02.2015
Home
»
Archive
»
2015
»
Issue 25: Safe...
»
/smtp[14944]: \ Verified TLS connection established to dane.sys4.de[194.126.158.134]:25: \ TLSv
1.2
with cipher ECDHE-RSA-AES
256
-GCM-SHA384 (
256/256
bits) The admin should set the smtp
« Previous
1
...
5
6
7
8
9
10
11
12
13
14
15
16
17
18
Next »