search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last month
Sort order
Date
Score
Content type
Article (Print)
(92)
Keywords
« Previous
1
...
3
4
5
6
7
8
9
10
24%
Free backup tool for data centers
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
Include { 13 File = /usr/sbin 14 Options { 15 Signature = MD5 16 } 17 } 18 Exclude { 19 File = /var/lib/bacula 20 File = /tmp 21 }
22
} 23 24 Messages { 25 Name = Daemon 26
24%
New approaches for forensics in cloud environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
by a malicious third-party? In this context, the term data provenance [
6
] becomes extremely meaningful: It covers the origins of the piece of data and how it might have been modified, that is, who has viewed
« Previous
1
...
3
4
5
6
7
8
9
10