search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(190)
Article
(8)
News
(3)
Keywords
« Previous
1
...
10
11
12
13
14
15
16
17
18
19
20
21
Next »
18%
The Resurrection of bWatch
02.06.2025
Home
»
Articles
»
-purpose, interpreted and dynamic Tool Command Language (Tcl) was created by John Ousterhout in the 1990
s
. From the name you can probably tell that it was intended to be a language for writing tools for whatever platform
18%
Cgroups for resource management in Linux
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
cgroup, which has no restrictions. You can test this by sending a SIGUSR1 to the process: # kill -USR1 $pid 578804+0 records in 578804+0 records out 296347648 bytes (296 MB) copied, 7.00803
s
, 42.
3
MB/
s
18%
Using a tablet as a portable management console
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
, somehow the signal could reach you. During the post-pager revolution (The 1990
s
), you received a new device that offered two-way communications: The ubiquitous cell phone. The cell phone could not only
18%
Intrusion detection with Prelude
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
programs. This is not always the security solution's fault. An application that is not programmed carefully and fails to comply with RFCs can trip a SIEM signature. In this test, Prelude suspected a Do
S
18%
Securing email communication with GnuPG
07.10.2025
Home
»
Archive
»
2025
»
Issue 89: Autom...
»
for different security requirements: GnuPG Desktop [
3
] and Gpg4win [4] are user-friendly desktop versions. GnuPG VS-Desktop [5] is available for particularly secure use in government agencies and companies
18%
Monitoring for small and medium-sized companies compared
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
, POP
3
, or DNS. Thanks to its integrated SNMP trap and Syslog receiver, OpenNMS is capable of implementing centralized logging. Performance data can be collected via SNMP, WMI, HTTP, JMX, JDBC
18%
Snapshot management for Azure VMs
28.07.2025
Home
»
Archive
»
2025
»
Issue 88: 5 Net...
»
Config = New-AzVMConfig -VMName "
" -VMSize "Standard_D2
s
_v
3
" vmConfig = Set -AzVMOSDisk -VM $vmConfig -ManagedDiskId $newDisk.Id -CreateOption Attach -Windows New-AzVM -ResourceGroupName"
18%
Taking that Unix and Linux feeling tothe Windows desktop with MobaXterm
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
version with advanced capabilities is available for EUR 49. A feature list [
3
] specifies the differences between the free and pro versions. The terminal function supports anti-aliasing, fonts, and macros
18%
What tools do intruders use to
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
, name servers, and network hosts accessible through the Internet. The popular whois service also offers a means for discovering domain information. The Nmap scanner's -
s
L option (nmap -
s
L) performs
18%
System monitoring with Sysinternals
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
lists all the processes in a window and includes more detailed information on the current process, such as access to directories (Figure
3
). Figure
3
« Previous
1
...
10
11
12
13
14
15
16
17
18
19
20
21
Next »