search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(484)
Article
(145)
News
(12)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
48
49
50
51
52
53
54
55
56
57
58
59
60
61
...
65
Next »
16%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home
»
Archive
»
2022
»
Issue 68: Autom...
»
attached (Figure
12
). The combination of these two privileges could let the misconfigured user create a new EC2 instance. Not only that, they will have operating system access to which they can pass
16%
Key-value stores: an alternative to relational databases
04.12.2024
Home
»
Archive
»
2024
»
Issue 84: Non-R...
»
://istio.io Vitess for MySQL: https://vitess.io/docs/archive/
12.0
/reference/compatibility/mysql-compatibility/ The Author Martin Loschwitz
16%
Finally: Java 9
13.02.2017
Home
»
Archive
»
2017
»
Issue 37: Distr...
»
implementation 11 provides de.lm.java9.modulea.CustomerService with de.lm.java9.modulea.intern.CustomerServiceImpl;
12
} All other classes from modulea are not visible outside of the module. Although
16%
Keeping Docker containers safe
13.02.2017
Home
»
Archive
»
2017
»
Issue 37: Distr...
»
filesystem, a CD-ROM drive in Linux is usually a file called /dev/cdrom (actually, it's a symlink to /dev/sr
0
for a SCSI drive), which streams data from your hardware to the system. For security reasons, when
16%
Assigning Privileges with sudo and PolicyKit
22.01.2013
Home
»
Articles
»
. As an alternative to the hostname, you can also specify the IP address. For an address range, just specify the subnet: klaus 192.168.2.
0/255.255.255.0
=(ALL)NOPASSWD:/usr/bin/apt-get upgrade In this case, the user
16%
ASP.NET web development framework
30.11.2020
Home
»
Archive
»
2020
»
Issue 60: Secur...
»
Options.ListenAnyIP(4711, 08 listenOptions => { 09 listenOptions.UseHttps("cert.pfx", "
"); 10 } 11 );
12
}) 13 .UseStaticWebAssets() 14 .Use
16%
Automated compliance with Chef InSpec
30.11.2020
Home
»
Archive
»
2020
»
Issue 60: Secur...
»
: profile title: InSpec profile to check /etc/motd maintainer: Martin Gerhard Loschwitz copyright: Hutchison Drei Austria GmbH copyright_email: martin.loschwitz@drei.com license: Apache-2.
0
summary: Tests
16%
DNS filtering with authentication
30.11.2020
Home
»
Archive
»
2020
»
Issue 60: Secur...
»
installing NxFilter: sudo service systemd-resolved stop sudo systemctl disable systemd-resolved.service sudo rm /etc/resolv.conf sudo echo 'nameserver
0.0.0.0
' > /etc/resolv.conf NxFilter is also available
16%
Securing and managing Microsoft IIS
02.02.2021
Home
»
Archive
»
2021
»
Issue 61: Secur...
»
and developers alike. To access them, press F
12
. The tools display the source code for a page and help with error analysis (e.g., if a page takes a long time to load). The Network tab lets you check the loading
16%
Reducing the Windows 10 attack surface
25.03.2021
Home
»
Archive
»
2021
»
Issue 62: Lean...
»
prevents a very common method of permanently embedding malware on a system. You can block calls to the Win32 API from within Office applications with rule 92E97FA
1-2
EDF-4476-BDD6-9DD
0
B4DDDC7B , which
« Previous
1
...
48
49
50
51
52
53
54
55
56
57
58
59
60
61
...
65
Next »