Operating Systems
azw3 |eng | 2017-10-22 | Author:Nwabueze Ohia [Ohia, Nwabueze]
Setting Virtual switch to Accept MAC Address change and Forged Transmit, permits Virtual Machines to send frames with an impersonated source MAC address. This allows an intruder to stage malicious ...
( Category:
Operating Systems
April 1,2018 )
azw3 |eng | 2017-07-15 | Author:John R. Hines
Default problem #1: Windows 10 doesn't create a standard user-equivalent identity for you. Windows 10 automatically creates you an admin-equivalent identity. That's good. However, if a bad guy discovers your ...
( Category:
Security & Encryption
April 1,2018 )
epub |eng | 2015-10-08 | Author:Tom Magrini [Magrini, Tom]
By default, the Show in Notification Center option is checked and the 5 most recent notifications will be available in Notification Center. OS X allows you to choose the number ...
( Category:
Internet & Social Media
April 1,2018 )
epub |eng | 2013-11-15 | Author:Tony Northrup [Tony Northrup]
( Category:
Operating Systems
March 31,2018 )
epub, pdf |eng | | Author:James Kent Lewis
In the terminal where script7 was running you will see it has stopped with the word Killed in it. Note, be sure to kill the right process! In the example ...
( Category:
Operating Systems
March 31,2018 )
mobi, epub |eng | 2012-01-04 | Author:Orin Thomas
( Category:
Software
March 30,2018 )
epub |eng | 2018-02-23 | Author:Sébastien Goasguen & Michael Hausenblas
See Also Persistent Volumes documentation Storage Classes documentation 8.6 Dynamically Provisioning Persistent Storage on GKE Problem Rather than manually provisioning persistent volumes with persistent volume claims like in Recipe 8.4, ...
( Category:
Hardware & DIY
March 30,2018 )
epub, pdf |eng | 2016-02-25 | Author:Sreenivas Makam [Makam, Sreenivas]
( Category:
Operating Systems
March 29,2018 )
azw3 |eng | 2016-11-29 | Author:John Savill [Savill, John]
When virtualization is used in an environment, there is often a decision to be made as to whether backups will be taken from the virtualization host of the virtual machines, ...
( Category:
Networking & Cloud Computing
March 29,2018 )
epub, pdf |eng | | Author:Vlad Catrinescu
HiddenFromAddressListsEnabled The HiddenFromAddressListsEnabled parameter specifies whether this recipient is visible in address lists. MailTip The MailTip parameter specifies the custom MailTip text for this recipient. The MailTip is shown to ...
( Category:
Operating Systems
March 27,2018 )
mobi |eng | 0101-01-01 | Author:William R. Stanek [Stanek, William R.]
( Category:
Networking & Cloud Computing
March 27,2018 )
azw3, mobi, epub, pdf |eng | 2016-12-29 | Author:Steve Tale [Tale, Steve]
Take note that the locate command is not installed in some Linux distributions by default. If you want to have this command in your system, pull up the the Add/Remove ...
( Category:
Operating Systems
March 26,2018 )
epub, pdf |eng | 2012-04-30 | Author:Jason Tyler [Tyler, Jason, Verduzco, Will]
Figure 4-3: The ClockworkMod safety screen To complete the action, you navigate to the “Yes” option and then press the selector key. Resetting a Device to Factory Condition The “wipe ...
( Category:
Internet & Social Media
March 24,2018 )
epub |eng | 2014-12-04 | Author:Derek Molloy
Cross‐Compilation Using Eclipse Eclipse is an integrated development environment (IDE) that enables you to manage your code and integrate cross‐compilation tools, debuggers, and other plug‐ins to create a sophisticated development ...
( Category:
Operating Systems
March 20,2018 )
epub, pdf |rus | 2011-03-11 | Author:Thomas, Keir [Thomas, Keir]
Let’s take a closer look at the first in the list—the Desktop folder. The permissions, ownership and group assignment are listed at the beginning of the line and read as ...
( Category:
Operating Systems
March 18,2018 )
Popular ebooks
Hello! Python by Anthony Briggs(9919)Test-Driven iOS Development with Swift 4 by Dominik Hauser(7767)
Filmora Efficient Editing by Alexander Zacharias(5791)
The Infinite Retina by Robert Scoble Irena Cronin(5272)
Learn Wireshark - Fundamentals of Wireshark. by Lisa Bock(3983)
Linux Device Driver Development Cookbook by Rodolfo Giometti(3935)
Edit Like a Pro with iMovie by Regit(3433)
Linux Administration Best Practices by Scott Alan Miller(2858)
Linux Command Line and Shell Scripting Techniques by Vedran Dakic & Jasmin Redzepagic(2836)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(2522)
Mastering PowerShell Scripting - Fourth Edition by Chris Dent(2405)
Docker on Windows by Stoneman Elton(2319)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2315)
Creative Projects for Rust Programmers by Carlo Milanesi(2255)
Hands-On AWS Penetration Testing with Kali Linux by Karl Gilbert(2109)
Hands-On Linux for Architects by Denis Salamanca(2053)
Programming in C (4th Edition) (Developer's Library) by Stephen G. Kochan(2005)
Computers For Seniors For Dummies by Nancy C. Muir(2003)
The Old New Thing by Raymond Chen(1941)
Linux Kernel Debugging by Kaiwan N Billimoria(1762)
