search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(170)
Article
(8)
News
(2)
Keywords
« Previous
1
...
7
8
9
10
11
12
13
14
15
16
17
18
Next »
25%
The Resurrection of bWatch
02.06.2025
Home
»
Articles
»
-purpose, interpreted and dynamic Tool Command Language (Tcl) was created by John Ousterhout in the 1990
s
. From the name you can probably tell that it was intended to be a language for writing tools for whatever platform
25%
Cgroups for resource management in Linux
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
cgroup, which has no restrictions. You can test this by sending a SIGUSR1 to the process: # kill -USR1 $pid 578804+0 records in 578804+0 records out 296347648 bytes (296 MB) copied, 7.00803
s
, 42.
3
MB/
s
25%
Using a tablet as a portable management console
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
, somehow the signal could reach you. During the post-pager revolution (The 1990
s
), you received a new device that offered two-way communications: The ubiquitous cell phone. The cell phone could not only
25%
Intrusion detection with Prelude
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
programs. This is not always the security solution's fault. An application that is not programmed carefully and fails to comply with RFCs can trip a SIEM signature. In this test, Prelude suspected a Do
S
25%
Securing email communication with GnuPG
07.10.2025
Home
»
Archive
»
2025
»
Issue 89: Autom...
»
for different security requirements: GnuPG Desktop [
3
] and Gpg4win [4] are user-friendly desktop versions. GnuPG VS-Desktop [5] is available for particularly secure use in government agencies and companies
25%
Snapshot management for Azure VMs
28.07.2025
Home
»
Archive
»
2025
»
Issue 88: 5 Net...
»
Config = New-AzVMConfig -VMName "
" -VMSize "Standard_D2
s
_v
3
" vmConfig = Set -AzVMOSDisk -VM $vmConfig -ManagedDiskId $newDisk.Id -CreateOption Attach -Windows New-AzVM -ResourceGroupName"
25%
What tools do intruders use to
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
, name servers, and network hosts accessible through the Internet. The popular whois service also offers a means for discovering domain information. The Nmap scanner's -
s
L option (nmap -
s
L) performs
25%
Security without firewalls
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
and then explicitly allow certain users access. It's similar to the deny by default approach I touched on in another article [
3
]. To achieve this, the /etc/hosts.deny file would look like this: sshd: ALL To allow
25%
System monitoring with Sysinternals
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
lists all the processes in a window and includes more detailed information on the current process, such as access to directories (Figure
3
). Figure
3
25%
Galera Cluster for MySQL
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
.gz cd pen-0.18.0/ ./configure make make install Started with: ./pen -r -p pen.pid -C localhost:4444 -
S
3
\ localhost:3306 192.168.56.101:3306:100 \ 192.168.56.102:3306:100 192
« Previous
1
...
7
8
9
10
11
12
13
14
15
16
17
18
Next »