New feature in #Windows10 build 19603:If you have Windows Subsystem for Linux (#WSL) installed and open up File Explorer, you’ll see a familiar face! #Tux You can access your #Linux file system mounted in File Explorer. Read more here https://t.co/VeBMkZIIq4 https://t.co/tcbeI9qDie https://t.co/XdZfNvnIwk
08 Apr 2020
#AbbeyRoad #TheBeatles #Corona edition ;-) #GetBack 1.5 meters (6 feet) Stay safe, stay healthy. https://t.co/jXqy2vgVQv
04 Apr 2020
Great #TheBeatles #Corona parody 'I Gotta Wash My Hands' with valuable lessons. All you need is gloves.... Stay healthy https://t.co/sLPg8YkyXe
01 Apr 2020
SMBGhost (CVE-2020-0796): a new wormable #Windows #SMBv3.1.1 vulnerability. Patch #KB4551762 released after patch Tuesday. Vulnerability affects #Windows10 (versions #1903 and #1909) and #WindowsServer (1903 and 1909) #smb #compression. https://t.co/hjGl0bST9R https://t.co/BKxeX6zq8x
13 Mar 2020
Yes always use your original mains phone charger when you are not at a trusted location. https://t.co/EiFy8eMlls
13 Mar 2020
XCA the Certificate and Key management tool by Christian HohnstädtThis application is intended for creating and managing X.509 certificates, certificate requests, RSA, DSA and EC private keys, Smartcards and CRLs. Everything that is needed for a CA is implemented. All CAs can sign sub-CAs recursively. These certificate chains are shown clearly.
For an easy company-wide use there are customiseable templates that can be used for certificate or request generation.
All cryptographic data is stored in a SQL database. SQLite, MySQL (MariaDB) and PostgreSQL databases are supported.
You may vote your opinion about this article:
Scripts and programming examples disclaimerUnless stated otherwise, the script sources and programming examples provided are copyrighted freeware. You may modify them, as long as a reference to the original code and hyperlink to the source page is included in the modified code and documentation. However, it is not allowed to publish (copies of) scripts and programming examples on your own site, blog, vlog, or distribute them on paper or any other medium, without prior written consent.
Many of the techniques used in these scripts, including but not limited to modifying the registry or system files and settings, impose a risk of rendering the Operating System inoperable and loss of data. Make sure you have verified full backups and the associated restore software available before running any script or programming example. Use these scripts and programming examples entirely at your own risk. All liability claims against the author in relation to material or non-material losses caused by the use, misuse or non-use of the information provided, or the use of incorrect or incomplete information, are excluded. All content is subject to change and provided without obligation.
Generated by WebHalla™ Version 0.1.e.4 : Friday 10-4-2020
© Copyright 1995-2020 ing. Johan P.G. van Soest CIPM