search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(394)
Article
(116)
News
(6)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
40
41
42
43
44
45
46
47
48
49
50
51
52
Next »
16%
ASP.NET web development framework
30.11.2020
Home
»
Archive
»
2020
»
Issue 60: Secur...
»
Options.ListenAnyIP(4711, 08 listenOptions => { 09 listenOptions.UseHttps("cert.pfx", "
");
10
} 11 ); 12 }) 13 .UseStaticWebAssets() 14 .Use
16%
Security after Heartbleed – OpenSSL and its alternatives
07.10.2014
Home
»
Archive
»
2014
»
Issue 23: 10 Ti...
»
for years that would allow remote attackers to gain
root
access. Figure 5: Theo de Raadt (here with Jon "maddog" Hall) is one of the most outspoken BSD
16%
Azure Sphere for Internet of Things
22.05.2023
Home
»
Archive
»
2023
»
Issue 75: Teamwork
»
significantly more functionality. Pluton acts as a hardware
root
of trust and random number generator, securing the MCU with Secure Boot and implementing encryption functions. The chip makes sure a device does
16%
Enterprise job scheduling with schedulix
11.02.2016
Home
»
Archive
»
2016
»
Issue 31: Tunin...
»
on average more than
10
batch processes [1]. To ensure stable operation of independent jobs, however, you need more functionality – for example, the ability to pass control information, to choose a monitoring
16%
Manipulation detection with AFICK
05.12.2019
Home
»
Archive
»
2019
»
Issue 54: NVMe...
»
, but also acts as a small intrusion detection system. The tool is licensed under the liberal GNU GPLv3 license, which also allows free use in the enterprise. AFICK only requires Perl v5.
10
or newer
16%
Solving the security problems of encrypted DNS
25.03.2020
Home
»
Archive
»
2020
»
Issue 56: Secur...
»
2fuTVWnj7LDsEh3NzrhjGYlhWmtvrXg3mlFelz/MZ 08 XrK6uAlp6206Hc669ylfhIcD9d7w0rc9Ms1DFCh5wzVRbnJJF51mW2nC 09 mh5C8E7xSw==
10
mozilla.org. 6074 IN DNSKEY 256 3 7 11 AwEAAcY1VDPt
16%
Understanding Layer 2 switch port security
22.12.2017
Home
»
Archive
»
2017
»
Issue 42: Secur...
»
random MAC addresses and sends them out to the interface. Listing 1 Generating random MAC addresses
root
@kali:~# macof -e eth1 e3:8b:88:3:b4:cd d8:25:98:35:61:87 0.0.0.0.9537 > 0
16%
Forensic main memory analysis with Volatility
05.02.2019
Home
»
Archive
»
2019
»
Issue 49: Anato...
»
in these cases. Tapped The lmg script assumes that a Linux machine is available that can compile a kernel module suitable for the target system; this requires detailed knowledge of the target and a
root
account
16%
Pandas: Data analysis with Python
20.03.2014
Home
»
Archive
»
2014
»
Issue 19: Perim...
»
counterpart range(). The second argument defines a final value, whereas the first is used as the seed for the sequence. A third argument optionally changes the step size. For example, use In: np.arange(3,
10
16%
Virtual networks with Hyper-V in Windows Server 2016
13.06.2016
Home
»
Archive
»
2016
»
Issue 33: IPv6...
»
adapters on the fly – to or from generation 2 VMs. Embedded virtualization (nested virtualization) is possible in Windows Server 2016, as of TP4, and Windows
10
from build 10565. You can thus install
« Previous
1
...
40
41
42
43
44
45
46
47
48
49
50
51
52
Next »