search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
0mb 100 Llorente"523
?
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(109)
Article
(46)
Blog post
(1)
News
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
9
10
11
12
13
14
15
16
37%
Five graphical database front ends
01.08.2019
Home
»
Archive
»
2019
»
Issue 52: Stop...
»
function for saving queries for later use. Kexi Kexi [3] is an integrated database system that is part of Calligra Suite [8]. In the current 3.1.
0
version, Kexi runs independently of KDE's Plasma desktop
37%
Recovering from a cyberattack in a hybrid environment
30.01.2024
Home
»
Archive
»
2024
»
Issue 79: Monit...
»
experts recommend enabling PHS – at least as an additional authentication procedure. The frequently cited angst prompted by synchronizing passwords with the cloud is unfounded, because hashing more than
1,000
37%
Microsoft Exchange replacement
20.06.2022
Home
»
Archive
»
2022
»
Issue 69: Terra...
»
!), and requires at least Windows Server 2012 R2 and PowerShell 2.
0
. Listing 1 shows the first lines of the migration loop. Listing 1 Migration by Script 01 foreach ($Mailbox in (Get-Mailbox)) { 02
37%
Security data analytics and visualization with R
05.12.2014
Home
»
Archive
»
2014
»
Issue 24: Visua...
»
among the integrated development environment (IDE) options available for R, I use RStudio [8]. I downloaded RStudio
0
.98.1083 Debian 6+/Ubuntu 10.04+ (32-bit) and ran: sudo dpkg -i rstudio-
0
.98.1083-i386
37%
Processing streaming events with Apache Kafka
02.02.2021
Home
»
Archive
»
2021
»
Issue 61: Secur...
»
(KafkaProducerString,
producer = new KafkaProducer
(props)) { 03 04 for (long i =**
0
; i <**10; i++) { 05 final String orderId = "id" + Long.toString(i); 06 final Payment
37%
Open Source Security Information and Event Management system
20.05.2014
Home
»
Archive
»
2014
»
Issue 20: IPv6...
»
and lets you know of changes or foul play on the data link layer. P
0
f – An effective passive fingerprinting tool to identify OS and software on endpoints and to show how the machine is connected
37%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home
»
Archive
»
2013
»
Issue 14: Samba 4
»
sessions with Google Authenticator [17]. The Google Authenticator Project is released under the Apache License 2.
0
and is freely available. A PAM module is available for the server; the Google Authenticator
« Previous
1
...
9
10
11
12
13
14
15
16