9%
28.11.2021
other program, SSH is occasionally affected by vulnerabilities. For example, CVE-2020-14145 [2] allows an MITM attacker to hijack connections when they go through the TOFU process. The exploit describes
9%
11.02.2016
of continuous integration
[2] or continuous delivery
[3], allowing developers to extend their projects quickly, add new features, and deliver the goods. Because they handle classical administrative tasks
9%
13.02.2017
or virtual, from one of the many providers in the market. This option is recommended for companies without infrastructure of their own, either in-house or co-located in a data center. Option 2 is for those who
9%
15.08.2012
In parts 1 and 2 of this series, I introduced the Julia language and highlighted the parallel computing aspects. In this final, but by no means complete, article, some other aspects of Julia
9%
08.10.2015
The Docker container system [1] is a rising star. The mere fact that Microsoft's latest operating system supports this technology [2] speaks volumes. Meanwhile, OpenStack [3] has been surfing its
9%
06.10.2019
email address to determine if any of your online identities have been compromised.
Okta has provided a useful Chrome app called PassProtect [2] that uses information from the Have I Been Pwned database
9%
03.04.2024
CIQ Offers Long-Term Support for Rocky Linux on AWS
CIQ, the company behind the Rocky Linux project, is now providing CIQ long-term support (LTS) for Rocky Linux 8.6, 8.8, and 9.2 images on Amazon
9%
27.09.2024
representative) survey at this year's Chemnitz Linux Days. Anyone in possession of a FIDO2 stick [2] can use it for SSH authentication – provided SSH, at least version 8.2p1 or preferably version 8.3, is available
8%
22.05.2023
.e., Telegraf, InfluxDB, Chronograf, Kapacitor; alternatively, TIG [2] with Grafana instead of Chronograf, or CIG with Collectd instead of Telegraf) and how to use it to collect performance data from your
8%
13.02.2017
Walsh article [2]; Walsh does work for Red Hat and was pivotal in the creation of the top-notch security tool SELinux [3]. As the joke goes, Walsh weeps when you switch off SELinux and disables its