search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%25x20mm%253%25390 Llorente 08
?
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(205)
Article
(35)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
17
18
19
20
21
22
23
24
24%
Real World AWS for Everyone
18.02.2018
Home
»
Archive
»
2018
»
Issue 43: Real...
»
]. Create access key pairs for the required tenants/users. An AWS access key always has a key ID in the form of AKIAJ4 PMEXHFYUHIXG2
A
and a secret access key such as :/ONT0HapjmLw7xni 6FPscmvPZJ Sc75hUXAQI+
N
3
24%
Security in the AWS cloud with GuardDuty
09.04.2019
Home
»
Archive
»
2019
»
Issue 50: Bpfilter
»
backend "s
3
" { 07 region = "eu-west-1"
08
bucket = "chrisbinnie-terraformstate" 09 key = "guardduty.tfstate" 10 encrypt = true 11 } 12 } 13 14 resource "aws
24%
Introduction to behavior-driven monitoring
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
Scenarios: 21 cucumber /usr/lib/nagios/plugins/cucumber-nagios/checks/features/www.xing.com/startpage.feature:4 # Scenario: Visiting home page 22 23 1 scenario (1 failed) 24 4 steps (1 failed,
3
skipped)
25
0 ...
3
24%
How graph databases work
04.08.2020
Home
»
Archive
»
2020
»
Issue 58: Graph...
»
" source="7" target="8">
action
with_goat
action
24%
Network analysis with the Bro Network Security Monitor
05.12.2014
Home
»
Archive
»
2014
»
Issue 24: Visua...
»
. For example, to run a report every three seconds for five iterations on eth0, you would use the command in Listing 4. Listing 4 capstats /opt/bro/bin/capstats -I
3
-
n
5 -i eth0 1415510235
24%
Exploring dhcpy6d, a DHCP server for IPv6 networks
03.12.2015
Home
»
Archive
»
2015
»
Issue 30: OpenD...
»
with the client; 547 with the server). Several options are available for DHCP in IPv6, including Dibbler [2], Internet Systems Consortium (ISC) DHCPv6 [
3
], and WIDE-DHCPv6 [4], and each has a slightly different
24%
Monitoring container clusters with Prometheus
09.10.2017
Home
»
Archive
»
2017
»
Issue 41: Kuber...
»
environment provides impressions of the insights Prometheus delivers into a Kubernetes installation. The Prometheus configuration is oriented on the official example [
3
]. When querying metrics from
24%
Make Your IT Automation Systems Play Together Like a Symphony
15.12.2017
Home
»
Archive
»
2017
»
Issue 42: Secur...
»
many nodes, then a significantly larger size is a good idea: I’d use 80GB, if at all possible. Then, configure the security group to include at least the following ports:
a
. 80 b. 22
c
. 443 d
23%
Lean on Logwatch
17.02.2015
Home
»
Archive
»
2015
»
Issue 25: Safe...
»
NEW packages will be installed: libdate-manip-perl libyaml-syck-perl logwatch As a result, about 12.5
MB
of new software is installed. Logwatch gets configuration details several ways: from script ...
25
23%
Open Source Security Information and Event Management system
20.05.2014
Home
»
Archive
»
2014
»
Issue 20: IPv6...
»
is the community open source version of the project, and Alien Vault Unified Security Management (USM) [
3
] offers even more in the way of features, scalability, and support. Additionally, it is worth noting that all
« Previous
1
...
17
18
19
20
21
22
23
24