23%
04.10.2011
of command-line tools for EC2.
S3 [6] (Simple Storage Service) offers permanent storage independent of EC2 virtual machines being deployed and shut down. Specifically, we use S3 to store the code that gets
23%
26.03.2025
queries from insecure zones.
Third is the Active Directory Federation Services (ADFS), a Security Assertion Markup Language (SAML) and OpenID Connect-compliant identity provider (IdP) for federated
23%
25.09.2023
host aggregator.example.com
port 24224
Listing 3
Simple Aggregator Node
@type forward
port 24224
@type
23%
30.11.2025
by a malicious third-party? In this context, the term data provenance [6] becomes extremely meaningful: It covers the origins of the piece of data and how it might have been modified, that is, who has viewed
23%
11.02.2016
Accounts: https://support.office.com/en-us/article/Configuration-of-General-and-Notification-Settings-6ad3a53f-470f-4f15-ad31-aca147385449
23%
15.12.2017
-server-ctl user-create jstanger James Stanger jstanger@company.com
Cr8*p@sswrd*here -f /tmp/jstanger.key
Now that you’ve created a certificate and a user, make sure that the PEM files are in the right place
23%
20.05.2014
] covers a whole range of snapshot parameters associated with virsh, including live backups. For example, if a virtual machine named RHEL6 is running under libvirt, you can type:
virsh snapshot
23%
21.08.2014
: At the command line, the Vagrant user can combine a running virtual machine with a new subdomain on Vagrantshare.com. Its development environment is subsequently accessible on the Internet (e.g., on http
23%
18.02.2018
. If you also want to manage tenants in your AWS account or use AWS resources via an API, click on your own username in the upper right-hand corner and switch to the AWS Security Credentials
page [6
23%
13.06.2016
, that the user is indeed connected with the correct web address and not with a spoofed website when connecting to a specific domain (e.g., www.linuxmagazine.com
).
In the recent past, however, many spoofed