search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(121)
Article
(2)
Keywords
« Previous
1
...
6
7
8
9
10
11
12
13
23%
Free backup tool for data centers
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
Include { 13 File = /usr/sbin 14 Options { 15 Signature = MD5 16 } 17 } 18 Exclude { 19 File = /var/lib/bacula 20 File = /tmp 21 }
22
} 23 24 Messages { 25 Name = Daemon 26
23%
Passwords, passphrases, and passkeys
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
character increases the power, which results in an incredible number of possibilities for each additional character. For example, denounce-crush-explore has
22
characters. From the current state of the art
23%
New approaches for forensics in cloud environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
by a malicious third-party? In this context, the term data provenance [
6
] becomes extremely meaningful: It covers the origins of the piece of data and how it might have been modified, that is, who has viewed
« Previous
1
...
6
7
8
9
10
11
12
13