search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
0mbén Llorente"500
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(79)
News
(11)
Article
(7)
Keywords
« Previous
1
...
3
4
5
6
7
8
9
10
27%
Aggregate alerts from various monitoring systems
07.10.2025
Home
»
Archive
»
2025
»
Issue 89: Autom...
»
properly. An existing backup script can be extended to include heartbeat in a curl command: curl --request POST --header 'Authorization: Key H
0
i_bj<...>' --header 'Content-type: application/json' --data
27%
Red Hat Ansible Automation Platform
07.10.2025
Home
»
Archive
»
2025
»
Issue 89: Autom...
»
features only found their way into the software in AAP 2.
0
. Table 1 Ansible Automation Platform Objective To create, execute, and manage automation processes Manufacturer
27%
phpVirtualBox and RemoteBox compared
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
version 2 since version 4.
0
. The latest version available at the time of writing, version 4.2, is probably newer than the packages provided by the repositories of most Linux distributions. The installation
27%
Managing computers with Rex
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
_syslog => "local
0
"; You need to add one of the two lines to the Rexfile before the first task. A word of caution: In both cases, only the messages generated by Rex itself end up in the logfiles. The returned uptime
27%
Passwords, passphrases, and passkeys
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
.g., A becomes 4, E becomes 3, O becomes
0
, 1 becomes !, etc.), makes the password even more complicated and does not make it any easier to handle. For example, the Robbie Williams refrain Hell is gone and heaven
27%
Designing a secure Active Directory
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
admin groups necessary, if you have not already done so. No normal user needs to be able to list administrators, highly privileged groups, and Tier
0
systems. Also, consider the permissions of the Admin
27%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
task customization that installs Wireshark into a dev box environment by WinGet package management: $schema: 1.
0
tasks: - name: winget parameters: package: WiresharkFoundation.Wireshark run
« Previous
1
...
3
4
5
6
7
8
9
10