search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(224)
Article
(43)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
19
20
21
22
23
24
25
26
27
Next »
28%
Mobile hacking tool
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
(e.g., which you can use to read passwords in the scope of a pentest) are available for download from GitHub [5] [
6
]. Flipper Zero is designed for interaction with a smartphone. During the initial
28%
Open Source Security Information and Event Management system
20.05.2014
Home
»
Archive
»
2014
»
Issue 20: IPv6...
»
daily 05 missingok 06 notifempty 07 compress 08 delaycompress
09
sharedscripts 10 postrotate 11 invoke-rc.d rsyslog reload > /dev/null
12
endscript 13 } Finally, to see the syslog
28%
Manage OpenVPN keys with Easy-RSA
06.10.2019
Home
»
Archive
»
2019
»
Issue 53: Secur...
»
response = urllib.urlopen(url); 06 data = json.loads(response.read()) 07 08 for userentry in data:
09
if userentry.get('active'): 10 username = userentry.get('username') 11
12
if os
28%
Proactive Monitoring
11.10.2016
Home
»
Archive
»
2016
»
Issue 35: Persi...
»
-server"})) 06 07 ; Enable all interfaces for TCP, UDP and websockets: 08 (let [host "0.0.0.0"]
09
(tcp-server {:host host}) 10 (udp-server {:host host}) 11 (ws-server {:host host}))
12
13 ; Clean up events
28%
ASP.NET web development framework
30.11.2020
Home
»
Archive
»
2020
»
Issue 60: Secur...
»
Options.ListenAnyIP(4711, 08 listenOptions => {
09
listenOptions.UseHttps("cert.pfx", "
"); 10 } 11 );
12
}) 13 .UseStaticWebAssets() 14 .Use
28%
Relational databases as containers
17.06.2017
Home
»
Archive
»
2017
»
Issue 39: Conta...
»
SQL [
6
], MariaDB [7], and PostgreSQL [8]. Entry-Level Relational Searching the web for the keyword "database" shows various techniques, implementations, approaches, and software variants. In this article
28%
Live migration of virtual machines with KVM
13.06.2016
Home
»
Archive
»
2016
»
Issue 33: IPv6...
»
(e.g., iSCSI, Fibre Channel), or you can stick with NFS. For example, NetApp Clustered ONTAP also offers support for pNFS, which newer Linux distributions such as Red Hat Enterprise Linux or CentOS
6
28%
Attacks on HTTPS Connections
13.06.2016
Home
»
Archive
»
2016
»
Issue 33: IPv6...
»
supported by Chrome since Chromium
12
and Firefox from version 32. Safari and Internet Explorer have not previously supported pinning. Microsoft is considering whether to introduce it. Until then, IE users
28%
The basics of domain-driven design
28.11.2023
Home
»
Archive
»
2023
»
Issue 78: Domai...
»
for the analysis of domains and the design of application-oriented software was filled by others. Popular methods include event storming [
6
], domain storytelling [7], or example mapping [8]. These methods have
28%
A Distributed SQL Database
03.08.2023
Home
»
Archive
»
2023
»
Issue 76: Energ...
»
Catcher in the Rye', 'J.D. Salinger', '1951-07-16', 15.99), ('To Kill a Mockingbird', 'Harper Lee', '1960-07-11',
12
.99), ('Pride and Prejudice', 'Jane Austen', '1813-01-28', 9.99); At this point
« Previous
1
...
19
20
21
22
23
24
25
26
27
Next »