• Links
  • Lists
  • Tags
  • Login

Links

Add
Oldest Newest URL A-Z URL Z-A Title A-Z Title Z-A Random
Two New Documents to Help You Navigate Australian Prudential Regulation Aut
https://aws.amazon.com/blogs/security/two-new-documents-to-help-you-navigate-australian-prudential-regulation-authority-apra-requirements/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=APRAdocuments&sc_category=AWS_Identity_and_Access_Management&linkId=46752971
 
amazon aws process security
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Locally developing Kubernetes services (without waiting for a deploy)
https://hackernoon.com/locally-developing-kubernetes-services-without-waiting-for-a-deploy-f63995de7b99
At <a href="https://www.datawire.io" target="_blank">Datawire</a>, all of our cloud services are developed and deployed on Kubernetes. When we started developing services, we noticed that getting code changes into Kubernetes was a fairly tedious process. Typically, we had to:
 
development k8s
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Find Training | AWS Training & Certification
https://www.aws.training/training/?sc_channel=sm&sc_campaign=Launch_Campaign&sc_publisher=TWITTER&sc_country=Global&sc_geo=EMEA&sc_outcome=adoption&trk=_TWITTER&sc_content=AWSTrainCert&linkId=46714283
 
amazon training
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Analyze Database Audit Logs for Security and Compliance Using Amazon Redshi
https://aws.amazon.com/blogs/big-data/analyze-database-audit-logs-for-security-and-compliance-using-amazon-redshift-spectrum/?sc_channel=sm&sc_campaign=Big_Data_Blog&sc_publisher=TWITTER&sc_country=Global&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=redshift-spectrum-blog-db-audit-logs-03&sc_category=Amazon_Redshift&linkId=46689077
In this post, we'll demonstrate querying the Amazon Redshift audit data logged in S3 to provide answers to common use cases described preceding.
 
amazon aws security
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
The Top 20 Most Viewed AWS IAM Documentation Pages in 2017 | AWS Security B
https://aws.amazon.com/blogs/security/the-top-20-most-viewed-aws-iam-documentation-pages-in-2017/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=top20awsiamdocpagesin2017&sc_category=AWS_Identity_and_Access_Management&linkId=46619339
The following 20 pages were the most viewed AWS Identity and Access Management (IAM) documentation pages in 2017. I have included a brief description with each link to explain what each page covers. Use this list to see what other AWS customers have been viewing and perhaps to pique your own interest in a topic you’ve […]
 
amazon aws process security
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
The Top 10 Most Downloaded AWS Security and Compliance Documents in 2017 |
https://aws.amazon.com/blogs/security/the-top-10-most-downloaded-aws-security-and-compliance-documents-in-2017/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=top10downloadeds&cdocuments2017&sc_category=AWS_Identity_and_Access_Management&linkId=46616500
July 24, 2020: The number 9 item in this list, the Auditing Security Checklist, has been replaced by a Cloud Audit Academy course. The following list includes the ten most downloaded AWS security and compliance documents in 2017. Using this list, you can learn about what other AWS customers found most interesting about security and […]
 
amazon aws process security
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Git pretty — justin hileman dot info
http://justinhileman.info/article/git-pretty/?utm_content=buffer1e7c3&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
 
development git programming revision
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Darktable 2.4.0 released
https://www.darktable.org/2017/12/darktable-240-released/
 
photography
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
netstat without netstat · Staaldraad
https://staaldraad.github.io/2017/12/20/netstat-without-netstat/
Recently I was doing an assessment in a locked down and restricted environment. One of the first actions you tend to do when landing a shell on a [linux] box is to do some reconnaissance. This is both on host and network, as you want to determine what new access this host has given you. Normally you would run netstat, ifconfig, ip route etc to determine if the compromised host is connected to any other hosts and to determine if there are other network segments you do not know about.
 
