58%
28.11.2022
might not have containers and instead reside on bare metal. Physical hardware, for example, can easily be managed by open source software such as Foreman (Figure 3). As the administrator, you then have ... 2022
58%
28.11.2022
hope to orient you in the correct direction for deploying a log analysis capability.
Splunk
Although I'm a big supporter of open source, Splunk [3], a commercial product, is probably the gold standard ... 2022
58%
28.11.2022
policy scripting language [3] for customization. With its help, you can flexibly adapt your monitoring setup to suit your needs or expand the analysis options to include more network protocols, if required ... 2022
58%
03.02.2022
with a KDE or Gnome desktop, you need to ensure around 200MB of storage space in each case. Much more important is the availability of RPM support, SSH, and a correct Network Time Protocol (NTP) configuration ... 2022
58%
03.02.2022
authorized outbound mail servers. Although designed in 2004, SPF only became the standard recommended by the Internet Engineering Task Force (IETF) in 2014 [2]. From a sample of more than 3,000 domains ... 2022
58%
03.02.2022
, it is clear that the legacy 9-to-5 working model in the office is a thing of the past for many. Even when new people join the company, their first day at work often no longer takes place on the company premises ... 2022
58%
03.02.2022
integrity – and all without really demanding more knowledge from the admin.
Another related topic in this context is Rust: Sooner or later we should move away from C. It's just too hard to use the language ... 2022
58%
03.02.2022
arp -a
(Figure 1). On Linux computers
ip n s
Figure 1: The ARP cache can be displayed from the Windows command line.
does the same thing ... 2022
58%
03.02.2022
Terminal Preview in Microsoft Store: https://www.microsoft.com/en-us/p/windows-terminal-preview/9n8g5rfz9xk3
Windows Terminal Preview on GitHub: https://github.com/microsoft/terminal/releases
More ... 2022
58%
03.02.2022
to vulnerabilities, and also developed STIX and CyBox, which are used to exchange threat information and attack indicators.
The MITRE ATT&CK and D3FEND knowledge databases offer techniques that let you retrace ... The MITRE ATT&CK and D3FEND knowledge databases provide useful techniques for securing your IT infrastructure. ... MITRE ATT&CK & D3FEND ... 2022