Hi, what do you want to do?
IDG TECHtalk
How an attacker can target phishing attacks
There are a number of ways attackers can exploit public information about your organization's employees. CSO Online's Susan Bradley walks through how an attacker can gain access to your organization's Office 365 accounts and how you can...
IDG TECHtalk
How to set up a Microsoft Azure backup process
Setting up a backup process in Azure is one way to quickly recover from a ransomware attack. Leave a comment below and suggest a topic for a future episode of Windows Security Tips.
IDG TECHtalk
How to audit Windows Task Scheduler to detect attacks
Learn how to prevent attackers from using Task Scheduler to hide and set up tasks to access Windows systems.
Packt
Windows - Start Zookeeper and Kafka
This video demonstrates how to start a Zookeeper server and install Kafka on Windows.
<
br/>
This clip is from the chapter "Starting Kafka" of the series "Apache Kafka Series - Learn Apache Kafka for Beginners".In this section, you...
<
br/>
This clip is from the chapter "Starting Kafka" of the series "Apache Kafka Series - Learn Apache Kafka for Beginners".In this section, you...
Curated Video
Complete Modern C++ - Overview of Debugging in Visual Studio
This video gives a gentle introduction to debugging C++ applications in Visual Studio and explains a few common shortcuts.
r/>
This clip is from the chapter "Basic Language Facilities" of the series "Complete Modern C++".In...
r/>
This clip is from the chapter "Basic Language Facilities" of the series "Complete Modern C++".In...
Curated Video
Comprehensive Android Developer Bootcamp - Running Android Apps on Physical Device - How to
Running Android Apps on Physical Device:Running Android Apps on Physical Device - How to
r/>
This clip is from the chapter "Running Android Apps on Physical Device" of the series "The Comprehensive Android Developer...
r/>
This clip is from the chapter "Running Android Apps on Physical Device" of the series "The Comprehensive Android Developer...
IDG TECHtalk
What’s going on with Nvidia’s Arm acquisition? Plus, Apple silicon in 2022
A recent report from Bloomberg revealed that Nvidia is preparing to abandon its acquisition of Arm. The deal would have made a joint Nvidia-Arm a semiconductor superpower, and as such it was subject to scrutiny from regulators....
Curated Video
Java Programming for Complete Beginners - Java 16 - Step 01 - Installing Java - Windows
In this lesson, we will learn how to install Java for Windows.
r/>
This clip is from the chapter "Installing Java" of the series "Java Programming for Complete Beginners - Java 16".In this section, we will install Java and set...
r/>
This clip is from the chapter "Installing Java" of the series "Java Programming for Complete Beginners - Java 16".In this section, we will install Java and set...
The March of Time
Basic English 1 / vocab verbs
MOT: BASIC ENGLISH: Ranch farm set w/ man & woman on porch [SOT w/ subtitles] using English language phrases related to box: front back sides base cover over on. Males bringing dollhouse onto porch house front door windows over under...
Curated Video
Serverless JavaScript Projects 2.2: Build Your Location AWS Lambda
We need a way to capture the location information from the provided IP address. • Install serverless and AWS CLI • Utilize a function that queries a database for info from IP • Return the geolocation information to the user
Curated Video
Bug Bounty Program Certification 5.2: Find Major Bugs in Server
In this video, we will learn about advance scanning using vulnerability scanner. • Use Nessus network vulnerability scanner • Use advance scan, find bugs in server • Explanation of bug available in server
IDG TECHtalk
Tips for finding signs of SolarWinds-type attacks in Active Directory
The SolarWinds attackers used sophisticated techniques to steal admin credentials. Here’s what to look for in AD.
IDG TECHtalk
Guide to key Windows 10 event logs you need to monitor
These are the event logs that will help you identify malicious activity on your network.
IDG TECHtalk
Top vulnerabilities used in attacks on Windows networks in 2020
COVID has changed tactics that attackers use to compromise Windows networks. These are the vulnerabilities they now favor.
IDG TECHtalk
How to better control access to your Windows network
Take stock of how people and devices access your network and block potential avenues of attack.
APMonitor
Python 🐍 Jupyter, VSCode Install
Jupyter notebook, Jupyter lab, and VSCode are installed to run a 'Hello, World' application in Ubuntu Linux for Python 3.8.
py
thon3 --version
sudo apt install python3
(Linux, apt or...
py
thon3 --version
sudo apt install python3
(Linux, apt or...
Curated Video
The Full Stack Web Development - Installation & Redis-CLI Basics
Redis - The Cache Database: Installation & Redis-CLI Basics
r/>
This clip is from the chapter "Redis - The Cache Database" of the series "The Full Stack Web Development".In this section, we look into Redis – part of other...
r/>
This clip is from the chapter "Redis - The Cache Database" of the series "The Full Stack Web Development".In this section, we look into Redis – part of other...
IDG TECHtalk
WWDC 2021 recap: iPadOS overview, enterprise improvements and unannounced iOS 15 features
Apple announced updates to its operating systems, including iOS, iPadOS and macOS at its annual Worldwide Developer Conference on Monday. iPadOS has new productivity features, but do the updates justify the company's decision to put an...
IDG TECHtalk
How to improve Windows 10 security on PCs that can’t run Windows 11
Most businesses will have some PCs that they can’t update to Windows 11. Here’s how to keep those PCs from being a security weak link.
IDG TECHtalk
Eliminate compromised and weak passwords
A single compromised password allowed attackers access to Colonial Pipeline’s network. Chaos ensued. This advice will help you avoid that fate.
Curated Video
Ansible for the Absolute Beginner - Ansible Inventory
This video focuses on Ansible inventory.<br/<br/>>
This clip is from the chapter "Introduction to Ansible Inventory" of the series "Ansible for the Absolute Beginner - Hands-On – DevOps".This section focuses on Ansible inventory.
This clip is from the chapter "Introduction to Ansible Inventory" of the series "Ansible for the Absolute Beginner - Hands-On – DevOps".This section focuses on Ansible inventory.
Curated Video
Spring Framework Master Class - Java Spring the Modern Way - Step 1-Creating a Java Project
This video demonstrates how to create a Java project.
r/>
This clip is from the chapter "Basic Tools and Framework - Eclipse in 5 steps" of the series "Spring Framework Master Class - Java Spring the Modern Way".This section...
r/>
This clip is from the chapter "Basic Tools and Framework - Eclipse in 5 steps" of the series "Spring Framework Master Class - Java Spring the Modern Way".This section...
Curated Video
Node.js API Masterclass with Express and MongoDB - Digital Ocean Droplet & Server Log In
Documentation & Deploy: Digital Ocean Droplet & Server Log In<br/<br/>>
This clip is from the chapter "Documentation & Deploy" of the series "Node.js API Masterclass with Express and MongoDB".null
This clip is from the chapter "Documentation & Deploy" of the series "Node.js API Masterclass with Express and MongoDB".null
Curated Video
Java Programming for Complete Beginners - Java 16 - Troubleshooting Eclipse - Configuring Java JDK
This video gives an overview of the entire section.
r/>
This clip is from the chapter "Appendix - Troubleshooting Eclipse and Java" of the series "Java Programming for Complete Beginners - Java 16".This section focuses on the...
r/>
This clip is from the chapter "Appendix - Troubleshooting Eclipse and Java" of the series "Java Programming for Complete Beginners - Java 16".This section focuses on the...