search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(735)
Article
(266)
News
(32)
Blog post
(3)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
72
73
74
75
76
77
78
79
80
81
82
83
84
85
...
104
Next »
26%
Security with PowerShell 5
09.04.2019
Home
»
Archive
»
2019
»
Issue 50: Bpfilter
»
. The command > msfpayload windows/exec CMD="cmd /k calc" EXITFUNC=thread C | sed '1,6d;
s/[";]//g;s
/\\/,
0
/g' | tr -d '\n' | cut -c2- would format the parameter value for -ShellCode correctly in the example here
26%
Reducing the Windows 10 attack surface
25.03.2021
Home
»
Archive
»
2021
»
Issue 62: Lean...
»
to infiltrate other active processes from within Microsoft Office by activating GUID rule 75668C1F-73B5-4CF
0
-BB93-
3
ECF5CB7CC84 . For the most part, you can use this rule safely. Virtually no legitimate enterprise
26%
Comparison of forensic toolkits for reconstructing browser sessions
09.01.2013
Home
»
Archive
»
2013
»
Issue 18: New W...
»
OSForensics OSForensics [
3
] is a Windows tool by PassMark Software for live forensics and postmortem analysis. For this comparison, we looked at version 1.2 (build 1003); version 2.
0
has been released
26%
High-Performance Python 3
19.09.2019
Home
»
HPC
»
Articles
»
to LLVM’
s
intermediate code, including for Nvidia and AMD GPUs and CPUs. The really great part is that you don’t have to compile any external code or have a C/C++ compiler installed, because LLVM comes ... High-Performance Python
3
26%
Bare metal deployment with OpenStack
02.08.2021
Home
»
Archive
»
2021
»
Issue 64: Bare...
»
: "16" name: "node1" # ipmitool -H
-U
-P
raw
0
x30
0
x21 | tail -c 18 | sed '
s
/ /:/g' To avoid the password specified here appearing in the process list and history
26%
Migrating to Azure Monitor Agent
03.08.2023
Home
»
Archive
»
2023
»
Issue 76: Energ...
»
and storing metrics is an inherent part of virtually any Azure resource. The data can always be collected, stored, and analyzed directly in Azure Monitor with the Metrics Explorer for platform as a service (Paa
S
26%
Centralized Password Management
06.08.2013
Home
»
Articles
»
.fetch(msgid, '(UID)') 043 match = REUID.match(data[
0
]) 044 msguid = match.group('uid') 045 logging.debug("Found UID %
s
" % ( msguid )) 046 result = imap.uid('COPY', msguid, targetfolder) 047
26%
Network access control with Cisco's Identity Services Engine
07.04.2022
Home
»
Archive
»
2022
»
Issue 68: Autom...
»
in version
3.0
(currently
3
.1; see the "New Features in Versions
3.0
and
3
.1" box). Cisco offers three different license subscriptions for the NAC features: Essentials, Advantage, and Premier
26%
Kubernetes networking in the kernel
05.08.2024
Home
»
Archive
»
2024
»
Issue 82: Sover...
»
.yaml cluster: name: kubernetes k8
s
ServiceHost: 10.124.
0.3
k8
s
ServicePort: 6443 kubeProxyReplacement: strict operator: replicas: 1 ipam: mode: "cluster-pool" operator: clusterPoolIPv4Pod
26%
Getting started with the OpenStack cloud computing framework
28.06.2011
Home
»
CloudAge
»
Articles
»
generated previously to connect with the machine: ssh ii rwartala_key.priv root@10.
0.0.3
That's it! Behind the Scenes When new technologies are introduced, people always ask themselves it they are really
« Previous
1
...
72
73
74
75
76
77
78
79
80
81
82
83
84
85
...
104
Next »