search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(94)
Article
(29)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
3
4
5
6
7
8
9
10
11
12
13
Next »
24%
Processing streaming events with Apache Kafka
02.02.2021
Home
»
Archive
»
2021
»
Issue 61: Secur...
»
: records) {
08
String key = record.key(); 09 Payment value = record.value(); 10 System.out.printf("key = %s, value = %s%
n
", key, value); 11 } 12 } 13 } 14 [...] Kafka Ecosystem
24%
Network analysis with the Bro Network Security Monitor
05.12.2014
Home
»
Archive
»
2014
»
Issue 24: Visua...
»
. For example, to run a report every three seconds for five iterations on eth0, you would use the command in Listing 4. Listing 4 capstats /opt/bro/bin/capstats -I
3
-
n
5 -i eth0 1415510235
24%
Security data analytics and visualization with R
05.12.2014
Home
»
Archive
»
2014
»
Issue 24: Visua...
»
inspirational is by Jay Jacobs and Bob Rudis [
3
] [4]. These few months later, my R skill level has improved just enough to share some insight with you. Imagine me as somewhere between total noob R script kiddie
24%
Prepare, analyze, and visualize data with R
07.06.2019
Home
»
Archive
»
2019
»
Issue 51: Self-...
»
: > numbers <- c(1, 2,
3
, 4, 5) The c() function – the c stands for "concatenate" – combines the individual elements listed in parentheses. An equals sign can be used as an alternative for assignments, in line
23%
Microsoft Exchange replacement
20.06.2022
Home
»
Archive
»
2022
»
Issue 69: Terra...
»
: It is not based on open standards, and it uses proprietary protocols and APIs like MAPI [
3
] for internal communication. Clients for Exchange are pre-installed on all Windows, Android, and Apple devices
23%
Secure microservices with centralized zero trust
04.04.2023
Home
»
Archive
»
2023
»
Issue 74: The F...
»
TLS use case that we are focusing on in this article. Note that although a SPIFFE ID looks very much like a URI, it has no meaning in the DNS sense, and plays no role in establishing the initial layer
3
TCP
23%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
struct jail 01 main(int argc, char **argv) 02 { 03 struct jail j; 04 int i; 05 [...] 06 /* Populate the jail struct */ 07 memset(&j, 0, sizeof(j));
08
j.version = 0; 09 j.path =
23%
Port Knocking
07.10.2014
Home
»
Archive
»
2014
»
Issue 23: 10 Ti...
»
. You can use this to watch that file in real time (or at least updates every second) in another terminal with: watch -
n
1 cat /etc/hosts.allow
3
. Assuming you have access, try closing access
23%
Process, Network, and Disk Metrics
26.02.2014
Home
»
HPC
»
Articles
»
: import re # Needed for regex except ImportError: print "Cannot import re module - this is needed for this application."; print "Exiting..." sys.exit(); def bytes2human(
n
23%
Programming with Node.js and JavaScript
20.05.2014
Home
»
Archive
»
2014
»
Issue 20: IPv6...
»
Script. This approach allows event-based processing of work requests and, thus, more concurrent requests than the Apache server can handle – although Apache also has an event-based processing module [
3
] in its more
« Previous
1
...
3
4
5
6
7
8
9
10
11
12
13
Next »