search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(608)
Article
(145)
News
(12)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
59
60
61
62
63
64
65
66
67
68
69
70
71
72
...
77
Next »
14%
Processing streaming events with Apache Kafka
02.02.2021
Home
»
Archive
»
2021
»
Issue 61: Secur...
»
(KafkaProducerString,
producer = new KafkaProducer
(props)) { 03 04 for (long i =**
0
; i <**10; i++) { 05 final String orderId = "id" + Long.toString(i); 06 final Payment
14%
Open Source Security Information and Event Management system
20.05.2014
Home
»
Archive
»
2014
»
Issue 20: IPv6...
»
and lets you know of changes or foul play on the data link layer. P
0
f – An effective passive fingerprinting tool to identify OS and software on endpoints and to show how the machine is connected
14%
Building more efficient database applications with a graph database
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
comparison in Table 1. Table 1 Five Graph Databases Name Neo4j 1.6 Sones Graph DB 2.
0
InfoGrid 2.9.5 HyperGraphDB 1.1 VertexDB Homepage http
14%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home
»
Archive
»
2022
»
Issue 68: Autom...
»
attached (Figure
12
). The combination of these two privileges could let the misconfigured user create a new EC2 instance. Not only that, they will have operating system access to which they can pass
14%
Key-value stores: an alternative to relational databases
04.12.2024
Home
»
Archive
»
2024
»
Issue 84: Non-R...
»
://istio.io Vitess for MySQL: https://vitess.io/docs/archive/
12.0
/reference/compatibility/mysql-compatibility/ The Author Martin Loschwitz
14%
Finally: Java 9
13.02.2017
Home
»
Archive
»
2017
»
Issue 37: Distr...
»
implementation 11 provides de.lm.java9.modulea.CustomerService with de.lm.java9.modulea.intern.CustomerServiceImpl;
12
} All other classes from modulea are not visible outside of the module. Although
14%
Application-aware batch scheduler
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
://$APISERVER --deploy-mode cluster --name spark-wordcount --class org.apache.spark.examples.JavaWordCount local:///opt/spark/examples/jars/spark-examples_2.
12
-3.5.2.jar s3a://data/war-and-peace.txt watch kubectl get po
14%
Keeping Docker containers safe
13.02.2017
Home
»
Archive
»
2017
»
Issue 37: Distr...
»
filesystem, a CD-ROM drive in Linux is usually a file called /dev/cdrom (actually, it's a symlink to /dev/sr
0
for a SCSI drive), which streams data from your hardware to the system. For security reasons, when
14%
Assigning Privileges with sudo and PolicyKit
22.01.2013
Home
»
Articles
»
. As an alternative to the hostname, you can also specify the IP address. For an address range, just specify the subnet: klaus 192.168.2.
0/255.255.255.0
=(ALL)NOPASSWD:/usr/bin/apt-get upgrade In this case, the user
14%
ASP.NET web development framework
30.11.2020
Home
»
Archive
»
2020
»
Issue 60: Secur...
»
Options.ListenAnyIP(4711, 08 listenOptions => { 09 listenOptions.UseHttps("cert.pfx", "
"); 10 } 11 );
12
}) 13 .UseStaticWebAssets() 14 .Use
« Previous
1
...
59
60
61
62
63
64
65
66
67
68
69
70
71
72
...
77
Next »