28%
09.08.2015
of these archiving tools.
Table 1
Overview of the Test Candidates
Features
Benno MailArchiv
MailArchiva
Piler
Test version
2.1.0
4
1.1.0
Variant
28%
20.05.2014
and lets you know of changes or foul play on the data link layer.
P0f – An effective passive fingerprinting tool to identify OS and software on endpoints and to show how the machine is connected
28%
09.06.2018
Capture Task Force and is a part of HTML5.
WebRTC 1.0 (aka RTCPeerConnection) is the API used to control the browser's WebRTC peer-to-peer connections. This is what a JavaScript app uses to initiate
28%
27.09.2024
if (doc.timestamp) {\n emit(doc.timestamp, null);\n }\n}"
},
"by-hours": {
"map": "function (doc) {\n if (doc.timestamp) {\n emit(doc.timestamp.substr(8,2), null);\n }\n
28%
30.01.2024
-IOV) implementation with a total of 15 different virtualization functions. Hardware support for various security functions in line with the Trusted Computing Group (TCG) Opal 2.0 specification is also part
28%
16.05.2013
sessions with Google Authenticator [17]. The Google Authenticator Project is released under the Apache License 2.0 and is freely available. A PAM module is available for the server; the Google Authenticator
28%
27.09.2024
, testing, and production. The hub VNet typically contains shared resources, such as firewalls (Figure 2) or VPN gateways, and manages traffic to and from each spoke VNet that hosts the Linux workloads
28%
26.01.2025
in the scope of Industry 4.0 or smart factory initiatives. Although cyber risk management is required by law (e.g., in NIS2), ASM is not. However, any company that becomes aware of attack surfaces as part of its
28%
30.11.2025
comparison in Table 1.
Table 1
Five Graph Databases
Name
Neo4j 1.6
Sones Graph DB 2.0
InfoGrid 2.9.5
HyperGraphDB 1.1
VertexDB
Homepage
http
28%
28.07.2025
. The WP816, WP826 (Figure 2), and WP836 models by Grandstream [9], for example, also support Bluetooth 5.0, which means you can connect convenient headsets with decent transmission quality