search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%220mb%3 00s Llorente"5432
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(78)
Article
(1)
Keywords
« Previous
1
2
3
4
5
6
7
8
75%
Finding cracks with Nmap, Portbunny, and Nessus
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
will default to this mode. You can select it manually by setting the -
sS
switch, as in nmap -
sS
www.lemon.com . Figure
3
: The SYN scan is similar to the three
75%
Web applications with Julia
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
examples created a slider in the Pluto notebook (Figure
3
) with @bind x Slider(1:10) In HTML, the closest equivalent is:
However, the two examples
75%
Creating KVM machines with BoxGrinder and VMBuilder
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
Service (Amazon
S
3
) 19 - ami plugin for Amazon Simple Storage Service (Amazon
S
3
) 20 - sftp plugin for SSH File Transfer Protocol 21 - ebs plugin for Elastic Block Storage
22
- local plugin
75%
Passwords, passphrases, and passkeys
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
password, and the need to remember it. Unrealistic Rulesets Bill Burr wrote the official password guide for the U.
S
. National Institute of Standards and Technology (NIST). According to the guide
74%
Professional backup solutions compared
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
used a virtual machine on a VMware ESX server. The physical underpinnings were a ProServ II server by Exu
S
Data with two Xeon quad-core processors and 16GB of RAM (Figure 1, top
74%
Free backup tool for data centers
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
Include { 13 File = /usr/sbin 14 Options { 15 Signature = MD5 16 } 17 } 18 Exclude { 19 File = /var/lib/bacula 20 File = /tmp 21 }
22
} 23 24 Messages { 25 Name = Daemon 26
74%
Remote Access with Tactical RMM
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
recommended as the technical underpinnings. If you prefer to work with Ubuntu, you can go for Ubuntu
22
.04. SSL and DNS Required Before the installation can start, you have to meet a few requirements
74%
Introduction to behavior-driven monitoring
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
Scenarios: 21 cucumber /usr/lib/nagios/plugins/cucumber-nagios/checks/features/www.xing.com/startpage.feature:4 # Scenario: Visiting home page
22
23 1 scenario (1 failed) 24 4 steps (1 failed,
3
skipped) 25 0 ...
3
73%
Using the Expect scripting environment
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
or a password, and the current user will be allowed to run remote commands as root using ssh. This script is called ec2_ssh_init, and Listing
3
shows its initial section. Listing
3
ec2_ssh_init (Part
« Previous
1
2
3
4
5
6
7
8