A subkey is a key/pair associated with the main key. GPG allows you to create subkeys linked to the primary key. These ...
During engagements, it may happen that a Linux machine is compromised with only a brief and limited window of access. In such ...
After updating to NetEye version 4.38 and activating authentication via Keycloak, the Icinga Director Self Service API no longer works. For instance if you install the Icinga agents using a Powershell ...
Since Elasticsearch aliases allow for quick switching between indices, this method ensures that the search system remains up and running throughout the update process. Users will always get accurate ...
In a previous blog post by one of my colleagues, we shared how we developed a powerful semantic search engine for our NetEye User Guide. This solution uses Elasticsearch in combination with machine ...
As the digital arena evolves at lightning speed, so do the tactics of those seeking to breach it. Traditional security measures are no longer enough for today’s increasingly sophisticated cyber ...
It seems we can’t find what you’re looking for. Perhaps searching can help.
It seems we can’t find what you’re looking for. Perhaps searching can help.
It seems we can’t find what you’re looking for. Perhaps searching can help.
On the 36th Chaos Communication Congresses back before Covid forced a three year break, I attended a talk from the German tech-blogger Fefe. There he talked about the “nützlich-unbedenklich Spektrum” ...