containers docker networking
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://www.gitplex.com
https://www.gitplex.com
 
development
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://t.co/mr7IVRkUAX
https://t.co/mr7IVRkUAX
 
amazon
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Massive Satori botnet emerges - Security - CRN Australia
https://www.crn.com.au/news/massive-satori-botnet-emerges-479522
 
iot security
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
18 Great Scifi Movies You May Have Missed In 2017 (But Shouldn't Have) | Gi
https://www.gizmodo.com.au/2017/12/20-great-scifi-movies-you-may-have-missed-in-2017-but-shouldnt-have/
Dive into cutting-edge tech, reviews and the latest trends with the expert team at Gizmodo. Your ultimate source for all things tech.
 
movies sci fi
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
kubectl Cheat Sheet - Kubernetes
https://kubernetes.io/docs/reference/kubectl/cheatsheet/
 
cheatsheet k8s
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://aws.amazon.com/blogs/security/how-to-encrypt-and-decrypt-your-data-with-the-aws-encryption-cli/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=awsencryptioncli&sc_category=AWS_Identity_and_Access_Management&linkId=44937334
https://aws.amazon.com/blogs/security/how-to-encrypt-and-decrypt-your-data-with-the-aws-encryption-cli/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=awsencryptioncli&sc_category=AWS_Identity_and_Access_Management&linkId=44937334
August 31, 2021: AWS KMS is replacing the term customer master key (CMK) with AWS KMS key and KMS key. The concept has not changed. To prevent breaking changes, AWS KMS is keeping some variations of this term. More info You can now encrypt and decrypt your data at the command line and in scripts—no […]
 
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://stelligent.com/2017/11/16/codepipeline-dashboard/
https://stelligent.com/2017/11/16/codepipeline-dashboard/
Simple dashboard built for viewing pipeline metrics in AWS. Built using CloudWatch dashboards and metrics populated from CloudWatch events that CodePipeline triggers. Read more...
 
aws cicd dashboard g6 pipelines
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
cv-template (responsive)
https://codepen.io/erictreacy/pen/EbWmbY?css-preprocessor=scss
 
css development web
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://blog.cryptoaustralia.org.au/2017/11/15/favourite-block-lists-cryptoaustralia/
https://blog.cryptoaustralia.org.au/2017/11/15/favourite-block-lists-cryptoaustralia/
 
malware privacy security
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://dzone.com/articles/3-steps-to-becoming-an-aws-security-specialist
https://dzone.com/articles/3-steps-to-becoming-an-aws-security-specialist
 
amazon aws security training
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
How to Get Rid of Ransomware at No Cost - Spiceworks
https://community.spiceworks.com/topic/2080067-how-to-get-rid-of-ransomware-at-no-cost
Ransomware is one of the biggest scourges we face as Internet citizens today. What happens when you have been struck by it? The most obvious option would be to pay the ransom. You would not be alone if you did – even lar…
 
file serve powershell ransomware security server windows
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Pretzel: email encryption and provider-supplied functions are compatible –
https://blog.acolyer.org/2017/10/10/pretzel-email-encryption-and-provider-supplied-functions-are-compatible/amp/
 
email encryption security
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Security.txt
https://securitytxt.org/
A proposed standard that allows websites to define security policies.
 
documentation security
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
500 Free Online Programming & Computer Science Courses You Can Start in Sep
https://medium.freecodecamp.org/450-free-online-programming-computer-science-courses-you-can-start-in-september-59712e77635c
By Dhawal Shah Five years ago, universities like MIT and Stanford first opened up free online courses to the public. Today, more than 700 schools around the world have created thousands of free online courses. I’ve compiled this list of 500 such free...
 
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://blog.summercat.com/configuring-mixed-dpi-monitors-with-xrandr.html
https://blog.summercat.com/configuring-mixed-dpi-monitors-with-xrandr.html
I use xrandr to configure a dual monitor setup with a high DPI and low DPI monitor on Linux. I also use it to switch back and forth between a dual monitor and a single monitor setup.
 
display dpi linux
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
  • ‹
  • 1
  • 2
  • ...
  • 36
  • 37
  • 38
  • ...
  • 41
  • 42
  • ›
Linkace is a project by Kovah.de | PGMac . Net . AU | PGLinks