search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(181)
Article
(8)
News
(3)
Keywords
« Previous
1
...
8
9
10
11
12
13
14
15
16
17
18
19
20
Next »
18%
The Resurrection of bWatch
02.06.2025
Home
»
Articles
»
-purpose, interpreted and dynamic Tool Command Language (Tcl) was created by John Ousterhout in the 1990
s
. From the name you can probably tell that it was intended to be a language for writing tools for whatever platform
18%
Cgroups for resource management in Linux
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
cgroup, which has no restrictions. You can test this by sending a SIGUSR1 to the process: # kill -USR1 $pid 578804+0 records in 578804+0 records out 296347648 bytes (296 MB) copied, 7.00803
s
, 42.
3
MB/
s
18%
Using a tablet as a portable management console
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
, somehow the signal could reach you. During the post-pager revolution (The 1990
s
), you received a new device that offered two-way communications: The ubiquitous cell phone. The cell phone could not only
18%
Intrusion detection with Prelude
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
programs. This is not always the security solution's fault. An application that is not programmed carefully and fails to comply with RFCs can trip a SIEM signature. In this test, Prelude suspected a Do
S
18%
Securing email communication with GnuPG
07.10.2025
Home
»
Archive
»
2025
»
Issue 89: Autom...
»
for different security requirements: GnuPG Desktop [
3
] and Gpg4win [4] are user-friendly desktop versions. GnuPG VS-Desktop [5] is available for particularly secure use in government agencies and companies
18%
Snapshot management for Azure VMs
28.07.2025
Home
»
Archive
»
2025
»
Issue 88: 5 Net...
»
Config = New-AzVMConfig -VMName "
" -VMSize "Standard_D2
s
_v
3
" vmConfig = Set -AzVMOSDisk -VM $vmConfig -ManagedDiskId $newDisk.Id -CreateOption Attach -Windows New-AzVM -ResourceGroupName"
18%
pfSense firewall and router distribution
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
Protocol (CARP) is used in the background [
3
]. If needed, a pfSense installation can transfer its configuration to all other firewalls and then run pfsync to keep the state tables of all the active firewalls
18%
What tools do intruders use to
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
, name servers, and network hosts accessible through the Internet. The popular whois service also offers a means for discovering domain information. The Nmap scanner's -
s
L option (nmap -
s
L) performs
18%
Security without firewalls
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
and then explicitly allow certain users access. It's similar to the deny by default approach I touched on in another article [
3
]. To achieve this, the /etc/hosts.deny file would look like this: sshd: ALL To allow
18%
System monitoring with Sysinternals
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
lists all the processes in a window and includes more detailed information on the current process, such as access to directories (Figure
3
). Figure
3
« Previous
1
...
8
9
10
11
12
13
14
15
16
17
18
19
20
Next »