search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(909)
Article
(318)
News
(106)
Blog post
(4)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
122
123
124
125
126
127
128
129
130
131
132
133
134
Next »
24%
Automating development environments and deployment with Otto
11.02.2016
Home
»
Archive
»
2016
»
Issue 31: Tunin...
»
of continuous integration [2] or continuous delivery [
3
], allowing developers to extend their projects quickly, add new features, and deliver the goods. Because they handle classical administrative tasks
24%
Automated compliance testing with InSpec
22.12.2017
Home
»
Archive
»
2017
»
Issue 42: Secur...
»
is InSpec. InSpec is available under a free license and is free for download from Chef's GitHub directory [
3
]. It supports a variety of target systems: Linux is represented by CentOS, RHEL, SLES, Debian
24%
Searching for security flaws and exploits with Burp Suite
20.03.2014
Home
»
Archive
»
2014
»
Issue 19: Perim...
»
tab within the Proxy section. For the rest of the exercise, you'll need a browser (Firefox), two Firefox extensions (Cookies Manager+ [2] and FoxyProxy Standard [
3
]), and Burp Suite
24%
Cloud-native application bundles for easy container deployment
25.03.2020
Home
»
Archive
»
2020
»
Issue 56: Secur...
»
standard that can even be distributed from Docker Hub. Duffle Duffle (Figure
3
) unabashedly refers to itself as the reference implementation of the CNAB format and provides a variety of functions
24%
Discover system vulnerabilities and exploits
06.10.2019
Home
»
Archive
»
2019
»
Issue 53: Secur...
»
tools are available for testing your own systems. Of course, I assume you will only target your infrastructure and not that of others. Many Options With an image size of about
3
.5GB, Kali Linux
24%
Recovering from a cyberattack in a hybrid environment
30.01.2024
Home
»
Archive
»
2024
»
Issue 79: Monit...
»
federated domains from Federated to Managed (Figure
3
), Connect-MGGraph -Scopes Domain.ReadWrite.All,Directory.Access-AsUser.All Get-MGDomain and proceed as follows, Update-MGDomain -DomainId
24%
Hyper-V failover with Azure Site Recovery
03.04.2024
Home
»
Archive
»
2024
»
Issue 80: Threa...
»
in combination with Hyper-V or other hypervisors. Azure Site Recovery (ASR) is Microsoft's disaster recovery as a service (DRaa
S
). Thanks to ASR, companies can replicate their Hyper-V VMs in Azure and restore them
24%
Zulip, Mattermost, and Rocket.Chat
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
Zulip [1], Mattermost [2], and Rocket.Chat [
3
] and discover how well these platforms integrate with other applications. Functions and Features A number of questions should be considered when looking
24%
Checking DNS configurations for errors
07.10.2025
Home
»
Archive
»
2025
»
Issue 89: Autom...
»
order) option on the server in the Advanced TCP/IP Settings dialog (Figure
3
). Next, enter the namespace of your own tree first and then append the namespaces of the other trees. The purpose
24%
Intelligent observability with AI and Coroot
27.05.2025
Home
»
Archive
»
2025
»
Issue 87: Light...
»
offer options that automatically identify and warn you about distributed denial of service (DDo
S
) attacks so that you can immediately block the attack at the network level. Although these solutions
« Previous
1
...
122
123
124
125
126
127
128
129
130
131
132
133
134
Next »