search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(303)
Article
(58)
Blog post
(2)
News
(2)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
29
30
31
32
33
34
35
36
37
Next »
28%
How graph databases work
04.08.2020
Home
»
Archive
»
2020
»
Issue 58: Graph...
»
, journalists associated with the International Consortium of Investigative Journalists (ICIJ) from 107 newspapers, television stations, and online media in
80
countries uncovered the crimes by jointly analyzing
28%
Lean on Logwatch
17.02.2015
Home
»
Archive
»
2015
»
Issue 25: Safe...
»
_list, qr/^SSL_accept/; push @ignore_list, qr/^SSL_connect:/; push @ignore_list, qr/^connection (?:closed|established)/; These lines are much easier to understand than other parts of the script, and I'
m
28%
Retrieving Windows performance data in PowerShell
10.04.2015
Home
»
Archive
»
2015
»
Issue 26: OpenS...
»
). Listing 1 Get-WMIObject Cmdlet # Get-WMIObject Win32_OperatingSystem SystemDirectory: C:\Windows\system32 Organization: BuildNumber: 9600 RegisteredUser: johndoe@outlook.
com
Serial
28%
Port Knocking
07.10.2014
Home
»
Archive
»
2014
»
Issue 23: 10 Ti...
»
/var/log/messages on some Linux flavors) receives logging information. On Debian I'
m
becoming more accustomed to looking inside /var/log/auth.log for all things relating to logins, but I don't like
28%
A ptrace-based tracing mechanism for syscalls
06.10.2022
Home
»
Archive
»
2022
»
Issue 71: Kuber...
»
, which is passed by the caller in CPU register rax on x86-64 machines [
8
]. Syscall arguments are passed in registers rdi , rsi , rdx , r10 , r
8
, and r9 . The return value of the syscall is returned
28%
A Distributed SQL Database
03.08.2023
Home
»
Archive
»
2023
»
Issue 76: Energ...
»
atomically and consistently across all the involved nodes. Here's a simple example of a transaction that involves updating the prices of two books: BEGIN; UPDATE books SET price = price *
0.9
WHERE title
28%
Shadow admin permissions and your AWS account
30.05.2021
Home
»
Archive
»
2021
»
Issue 63: Autom...
»
be vulnerable. In a PowerShell command prompt window (CMD), run the following command under the SkyArk folder: PS C:\SkyArk> Scan -AWShadowAdmins -AccessKeyID AKIA5DWQIQ2MR6OXXXXX -SecretKey BYptvF+QF2kk
8
W4
28%
Serverless computing with AWS Lambda
30.01.2020
Home
»
Archive
»
2020
»
Issue 55: AWS L...
»
Lookup Output START RequestId: 4e90b424-95d9-4453-a2f4-
8
f5259f5f263 Version: $LATEST ('www.devsecops.cc', [], [' 138.68.149.181' ]) END RequestId: 4e90b424-95d9-4453-a2f4-
8
f5259f5f263 REPORT Request
28%
Aggregating information with Huginn
18.02.2018
Home
»
Archive
»
2018
»
Issue 43: Real...
»
"href": "http://www.linux-magazine.
com
/NEWS/Gartner-worldwide-server_sales_drop" 08 }
09
], 10 "title": "Gartner: Worldwide server sales drop", 11 "content": "
28%
Open Source Security Information and Event Management system
20.05.2014
Home
»
Archive
»
2014
»
Issue 20: IPv6...
»
picture of what threats you need to address. To set up periodic scanning, go to the web interface by clicking on Environment | Vulnerabilities | Scan Job | New Scan Job (Figure
8
). Enter a job name
« Previous
1
...
29
30
31
32
33
34
35
36
37
Next »