41%
06.10.2022
immediate action. In this article, I explain why this is the case and what else you can and should expect from Ceph 17.2.
Figure 1: FileStore is the name ... Ceph 17.2
39%
30.11.2025
.
Listing 1
A SIP Request
01 INVITE sip:bob@tuwien.ac.at SIP/2.0
02 Via: SIP/2.0/UDP myhost.myprovider.de;branch=z9hG4bK776asdhds
03 ...
04 To: Bob
05 ...
06 From: Alice Internet Telephony (SPIT) is regarded as the next generation of spam. In this article, we investigate SPIT and point out countermeasures for admins with VoIP servers. ... 0 ... Spam over Internet Telephony
36%
02.02.2021
application with FIDO2, I will refer to the sample application as a guide and look for the important components in the examples for an abstract service of your own.
As a concrete use case, I will be looking ... The FIDO and FIDO2 standard supports passwordless authentication. We discuss the requirements for the use of FIDO2 and show a sample implementation for a web service. ... Secure Login with FIDO2 ... Secure authentication with FIDO2
35%
30.11.2025
to me (Listing 2).
Listing 2
Action Settings
01 # ban the IP & send an e-mail with whois report and include relevant log lines to the destemail
02 action_mwl = %(banaction)s[name=%(__name__)s ... For its size, fail2ban, a utility that scans logfiles and bans suspicious IP addresses, punches well above its weight. ... fail2ban ... The fail2ban intrusion prevention framework
35%
11.04.2016
/blog/2013/12/08/the-origins-of-ansible
Ansible: http://www.ansible.com
Announcement: http://www.ansible.com/blog/ansible-2.0-launch
Installation guide: http://docs.ansible.com ... Ansible 2.0 ... What's new in Ansible 2.0
35%
28.11.2021
distributions support WSL1 and WSL2 differently in some cases. Each distribution can be upgraded or downgraded at any time. WSL1 and WSL2 distributions also can be run side by side. However, to run Docker ... Deploy a full Linux container environment, including a Kubernetes cluster, on Windows with Windows Subsystem for Linux version 2. ... Containers + WSL2 ... Use Linux Containers with WSL2 on Windows
34%
06.10.2022
, the command would be:
$ curl -sfL https://get.k3s.io | sh -s - server --datastore-endpoint="mysql://rancher:secret@tcp(10.42.0.1:3306)/rancher"
This command only works if the system has access to the Internet ... Rancher 2.5
34%
10.12.2013
The Internet of Things is predicted to be a huge market in the next 10 years, taking the dumb objects around us and making them data-noisy.
... easy to gauge the scale intuitively.
The fact is that lots of Internet of Things (IoT) use cases are still hypothetical or just commercially unproven. Your car could
talk to the city parking space ...
The Internet of Things is predicted to be a huge market in the next 10 years, taking the dumb objects around us and making them data-noisy.
... A Management Platform for the Internet of Things ... The Age of The Internet of Things is upon Us
32%
25.03.2021
specifically use when selecting the private key:
attributetype ( 1.3.6.1.4.1.56227.1.1.2
NAME 'fido2credentialId'
EQUALITY caseExactIA5Match
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26
SINGLE-VALUE )
This identifier ... Log in to your account securely without a password with LDAP and a schema to establish the objects and attributes required for FIDO2 authentication. ... Store FIDO2 info in LDAP ... Secure passwordless logins with FIDO2 and LDAP
30%
22.05.2023
transmission of digital signals, whose function is completely definable in software. One pin each maps the values 0 and 1 in the simplest case – for example, to switch on an LED (output) or to query the position ... Microsoft Azure Sphere links three vital elements of the Internet of Things – microcontrollers, software, and cloud service – with a focus on security. ... Azure Sphere for Internet of Things