search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(492)
Article
(146)
News
(12)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
48
49
50
51
52
53
54
55
56
57
58
59
60
61
...
66
Next »
11%
Security in the AWS cloud with GuardDuty
09.04.2019
Home
»
Archive
»
2019
»
Issue 50: Bpfilter
»
"guardduty:*" 08 ], 09 "Resource": "*" 10 }, 11 {
12
"Effect": "Allow", 13 "Action": [ 14 "iam:CreateServiceLinkedRole" 15 ], 16 "Resource": "arn:aws:iam
11%
Supercharge Your Website with Amazon CloudFront
01.04.2014
Home
»
Articles
»
://console.aws.amazon.com/cloudfront/home. Next, click on Create Distribution (Figure 2), and select Web | Continue . Under Origin Settings, enter the full address for your website (rather than my example site www.m
0
nk3y.biz ) and a descriptive
11%
A Hands-on Look at Kubernetes with OpenAI
09.10.2017
Home
»
Archive
»
2017
»
Issue 41: Kuber...
»
" nodeInfo: architecture: amd64 containerRuntimeVersion: docker://1.
12
.6 kernelVersion: 4.4.
0
-72-generic osImage: Ubuntu 14.04.5 LTS GPU Scheduling Graphics processors do most
11%
Windows Subsystem for Linux and Android in Windows 11
28.11.2022
Home
»
Archive
»
2022
»
Issue 72: OpenS...
»
benefits graphically intensive applications, but also those that require GPUs for machine learning (ML) or artificial intelligence (AI) use cases. Microsoft has ported the DirectX
12
interface to Linux
11%
Searching for security flaws and exploits with Burp Suite
20.03.2014
Home
»
Archive
»
2014
»
Issue 19: Perim...
»
the Proxy Listeners Section (Figure 1) to identify the IP Address and port the proxy is listening on. The default port is 127.
0.0
.1:8080. Figure 1: Options
11%
Detecting intruders with Suricata
10.06.2015
Home
»
Archive
»
2015
»
Issue 27: Fault...
»
Tunneling"; content:"|01 00|"; offset:2; w ithin:4; content:"cT"; offset:
12
; depth:3; content:"|00 10 00 01|"; within:255; class type:bad - unknown; sid:1000 2; The preceding rule inspects the DNS traffic
11%
Exploring dhcpy6d, a DHCP server for IPv6 networks
03.12.2015
Home
»
Archive
»
2015
»
Issue 30: OpenD...
»
the following configuration for the widespread radvd (Linux IPv6 router advertisement daemon) [9]: interface eth
0
{ AdvSendAdvert on; AdvManagedFlag on; }; Radvd should not announce the prefix explicitly
11%
Pen Test Tips
30.04.2012
Home
»
Articles
»
in the Metasploit Framework itself. Start the Metasploit msfconsole console and load nessus : msf > load nessus Once the plugins are loaded, connect to the server. msf > nessus_connect cr
0
wn:password@localhost ok
11%
Next-generation terminal UI tools
02.08.2021
Home
»
Archive
»
2021
»
Issue 64: Bare...
»
(Figure 3). It presents a history ribbon view of the CPU, breaks out individual cores, and includes load average [
12
] figures. Network interfaces benefit from a similar visualization (Figure 4
11%
Admin as a service with sysstat for ex-post monitoring
01.06.2024
Home
»
Archive
»
2024
»
Issue 81: Load...
»
ALL 04 $ sar -f /var/log/sysstat/sa07 -s 23:30:00 -e 23:55:00 -P
1,2
However, filtering by specific days is often not enough, so you can filter for a time interval by passing -s [
« Previous
1
...
48
49
50
51
52
53
54
55
56
57
58
59
60
61
...
66
Next »