search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(1550)
News
(737)
Article
(313)
Blog post
(9)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
173
174
175
176
177
178
179
180
181
182
183
184
185
186
...
261
Next »
36%
LibreOffice in the workplace
18.02.2018
Home
»
Archive
»
2018
»
Issue 43: Real...
»
(e.g., as web applications). Test and conversion phase. All necessary processes are tested on the
new
office suite, typically in a test environment, including the creation of
new
templates
36%
Handy Windows tools for sniffing network traffic
09.08.2015
Home
»
Archive
»
2015
»
Issue 28: SSD RAID
»
directory from which you started SmartSniff. If you now restart the tool and start a
new
scan, you will see the packet destination country in the column on the far right. Analyzing Packets in Real Time When
36%
Making Small Business Server 2011 fit for 2014
20.05.2014
Home
»
Archive
»
2014
»
Issue 20: IPv6...
»
on the workstations. Here the setting is set by default to High so that all
new
updates are automatically installed on the clients. When updating the server, make sure that the clients have the latest updates in place
36%
An overview of the Citadel BBS
02.06.2020
Home
»
Archive
»
2020
»
Issue 57: Artif...
»
, such as adopting the address book service provided by
Google
, might seem an easy solution, but it is not free from problems. Under some jurisdictions, uploading the personal data of contacts to a server managed
36%
Build a honeypot with real-world alerts
01.08.2019
Home
»
Archive
»
2019
»
Issue 52: Stop...
»
NEW
-m tcp --dport 22 -j ACCEPT 10 -A INPUT -p udp --dport 5353 -j DROP 11 -A INPUT -s
-p tcp -m state --state
NEW
-m tcp --dport 443 -j ACCEPT 12 -A INPUT -m limit --limit 30/min -j
36%
Credential harvesting at the network interstice
06.10.2019
Home
»
Archive
»
2019
»
Issue 53: Secur...
»
(often on the dark web) or handing them over to an attacker – a relatively
new
practice. (See the "Have I Been Harvested?" box.) Traditionally, hackers were interested in compromising systems either smash
36%
Open Network Operating System
11.10.2016
Home
»
Archive
»
2016
»
Issue 35: Persi...
»
services, manage them, or add listeners for service events. If OpenFlow runs in the network and the OpenFlow provider is active, a
new
network packet that arrives on a network device creates a PacketIn event
36%
Debian's quest for reproducible builds
05.12.2016
Home
»
Archive
»
2016
»
Issue 36: Autom...
»
details of the tools used in the binary package during the initial build. To do so, it writes the data to a
new
file called .buildinfo within the structure of the package. In subsequent builds, the srebuild
36%
Tuning Ansible
09.05.2018
Home
»
Archive
»
2018
»
Issue 45: Autom...
»
. If you miss an announcement, suddenly some
new
syntax in a “play” in your playbook could break everything horribly. Ansible is not exempt from this behavior, but the online search I just mentioned usually
36%
Desktops and applications with Essentials
16.08.2018
Home
»
Archive
»
2018
»
Issue 46: CMS S...
»
The ability to run Citrix workloads in a public cloud is not
new
. The 7.x versions already provided terminal servers and virtual desktops in the cloud. However, all administrative activities
« Previous
1
...
173
174
175
176
177
178
179
180
181
182
183
184
185
186
...
261
Next »