search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(481)
Article
(122)
News
(43)
Blog post
(2)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
30
31
32
33
34
35
36
37
38
39
40
41
42
43
...
65
Next »
24%
Many Clouds, One API
22.08.2011
Home
»
Articles
»
.keys.sort.each do |s| 14 printf "%20s %d\
n
", s, summary[s] 15 end 16 puts "Polling for changes (Ctrl-
C
to end)" 17 loop do 18 sleep 2 19 client.instances.each do |inst| 20 if state[inst.id] != inst.state 21
24%
A standard cloud computing API
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
few years, including Amazon Elastic Compute Cloud (EC2), Amazon Simple Storage Service (S
3
), and JiffyBox. In the US, these vendors are joined by providers such as GoGrid, Rackspace, and Terremark
24%
NetFlow reporting with Google Analytics
10.06.2015
Home
»
Archive
»
2015
»
Issue 27: Fault...
»
, or User scopes). These include custom dimensions: 1. srcaddr 2. dstaddr
3
. srcport 4. dstport 5. protocol 6. exporter_id 7. input_if 8. output_if
9
. tos and custom metrics: 1. bytes (integer) 2
24%
Forensic main memory analysis with Volatility
05.02.2019
Home
»
Archive
»
2019
»
Issue 49: Anato...
»
Laboratory Technical Report 536, 2002: https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-536.pdf Becher, M., M. Dornseif, and
C.N
. Klein. "FireWire: All Your Memory are Belong to Us." A presentation at Can
24%
The Cuckoo sandboxing malware analysis tool
17.04.2017
Home
»
Archive
»
2017
»
Issue 38: .NET...
»
7db
9
d1663fc695ec2fe2
a
2
c
4538aabf651fd0f" 2016-07-25 5:37:00 PM,335 [lib.cuckoo.core.scheduler] INFO: Task #6: acquired machine fed01 (label=fed01) 2016-07-25 17:37:00,345 [modules
24%
Warding off the rise of VoIP spam
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
:alice@somesipprovider.de>;tag=42 07 Call-ID:
a
84b4
c
76e66710de5f90ae275 08 Contact: Alice
09 ... The media data transferred in the course of a voice or video call are typically transported one
23%
Exploring Nmap's scripting engine
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
– A common language makes the script portable to Nmap systems on other platforms. (
A
Bash script, on the other hand, would work well in Linux but might not work on a Windows system.) Community
23%
Stressing security with PowerShell
02.06.2020
Home
»
Archive
»
2020
»
Issue 57: Artif...
»
, specialized meta-frameworks are available on GitHub, PowerLine [
3
] being just one example. PS2EXE [4] also follows a similar approach, although with completely different administrative goals. Another option
23%
Linux Essentials for Windows Admins – Part 2
06.08.2012
Home
»
Articles
»
and other file attributes, if specified. The following is a partial directory listing of my Windows 7 home directory with DIR : 07/10/2011 04:28 PM
Citrix 07/11/
2012
03:17 PM
23%
Comparing Ceph and GlusterFS
21.04.2015
Home
»
Archive
»
2014
»
Issue 23: 10 Ti...
»
-r--r-- 2 root root 6
3
. Feb 18:36 .glusterfs/0d/19/0d19fa
3
e-5413-4f6e-abfa-1f344b687ba7 # # ls -alid dir1 .glusterfs/fe/
9
d/fe
9
d750b-
c
0e
3
-42ba-b2cb-22ff8de
3
edf0 .glusterfs /00
« Previous
1
...
30
31
32
33
34
35
36
37
38
39
40
41
42
43
...
65
Next »