1,278 Results for:url
- Sort by:
Emotet tests new tricks to thwart enhanced security
26 Apr 2022The operators of the Emotet botnet seem to be trying to find a way to get around recent changes made by Microsoft to better protect its users Read More
Manage Kubernetes clusters with PowerShell and kubectl
07 Nov 2022Learn how to use the Kubernetes tool kubectl in PowerShell, including setting up aliasing and tab-completion, parsing JSON output and searching logs with the Select-String cmdlet. Read More
Five ways to fix the 'no persistence.xml file found' error in Eclipse
09 May 2023No persistence.xml file found fix The hardest part about learning Hibernate and JPA 3 is how to get your first project up and running. Some will encounter the dreaded no persistence.xml file found ... Read More
2024 technology predictions around AI, Mojo and blockchain
30 Jan 2024Blockchain, AI, anti-competitive activity and the new programming language Mojo are sure to fill the headlines in 2024. Read More
What makes a good learning management system?
20 Jul 2023HR leaders should ensure their new LMS includes certain features so it benefits employees, managers and HR staff. Learn what makes a good learning management system. Read More
How to setup an Apache reverse proxy server example
17 May 2022Most enterprise architectures use Apache as a reverse proxy, but it is not configured for that by default. In this quick tutorial, we show you how to configure an Apache reverse proxy for backend ... Read More
Researchers see surge in scam websites linked to coronation
02 May 2023Scammers and fraudsters continue to take advantage of large public events, with the coronation of King Charles III no exception Read More
Customer data, encryption key stolen in GoTo breach
24 Jan 2023GoTo's breach update follows the recent disclosure made by GoTo subsidiary LastPass, which similarly lost significant sensitive customer data in a breach last year. Read More
Travel-themed phishing lures spiked this summer
16 Sep 2021As people begin to take holidays again after more than a year of restrictions and lockdowns, opportunist cyber criminals have taken note, according to new data from Palo Alto’s Unit 42 Read More
Follow this Harness IO tutorial to get started with CI/CD
04 Mar 2022This tutorial gives an overview of the options and features available to users of Harness IO and walks through how to build and ship code in the CI/CD platform. Read More