10%
09.11.2017
Senior Architect and Software Fellow Ben Sander about HIP and how it emerged from the ROCm development process. “When we started putting together the ROCm environment, one of the things we heard from ... AMD senior architect Ben Sander explains how the HIP interface integrates existing CUDA programs with the ROCm open development environment.
10%
17.06.2017
-directory-aadconnect-accounts-permissions#create-the-ad-ds-account
Preparations for user provisioning in Office 365: https://support.office.com/en-gb/article/Prepare-to-provision-users-through-directory-synchronization-to-Office-365-01920974-9e6f-4331-a370-13aea4e82b3e?omkt=en ... Learn how Microsoft Identity Manager 2016 can help sync identities in the local AD as well as Azure AD and Office 365.
10%
20.03.2014
+ (in Tools | Cookie Manager+
) to locate a cookie and see its details. Figure 6 shows an example of a JSESSION cookie (from a Fortune 500 firm) issued from the web server without a Secure flag ... You can strengthen your web security by testing for common vulnerabilities. We show how to do this using the attack proxy known as Burp Suite.
10%
14.11.2013
NAS and a significant source of its power. We will point out hardware or configuration considerations necessary to get the most from FreeNAS and, finally, describe how to set up and maintain a FreeNAS installation ... We provide an overview of FreeNAS and ZFS, its main filesystem, then show how to set up and maintain a FreeNAS installation.
10%
28.11.2022
-digital-threats/bashware-attack-targets-windows-system-for-linux-wsl
Custom Linux distributions for WSL: https://docs.microsoft.com/en-us/windows/wsl/build-custom-distro
Kali in WSL 2: https://www.kali.org/docs/wsl/win ... Several tactics, techniques, and procedures circulating among cybercriminals exploit Windows Subsystem for Linux as a gateway. We look at how WSL can be misused and some appropriate protections.
10%
30.11.2025
," directory.
"Chroot" is the term for this type of restricted directory. With chroot, users are unable to move outside their "cell" and can only view their surroundings. Just think of how you feel in a cubicle ... Restricting FTP access on Solaris can be tricky. We show you how to create a secure chroot environment that restricts an SFTP user to a specific directory.
10%
21.08.2014
by a select * from htctopbookmarks; (Listing 6).
Listing 6
select * from htctopbookmarks
01 1|HTC|http://www.htc.com/|2|11|h|ht|htc
02 2|Google|http://www.google.com/|2|11|g|go|goo
03 3|Facebook|http://www.facebook.com ... No matter how insecure Android might appear, you can't escape the "bring your own device" philosophy in today's corporate environment. In this article, we show how admins can use on-board tools
10%
28.11.2022
/commandline/systemd-support-is-now-available-in-wsl/
Download usbipd-win: https://github.com/dorssel/usbipd-win
usbipd-win and WSL: https://github.com/dorssel/usbipd-win/wiki/WSL-support
WSA with Amazon Appstore: https://apps.microsoft.com/store ... for Android apps. We look at the state of the art and help you get started.
10%
14.08.2017
scenarios, this asynchronous condition is not a problem because it does not cause a conflict.
Look at global aircraft sales, for example. Say someone wants to buy a plane in Japan. How likely ... High availability, replication, and scaling are everyday necessities in the database world. What features does PostgreSQL offer in this context, and how good are they?
10%
30.11.2020
must be in quotes when created.
Web Client
Now you have a working back end, but it is of little use without a front end. Listing 6 shows how to install the Kopano browser client, Web ... Kopano Groupware seeks to be more than a slot-in replacement for Microsoft Exchange. We reveal how you can commission the platform and the highlights it offers.