search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcomm%3
?
Refine your search
[x]
Creation time
: Last month
Sort order
Date
Score
Content type
Article (Print)
(68)
Keywords
« Previous
1
2
3
4
5
6
7
78%
Container and hardware e-virtualization under one roof
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
; whereas KVM [
3
] supports genuine hardware virtualization in combination with the right CPU. Both virtualization technologies support maximum performance for the guest system in line with the current state
77%
Using AppLocker to block applications on networks
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
and implement your AppLocker policies [1]. And, Microsoft TechNet offers how-tos on the subject [2]. You can also check out WindowsSecurity.com [
3
] for a video that might help you set up your environment
77%
What tools do intruders use to
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
on the properties of the file format. Pen testers can use a tool called Metagoofil [
3
] to help find metadata on websites. Metagoofil is an information-gathering tool designed for extracting metadata off public
77%
The RADOS object store and Ceph filesystem
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
to install RADOS and Ceph. Ceph, which is a plain vanilla filesystem driver on Linux systems (e.g., ext
3
or ext4), made its way into the Linux kernel in Linux 2.6.34 and is thus available for any distribution
77%
Backup tools to save you time and money
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
machines. Moving an external hard disk between two machines might be easiest, but with
20
machines, you should definitely consider a centralized system. Here, too, you must consider the speed at which you
77%
Managing SSH and other remote connections with PAC
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
-of-all-trades is licensed under the GNU GPLv
3
, you can use it free of charge. The only precondition is a fairly recent Linux distribution with Gnome. Although PAC runs on other desktops, you would have to do without some
76%
More than password protection, htaccess has you covered
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
short URLs to longer ones. Most people have used the likes of TinyURL.com [1], Bitly [2], or Google URL shortener [
3
] to shrink unsightly and unmanageable URLs to something that's more suitable for email
76%
Network analysis with Wireshark
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
runs with root privileges. The exceptions are Mac OS
X
and Solaris, where the user only needs access privileges for the network interface card device file. By default, Tcpdump reads all the data
« Previous
1
2
3
4
5
6
7