17%
03.09.2013
. In the Manage Devices
section, all Teradici PCoIP devices on the network are detected and listed automatically (Figure 6).
Figure 6: Simple but functional
17%
17.09.2013
with ssh-agent
; the -l
option lists the currently stored keys. With the Windows MobaXterm SSH client, you can easily enable the SSH agent, for example, in the program settings (Figure 6). The PuTTY Suite
17%
01.04.2014
then Create New Users
;
name the user whatever you would like and click C
reate
(Figure 6).
Figure 6: Creating a new user.
Once the user is created, go
17%
21.05.2014
Stack definitely allows users to collect data on VMs and store the data persistently beyond a restart of the virtual machine. This is where Cinder enters the game (Figure 6): Cinder equips virtual machines
17%
26.10.2012
that the frequently forwarded ports belong to services typically used by malware to infect new systems (Figure 6).
Figure 6: Registered attacks on various ports
17%
02.04.2013
any back-end software because it is provided by Vasco in the cloud (see also the “OAuth API” box).
Figure 6: The online demo token by Vasco lets users
17%
12.08.2013
.tool
The output is given in JSON format (Figure 5), so piping it to python -m json.tool
makes the output readable (Figure 6).
Figure 5: Performance data queried
17%
22.06.2014
Stack machines is much more convenient in the built-in Puppet Dashboard than setting up the services manually (Figure 6). If you want to extend your OpenStack installation later to add more computers, you can do
17%
13.12.2011
entities and run transforms to change those entities. The palette is available once you click the Manage
tab and see it listed under Windows
, which contains a default collection of entities (see Figure 6
17%
03.02.2012
be sure that the evidence is genuine and has not been injected by a malicious third-party? In this context, the term data provenance [6] becomes extremely meaningful: It covers the origins of the piece