search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
opens
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(69)
News
(36)
Article
(9)
Keywords
« Previous
1
...
5
6
7
8
9
10
11
12
34%
Mocking and emulating AWS and GCP services
05.08.2024
Home
»
Archive
»
2024
»
Issue 82: Sover...
»
of mocking and emulating AWS services becomes more important from financial and dependency perspectives for any company of any size. Because of the power of free and
open
source software, you can find
34%
Kubernetes networking in the kernel
05.08.2024
Home
»
Archive
»
2024
»
Issue 82: Sover...
»
and choice in this vital area. I focus on the
open
source Cilium network plugin, which is one of a few CNI choices that leverages eBPF (the successor to the Berkeley Packet Filter) to provide high performance
34%
Detecting system compromise
01.06.2024
Home
»
Archive
»
2024
»
Issue 81: Load...
»
by an authorized user
opens
up the system to malicious code and subsequent compromise. The fact of the matter is that system attacks are widespread, unrelenting, and often automated, indiscriminately looking
34%
Networking strategies for Linux on Azure
27.09.2024
Home
»
Archive
»
2024
»
Issue 83: Storage
»
layer of security for Linux-based web applications. The WAF protects against common web vulnerabilities such as SQL injection, cross-site scripting (XSS), and other
Open
Web Application Security Project
« Previous
1
...
5
6
7
8
9
10
11
12