168 Results for:L1D
- Sort by:
Most Influential Women in UK Tech: The 2021 longlist
22 Jul 2021Each year, Computer Weekly publishes the longlist of all of the women put forward to be considered for its list of the top 50 Most Influential Women in UK Tech. Here are all of 2021’s nominees Read More
EDS report on 'dangerous' Chinook software published for the first time
22 Feb 2010Computer Weekly is publishing, for the first time, a technical analysis of the software installed on the Chinook Mk2 helicopter, the Chinook model which featured in the RAF's worst peacetime crash. Read More
Working with configuration files in Linux systems
26 Jan 2011Learn how to find and edit configuration files in your customers' Linux systems by using the shell commands provided in this chapter excerpt. Read More
Most influential women in UK tech: The 2022 longlist
16 Aug 2022Each year, Computer Weekly publishes the longlist of all of the women put forward to be considered for its list of the top 50 Most Influential Women in UK Tech. Here are 2022’s nominees Read More
How to properly authenticate a Linux client in a Windows domain
17 Jul 2007MVP Gary Olsen describes the step-by-step process of configuring a Red Hat Fedora client into a Windows Server 2003 domain. Read More
Network session data analysis with Snort and Argus
01 Apr 2008This edition of Snort Report departs from the standard format to introduce Argus, a session data collecting tool that can work alongside Snort. Learn how session data can complement Snort's alert data for network ... Read More
Understanding the UID Aadhaar project and IT's role in its success
23 Sep 2011The success of the Aadhaar project (UID) will solely rely on its IT infrastructure. Know the role that IT plays in success of Aadhaar project. Read More
Nmap tutorial: Nmap scan examples for vulnerability discovery
20 Jul 2011Learn how to use Nmap, the free network scanner tool, to identify various network devices and interpret network data to uncover possible vulnerabilities. Read More
Troubleshooting Logical Volume Manager boot problems
27 Aug 2009If Logical Volume Manager (LVM) boots incorrectly, logical volumes are inaccessible and you can't manage server disk space. In this LVM how-to, we offer some simple steps to troubleshoot boot issues with LVM. Read More
Traffic Talk: Testing Snort with Metasploit
02 Feb 2010Are your customers' network security solutions working as expected? Learn about testing Snort with Metasploit in this detailed tip from Richard Bejtlich, complete with code examples and step-by-step instructions. Read More