search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(1047)
Article
(333)
News
(119)
Blog post
(5)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
139
140
141
142
143
144
145
146
147
148
149
150
151
Next »
15%
Data virtualization using JBoss and Teiid
10.04.2015
Home
»
Archive
»
2015
»
Issue 26: OpenS...
»
and run through the graphical installation process. You will find a detailed description of all the configuration options in the very comprehensive installation manual [
3
]. The installer automatically
15%
11 Tricks for Windows servers
29.09.2020
Home
»
Archive
»
2020
»
Issue 59: Custo...
»
-WindowsOptionalFeature -Online -FeatureName WindowsMediaPlayer
3
. Configuring LDAP Priorities and Weighting Checking that the LDAP SRV entries are correct in the domain name system (DNS) can help you detect Active Directory (AD
15%
Grafana and time series databases
14.08.2017
Home
»
Archive
»
2017
»
Issue 40: Lean...
»
, Grafana is a server that speaks HTTP(
S
) and exposes a graphical web interface. Under the hood, the service has a plugin interface for various back ends (i.e., between Grafana and various time series
15%
Management improvements, memory scaling, and EOL for FileStore
06.10.2022
Home
»
Archive
»
2022
»
Issue 71: Kuber...
»
protocol; it emulates either OpenStack's Swift protocol or Amazon
S
3
. In many places, the RADOS gateway is used as a supplement for providers who want to offer their customers on-demand online storage
15%
Managing network connections in container environments
30.05.2021
Home
»
Archive
»
2021
»
Issue 63: Autom...
»
of IT in the early 2000
s
see networks (and often storage as well) as the devil's work. Traefik counters this: It aims to make software-defined networking (SDN) approaches in container environments obsolete
15%
Automated compliance testing with InSpec
22.12.2017
Home
»
Archive
»
2017
»
Issue 42: Secur...
»
is InSpec. InSpec is available under a free license and is free for download from Chef's GitHub directory [
3
]. It supports a variety of target systems: Linux is represented by CentOS, RHEL, SLES, Debian
15%
Searching for security flaws and exploits with Burp Suite
20.03.2014
Home
»
Archive
»
2014
»
Issue 19: Perim...
»
tab within the Proxy section. For the rest of the exercise, you'll need a browser (Firefox), two Firefox extensions (Cookies Manager+ [2] and FoxyProxy Standard [
3
]), and Burp Suite
15%
Cloud-native application bundles for easy container deployment
25.03.2020
Home
»
Archive
»
2020
»
Issue 56: Secur...
»
standard that can even be distributed from Docker Hub. Duffle Duffle (Figure
3
) unabashedly refers to itself as the reference implementation of the CNAB format and provides a variety of functions
15%
Discover system vulnerabilities and exploits
06.10.2019
Home
»
Archive
»
2019
»
Issue 53: Secur...
»
tools are available for testing your own systems. Of course, I assume you will only target your infrastructure and not that of others. Many Options With an image size of about
3
.5GB, Kali Linux
15%
Recovering from a cyberattack in a hybrid environment
30.01.2024
Home
»
Archive
»
2024
»
Issue 79: Monit...
»
federated domains from Federated to Managed (Figure
3
), Connect-MGGraph -Scopes Domain.ReadWrite.All,Directory.Access-AsUser.All Get-MGDomain and proceed as follows, Update-MGDomain -DomainId
« Previous
1
...
139
140
141
142
143
144
145
146
147
148
149
150
151
Next »