12%
05.12.2014
services. In the latter case, the test team chose providers with a fixed price model. Phraseanet [1] and ResourceSpace [2] are open source, and they take on the two commercial candidates Razuna [3
12%
15.03.2012
SSL encryption using the -t
option, or its longer form --disable-ssl
. The “Shell In A Box Functions” box gives more details. A shellinaboxd
process can provide multiple services, such as logging
12%
29.06.2011
Hyper-V, an element of Windows Server 2008 since the operating system was introduced, provides an integrated virtualization solution that doesn't require third-party software [1]. Hyper-V technology
12%
09.11.2017
that is structured in a way that supports easy, automated porting of CUDA code to a vendor-neutral format. This neutral HIP format provides a path for adapting CUDA code to fit in with AMD’s ROCm development stack
12%
06.01.2012
entries. Data access is handled via WebDAV and is possible on any Linux, Mac, or Windows system, as well as on mobile devices. Additionally, ownCloud provides a convenient web interface that allows
12%
08.08.2022
terminal.
Terminal Multiplexers
The next two tools don’t provide terminal multiplexing over the web by themselves, but they can provide a web-based communication link between two systems, over which
12%
10.04.2015
of data provided. Of course, PowerShell provides the necessary tool to collect the data. To access WMI objects, you use the Get-WMIObject cmdlet with the WMI object to be queried as a parameter (Listing 1
12%
30.11.2020
: Certificate Transparency, shown here in green, supplements the TLS/SSL procedure with an additional check by a log server.
Log Access via Proxy Server
Various service providers operate their own log
12%
02.02.2021
T) environment with Kafka. This scenario provides a good overview of the individual Kafka components and their interaction with other technologies.
Figure 1: Kafka
12%
02.08.2021
they analyze and describe the IoCs. If you receive STIX documents from partners or service providers (e.g., from platforms such as the threat sharing platform MISP [4]), you can test them immediately