search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(82)
Article
(14)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
2
3
4
5
6
7
8
9
10
Next »
13%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home
»
Archive
»
2021
»
Issue 66: Inci...
»
:/usr/sbin:/bin/sh bin:x:
2:2
:bin:/bin:/bin/sh sys:x:3:3:sys:/dev:/bin/sh (...) reboot; Connection closed by foreign host. Metasploitable runs many more insecure services that an Nmap scan brings to light (Listing 3
13%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1
MB
) and simple
13%
Installing and operating the Graylog SIEM solution
13.12.2018
Home
»
Archive
»
2018
»
Issue 48: Secur...
»
. The pwgen command generates a password and encrypts with sh
256
sum: pwgen -N 1 -s 100 echo -n
| sha
256
sum The encrypted password is then assigned to the parameter root_password_sha2. Table 1 gives
13%
Setting up SSL connections on Apache 2
18.07.2013
Home
»
Archive
»
2013
»
Issue 15: What’...
»
cryptography), in which each party has two keys. To create a certificate, you must first generate a private key for the server: openssl genrsa -aes
256
-out privaterschluessel.pem 2048 The key length is 2048
13%
Automating development environments and deployment with Otto
11.02.2016
Home
»
Archive
»
2016
»
Issue 31: Tunin...
»
] and unpack to your hard disk, revealing the lightweight otto program, which weighs in at just 15
MB
. Although you can call it directly – there is no need to install – HashiCorp does recommend adding otto
13%
What's left of TLS
18.07.2013
Home
»
Archive
»
2013
»
Issue 15: What’...
»
SHA1. A basic distinction is made in encryption between block ciphers and stream ciphers. A block cipher encrypts only a first block of a fixed length, for example
256
bits. A stream cipher can
13%
Kubernetes clusters within AWS EKS
02.08.2021
Home
»
Archive
»
2021
»
Issue 64: Bare...
»
public key has been saved in eks-ssh.pub.
09
The key fingerprint is: 10 SHA
256
:Pidrw9+MRSPqU7vvIB7Ed6Al1U1Hts1u7xjVEfiM1uI 11 The key's randomart image is: 12 +---[RSA 4096]----+ 13 | .. ooo+| 14
13%
Safeguard and scale containers
05.12.2016
Home
»
Archive
»
2016
»
Issue 36: Autom...
»
Version: v1 02 kind: Pod 03 metadata: 04 name: nginx 05 spec: 06 containers: 07 - name: nginx 08 image: nginx
09
ports: 10 - containerPort: 80 A replication controller [12], however
13%
Storage system with OpenSolaris and Comstar
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
.168.209.200 07 192.168.209.200:3260,1 iqn.1986-03.com.sun:02:8f4cd1fa-b81d-c42b-c008-a70649501262 08 # iscsiadm -m node
09
# /etc/init.d/open-iscsi restart 10 # fdisk -l 11 Disk /dev/sdb: 2147
MB
, 2147418112 bytes
13%
CPU affinity in OpenMP and MPI applications
03.02.2022
Home
»
Archive
»
2022
»
Issue 67: syst...
»
command, except it lists all of the cores at once. Listing 4 Real or SMT? Method 2 $ cat $(find /sys/devices/system/cpu -regex ".*cpu[
0-9
]+/topology/thread_siblings_list") | sort -n | uniq 0
« Previous
1
2
3
4
5
6
7
8
9
10
Next »