168 Results for:L1D

  • Sort by: 

Most Influential Women in UK Tech: The 2021 longlist

By Clare McDonald 22 Jul 2021

Each year, Computer Weekly publishes the longlist of all of the women put forward to be considered for its list of the top 50 Most Influential Women in UK Tech. Here are all of 2021’s nominees Read More

EDS report on 'dangerous' Chinook software published for the first time

By Tony Collins 22 Feb 2010

Computer Weekly is publishing, for the first time, a technical analysis of the software installed on the Chinook Mk2 helicopter, the Chinook model which featured in the RAF's worst peacetime crash. Read More

Working with configuration files in Linux systems

By Don R. Crawley 26 Jan 2011

Learn how to find and edit configuration files in your customers' Linux systems by using the shell commands provided in this chapter excerpt. Read More

Most influential women in UK tech: The 2022 longlist

By Clare McDonald 16 Aug 2022

Each year, Computer Weekly publishes the longlist of all of the women put forward to be considered for its list of the top 50 Most Influential Women in UK Tech. Here are 2022’s nominees Read More

How to properly authenticate a Linux client in a Windows domain

By Gary Olsen 17 Jul 2007

MVP Gary Olsen describes the step-by-step process of configuring a Red Hat Fedora client into a Windows Server 2003 domain. Read More

Network session data analysis with Snort and Argus

By Richard Bejtlich 01 Apr 2008

This edition of Snort Report departs from the standard format to introduce Argus, a session data collecting tool that can work alongside Snort. Learn how session data can complement Snort's alert data for network ... Read More

Understanding the UID Aadhaar project and IT's role in its success

23 Sep 2011

The success of the Aadhaar project (UID) will solely rely on its IT infrastructure. Know the role that IT plays in success of Aadhaar project. Read More

Nmap tutorial: Nmap scan examples for vulnerability discovery

20 Jul 2011

Learn how to use Nmap, the free network scanner tool, to identify various network devices and interpret network data to uncover possible vulnerabilities. Read More

Troubleshooting Logical Volume Manager boot problems

By Sander van Vugt 27 Aug 2009

If Logical Volume Manager (LVM) boots incorrectly, logical volumes are inaccessible and you can't manage server disk space. In this LVM how-to, we offer some simple steps to troubleshoot boot issues with LVM. Read More

Traffic Talk: Testing Snort with Metasploit

By Richard Bejtlich 02 Feb 2010

Are your customers' network security solutions working as expected? Learn about testing Snort with Metasploit in this detailed tip from Richard Bejtlich, complete with code examples and step-by-step instructions. Read More