search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xsede%3 09 Llorente"52
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(115)
Article
(1)
Keywords
« Previous
1
...
5
6
7
8
9
10
11
12
18%
Protecting web servers with ModSecurity
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
but comprehensively documented [
3
]. It logs HTTP requests and gives administrators unrestricted access to the individual elements of a request, such as the content of a POST request. It also identifies attacks in real
18%
Managing Linux systems with Spacewalk
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
can be installed on Red Hat Enterprise (RHEL) [
3
], Fedora [4], or CentOS [
3
] Linux. Note that Spacewalk does need a current Java Runtime Version 1.6.0 or newer. You can use the Open JDK for this; Fedora
18%
Flexible user authentication with PAM
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
configuration, you might want to test the device itself. To do so, scan a fingerprint by giving the tf-tool --acquire command (Figure
3
). Then you can use tf-tool --verify
18%
Neglected IPv6 features endanger the LAN
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
::1 (all nodes; Figure
3
). The payload of this message includes all valid IPv6 prefixes on the local subnet and other flags that allow a sophisticated configuration. The RA message is also repeated
18%
The PHP FastCGI process manager, PHP-FPM
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
. In contrast, the information on the PHP-FPM website [2] and in the PHP documentation [
3
] is outdated or incomplete. If you cannot find an example file, download the official PHP source code package and take
17%
pfSense firewall and router distribution
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
Protocol (CARP) is used in the background [
3
]. If needed, a pfSense installation can transfer its configuration to all other firewalls and then run pfsync to keep the state tables of all the active firewalls
« Previous
1
...
5
6
7
8
9
10
11
12