@EU_EDPB published final version of the Guidelines on Accreditation. Inclusion of Annex 1 (version 2.0 of Annex 1 adopted on 4 June 2019 after public consultation) https://t.co/u9qM8uIUSa
14 Jun 2019
@ farbodsaraf: You are not a team because you work together. You are a team because you trust, respect and care for each other. https://t.co/3Bpg743yS8
11 Jun 2019
#HiddenWasp is a new sophisticated #Linux #malware still undetected by the majority of anti-virus solutions. According to the experts at #Intezer, the malware was involved in targeted attacks. Thanks for the info #andyf . https://t.co/ypmX2XBEfH
02 Jun 2019
Group policy files using local or domain passwords (local admin password change, service creation, scheduled tasks creation) store the password in a XML file in the SYSVOL path. The password is encrypted with an AES256 algorithm but is discoverable. Andy shows how to fix it. Thnx https://t.co/N6hYbDM8zR
01 Jun 2019
Proud to be working for https://t.co/98wI88GpGY celebrating the 100 birthday and receiving the predicate #Royal today. Image (C) Province of North Brabant https://t.co/nBq80abqAm
17 May 2019
Business Continuity Management Example: selection process failure preparation.When you look at picture 1, the same decision arguments (Business Impact and Critical Time span) can be seen as in Picture 1 in the article "Business Continuity Management Example: selection process disaster / calamity preparation." These arguments are now applied to the situation that one of the server systems fails at the primary location. Of course you can have other or more decision arguments in your organization.
Picture 1. Example: selection process failure preparation.
VirtualisationWhen you own virtualization technology such as VMware or Hyper-V, this opens additional opportunities for high availability of the server systems. By deploying multiple identical redundant hardware servers, a virtual server can be moved (using VMotion or "Live Migration") to another server with sufficient capacity at an impending failure of a server or hardware maintenance. Since virtualization makes it easy to quickly add virtual server systems, one must ensure that there is enough spare capacity to handle failures.
You may vote your opinion about this article:
Scripts and programming examples disclaimerUnless stated otherwise, the script sources and programming examples provided are copyrighted freeware. You may modify them, as long as a reference to the original code and hyperlink to the source page is included in the modified code and documentation. However, it is not allowed to publish (copies of) scripts and programming examples on your own site, blog, vlog, or distribute them on paper or any other medium, without prior written consent.
Many of the techniques used in these scripts, including but not limited to modifying the registry or system files and settings, impose a risk of rendering the Operating System inoperable and loss of data. Make sure you have verified full backups and the associated restore software available before running any script or programming example. Use these scripts and programming examples entirely at your own risk. All liability claims against the author in relation to material or non-material losses caused by the use, misuse or non-use of the information provided, or the use of incorrect or incomplete information, are excluded. All content is subject to change and provided without obligation.
Generated by WebHalla™ Version 0.1.e.3 : Tuesday 18-6-2019
© Copyright 1995-2019 Johan van Soest