17%
20.05.2014
-known wildcards to provide greater tolerance. Thus, the above pattern could look like this:
pattern=Failed password for (\w+)
Now SEC alerts for each failed SSH login, because the \W+ regex stands for one or more ... The Simple Event Correlator is a small Perl program that supports analysis of logfiles with a view to security. In this article, we provide an introduction to SEC's rules and actions.
17%
21.08.2014
's feature set not only to query status information but also to create new systems or define other virtual resources, such as networks.
On Fedora systems, the Python bindings are provided by the libvirt ... If you do not want to use any of the major management frameworks to manage your virtual machines, the Libvirt library for Python provides an alternative.
17%
17.07.2018
Approach
The classic approach is to install the services needed on central servers (see the "Deep Infrastructure" box), provide them with the corresponding configuration files, and operate them ... GitLab provides the perfect environment for generating Docker containers that can help you operate critical infrastructure reliably and reproducibly.
17%
13.02.2017
IT environments comfortably, openITCOCKPIT offers service template groups. As a result, identical hosts do not need to be provided manually with the same checks. To accomplish this, you create a new service ... A good monitoring solution must provide information about applications and their performance. We show you how to monitor a database using openITCOCKPIT.
17%
06.12.2011
Our ADMIN Update newsletter provides tips and practical solutions for configuration, security, and system management in heterogeneous environments.
Register for ADMIN Update!
17%
20.03.2014
Partition alignment changes as drives evolve, and proper alignment is necessary for maximum performance. We provide some tips to help you get things back in order.
17%
11.04.2016
The Veil pen-testing platform provides some powerful tools that will hide your attack from antivirus scanners – and Veil even supports Metasploit payloads.
17%
06.10.2022
laptop. Yes, some cloud services have been compromised. Still, if you take precautions, such as selecting providers that encrypt your data and enabling multifactor authentication, you have less to worry
17%
22.08.2011
With the recent rise in cloud computing, most cloud providers have offered their own APIs, which means cloud users sign up for the services of individual providers at the expense of being able ...
With the recent rise in cloud computing, most cloud providers have offered their own APIs, which means cloud users sign up for the services of individual providers at the expense of being able
17%
13.12.2011
Solaris Zone clustering. It provides cloud-ready application protection and restart and failover capabilities. The latest version also enables easy multinode installation of both Oracle Solaris and Oracle ...
Oracle has announced the availability of Oracle Solaris Cluster 4.0, the first release providing extended high availability and disaster recovery capabilities for Oracle Solaris 11, the first cloud