search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(262)
News
(7)
Article
(5)
Keywords
« Previous
1
...
10
11
12
13
14
15
16
17
18
19
20
21
22
23
...
28
Next »
15%
Five special distros for system and network admins
28.07.2025
Home
»
Archive
»
2025
»
Issue 88: 5 Net...
»
Figure 3: Midnight Commander provides excellent services for file and folder management. Grml Grml [
6
] from Graz, Austria, is one of the veterans among Linux distributions for maintenance and rescue
15%
Anonymization and pseudonymization of data
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
M 12345 5 36 F 12346
6
34 M 12347 Anonymized Data (k=3) 1 30-40 * 123## 2 30
15%
Filtering email with Sieve
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
takes a couple of lines (see Listing
6
). Listing
6
On Vacation 01 require "vacation"; 02 vacation 03 :days 14 04 # in case of multiple addresses used to format ["address1", "address2
15%
Boost performance of your Python programs
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
Python code designed with threading is to use the built-in multiprocessing package included in Python from version 2.
6
on. This package provides an API similar to the threading Python module. Although
15%
Strategies for routing voice calls around a firewall
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
follows the hops collected in the Via headers from Bob back to Alice. When Bob accepts the call, he sends a 200 OK (
6
). In contrast to the previous responses, this OK will contain a Contact header
15%
What tools do intruders use to
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
under Windows , which contains a default collection of entities (see Figure
6
). Figure
6
: Managing reconnaissance information with Maltego. Select
15%
Fast system management from Puppet Labs
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
-based (Streaming Text Oriented Messaging Protocol) server implementation, for example, ActiveMQ [5] and RabbitMQ [
6
]. The administrator generates arbitrary job chains on a management system that are then sent
15%
Managing Active Directory at the command line
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
is not installed on any other systems. Instead, the Remote Server Administration Tools (RSAT) module is used [5] [
6
]. The version for Windows 7 not only installs a full set of tools for GUI-based administration
15%
Check your VoIP networks with SIPVicious and sngrep
30.11.2025
Home
»
Archive
»
2025
»
Issue 90 VoIP N...
»
(6192 bits), 774 bytes captured (6192 bits) Ethernet II, Src: 00:1a:2b:3c:4d:5e, Dst: 00:
6
f:7g:8h:9i:0j Internet Protocol Version 4, Src: 192.168.1.101, Dst: 192.168.1.104 User Datagram Protocol, Src Port
15%
Safeguard your Kubernetes setup with Kanister
28.07.2025
Home
»
Archive
»
2025
»
Issue 88: 5 Net...
»
to S3 will be successful (Listing
6
). Listing
6
Backup ActionSet cat <
« Previous
1
...
10
11
12
13
14
15
16
17
18
19
20
21
22
23
...
28
Next »