search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(281)
Article
(63)
News
(2)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
26
27
28
29
30
31
32
33
34
35
Next »
10%
Security as Code
04.10.2018
Home
»
Archive
»
2018
»
Issue 47: Findi...
»
/CD) process, you can automate the monitoring of your systems, dependent on your scenario. Gauntlt's scripts come in the form of "attack files" [
6
]; each plain text file ends with the .attack extension. Listing
10%
D-Wave's Murray Thom discusses the present and future of quantum computing.
13.12.2018
Home
»
Archive
»
2018
»
Issue 48: Secur...
»
the first real-time Quantum Application Environment called Leap [
6
]. "We built Leap based on our experience helping customers build the 100 early real-world applications running on our computers today. So, we
10%
JMeter tests loads and measures performance of static and dynamic resources
28.11.2021
Home
»
Archive
»
2021
»
Issue 66: Inci...
»
Even if you know your website can handle a load of 30 users a second or that more than
500
users causes a small fire in the data center, the big question is: Will the next release work under
10%
Defining measures
07.04.2022
Home
»
Archive
»
2022
»
Issue 68: Autom...
»
], fdtree [
6
], Postmark [7], and MD-Workbench [8]. These benchmark codes test overall I/O functions such as creating and deleting, renaming, and gathering statistics. These tests are done in isolation
10%
Searching for security flaws and exploits with Burp Suite
20.03.2014
Home
»
Archive
»
2014
»
Issue 19: Perim...
»
+ (in Tools | Cookie Manager+ ) to locate a cookie and see its details. Figure
6
shows an example of a JSESSION cookie (from a Fortune
500
firm) issued from the web server without a Secure flag
10%
Throw Down the Gauntlet
14.08.2018
Home
»
Archive
»
2018
»
Issue 47: Findi...
»
Attacks: TLS_FALLBACK_SCSV: OK - Supported * Deflate Compression: OK - Compression disabled * TLSV
1_2
Cipher Suites: Forward
10%
Secure microservices with centralized zero trust
04.04.2023
Home
»
Archive
»
2023
»
Issue 74: The F...
»
:container-name:spire-client -selector k8s:container-image:docker.io/acmecorp/go-spiffe-https-example:v
0.8
-selector unix:uid:1102 -selector k8s:ns:acmewebappnamespace Only a workload with characteristics that match these four selectors
10%
ASP.NET web development framework
30.11.2020
Home
»
Archive
»
2020
»
Issue 60: Secur...
»
Options.ListenAnyIP(4711,
08
listenOptions => { 09 listenOptions.UseHttps("cert.pfx", "
"); 10 } 11 );
12
}) 13 .UseStaticWebAssets() 14 .Use
10%
Live migration of virtual machines with KVM
13.06.2016
Home
»
Archive
»
2016
»
Issue 33: IPv6...
»
(e.g., iSCSI, Fibre Channel), or you can stick with NFS. For example, NetApp Clustered ONTAP also offers support for pNFS, which newer Linux distributions such as Red Hat Enterprise Linux or CentOS
6
10%
Attacks on HTTPS Connections
13.06.2016
Home
»
Archive
»
2016
»
Issue 33: IPv6...
»
supported by Chrome since Chromium
12
and Firefox from version 32. Safari and Internet Explorer have not previously supported pinning. Microsoft is considering whether to introduce it. Until then, IE users
« Previous
1
...
26
27
28
29
30
31
32
33
34
35
Next »