search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
track chủ Bá bin than thế.(TG:e10838).lrk
?
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(22)
Article
(5)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
2
3
26%
Security analysis with Microsoft Advanced Threat Analytics
11.04.2016
Home
»
Archive
»
2016
»
Issue 32: Measu...
»
. In this way, ATA detects suspicious user actions (
e
.g., unusual login times on the computer) that indicate infected computers. Thanks to advance analysis, ATA also detects pass-
the
-hash (PtH) attacks mentioned
25%
Hacking Mutillidae II
03.08.2023
Home
»
Archive
»
2023
»
Issue 76: Energ...
»
the origin of the name (and how to pronounce it). The Wikipedia [3] page does a great job of joining the dots with the link to wasps: "
The
Mutillidae are a family of more
than
7,000 species of wasps whose
25%
Static code analysis finds avoidable errors
06.10.2019
Home
»
Archive
»
2019
»
Issue 53: Secur...
»
Listing 3 shows the output and thus the full extent of the digital horror story. Splint uncompromisingly reveals any sloppiness; in fact, it outputs seven warnings, which is far more
than
gcc -Wall (i.
e
25%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
the installation to this point, manually launch the jail with the hostname www.homenet.net , an IP address of 192.168.1.200, and the shell /
bin
/sh for the configuration: # jail /jail/www www.homenet.net 192
25%
Ergonomics and security of graphical email clients
27.09.2021
Home
»
Archive
»
2021
»
Issue 65: 7 Em...
»
it speeds up processes compared with snail mail; also, you can send arbitrary attachments. However, modern email programs can do more
than
read, write, and send messages. They can also integrate the messages
25%
Proactive Monitoring
11.10.2016
Home
»
Archive
»
2016
»
Issue 35: Persi...
»
: Monitored hosts send metrics to Riemann, and they assess their status themselves, rather
than
leaving this decision to a central instance [2]. In addition to the server, which is implemented in Clojure
25%
How graph databases work
04.08.2020
Home
»
Archive
»
2020
»
Issue 58: Graph...
»
# Which of these people who know the person with ID 1 is less
than
30? 27 gremlin> g.V(1).out('knows').has('age', lt(30)).values('name') 28 ==>vadas 29 30 # Display matches step-by-step 31 gremlin> g.V().out
E
« Previous
1
2
3