15%
04.08.2020
address calls up a detailed view of the system in question. As in the settings for an interface, the icon with the warning sign lets you define thresholds for generating alerts and, of course, retrieve
15%
07.06.2019
(domain-specific language), so you have to mix YAML and Groovy within a YAML file. Listing 6 shows a YAML script with a jobs section that creates a so-called seed job that is used later to deploy other jobs
15%
01.08.2019
_USER (1)
root@fs-01:~# wbinfo -i test-u1
failed to call wbcGetpwnam: WBC_ERR_DOMAIN_NOT_FOUND
Could not get info for user test-u1
root@fs-01:~# getent passwd test-u1
_
Unfortunately, this error
15%
01.08.2019
'll look at shortly, calls such activities a "blend of science, psychology, and art." I think that sums up cybersecurity as a discipline pretty well, too! If you're interested in this area, a friend directed
15%
06.10.2019
, such as buffer overflows or insecure function calls. Dynamic Application Security Testing (DAST) tests against a running application or against the Review Apps collaboration tool [14]. These tests start with each
15%
11.10.2016
source tools for data collection and presentation is the so-called "ELK" stack, which comprises:
Elasticsearch: Enables sophisticated searches of large amounts of volatile data.
Logstash: Collects
15%
11.10.2016
the ports on the switch as configurable network interfaces on the OS10 switch. From here, you can walk the tree as required. Because it is a Debian system, you can, for example, call apt-get to install new
15%
11.10.2016
.
A dmesg command shows free areas (Listing 1). Areas marked usable
can be used by the NVDIMM driver. The last line shows an area of 50GiB usable
. Calling
memmap=16G!4G
Listing 1
Showing Memory
15%
05.12.2016
(SDN). OpenStack provides its own component called Neutron that takes care of all aspects of SDN. Typical OpenStack clouds strictly separate the private networks of individual customers – based
15%
05.12.2016
a denial of service attack.
The other point of view, that of the customer whose VMs are operated by a cloud service provider, is taken into account by Shielded VMs and is called Hardware-Trusted Attestation