search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(511)
Article
(139)
News
(9)
Blog post
(2)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
46
47
48
49
50
51
52
53
54
55
56
57
58
59
...
67
Next »
42%
Detecting security threats with Apache Spot
14.03.2018
Home
»
Archive
»
2018
»
Issue 44: Cloud...
»
risks, quantifying possible data loss and responding to attacks. Apache Spot [3] uses big data and modern ML components to improve the detection and analysis of security problems. Apache Spot 1.
0
has been
42%
Detecting malware with Yara
09.10.2017
Home
»
Archive
»
2017
»
Issue 41: Kuber...
»
= "A pdf file that contains a bad link" 10 11 strings: 12 $pdf_magic = {68 47 77
22
} 13 $s_anchor_tag = "
0 and (#s
42%
Convert Linux shell commands into PowerShell cmdlets
07.04.2022
Home
»
Archive
»
2022
»
Issue 68: Autom...
»
Shell version. This two-pronged approach is also reflected in the system requirements: To create a package based on Crescendo, you need PowerShell version 7.
0
, whereas the modules will run in Windows PowerShell 5
42%
A self-healing VM system
07.06.2019
Home
»
Archive
»
2019
»
Issue 51: Self-...
»
# DHCP Server Configuration file. # see /usr/share/doc/dhcp*/dhcpd.conf.example # see dhcpd.conf(5) man page # subnet 10.14.2.
0
netmask 255.255.255.
0
{ option routers 10
42%
What's left of TLS
18.07.2013
Home
»
Archive
»
2013
»
Issue 15: What’...
»
in its infancy, the former monopolist browser released the SSL encryption protocol version 2.
0
(SSLv2). Version 1 existed only internally in Netscape. Numerous security vulnerabilities were discovered
42%
Moving HPC to the Cloud
19.10.2012
Home
»
HPC
»
Articles
»
12-core AMD processors ranging in speed from
2.2
to 2.9GHz with 24 to 128GB of RAM per server and up to 1TB of scratch local storage per node. Getting applications running POD HPC clouds can be quite
42%
Cloud security with AWS GuardDuty
04.08.2020
Home
»
Archive
»
2020
»
Issue 58: Graph...
»
grants permissions to enable GuardDuty. If some instances expose ports like
22
or 3389 to the world (
0.0.0.0/0
), you should soon see some findings of malicious IPs trying to get into your systems
42%
Finding cracks with Nmap, Portbunny, and Nessus
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
a packet to one of 2^16 available ports. TCP and UDP ports allow the operating system to map a packet to a specific service. The 65,535 available ports are divided into three groups: ports numbered
0
...
0
42%
History and use of the mail utility
05.12.2014
Home
»
Archive
»
2014
»
Issue 24: Visua...
»
. As a guide, one well-known and widely adopted webmail provider currently limits 20
MB
as the outgoing file size for its SMTP, per email. I tend to be stricter and limit the size to 10
MB
on a smaller
42%
Putting Windows 8 on a USB Drive
10.12.2012
Home
»
Articles
»
DISK Disk ### Status Size Free Dyn Gpt -------- ------------- ------- ------- --- --- Disk
0
Online 298 GB
0
B Disk 1 Online 29 GB
0
« Previous
1
...
46
47
48
49
50
51
52
53
54
55
56
57
58
59
...
67
Next »