Search results

From ICO wiki
Jump to navigationJump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...om Microsoft </ref> added the ability for the OS to easily run a selection of native Linux software. ...>, a command line interpreter<ref>[http://linuxcommand.org/] Official site of linux command organization</ref> that is available in many different Linux ...
    6 KB (1,073 words) - 04:47, 7 June 2016
  • - It's a part of the AD module which is a part of RSAT (Remote Server Administration Tools). microsoft.com/en-us/download/det - learn-windows-powershell-3-in-a-month-of-lunches-don-jones-jeffrey-hicks ...
    14 KB (1,863 words) - 22:54, 17 December 2017
  • Logging is the process of keeping a continuous record of an event. The general rule of logging is: Log everything which is not predictable. ...
    10 KB (1,502 words) - 10:04, 13 October 2016
  • Chef is a suite of tools that belong to the desired state configuration tools, and basically f It can be adapted for use for a wide range of infrastructure, and can control such machines as Windows, Linux, Mac OS X a ...
    13 KB (2,093 words) - 02:48, 14 June 2016
  • ...xl2383" width="829">Collection 3201: Developing Microsoft® ASP.NET 2.0 Web Applications</td> <td class="xl2367">Collection 8913: Applications in Microsoft Dynamics® ...
    65 KB (8,025 words) - 20:38, 5 September 2010
  • ...the leading edge of such technologies.Fedora Core 1 was the first version of Fedora and was released on November 6, 2003.If anyone has experience using ...e often not found in other distributions. Here, we document just a portion of the key features that make Fedora stand out above the rest. ...
    15 KB (2,301 words) - 21:50, 8 May 2017
  • ...ional security to the system, rather it can be used to discover violations of security policies used on the system. These violations can further be preve ...tion has been proven to be very useful. The following list summarizes some of the information that Audit can record in its log files<ref name=chapter7 /> ...
    29 KB (4,655 words) - 20:07, 7 April 2017
  • ...sues closely related to their specialties which will result in development of functioning prototype-solution. ...nd year daytime study students, but it is not limited to them. IT students of other higher educational institutions in Estonia as well a neighboring coun ...
    8 KB (1,175 words) - 15:49, 30 March 2012
  • ...commended for rookies. However, the deal with Arch Linux is that it’s free of bloat-wares and uses a very minimalist approach, moreover it pushes to user ...the upstream developed. Arch Linux probably has the best community support of all the linux distros, and the Arch WIKI contains pretty much everything a ...
    20 KB (3,438 words) - 19:55, 8 May 2017
  • Monitoring is the process of keep tracking of system resources. ...observing and checking the progress or quality of something over a period of time; keep under systematic review.<ref>[https://en.wikipedia.org/wiki/Syst ...
    12 KB (1,732 words) - 15:11, 9 January 2018
  • The term 'new media' appeared into various sources about at the turn of the century. Different authors and also different research disciplines have ** Plus: feedback, dialogue, synthesis (of new knowledge) ...
    37 KB (5,820 words) - 21:20, 24 September 2023
  • Monitoring is the process of keep tracking of system resources. ...observing and checking the progress or quality of something over a period of time; keep under systematic review.<ref>[https://en.wikipedia.org/wiki/Syst ...
    13 KB (1,978 words) - 14:33, 31 May 2018
  • Save the repository definition to /etc/apt/sources.list.d/elasticsearch.list ....x/debian stable main" | sudo tee -a /etc/apt/sources.list.d/elasticsearch.list ...
    23 KB (3,421 words) - 11:09, 15 December 2016
  • ...ise ei ole suure-väikse tähe tundlikud, st käsk "LIST DISK" on sama, mis "list disk". Küll aga on suured-väiksed tähed olulised osades käskude parameetrit FS=<FS> Specifies the type of file system. If no file system is given, ...
    31 KB (4,093 words) - 16:53, 24 October 2011
  • YubiKeys are built on state-of-the-art secure elements, molded into plastic with high pressure, making the ...re”. The authentication and encryption features are programmed at the time of shipment to customers. All YubiKeys sold on our web store can be re-program ...
    24 KB (3,901 words) - 13:35, 7 June 2017
  • *Markus Rintamäki, Vaasa University of Applied Sciences *Tomas Lepistö, Vaasa University of Applied Sciences ...
    25 KB (4,062 words) - 14:53, 5 April 2013
  • <code>diskutil list</code> ...cOS\ High\ Sierra.app/Contents/Resources/startosinstall --applicationpath /Applications/Install\ macOS\ High\ Sierra.app --agreetolicense --converttoapfs NO --noin ...
    12 KB (1,575 words) - 22:28, 13 March 2018
  • = A Practical Example: the Story of Linux = ...including [http://www.catb.org/~esr Eric S. Raymond] suggest that the lack of business ...
    25 KB (4,144 words) - 22:25, 17 November 2023
  • [[File:Osint_example.png|thumb|Example of OSINT analysis]] ...goals. For example, this year an emergence of OSINT techniques in tracking of the latest developments in Ukraine war can be observed. ...
    35 KB (5,573 words) - 10:52, 27 April 2022
  • ...ration and security assessment. It is a community project and full of some of the most commonly used security and analysis tools. It runs a desktop envi * 1024 MB of system memory (RAM) ...
    46 KB (7,438 words) - 00:02, 9 May 2017
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)