13%
04.10.2018
-popular Travis CI
[3] or GitLab CI
[4]), which integrates easily with tools you might normally use manually. These tools might be used for database hacking, penetration testing, open network port probing
13%
13.12.2018
of the logfiles of all computers in one place.
Analysis of logs with support for correlation analysis.
Automatic notification for rule violations.
Reporting on networks, operating systems, databases
13%
14.08.2017
a lot of sense to look at the registered formats and protocols such as IANA [6], Schema.org [7], and Alps.io [8].
Infos
Request for Comments 707. A High-Level Framework for Network
13%
23.08.2017
of the stack in the Application Layer (OSI model Layer 7) [6]. Although many fantastic network security tools exist that will probe every nook and cranny of a network stack, ZAP specializes in the application
13%
09.10.2017
on both sides, it can happen that a login is not possible if SELinux is activated and enforced. If this is the case, you might need to modify the rights for access to the network for the SSH login process
13%
30.05.2021
, but the concept is very similar to, for example, Microsoft authentication, where you need to have a user account and permissions to access any resource on the network. Cloud providers have an extensive selection
13%
09.04.2019
SQL and its fork MariaDB is Facebook. Last year, the social network spread the news of an important migration: Its MySQL instances, which relied on the default storage engine InnoDB, were migrated to their in
13%
09.04.2019
and over: It's too slow! This drawback might not matter much for web programming, where your program can spend more time waiting for responses from the network and database than actually computing anything
13%
09.04.2019
Analytics includes a number of interesting additions to the simple example.
For example, GuardDuty can ignore a list of ingested IP addresses, such as your home network or a corporate LAN, as whitelists. You
13%
09.08.2015
the host name, IP addresses, names of network interfaces, time zone, hardware information, and many other facts. The documentation contains a comprehensive list of the available facts [3]. Beyond this, you