search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(447)
Article
(145)
News
(37)
Blog post
(3)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
48
49
50
51
52
53
54
55
56
57
58
59
60
61
...
64
Next »
17%
SSL/TLS best practices for websites
07.10.2014
Home
»
Archive
»
2014
»
Issue 23: 10 Ti...
»
as reliably as the rest of the PKI world. 4. Protocols A public website must support the TLS 1.
0
, TLS 1.1, and TLS 1.2 protocols. SSL 2 is obsolete and insecure. SSL
3
is also deprecated and, although
17%
Relational databases as containers
17.06.2017
Home
»
Archive
»
2017
»
Issue 39: Conta...
»
Software services packaged as containers finally reached the remotest corners of IT about three years ago. Docker [1], rkt [2], LXC [
3
], and the like see themselves confronted with technologies
17%
Detecting malware with Yara
09.10.2017
Home
»
Archive
»
2017
»
Issue 41: Kuber...
»
= "A pdf file that contains a bad link" 10 11 strings: 12 $pdf_magic = {68 47 77
22
} 13 $s_anchor_tag = "
0 and (#s
17%
Convert Linux shell commands into PowerShell cmdlets
07.04.2022
Home
»
Archive
»
2022
»
Issue 68: Autom...
»
network interface you want to run the command against (e.g., Invoke-ifconfig eth
0
). Figure
3
: The wrapper generated by Crescendo works fine on Ubuntu
17%
Automate macOS 12 with the Shortcuts app
02.08.2022
Home
»
Archive
»
2022
»
Issue 70: Defen...
»
: https://support.apple.com/en-gb/guide/shortcuts-mac/apdf
22
b0444c/5.
0
/mac/12.
0
Importing Automator workflows: https://support.apple.com/en-gb/guide/shortcuts-mac/apd02bffbaac/5.
0
/mac/12.
0
Sharing
17%
Containers made simple
04.04.2023
Home
»
Archive
»
2023
»
Issue 74: The F...
»
install the community edition of Docker (Docker CE) on a current system (e.g., Ubuntu
22
.04), create a persistent volume, and then start the Portainer container (Listing 1). The rest happens automatically
17%
Discover vulnerabilities with Google Tsunami
04.04.2023
Home
»
Archive
»
2023
»
Issue 74: The F...
»
. The Shell Approach The following example assumes you have a host machine running Ubuntu Linux
22
.04 with Java installed. Besides Java, you need Nmap network scanner version 7.80 or newer and the Ncrack
17%
Manage projects in SMEs with OpenProject
22.05.2023
Home
»
Archive
»
2023
»
Issue 75: Teamwork
»
Docker container. In principle, this can be started on any server with a working Docker runtime environment. The following example assumes you have a fresh Ubuntu
22
.04, which can be virtualized, of course
17%
When are Kubernetes and containers not a sensible solution?
28.11.2022
Home
»
Archive
»
2022
»
Issue 72: OpenS...
»
(e.g., from Ubuntu 20.04 to Ubuntu
22
.04 at Canonical). If you run and are familiar with a defined set of services on your systems, you will reach your objectives far faster with classic packages than
17%
Reducing the Windows 10 attack surface
25.03.2021
Home
»
Archive
»
2021
»
Issue 62: Lean...
»
to infiltrate other active processes from within Microsoft Office by activating GUID rule 75668C1F-73B5-4CF
0
-BB93-
3
ECF5CB7CC84 . For the most part, you can use this rule safely. Virtually no legitimate enterprise
« Previous
1
...
48
49
50
51
52
53
54
55
56
57
58
59
60
61
...
64
Next »