search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(629)
Article
(172)
News
(25)
Blog post
(2)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
Next »
16%
Get to know Azure Files and Azure File Sync
27.09.2024
Home
»
Archive
»
2024
»
Issue 83: Storage
»
keys, only host-based authentication is available for NFS access. Also, Azure Files only supports optional Internet access for SMB from version 3.
0
upward and not for NFS. Therefore, I will focus on SMB
16%
Making Kerberoasting uneconomical
01.06.2024
Home
»
Archive
»
2024
»
Issue 81: Load...
»
. For services that do not need to be available
100
percent of the time and can tolerate an occasional restart, you can reset the password quite frequently in a script. If supported by the respective application
16%
Run rootless Podman containers as systemd services
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
-subuids 100000-65536 --add-subgids 100000-65536 koan which allocates 65,536 sub-IDs starting from
100
,000 to the user koan (substitute your username). As a result, the /etc/subuid and /etc/subgid files must both
16%
What tools do intruders use to
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
sources, such as search engines, and PGP key servers. The sources supported are Google, Google profiles, Bing, PGP, LinkedIn, and Exalead. New features were added as of March 4, 2011, with the version 2.
0
16%
Managing mailing lists with Mlmmj
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
is mainly web-based, protected by the same password for all moderators, and mailing lists of the same name will not be supported until version 3.
0
is released. After evaluating several systems, Mlmmj
16%
Red Hat Ansible Automation Platform
07.10.2025
Home
»
Archive
»
2025
»
Issue 89: Autom...
»
features only found their way into the software in AAP 2.
0
. Table 1 Ansible Automation Platform Objective To create, execute, and manage automation processes Manufacturer
16%
Detecting malware with Yara
09.10.2017
Home
»
Archive
»
2017
»
Issue 41: Kuber...
»
= "A pdf file that contains a bad link" 10 11 strings: 12 $pdf_magic = {68 47 77
22
} 13 $s_anchor_tag = "
0 and (#s
16%
Convert Linux shell commands into PowerShell cmdlets
07.04.2022
Home
»
Archive
»
2022
»
Issue 68: Autom...
»
Shell version. This two-pronged approach is also reflected in the system requirements: To create a package based on Crescendo, you need PowerShell version 7.
0
, whereas the modules will run in Windows PowerShell 5
16%
What's left of TLS
18.07.2013
Home
»
Archive
»
2013
»
Issue 15: What’...
»
in its infancy, the former monopolist browser released the SSL encryption protocol version 2.
0
(SSLv2). Version 1 existed only internally in Netscape. Numerous security vulnerabilities were discovered
16%
Cloud security with AWS GuardDuty
04.08.2020
Home
»
Archive
»
2020
»
Issue 58: Graph...
»
grants permissions to enable GuardDuty. If some instances expose ports like
22
or 3389 to the world (
0.0.0.0/0
), you should soon see some findings of malicious IPs trying to get into your systems
« Previous
1
...
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
Next »