search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(919)
Article
(281)
News
(69)
Blog post
(4)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
50
51
52
53
54
55
56
57
58
59
60
61
62
63
...
128
Next »
16%
Forensic Tools
04.02.2014
Home
»
Articles
»
is essential. Autopsy Autopsy is a graphical extension of The Sleuth Kit (TSK), which was developed by Brian Carrier for Windows and Linux systems. We investigated Windows version
3.0.3
; version
3.0
.6 is now
16%
SHA-3 – The New Hash Standard
15.04.2013
Home
»
Articles
»
.) The situation is even more difficult when it comes to transmission protocols. The legacy but still popular SSL standard version
3
only supports MD5 and SHA-1 signatures. And the successors of SSL, TLS 1.
0
and 1 ... SHA-
3
– The New Hash Standard
16%
PowerTOP
21.10.2011
Home
»
Articles
»
‑dev, and libnl‑dev. To build PowerTOP, again, a simple make , followed by sudo make install will do just fine. To start PowerTOP 2.
0
and see the updated, slightly cleaner interface (Figure
3
), enter sudo
16%
Using a Bash script to mirror external monitors
10.06.2015
Home
»
Archive
»
2015
»
Issue 27: Fault...
»
\ \([
0
-9]\+\)x\([
0
-9]\+\).*$/\1 \2 \
3
\4 \5/p' )" 46 : connected_displays: ${connected_displays[@]} 47 : display_list: "$display_list" 48 49 if [[ -z "$display_list" ]] ; then 50 die "Could not find
16%
Julia: Fast as Fortran, easy as Python
09.04.2019
Home
»
Archive
»
2019
»
Issue 50: Bpfilter
»
flexible, but less predictable. Try 1 +"1" and 2 * "
3
" in your browser's JavaScript console – but first try to predict the results. Static Languages The other major class of languages are statically
16%
Malware Analysis
11.06.2014
Home
»
Archive
»
2014
»
Issue 21: Manag...
»
image, and then Volatility [
3
] and Mandiant Redline [4] for further investigation. In this paper, I dive more deeply into Redline and Volatility. To begin, I review a raw memory dump of a known malware
16%
Build a honeypot with real-world alerts
01.08.2019
Home
»
Archive
»
2019
»
Issue 52: Stop...
»
, and alerts are then sent by MQTT and stored in a SQLite database. The front end is a lightweight Flask app [
3
]. Figure 2: The honeyBot project flowchart
16%
OpenStack workshop, part 2: OpenStack cloud installation
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
IDENTIFIED BY 'ohC
3
teiv'; 10 EOF 11 mysql -u root <
0Ud7ra'; 15 EOF 16 mysql -u root <
16%
Automation with Ansible
09.08.2015
Home
»
Archive
»
2015
»
Issue 28: SSD RAID
»
: [node02.baremetal] PLAY RECAP *** control01.baremetal : ok=
3
changed=2 unreachable=
0
failed=
0
control02.baremetal : ok=
3
changed=2 unreachable=
0
failed=
0
node01.baremetal : ok=
3
changed=2 unreachable=
0
16%
Refurbished: Windows 2012 Active Directory
10.12.2012
Home
»
Articles
»
virtualization of domain controllers. And, making snapshots of domain controllers is no longer a problem either (see the article on Hyper-V
3.0
in this issue). VMware and other virtualization vendors likely
« Previous
1
...
50
51
52
53
54
55
56
57
58
59
60
61
62
63
...
128
Next »