71%
04.08.2020
] analyzed the effect of measurement on performance through clever experiments that determined the effect of time measurement on the code measured. Using well-placed calls to timespec_get [8] and a detailed
71%
27.09.2021
The object ID (1c9c09d7-4b3c-4f37-b2cf-e3b8ad0a2ecf
in this example) can then be used to search for audit entries:
Get-AzureADAuditDirectoryLogs -Filter "targetResources/any (tr:tr/id eq '1c9c09d7-4b3c-4f37
71%
05.02.2019
a family of wasps [2]. Although I'm a fan of Mutillidae, other applications like WebGoat [3], also from OWASP, offer a highly sophisticated and multilayered insecure web application, as well.
The most
70%
09.10.2017
.
Figure 1: Once you have registered to use the Twitter API, you are taken to this configuration page.
The numerous libraries [8] help you develop a client and make it significantly easier to program
70%
14.08.2017
api.raml
01 #%Raml 0.8
02 title: Contacts
03 version: 0.1
04 #baseUri: http://www.rve.com/contactshelf
05 baseUri: https://mocksvc.mulesoft.com/mocks/d4c4356f-0508-4277-9060-00ab6dd36e9b
70%
25.09.2023
kind: Service
03 metadata:
04 name: nginx
05 spec:
06 ports:
07 - port: 8080
08 targetPort: 80
09 selector:
10 app: nginx
Listing 7
my-k8s-app/webapp-service.yaml
01
70%
04.08.2020
] are impressive, although Node.js, Ruby, Golang, Java, PHP, and other languages can be expected to achieve similar results.
Listing 1
Python Minify Results
from ubuntu:14.04 - 438MB => 16.8MB
70%
07.10.2014
_session_timeout 60m;
06 # Only with Nginx 1.4.x and newer
07 ssl_stapling on;
08
09 # HSTS policies are persistent; learn more about HSTS
10 # before enabling the following rule for best security.
10 #add
70%
11.06.2014
://addons.mozilla.org/de/thunderbird/addon/lightning/
Sogo for Lightning: http://www.sogo.nu/fr/downloads/frontends.html
Evolution: http://projects.gnome.org/evolution/
Evolution with SabreDAV: http://sabre.io/dav/clients/evolution/
eM Client: http://www.emclient.com
70%
05.12.2014
Rudis. Data-Driven Security: Analysis, Visualization and Dashboards
. Wiley, 2014
toolsmith – Jay and Bob Strike Back: Data-Driven Security: http://holisticinfosec.blogspot.com/2014/09/toolsmith