search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(484)
Article
(114)
Blog post
(1)
News
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
36
37
38
39
40
41
42
43
44
45
46
47
48
49
...
60
Next »
16%
Acquiring a Memory Image
20.05.2014
Home
»
Archive
»
2014
»
Issue 20: IPv6...
»
from the Windows system to /mnt/windows_mount. After changing into that directory and listing the files, you will see the list of files followed by a login to the pmem location (Figure
6
16%
Udev with virtual machines
14.11.2013
Home
»
Archive
»
2013
»
Issue 17: Cloud...
»
distributions. Table 1 Udev Storage Locations Distribution Path Ubuntu
12.10
, Debian 7.0, SLES 11 SP2 * /etc/udev/rules.d/70-persistent-net.rules* /lib/udev/rules.d/75
16%
Self-hosted Pritunl VPN server with MFA
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
an organization by clicking Users | Add Organization (Figure
6
). Choose a relevant organization name, enter the details, and click Add . Figure
6
: Adding
16%
The state of open source groupware
09.08.2015
Home
»
Archive
»
2015
»
Issue 28: SSD RAID
»
of modern HTML5 clients. A makeover is intended for version 13. The company released a preview of Scalix
12.6
at the same time as the release of
12
.5. In the press release for version
12
.5, the manufacturer
16%
Documentation Tools for Admins
20.05.2014
Home
»
Archive
»
2014
»
Issue 20: IPv6...
»
that employees authenticate before creating entries, making it clear later who posted an entry. Less computer-savvy users are supported by a WYSIWYG editor [
6
] or at least a help link for the wiki syntax
16%
Attackers, defenders, and Windows Subsystem for Linux
28.11.2022
Home
»
Archive
»
2022
»
Issue 72: OpenS...
»
variant will do; it does not have to come from the official Microsoft Store [
6
]. Alternatively, the attacker can create their own Linux derivative for WSL with known threats and tools. The command PS
16%
Web applications with Flask
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
rel="stylesheet" href="style.css" /> 05 {% endblock %} 06 07 08
09 {% for item in seq %}
10
{{ item }}
11 {% endfor %}
12
13 14