1,278 Results for:url

  • Sort by: 

Emotet tests new tricks to thwart enhanced security

By Alex Scroxton 26 Apr 2022

The operators of the Emotet botnet seem to be trying to find a way to get around recent changes made by Microsoft to better protect its users Read More

Manage Kubernetes clusters with PowerShell and kubectl

By Anthony Howell 07 Nov 2022

Learn how to use the Kubernetes tool kubectl in PowerShell, including setting up aliasing and tab-completion, parsing JSON output and searching logs with the Select-String cmdlet. Read More

Five ways to fix the 'no persistence.xml file found' error in Eclipse

By Cameron McKenzie 09 May 2023

No persistence.xml file found fix The hardest part about learning Hibernate and JPA 3 is how to get your first project up and running. Some will encounter the dreaded no persistence.xml file found ... Read More

2024 technology predictions around AI, Mojo and blockchain

By Bob Reselman 30 Jan 2024

Blockchain, AI, anti-competitive activity and the new programming language Mojo are sure to fill the headlines in 2024. Read More

What makes a good learning management system?

By Eric St-Jean 20 Jul 2023

HR leaders should ensure their new LMS includes certain features so it benefits employees, managers and HR staff. Learn what makes a good learning management system. Read More

How to setup an Apache reverse proxy server example

By Cameron McKenzie 17 May 2022

Most enterprise architectures use Apache as a reverse proxy, but it is not configured for that by default. In this quick tutorial, we show you how to configure an Apache reverse proxy for backend ... Read More

Researchers see surge in scam websites linked to coronation

By Alex Scroxton 02 May 2023

Scammers and fraudsters continue to take advantage of large public events, with the coronation of King Charles III no exception Read More

Customer data, encryption key stolen in GoTo breach

By Alexander Culafi 24 Jan 2023

GoTo's breach update follows the recent disclosure made by GoTo subsidiary LastPass, which similarly lost significant sensitive customer data in a breach last year. Read More

Travel-themed phishing lures spiked this summer

By Alex Scroxton 16 Sep 2021

As people begin to take holidays again after more than a year of restrictions and lockdowns, opportunist cyber criminals have taken note, according to new data from Palo Alto’s Unit 42 Read More

Follow this Harness IO tutorial to get started with CI/CD

By Michael Levan 04 Mar 2022

This tutorial gives an overview of the options and features available to users of Harness IO and walks through how to build and ship code in the CI/CD platform. Read More