search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(1121)
News
(390)
Article
(296)
Blog post
(3)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
117
118
119
120
121
122
123
124
125
126
127
128
129
130
...
181
Next »
18%
Vulnerability assessment best practices for enterprises
16.08.2018
Home
»
Archive
»
2018
»
Issue 46: CMS S...
»
activity, construction mishaps (e.g., cut fiber optic lines), and other types of incidents. Vulnerabilities Vulnerabilities are often defined as
openings
or pathways that a given threat can exploit to do
18%
CRI-O and Kubernetes Security
30.11.2020
Home
»
Archive
»
2020
»
Issue 60: Secur...
»
Container runtimes continue to evolve at a fast rate, and Red Hat has shifted their focus in the direction of their own Podman container runtime in favor of Docker. Red Hat's
open
source
18%
ZAP provides automated security tests in continuous integration pipelines
23.08.2017
Home
»
Archive
»
2017
»
Issue 41: Kuber...
»
Special Thanks: This article was made possible by support from Linux Professional Institute Commonly, a mixture of
open
source and expensive proprietary tools are shoehorned into a pipeline
18%
Configuration management with CFEngine 3
30.05.2021
Home
»
Archive
»
2021
»
Issue 63: Autom...
»
is still in use in some companies today. As with other
open
source projects, the CFEngine project became increasingly commercialized with wider enterprise use, leading to the formation of a support
18%
Secure cloud-native services with Prisma Cloud Compute
02.06.2020
Home
»
Archive
»
2020
»
Issue 57: Artif...
»
. Although Prisma Cloud Compute is not an
open
source product, I will point you at some
open
source code that might be useful in the container security niche. Once you've had a look at what's included
18%
Let the editor wars begin!
11.10.2016
Home
»
Archive
»
2016
»
Issue 35: Persi...
»
and Ground Rules Before jumping into editor options, I want to put down the assumptions I'm using in my selection of what editors to write about. The starting assumptions are: The focus is on
open
source
18%
Network backups with Amanda
05.12.2016
Home
»
Archive
»
2016
»
Issue 36: Autom...
»
encryption via
Open
SSH on request. This support for encryption through
Open
SSH means you can even back up systems in the DMZ without having to worry about eavesdropping. Current Amanda versions also support
18%
The practical benefits of network namespaces
15.08.2016
Home
»
Archive
»
2016
»
Issue 34: Softw...
»
). The namespaces API comprises three system calls – clone(2), unshare(2), and setns(2) – as well as a few /proc entries. Processes in user space
open
files with /proc/
/ns/ and use their file descriptors to stay
18%
Requirements for centralized password management
18.07.2013
Home
»
Archive
»
2013
»
Issue 15: What’...
»
-pairs-of-eyes principle for certain password entries or for specific user groups. Is the Seal Intact? Formerly, the integrity of a seal indicated whether a message had been
opened
and thus whether the content had been
18%
Asynchronous PostgreSQL
12.09.2013
Home
»
Archive
»
2013
»
Issue 16: Docker
»
. There are some new lines: 5 and 12 to 22. Line 22 installs the sig function as a signal handler for SIGTERM. When the signal arrives, line 13
opens
a new connection to the database and calls the pg
« Previous
1
...
117
118
119
120
121
122
123
124
125
126
127
128
129
130
...
181
Next »