14%
10.06.2015
. To continue providing a free scanner, the open source project OpenVAS was formed; it builds on the last free version (2.2) of the scanner and has been developed independently ever since the fork.
Focus ... SecurityX-Ray
14%
20.05.2014
bottleneck is reading and writing data to the local hard disk or across the network, rather than processor power, the number of processes can be higher. As a rule of thumb, you can go for the number
14%
30.11.2025
tasks. But, there's a solution: A tablet computer.
The tablet computer is the new portable sweat shop. You're chained to the job. You're available 24/7x365 with a device that can deliver what you need
14%
27.10.2011
If the first item on a sys admin’s to-do list is building a Linux server, then the second item is surely monitoring that server. If you’ve been a sys admin for a while, you’ve almost definitely been
14%
28.11.2022
accounts to have been removed from the group. You can go into even more detail by pressing the Changes
button. Another window provides data on when accounts were added and removed.
In this context, I need
14%
03.11.2022
for a price.
Rather than dig into the tools and stacks, I’m going to discuss the ELK stack and its components briefly. This stack was the original open source log analysis stack designed to replace Splunk
14%
02.10.2012
are logged nicely to /var/log/tcp-wrappers.log
:
ALL : .example.com \
: spawn (/bin/echo %a from %h triggered an alarm %d >> \
/var/log/tcp-wrappers.log) \
: deny
Going one step further this next example
14%
28.11.2023
experience of the IT industry shows that the second approach – replacing the legacy system step-by-step with a new system that grows by increments (Figure 2) – works better than the big bang
14%
02.06.2025
. It was Beowulf. No, not the Scandinavian warrior, but an approach to high-performance computing (HPC) that uses common x86 processors, conventional Ethernet networking, the Message Passing Interface (MPI
14%
31.10.2025
all banned connections are logged nicely to /var/log/tcp-wrappers.log:
ALL : .example.com : spawn (/bin/echo \
%a from %h triggered an alarm %d >> \
/var/log/tcp-wrappers.log) : deny
Going one