32%
02.02.2021
for numerous applications and services, it would be wise to watch this space for future versions.
Listing 2 shows off the settings available for applying various rules to logfile inspection. As you can see, it
32%
02.02.2021
servers, a database, public IP addresses, and the appropriate firewall rules, you can either configure all these services manually through the appropriate APIs, or you can use orchestration and describe
32%
20.08.2013
on the mail server and can send and receive email and use instant messaging.
Like Exchange, IceWarp supports the use of rules. These can be set on the server side and bound to user email domains or entire
32%
18.07.2013
of the European Union are protected by Directive 95/46/EC [2], due to be updated for the digital age [3], with supplemental legislation in individual member countries (e.g., the Federal Data Protection Act
32%
22.08.2011
BSD MD5 [32/64 X2]... DONE
Raw: 10995 c/s real, 10995 c/s virtual
Benchmarking: OpenBSD Blowfish (x32) [32/64 X2]... DONE
Raw: 723 c/s real, 723 c/s virtual
Benchmarking: Kerberos AFS DES [48/64 4K
32%
06.10.2022
in version 6, Apache OpenMeetings also supports TLS 1.2 for OAuth and do-it-yourself captchas.
AOM lets you schedule meetings, create surveys, and back up data easily. The system is ideal for providing home
32%
19.02.2013
cases, between a provider and an enterprise.
RIP is the oldest IGP – the first version is from 1988. The current version is version 2, which also supports IPv6 via RIPng. Despite this, RIP is considered
32%
09.01.2013
\
rule $id="p_ip_lb1_prefer_on_alice" inf: #uname eq alice
location p_ip_lb2_on_bob p_ip_lb2 \
rule $id="p_ip_lb2_prefer_on_bob" inf: #uname eq bob
Load Balancing via Software or DNS
32%
03.12.2015
is very difficult to master. Why? Because when you deal with hardware security, you need to deal with physics. The real world has much more stringent rules than the digital world.
A common reaction is: Why
32%
12.09.2013
.
For the first of these cases, it makes sense to run ausearch and audit2allow to analyze the SELinux-related problems that occur in an application and then to bundle the necessary rulesets into your own policy