search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(631)
Article
(172)
News
(25)
Blog post
(2)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
Next »
16%
Managing Bufferbloat
02.06.2020
Home
»
Archive
»
2020
»
Issue 57: Artif...
»
will receive a series of ping responses that typically have times in the range of 20-
100
ms (Listing 1). Listing 1 Google.com Ping ping google.com PING google.com (172,217,16,206): 56 data bytes 64
16%
Key-value stores: an alternative to relational databases
04.12.2024
Home
»
Archive
»
2024
»
Issue 84: Non-R...
»
that their PostgreSQL interface does not implement all commands in
100
percent the same way as the original, but for the vast majority of applications, the general message is that Yugabyte's PostgreSQL compatibility
16%
Get to know Azure Files and Azure File Sync
27.09.2024
Home
»
Archive
»
2024
»
Issue 83: Storage
»
keys, only host-based authentication is available for NFS access. Also, Azure Files only supports optional Internet access for SMB from version 3.
0
upward and not for NFS. Therefore, I will focus on SMB
16%
Making Kerberoasting uneconomical
01.06.2024
Home
»
Archive
»
2024
»
Issue 81: Load...
»
. For services that do not need to be available
100
percent of the time and can tolerate an occasional restart, you can reset the password quite frequently in a script. If supported by the respective application
16%
Run rootless Podman containers as systemd services
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
-subuids 100000-65536 --add-subgids 100000-65536 koan which allocates 65,536 sub-IDs starting from
100
,000 to the user koan (substitute your username). As a result, the /etc/subuid and /etc/subgid files must both
16%
What tools do intruders use to
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
sources, such as search engines, and PGP key servers. The sources supported are Google, Google profiles, Bing, PGP, LinkedIn, and Exalead. New features were added as of March 4, 2011, with the version 2.
0
16%
Managing mailing lists with Mlmmj
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
is mainly web-based, protected by the same password for all moderators, and mailing lists of the same name will not be supported until version 3.
0
is released. After evaluating several systems, Mlmmj
16%
Red Hat Ansible Automation Platform
07.10.2025
Home
»
Archive
»
2025
»
Issue 89: Autom...
»
features only found their way into the software in AAP 2.
0
. Table 1 Ansible Automation Platform Objective To create, execute, and manage automation processes Manufacturer
16%
Detecting malware with Yara
09.10.2017
Home
»
Archive
»
2017
»
Issue 41: Kuber...
»
= "A pdf file that contains a bad link" 10 11 strings: 12 $pdf_magic = {68 47 77
22
} 13 $s_anchor_tag = "
0 and (#s
16%
Convert Linux shell commands into PowerShell cmdlets
07.04.2022
Home
»
Archive
»
2022
»
Issue 68: Autom...
»
Shell version. This two-pronged approach is also reflected in the system requirements: To create a package based on Crescendo, you need PowerShell version 7.
0
, whereas the modules will run in Windows PowerShell 5
« Previous
1
...
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
Next »