12%
07.06.2019
, virtual machines (VMs), or even VMs hosted by a cloud provider. For Jenkins to be able to use a machine as a slave, the machine only needs to be equipped with SSH access and a Java 8 Runtime. The builds
12%
01.08.2019
leading to the servers that provide A records for domains like hanscees.com
. DNSSEC was designed to protect against intrusion techniques that result in client systems receiving forged or manipulated DNS
12%
06.10.2019
can run containers without having superuser permissions.
Believe me when I say that this provides a far higher degree of comfort when it comes to leaving containers running on a system – development
12%
05.12.2016
disadvantages. For example, values provided by user-defined functions or stored procedures can differ from call to call. An example would be now(). If this statement is repeated on the slave, it must produce
12%
14.03.2018
itself provides detailed instructions for securing its directory service [1].
Inquisitive Intruders
An attacker usually enters a network through a single endpoint, such as an insecure PC, server, router
12%
02.03.2018
scripts: User Configuration | Policies | Windows Settings | Scripts
.
Processing scripts using group policies provides more flexibility. This also includes traditional logon scripts that you no longer
12%
02.03.2018
main memory for the CPU. After all, swapping out pages is bound to affect the processor.
Figure 1: Performance monitoring provides very accurate insights
12%
09.06.2018
will help – provided they are included in the Docker image on which the container was built. If you build the containers yourself, you should pay attention to your basic configuration, because the Linux
12%
13.06.2016
outage. The longer the commit interval, the greater the risk of data loss.
The use of RAM as a cache provides huge performance advantages for the user. Don't forget, however, that RAM is volatile
12%
15.08.2016
(FC SAN)/Internet Small Computer System Interface (iSCSI). This storage is then provided to the application servers, such as Hyper-V or SQL Server, over the network. SMB version 3 is used