search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
0mb 2010 Llorente"523
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(8)
Keywords
100%
Virtualization via Zones
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
System (output follows) 09 DOWNLOAD PKGS FILES XFER (
MB
) 10 Completed
20/20
3021/3021 42.55/42.55 11 12 PHASE ...
0
72%
Automating Migration to openEuler
30.11.2025
Home
»
Archive
»
2025
»
Issue 90 VoIP N...
»
Rubén
Llorente
... of a majority of Red Hat employees. In
2020
, Red Hat unilaterally discontinued CentOS development, setting end-of-life (EOL) dates for the active versions much earlier than the community expected. According
31%
News for Admins
28.07.2025
Home
»
Archive
»
2025
»
Issue 88: 5 Net...
»
compatibility between releases. Learn more at OpenELA: https://openela.org/. Ultra Ethernet Consortium Releases 1.
0
Specification The Ultra Ethernet Consortium (UEC) has released UEC Specification 1.
0
(https ... Releases 1.
0
Specification; CVE Foundation Issues Call for Support; Doudna Supercomputer in Development at NERSC; AlmaLinux OS 10 Released; CloudBees Introduces Unify DevOps Solution; Red Hat Enterprise
30%
Comparing system rescue distros
27.05.2025
Home
»
Archive
»
2025
»
Issue 87: Light...
»
an executable Grml installation to a standard USB storage device in next to no time. If you want to do yourself a favor, grab a USB storage device with USB 3.
0
, which has long been standard. As icing on the cake
28%
Server validation with Goss
07.10.2025
Home
»
Archive
»
2025
»
Issue 89: Autom...
»
). If a check fails, you will need to carry out an in-depth investigation to determine the cause. Goss has been testing Linux systems for almost 10 years, with support for Windows being added in
2020
, although
28%
Risk mitigation for Active Directory
27.05.2025
Home
»
Archive
»
2025
»
Issue 87: Light...
»
a step in the right direction. Authentication policies can, to a certain extent, help limit the attack surface for brute force. For example, a Tier
0
account cannot be blocked by a brute-force attack
28%
Securing AI model deployments with SELinux
28.07.2025
Home
»
Archive
»
2025
»
Issue 88: 5 Net...
»
app was containerized with vulnerable settings: a --privileged flag and volume mount -v /etc:/host-etc. In test 1, SELinux set up in permissive mode, sudo setenforce
0
sudo podman run --privileged -v
26%
Designing a Secure Active Directory
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
admin groups necessary, if you have not already done so. No normal user needs to be able to list administrators, highly privileged groups, and Tier
0
systems. Also, consider the permissions of the Admin