Search

You can find the results of your search below.

Matching pagenames:

Fulltext results:

The Hidden Dangers in Your Email: File Types to Avoid for Cybersecurity @en:blog:2023:12:12
8 Hits, Last modified:
ngers in Your Email: File Types to Avoid for Cybersecurity ====== **Author(s)**: Louis Ouellet ---- Emai... iles, once opened, can compromise your computer's security and integrity. Therefore, it's vital to recogn... ay contain malicious content or be used to bypass security. * **HTML Files (.htm, .html)**: Can contain... update your operating system and software to fix security loopholes. * Disable macros in Office docume
Let's Talk - Building a Modular PHP Framework part 3 @en:blog:2025:02:03
6 Hits, Last modified:
undwork set up in the previous parts, focusing on security (CSRF), setting up API routes, and more advanc... ss-Site Request Forgery (CSRF)** is a type of web security vulnerability that allows an attacker to trick... samesite', 'Strict'); ini_set('session.cookie_secure', 'On'); session_start(); } </code> Then we... in our PHP framework: * **CSRF Protection** to secure your application from malicious form submissions
How to Install Remote Desktop Services on Windows Server 2022 @en:blog:2024:11:27
4 Hits, Last modified:
RDS on Windows Server 2022 provides a robust and secure environment for remote work and collaboration. I... onal: Configure Remote Desktop Gateway ===== For secure remote access over the internet, consider settin... Ensure the server has a valid SSL certificate for secure connections. </block> <block round tip > ===== ... lities. By following this guide, you can set up a secure and scalable RDS environment, whether for applic
How to Publish a Remote Application using Windows Server RDS @en:blog:2024:11:29
4 Hits, Last modified:
application management while providing users with secure and efficient access to their work tools. With R... select ''Windows Defender Firewall with Advanced Security''. {{ :en:blog:2024:11:29:screenshot_2024-11-2... - In the Windows Defender Firewall with Advanced Security window, click on ''Inbound Rules''. - Scroll... ize application management and provide users with secure and efficient access to their work tools. Whethe
About @en
3 Hits, Last modified:
2. I chose to study in network administration and security because I didn't have much knowledge of this a... at CDI College (AEC - Network Administration and Security) * Obtained my AEC diploma in Network Administration and Security in 2018 * Worked at OVH from 2017 to 2019
Les Dangers Cachés dans Vos Emails : Types de Fichiers à Éviter pour la Cybersécurité @fr:blog:2023:12:12
3 Hits, Last modified:
isez votre cybersécurité. ===== Tags ===== {{tag>securite cyber-securite securite_email malware phishing}} ~~socialite:icon twitter facebook linkedin reddit telegram email ~
Security @en:blog:security
2 Hits, Last modified:
~~NOTOC~~ ~~NOCACHE~~ ====== Security ====== {{tagtopic>security&firstseconly&nolink&readmore&nolinkbacks}} ~~DISCUSSION:off~~
Fixing CrowdStrike Issue on Windows @en:blog:2024:07:23
2 Hits, Last modified:
n normal mode ===== Tags ===== {{tag> "windows" "security" "cyber-security" "crowdstrike" "outage" "kernel"}} ~~socialite:icon twitter facebook linkedin reddit
How to Build a Simple Ticketing System in DokuWiki @en:blog:2024:10:08
2 Hits, Last modified:
of the content, such as buttons and boxes. ===== Security Considerations ===== It's important to set up proper **Access Control Lists (ACL)** to secure the ticketing system. You want the ticket creati
Formatting Syntax @wiki
1 Hits, Last modified:
hare|this]] are recognized, too. Notes: * For security reasons direct browsing of windows shares only
Sécurité @fr:blog:security
1 Hits, Last modified:
C~~ ~~NOCACHE~~ ====== Sécurité ====== {{tagtopic>securite&firstseconly&nolink&readmore&nolinkbacks}} ~~D
Setup as a Thin-Client @en:projects:pyrdpconnect:documentation
1 Hits, Last modified:
setup.sh -o setup.sh bash setup.sh </code> ===== Security Considerations ===== Running scripts directly
How to prevent user from signing into a Microsoft Account on Windows 11 @en:blog:2024:01:31
1 Hits, Last modified:
ministrator needs to restrict this capability for security or policy compliance. Whether you're managing
How to Check a Hard Drive Health from the Command-Line @en:blog:2024:02:01
1 Hits, Last modified:
is an essential part of maintaining a stable and secure Linux environment. ===== Tags ===== {{tag>"linu
Resolving Taskbar Freezing Issues: A Comprehensive Guide @en:blog:2024:02:16
1 Hits, Last modified:
: - Take ownership via the ''Properties'' > ''Security'' > ''Advanced'' menu, - Then rename them
Wrap @en:projects:writr:documentation:03:01:wrap
1 Hits, Last modified: