Advanced search
Search all the words
Search the exact phrase
Published
Any time
Last day
Last week
Last month
Last three months
Last year
Display per page
5 items
10 items
20 items
30 items
50 items
Search for "" returned 4528 matches
Emergency Response
PO-3823-Fotolia-Stephen_Coburn_resized.png
Sys admins turn to rescue systems when faced with difficulties. Four alternatives – Grml, Rescatux, Knoppix, and SystemRescueCd – show what they can do.
Hunting the Invisible
18786665_Invisible-Business-Man_konstantynov.png
Virtual networks and server structures require additional mechanisms to ensure visibility of data streams. We show how to monitor and analyze network functions, even when virtualization is involved.
Solid Defense
PO-23464-123RF-Andrii_IURLOV_123RF-Torwart_resized.png
Although attacks on computers are numerous and varied, they are predominantly based on the same techniques. Microsoft closes these vulnerabilities on Windows computers using the Enhanced Mitigation Experience Toolkit (EMET).
Scrutinized
alphaspirit_123RF.png
The OpenBSD origins of the OpenSMTPD mail transfer agent makes SMTP easier to implement and manage and more secure.
Simple Continuous Operation
123RF_26480610_Non-stop-stamp_aquir_resized.png
Oracle offers several approaches to creating a high-availability environment. We look at the Standard Edition and some of the associated drawbacks to achieving this goal.
Data Panda
123rf_11909833_panda_yang-chao_resized.png
The Python Data Analysis Library, or Pandas, is built on top of the fast math library NumPy and makes analysis of large volumes of data an easy and efficient experience.
Large Radius
123rf_21189066_cafe-wlan_Tyler-Olson_resized.png
Tired of contending with shared passwords for wireless networks? Use WPA Enterprise and a FreeRADIUS server to set up a user password solution for wireless users.
On Patrol
PO-10716-Security_Alert-Brand-X-Bank_Security_Guard.png
You can strengthen your web security by testing for common vulnerabilities. We show how to do this using the attack proxy known as Burp Suite.
Secret Agent's Suitcase
123rf_7117096_agent_Kirill-Kurashov_resized.png
Event-based request processing makes Nginx an agile web server. With the OpenResty packages, it becomes a fast application server based on the Lua scripting language.
In the Vault
123rf_6607142_tresor_braverabbit_resized.png
Modern ATA hard drives and SSDs offer security options that help you control access and reliably destroy data if necessary.
« Previous
Next »
1
...
334
335
336
337
338
339
340
341
342
343
344
345
346
347
...
453
Powered by
eZ Publish™ CMS Open Source Web Content Management
. Copyright © 1999-2014
eZ Systems AS
(except where otherwise noted). All rights reserved.