19%
27.09.2024
of functions comparable to those of its NFS counterpart, but using the SMB protocol instead of NFS. This option is interesting in environments with existing Windows file servers. The GlusterFS [6] distributed
19%
27.09.2024
is available for Windows Server 2012 R2, 2016, 2019, and 2022 [6]. The setup routine shows the ubiquitous license agreement, prompts you for the installation path, and optionally uses a proxy server
19%
30.01.2024
cache (line 4). Last but not least, run apt to install the community edition of Docker on your system (line 5). A call to systemctl (line 6) should then show active
as the docker.service
status
19%
30.01.2024
: https://github.com/Checkmk/checkmk/tree/v1.2.6b5/agents/windows
MySQL tuning script: https://raw.githubusercontent.com/major/MySQLTuner-perl/master/mysqltuner.pl
The Author
Thomas Joos
19%
30.01.2024
of a general architecture for distributed monitoring. Some systems such as Checkmk [5] or Zabbix [6] support this type of architecture by default. However, the emergence of distributed monitoring strategies
19%
03.04.2024
because they follow very similar approaches and promise users and administrators roughly the same thing. Both Qualys Container Security [6] and JFrog Xray [7] are platform solutions that can be integrated
19%
03.04.2024
or storyteller LLMs.
For this article, I used the CodeUp-Llama-2-13B code generation model [6], which makes do with the 12GB of VRAM provided by the RTX 4090 in the lab computer. Again, I asked the coding model
19%
03.04.2024
, not a new idea [6]. Microsoft published two PDF files back in 2012 explaining the underlying technology and offering help with the necessary measures [7].
Conclusions
The safeguards for your network must
19%
01.06.2024
is well documented [5], and you can find useful tips on their website. Of special interest is the Recipes section [6], which includes example tasks for uploading files or copying scripts into the servers
19%
01.06.2024
used in the ticket is documented online [6] and differs from the convention used in the AD msDS-SupportedEncryptionTypes attribute.
Tracing the use of the captured login data might also be possible