search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(173)
Article
(81)
Blog post
(1)
News
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
10
11
12
13
14
15
16
17
18
19
20
21
22
23
...
26
Next »
29%
Win-Win with Cygwin
23.01.2012
Home
»
Articles
»
fingerprint is 87:17:
c
3
:92:44:ba:1
a
:df:d7:
9
c
:44:b2:5b:73:52:09. Are you sure you want to continue connecting (yes/no)? This prompt wants to establish a permanent secure key between the two hosts for future
29%
Security first with the Hiawatha web server
11.04.2016
Home
»
Archive
»
2016
»
Issue 32: Measu...
»
toolkit for joomla UrlToolkit { ToolkitID = joomla Match base64_encode[^(]*\([^)]*\) DenyAccess Match (<|%
3
C
)([^s]*s)+cript.*(>|%
3
E) DenyAccess Match GLOBALS(=|\[|\%[0-
9
A
-Z]{0,2}) Deny
29%
PowerShell Part 2: Manipulating Services, Processes, and Commands
17.04.2012
Home
»
Articles
»
(2208)? [Y] Yes [
A
] Yes to All [
N
] No [L] No to All [?] Help (default is "Y"): Y
The process will end immediately on receipt of the Stop-Process signal. Now try to run a CMD process
29%
Exploring Ubuntu cloud tools
28.06.2011
Home
»
CloudAge
»
Articles
»
ram disk 04 AVAILABILITYZONE |- m1.small 0000 / 0000 1 192 2 05 AVAILABILITYZONE |-
c
1.medium 0000 / 0000 1
256
5 06 AVAILABILITYZONE |- m1.large
29%
Process, Network, and Disk Metrics
26.02.2014
Home
»
HPC
»
Articles
»
def # # Routine to add commas to
a
float string # def commify
3
(amount): amount = str(amount) amount = amount[::-1] amount = re.sub(r"(\d\d\d)(?=\d)(?!\d*\.)", r"\1,", amount) return amount[::-1
29%
Free Enterprise Backup with Bareos
12.11.2013
Home
»
Articles
»
they are addressed Which files should be backed up (
a
FileSet) The plugin configuration The before and after jobs (i.e., programs that are started before or after a backup job, e.g., to start and stop
29%
Installing and operating the Graylog SIEM solution
13.12.2018
Home
»
Archive
»
2018
»
Issue 48: Secur...
»
. The pwgen command generates a password and encrypts with sh
256
sum: pwgen -
N
1 -s 100 echo -
n
| sha
256
sum The encrypted password is then assigned to the parameter root_password_sha2. Table 1 gives
29%
Discovering SQL injection vulnerabilities
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
://127.0.0.1/dvwa/ vulnerabilities/sqli/?id=1&Submit=Submit#" --cookie="PHPSESSID=ce0aa7922720f3190bf
9
bbff7f24
c
434;security=low" --forms After a short while, SQLmap finds the matching ID field and asks
29%
Stretching devices with limited resources
03.02.2022
Home
»
Archive
»
2022
»
Issue 67: syst...
»
] device to store /var/log, offloading the primary source of boot-time writes from the physical device to a 50
MB
RAM drive. Figure
3
: Three zram partitions
29%
Mocking and emulating AWS and GCP services
05.08.2024
Home
»
Archive
»
2024
»
Issue 82: Sover...
»
root:root /usr/local/bin/dockerize FROM google/cloud-sdk:alpine SHELL ["/bin/ash", "-o", "pipefail", "-
c
"] RUN apk add --no-cache --virtual .build-deps alpine-sdk libffi-dev openssl-dev python
3
-dev py
3
« Previous
1
...
10
11
12
13
14
15
16
17
18
19
20
21
22
23
...
26
Next »