search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(181)
Article
(57)
News
(2)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
13
14
15
16
17
18
19
20
21
22
23
24
Next »
10%
TLS 1.3 and the return of common sense
04.10.2018
Home
»
Archive
»
2018
»
Issue 47: Findi...
»
]). Figure 2: A vulnerable majority: Only a tiny number of sites surveyed in May 2018 (7.
6
%) support a
3
,072-bit key exchange (image source: Qualys SSL Labs [2]). On discovering the ROBOT exploit against ... After a decade in service, TLS 1.2 is showing many signs of aging. Its immediate successor, TLS 1.
3
, has earned the approval of the IETF. Some major changes are on the way. ... TLS 1.
3
... TLS 1.
3
and the return of common sense
10%
Setting up a PXE boot server
20.06.2022
Home
»
Archive
»
2022
»
Issue 69: Terra...
»
how long DHCP clients can keep their addresses. If your provider has assigned you an IPv
6
subnet, your DHCP server can pass on addresses from this segment to your LAN systems, which is sometimes
10%
Setting up FreeNAS
17.02.2015
Home
»
Archive
»
2015
»
Issue 25: Safe...
»
. FreeNAS does require some hardware planning, but it is well documented. Because the system is based on FreeBSD 9.
3
[
6
], you can find lots of details on the FreeBSD Hardware Compatibility List [7]. If you
10%
SmartOS as a virtualization platform
20.03.2014
Home
»
Archive
»
2014
»
Issue 19: Perim...
»
": 2048, 07 "resolvers": ["192.168.111.254"], 08 "disks": [ 09 { 10 "image_uuid": "1fc068b0-13b0-11e2-9f4e-2f
3
f
6
a96d9bc", 11 "boot": true, 12 "model": "virtio" 13 } 14 ], 15
10%
OrientDB document and graph database
09.08.2015
Home
»
Archive
»
2015
»
Issue 28: SSD RAID
»
chapter={1,2,
3,4,5,6
}; Graph databases have base types V (node) and E (edge). Lines
4-8
create the classes Person and Book as an extension of the base node and defines their attributes. The usual
10%
Reducing the Attack Surface in Windows
04.12.2024
Home
»
Archive
»
2024
»
Issue 84: Non-R...
»
applications from creating child processes No d4f940ab-401b-4efc-aadc-ad5f
3
c50688a Blocks credential theft from the local security authority subsystem (lsass.exe) Yes 9e
6
c4e1f
10%
Resolving problems with DNS, Active Directory, and Group Policy
17.04.2017
Home
»
Archive
»
2017
»
Issue 38: .NET...
»
name. By default, Windows Server 2012 R2, for example, tries to resolve the name to the IPv
6
address, resulting in undesirable messages. Figure
3
: Error
10%
Warewulf 4 – GPUs
20.02.2023
Home
»
HPC
»
Articles
»
the file /usr/local/bin/gpu_devices.sh (Listing
6
). Listing
6
: /usr/local/bin/gpu_devices.sh #!/bin/bash /sbin/modprobe nvidia if [ "$?" -eq 0 ]; then # Count the number of NVIDIA controllers found. NVDEVS=`lspci | grep -i NVIDIA` N
3
10%
Security as Code
04.10.2018
Home
»
Archive
»
2018
»
Issue 47: Findi...
»
="filtered" reason="no-response" reason_ttl="0"/>
10%
Managing Active Directory sites and subnets
02.08.2022
Home
»
Archive
»
2022
»
Issue 70: Defen...
»
and assign them to the respective sites. To create a new subnet, right-click Subnets in the snap-in and select New Subnet from the context menu. If desired, you can create IPv
6
subnets. After you create
« Previous
1
...
13
14
15
16
17
18
19
20
21
22
23
24
Next »