13%
10.06.2015
://analyticsacademy.withgoogle.com/course02/assets/html/GoogleAnalyticsAcademy-PlatformPrinciples-Lesson1.2-TextLesson.html
NetFlow Export Datagram Formats: http://www.cisco.com/c/en/us/td/docs/net_mgmt/netflow_collection_engine/5-0-3/user
13%
09.10.2017
volumes that also contain the respective filesystems. The smallest units of a logical volume system are the physical extents (4MB by default), which are comparable to sectors in classical partitioning
12%
18.07.2013
files from 1991 on my system and files from the late 1980s on floppy disks (once a pack rat, always a pack rat).
With the second approach – doing the migration for the users – migrating data takes a bit
12%
30.04.2013
forensic analysis application.
Memory Dumping
Current kernel versions restrict access to the Linux system’s main memory. In the past, you could use two device drivers, /dev/mem
and /dev/kmem
, to read
12%
08.08.2014
]
Python [6]
Julia (up and coming) [7]
Java [8]
Matlab [9] and Matlab-compatible tools (Octave [10], Scilab [11], etc.)
Java is the lingua franca of MapReduce [12] and Hadoop
12%
28.11.2021
Creating a graphical user interface (GUI) with the Fyne framework [1] requires some preparation, including installing the GCC compiler and a graphics driver [2]. You will also need at least Go v1.12
12%
25.03.2021
prevents a very common method of permanently embedding malware on a system. You can block calls to the Win32 API from within Office applications with rule 92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B
, which
12%
02.06.2020
is still in transition, so you'll see both product names mentioned throughout this article. Adding to the confusion, Palo Alto Networks offers two similarly named products [2]: the software-as-a-service (SaaS
12%
17.06.2017
on 'Enterprise Edition'
-s: creates image based on 'Standard Edition 2'
-x: creates image based on 'Express Edition'
-i: ignores the MD5 checksums
* select one edition only: -e, -s, or -x
LICENSE CDDL 1.0
12%
05.02.2023
and recommendations come in. Examples include:
Microsoft security baselines from the Microsoft Security Compliance Toolkit [4]
SiSyPHuS, a study of system design, logging, hardening, and security features