search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(750)
Article
(171)
News
(84)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
34
35
36
37
38
39
40
41
42
43
44
45
46
47
...
101
Next »
17%
Convert Linux shell commands into PowerShell cmdlets
07.04.2022
Home
»
Archive
»
2022
»
Issue 68: Autom...
»
"Verb": "New", 06 "Noun": "Command1", 07 "OriginalName": "
" 08 }, 09 { 10 "Verb": "New", 11 "Noun": "Command2",
12
"OriginalName": "
17%
Goodbye virtual machines, hello microVMs
06.10.2022
Home
»
Archive
»
2022
»
Issue 71: Kuber...
»
In two previous articles [
1][2
], I introduced how to bring up lightweight container machines with Footloose and cloud virtual machine stacks on a laptop with Multipass. The Footloose approach didn
17%
Policy rulesets in cloud-native environments
06.10.2022
Home
»
Archive
»
2022
»
Issue 71: Kuber...
»
{ 10 "UserName": "ferdinand", 11 "SerialNumber": "arn:aws:iam::123456789:mfa/ferdinand",
12
"EnableDate": "2021-04-25 09:00:38+00:00" 13 } 14 ], 15 "Groups
17%
Automating development environments and deployment with Otto
11.02.2016
Home
»
Archive
»
2016
»
Issue 31: Tunin...
»
this to create a complete virtual machine. The first call to otto dev can thus take a couple of minutes. In our lab, the basic image contained a minimal version of the more than three-year-old Ubuntu
12
.04 LTS
17%
Understanding Layer 2 switch port security
22.12.2017
Home
»
Archive
»
2017
»
Issue 42: Secur...
»
:1039619585(0) win 512 a:60:b2:3d:fc:af d3:7c:5b:36:4a:61 0.0.0.0.17578 > 0.0.0.0.4432: S 727135709:727135709(0) win 512 18:75:26:4c:a8:23 10:81:2a:
12
:e1:be 0.0.0.0.42271 > 0.0.0.0.61161: S 1071867223
17%
Forensic main memory analysis with Volatility
05.02.2019
Home
»
Archive
»
2019
»
Issue 49: Anato...
»
. To evaluate a memory image, Volatility requires information about the memory layout. A profile must therefore always precisely match the kernel version. The Volatility wiki [
12
] links to ready-made Linux
17%
Shell practice: Introduction to the sed stream editor
09.08.2015
Home
»
Archive
»
2015
»
Issue 28: SSD RAID
»
.04.1988 26 March 1989 15 April 1990 31-March-1991 19 April 1992 11 April 1993 3 April 1994 16. April 1995 7 April 1996 30 March 1997
12
April 1998 Regular Expressions Regular expressions are used
17%
Apache Storm
08.10.2015
Home
»
Archive
»
2015
»
Issue 29: Rescu...
»
# supervisor port 07 supervisor.slots.ports: 08 - 6700 09 - 6701 10 - 6702 11 - 6703
12
# Directory in which Nimbus and Supervisor store data 13 storm.local.dir: "/home/storm" 14
17%
Secrets and certificate management
04.08.2020
Home
»
Archive
»
2020
»
Issue 58: Graph...
»
could be any bit of data – not just a password: $ vault kv put secret/chrisbinnie liverpool=best Key Value --- ----- created_time 2020-03-13T
12
:56:24.857347664Z deletion
17%
OCI containers with Podman
06.10.2019
Home
»
Archive
»
2019
»
Issue 53: Secur...
»
used the example configuration file from the installation help page [6] (Listing 1). As you can see in line
12
, the following container image registries are to be searched: docker.io registry
« Previous
1
...
34
35
36
37
38
39
40
41
42
43
44
45
46
47
...
101
Next »