1,278 Results for:url
- Sort by:
The ultimate guide to cybersecurity planning for businesses
26 Jan 2024This in-depth cybersecurity planning guide provides information and advice to help organizations develop a successful strategy to protect their IT systems from attacks. Read More
Secure Azure Functions with these authentication methods
18 Sep 2023Securing Azure Functions is paramount to maintaining the integrity and reliability of your applications. Read over the methods, tools and best practices. Read More
How honey tokens support cyber deception strategies
31 Jul 2023Learn how to flip the script on malicious hackers with honey tokens, which act like tripwires to reveal an attacker's presence. Read More
Hibernate and JPA 3 CRUD example
15 May 2023Struggling to get your first JPA 3 application off the ground? Here's a quick Hibernate and JPA 3 CRUD example to help you get going with the latest version of the Java Persistence API. Read More
What Are the Four Levels of Health Data Interoperability?
14 Sep 2023According to the Healthcare Information and Management Systems Society (HIMSS), health data interoperability has four levels: foundational, structural, semantic, and organizational. Read More
How to use the Hydra password-cracking tool
06 Dec 2022Need help brute-forcing passwords? Get started by learning how to use the open source Hydra tool with these step-by-step instructions and companion video. Read More
Dissect open source ransomware code to understand an attack
14 Nov 2022To protect your organization from ransomware, it's helpful to know what goes on behind the scenes. Unpack this ransomware code example to understand and defend against attacks. Read More
How to setup an Nginx load balancer example
05 Jun 2022Nginx is among the most popular load balancers and reverse proxy servers for enterprises. Here's how to quickly setup Nginx as a load balancer and configure weighted nodes and sticky sessions. Read More
How to use startup scripts in Google Cloud
16 Mar 2023Google Cloud lets you use startup scripts when booting VMs to improve security and reliability. Follow these steps to create your own startup scripts. Read More
The right MySQL persistence.xml example file for JPA 3 and Hibernate 6
01 May 2023A quick migration from JPA 2.x to 3.x can become bottlenecked if the persistence.xml file is misconfigured. Here's what a proper persistence.xml file for JPA 3, Hibernate 6 and a MySQL database ... Read More