search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(123)
Article
(1)
Keywords
« Previous
1
...
6
7
8
9
10
11
12
13
23%
Free backup tool for data centers
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
Include { 13 File = /usr/sbin 14 Options { 15 Signature = MD5 16 } 17 } 18 Exclude { 19 File = /var/lib/bacula 20 File = /tmp 21 }
22
} 23 24 Messages { 25 Name = Daemon 26
23%
Passwords, passphrases, and passkeys
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
character increases the power, which results in an incredible number of possibilities for each additional character. For example, denounce-crush-explore has
22
characters. From the current state of the art
23%
New approaches for forensics in cloud environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
by a malicious third-party? In this context, the term data provenance [
6
] becomes extremely meaningful: It covers the origins of the piece of data and how it might have been modified, that is, who has viewed
23%
Identifying and using software licenses
27.05.2025
Home
»
Archive
»
2025
»
Issue 87: Light...
»
licenses transfer the copyright to the general public. The Unlicense [
6
] was created to mark software as public domain. Beyond Software Some open source software licenses can also be used for non
« Previous
1
...
6
7
8
9
10
11
12
13