search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(226)
Article
(42)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
Next »
17%
Evaluating logfiles with Microsoft Log Parser Studio
07.10.2014
Home
»
Archive
»
2014
»
Issue 23: 10 Ti...
»
is a string like "1, 10,
12
, 15, 2, 21,
3
, …" and not the ascending order of the values. Exporting the data into another program and anchoring the desired sorting directly in the query by adjusting
17%
Debian's quest for reproducible builds
05.12.2016
Home
»
Archive
»
2016
»
Issue 36: Autom...
»
. Figure
6
: Diffoscope allows in-depth comparisons for troubleshooting. Here, it is investigating two versions of a Firefox extension [
12
]. Reproducible builds represents an important step toward
17%
DevSecOps with DefectDojo
03.04.2024
Home
»
Archive
»
2024
»
Issue 80: Threa...
»
credentials. the initializer can take up to
3
minutes to run
08
# use docker-compose logs -f initializer to track progress 09 docker-compose logs initializer ? grep "Admin password:" First, run
17%
The OpenResty distribution for Nginx
20.03.2014
Home
»
Archive
»
2014
»
Issue 19: Perim...
»
" 05 06 start on (filesystem and net-device-up IFACE=lo) 07 stop on runlevel [!2345]
08
09 env DAEMON=/usr/local/openresty/nginx/sbin/nginx 10 env PID=/var/run/nginx.pid 11
12
expect fork
17%
Network analysis with the Bro Network Security Monitor
05.12.2014
Home
»
Archive
»
2014
»
Issue 24: Visua...
»
at the Bro website [2]. The installation instructions I cover here are based on a CentOS
6
.5 Linux distribution. (Note: At the time of publication, CentOS 7 still has a missing dependency for the Python
17%
Proactive Monitoring
11.10.2016
Home
»
Archive
»
2016
»
Issue 35: Persi...
»
-server"})) 06 07 ; Enable all interfaces for TCP, UDP and websockets:
08
(let [host "0.0.0.0"] 09 (tcp-server {:host host}) 10 (udp-server {:host host}) 11 (ws-server {:host host}))
12
13 ; Clean up events
17%
Keep an eye on your network
01.08.2019
Home
»
Archive
»
2019
»
Issue 52: Stop...
»
_path": "/var/log/osquery", 07 "disable_logging": "false",
08
"schedule_splay_percent": 10 09 }, 10 "schedule": { 11 "osquery_profile": {
12
"query": "SELECT * FROM osquery_info;", 13
17%
From debugging to exploiting
17.02.2015
Home
»
Archive
»
2015
»
Issue 25: Safe...
»
168 (gdb) p j $
3
= 144 (gdb) c Breakpoint 2, Calc_vacf () at MD.o.c:671 671 vacf[j-i]=0; (gdb) p &j $
6
= (int *) 0xffffc168 (gdb) p j $7 = 144 On the other hand, when dealing with the ELF
17%
Protecting the production environment
30.05.2021
Home
»
Archive
»
2021
»
Issue 63: Autom...
»
that Puppet cannot detect. A typical example in the Unix environment is the sequence for setting up a service. You have to (1) install the package, (2) adjust its configuration file, and (
3
) start
17%
OpenStack workshop, part 2: OpenStack cloud installation
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
IDENTIFIED BY 'ohC
3
teiv'; 10 EOF 11 mysql -u root <
12 CREATE DATABASE keystone; 13 GRANT ALL PRIVILEGES ON keystone.* TO 'keystonedbadmin'@'%' 14 IDENTIFIED BY 'Ue0Ud7ra'; 15 EOF 16 mysql -u root <
« Previous
1
...
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
Next »