Advanced search
Search all the words
Search the exact phrase
Published
Any time
Last day
Last week
Last month
Last three months
Last year
Display per page
5 items
10 items
20 items
30 items
50 items
Search for "" returned 4528 matches
Fanfare
PhotobyPabloHeimplatzonUnsplash_Fanfare.png
Microsoft Azure Update Management automatically patches servers in on-premises data centers, virtual servers on Azure and other cloud services, and even Linux servers.
Welcome
123rf_100956974_Hexagonal_DaniilPeshkov_resized.png
The upside and downside of the post-pandemic employment trend.
Attentive Co-Driver
bowie15_123RF-Man_in_Small_Car.png
Modern scale-out environments with containers make log collection difficult. We present concepts and methods for collecting application logfiles with a sidecar container in Kubernetes environments.
Tech News
Hive Ransomware Hitting Linux and FreeBSD Systems
Convenience
PhotobyFilipMrozonUnsplash-Convenience-Store.png
The bpytop command-line monitoring tool provides a variety of information via a fancy user interface and supports network monitoring and mouse- or keyboard-based control.
Defenders
PO-26394-123RF-Amy_Walters_123RF-8949433_-_miniature_military_soldiers_and_barbed_wire_are_guarding_a_laptop_from_viruses_spyware_and_identity_thie...
The Domain Name System, in addition to assigning IP addresses, lets you protect the network communication of servers in a domain. DNS offers further hardening of network protocols – in particular, SSH fingerprinting and CAA records.
Timeless Classic
PhotobyClemOnojeghuoonUnsplash_Classic-Car.png
The revival of terminal servers during the Covid-19 crisis depended on the IT administrator to enable home office workplaces, with the help of tools like ThinLinc, a Linux remote desktop server.
Key to Security
Jeff_Metzger_123rf_Key-laptop.png
Nitrokey hardware authentication devices aim to raise data encryption, key management, and user authentication security to the next level.
Trustworthy
PhotobySimonMoogonUnsplash_Dog-Trust.png
DMARC combines the abilities of SPF and DKIM to safeguard and protect against spam and phishing and allows targeted configuration according to company policy.
Card Change
PhotobyGlenCarrieonUnsplash_Cards.png
In this overview, we look at the opportunities eSIM technology offers for the mobile workplace and what IT managers need to watch out for in deployment and management.
« Previous
Next »
1
...
397
398
399
400
401
402
403
404
405
406
407
408
409
410
...
453
Powered by
eZ Publish™ CMS Open Source Web Content Management
. Copyright © 1999-2014
eZ Systems AS
(except where otherwise noted). All rights reserved.