search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(383)
Article
(109)
News
(27)
Blog post
(2)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
37
38
39
40
41
42
43
44
45
46
47
48
49
50
...
53
Next »
17%
The utility of native cloud applications
17.04.2017
Home
»
Archive
»
2017
»
Issue 38: .NET...
»
accommodates the very limited likelihood of the availability of individual services. If you run 1,
000
or more computers as part of a cloud, you can't set up each individual VM to be redundant without
17%
The achievements of and plans for systemd
03.02.2022
Home
»
Archive
»
2022
»
Issue 67: syst...
»
are expensive, with only 1,
000
of them (or sometimes only 100 or 500, depending on the distribution), and they are allocated individually during package installation. So traditionally they can only be used
17%
Portable home directory with state-of-the-art security
03.02.2022
Home
»
Archive
»
2022
»
Issue 67: syst...
»
" costs a good $4,
000
(about EUR
3
,600). However, if the blueprint for an innovative machine or the company's current tax return is stored on the device and it falls into the wrong hands, somebody
17%
Effective honeypots with sensors on production systems
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
exploded in recent years. (From AV-TEST Institute [2], which registered more than 55,
000
malicious programs every day.) Although regular updates of signature databases used in virus scanners
17%
Reducing the Attack Surface in Windows
04.12.2024
Home
»
Archive
»
2024
»
Issue 84: Non-R...
»
, signed drivers Yes 56a863a9-875e-4185-98a7 b882c64b5ce5 Stops Adobe Reader from creating child processes No 7674ba
52
-37eb-4a4f-a9a1-f0f9a1619a2c Stops all Office
17%
Remote desktop based on HTML5
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
quickly view the password hash at the command line with the md5sum utility: # echo -n
| md5sum -t 319f4d26e
3
c536b5dd871bb2c
52
e3178 - Next, add this hash value instead of the password
17%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home
»
Archive
»
2021
»
Issue 61: Secur...
»
see an image that uses Alpine Linux as its base (Listing 1). Listing 1 Endlessh Dockerfile FROM alpine:
3
.9 as builder RUN apk add --no-cache build-base ADD endlessh.c Makefile / RUN make
17%
Let the editor wars begin!
11.10.2016
Home
»
Archive
»
2016
»
Issue 35: Persi...
»
for another editor. ex Ex [1] was written by Bill Joy [2] in 1976 as something of a replacement for the original *nix editor named ed [
3
] (ed was developed in 1969). Bill Joy modified a development of ed
17%
Neglected IPv6 Features
06.08.2012
Home
»
Articles
»
by sending a router advertisement (RA) to the link-local multicast address FF02::1 (all nodes; Figure
3
). Figure
3
: Normally, a regular router responds
17%
Using a Bash script to mirror external monitors
10.06.2015
Home
»
Archive
»
2015
»
Issue 27: Fault...
»
(xrandr) "provides automatic discovery of modes (resolutions, refresh rates, …) [and] the ability to configure output dynamically (resize, rotate, move, …)" [
3
]. The xrandr configuration tool lets me
« Previous
1
...
37
38
39
40
41
42
43
44
45
46
47
48
49
50
...
53
Next »