search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(302)
Article
(66)
Blog post
(2)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
Next »
18%
Reducing the Attack Surface in Windows
04.12.2024
Home
»
Archive
»
2024
»
Issue 84: Non-R...
»
applications from creating child processes No d4f940ab-401b-4efc-aadc-ad5f
3
c50688a Blocks credential theft from the local security authority subsystem (lsass.exe) Yes 9e
6
c4e1f
18%
News for Admins
01.06.2024
Home
»
Archive
»
2024
»
Issue 81: Load...
»
is, the fewer vulnerabilities it is likely to have. According to the report, container images smaller than 100
MB
had 4.4 high or critical vulnerabilities, versus 42.2 for images between 250 and 500
MB
... and Management Software; LPI Launches Open Source Essentials Program; Apache Software Foundation Celebrates 25 Years; SUSE Announces Rancher Prime
3
.0; NSA Issues Zero Trust Guidelines for Network Security
18%
Efficient password management in distributed teams
18.02.2018
Home
»
Archive
»
2018
»
Issue 43: Real...
»
in source code, such as: var PASSWORD = 'sn4k
3
oil' This method tackles the challenge of keeping secret information synchronized between all team members in a simple, although not secure, way. On the one
18%
Setting up SELinux policies
12.09.2013
Home
»
Archive
»
2013
»
Issue 16: Docker
»
: 1.0 05 Release: 1%{?dist} 06 License: GPL v2 or later 07 Source0: local.te 08 Source1: local.fc
09
Source2: local.if 10 Group: Development/Tools 11 Summary
18%
Visualizing log and other data
14.11.2013
Home
»
Archive
»
2013
»
Issue 17: Cloud...
»
it as an "experiment in organic software visualization" [
3
]. Similarly to Gource, code_swarm animates project changes in a version control system. Files appear as dots; their colors again indicate the file type (Figure
18%
Security as Code
04.10.2018
Home
»
Archive
»
2018
»
Issue 47: Findi...
»
="filtered" reason="no-response" reason_ttl="0"/>
18%
A Container for HPC
15.08.2016
Home
»
Archive
»
2016
»
Issue 34: Softw...
»
. A container consists of the application itself and any library or system dependencies and is referred to as "operating system virtualization" [
3
]. This higher level of virtualization may allow you to use
18%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
is an excellent Bicep-based reference and starting point that helps you get up and running quickly [
3
]. Table 1 BICEP Resource Definitions Resources Versioned w/@yyyy-mm-dd-state Common
18%
A Distributed SQL Database
03.08.2023
Home
»
Archive
»
2023
»
Issue 76: Energ...
»
the data across all nodes: cockroach start --insecure --join=
,
,
3> This ensures that the previously stopped node receives any updates that occurred during
18%
Web applications with Julia
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
this minimal example looks like in the browser after the user has placed the slider in a position corresponding to the number
6
. The empty paragraph has been replaced by that constructed in Listing
3
« Previous
1
...
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
Next »