17%
09.08.2015
because you do not need any CALs here. This means you can only connect 25 (Essentials) or 15 users (Foundation). Furthermore, the servers are only allowed a maximum of two processors (Essentials) or one
17%
09.08.2015
.translation embeddedmap;
09
10 create class Relation extends E;
11 create property Relation.from date;
12
13 create class Appear extends E;
14 create property Appear.chapter embeddedlist integer
15
16 insert into Person
17%
20.05.2014
software tools also integrate wikis as a knowledgebase component. Ticketing systems designed for bug reporting, such as MantisBT [14] and Roundup [15], let you integrate wiki engines, although this can
17%
20.05.2014
switch to the script folder for Exchange 2013 Exchange Management Shell C:\Program Files\Microsoft\Exchange Server\V15\Scripts), you can enter .CheckDatabaseRedundancy.ps1 to test the replication.
If you
17%
11.06.2014
1048576000 sectors
13 Units = sectors of 1 * 512 = 512 bytes
14 Sector size (logical/physical): 512 bytes / 4096 bytes
15 I/O size (minimum/optimal): 4096 bytes / 4096 bytes
16 Disk identifier: 0x00000000
17
17%
04.08.2020
.org/ntopng/securing-ntopng-with-ssl-and-lets-encrypt/
The Author
Thomas Zeller is an IT consultant and has been involved with IT security and open source for 15 years. He is the author and coauthor of OpenVPN Compact
and Mind Mapping with Freemind
. In real
17%
07.06.2019
For more than 15 years I have been a Debian developer, so I am used to a good deal of teasing about "Debian Stale," a corruption of the name of the Debian Stable branch. However, if you look
17%
06.10.2019
[15].
Additional open source tools are used in container scanning. The CoreOS project Clair [16] collects information about app and Docker container vulnerabilities in its database. With the use
17%
15.08.2016
to jump to the next table to manipulate packages for further processing.
The OpenFlow protocol comes in several editions. The current version is 1.5 (standard). Version 1.3 is still quite common, as is 1
17%
14.03.2018
/security-best-practices/best-practices-for-securing-active-directory
Security Compliance Manager: https://www.microsoft.com/en-us/download/details.aspx?id=53353
Security Compliance Manager (retired): https://blogs.technet.microsoft.com/secguide/2017/06/15/security