search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(953)
Article
(264)
News
(101)
Blog post
(6)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
59
60
61
62
63
64
65
66
67
68
69
70
71
72
...
133
Next »
16%
Forensic analysis with Autopsy and Sleuth Kit
02.08.2021
Home
»
Archive
»
2021
»
Issue 64: Bare...
»
, then select Local Disk as the data source, and click Next . If you have selected an active hard drive, you have the option at this
point
to have Autopsy create an image of it in the form of a VHD file. After
16%
Public key infrastructure in the cloud
27.09.2021
Home
»
Archive
»
2021
»
Issue 65: 7 Em...
»
or healthcare. These examples also show that a PKI in cloud operation reduces complexity. Thus far, the opposite has been the case from the critics'
point
of view. A cloud-based implementation now offers
16%
Security boundaries in Windows
27.09.2021
Home
»
Archive
»
2021
»
Issue 65: 7 Em...
»
by the user is bound by the same-origin policy and is not allowed to access or manipulate the code or data of the browser sandbox. However, from Microsoft's
point
of view, this security limit is only defined
16%
Monitoring with collectd 4.3
11.06.2014
Home
»
Archive
»
2014
»
Issue 21: Manag...
»
facilitates an admin's daily work, if you actually make it to the
point
where collectd starts making things easier for you. Although installing collectd is very easy, it may take some time to build a complete
16%
Cleaning up your Linux server
14.08.2017
Home
»
Archive
»
2017
»
Issue 40: Lean...
»
temporary files open, and the application will crash or throw an error if the files are removed unexpectedly. Also, a user might lose all their work since the last save
point
16%
Packaging Apps To Run on Any Linux Device
09.10.2017
Home
»
Archive
»
2017
»
Issue 41: Kuber...
»
the wifi-ap snap? This command has a lot of juicy information, which you can see by entering the info command (Listing 2). The description section should be self-explanatory; just below that, a URL
points
16%
News for Admins
07.04.2022
Home
»
Archive
»
2022
»
Issue 68: Autom...
»
they're looking for." Because Linux deployments have skyrocketed (between containers and virtual machines), these types of attacks are only going to increase exponentially. The report also
points
out
16%
Laying out documents with Markdown and Pandoc
20.06.2022
Home
»
Archive
»
2022
»
Issue 69: Terra...
»
of different text formats into other formats (e.g., Markdown into HTML, ePub, or PDF). The tool also supports formats such as DOCX and PPTX (Microsoft Word and Power
Point
). These conversions are made possible
16%
Employing DNS in network security
02.08.2022
Home
»
Archive
»
2022
»
Issue 70: Defen...
»
of domains used by malware clients to communicate with a number of command-and-control (C&C) sites. These domains serve as a meeting
point
for malware- and hacker-controlled servers that communicate secretly
16%
A ptrace-based tracing mechanism for syscalls
06.10.2022
Home
»
Archive
»
2022
»
Issue 71: Kuber...
»
File # 64-bit system call numbers and entry vectors # The format is: #
point> # 0 common read sys_read 1 common write sys_write 2 common open sys
« Previous
1
...
59
60
61
62
63
64
65
66
67
68
69
70
71
72
...
133
Next »