I’m looking for a virus scanner (file scanner), that does not share any data with 3rd parties (is local), has a web management interface, has an extensive virus definition database and has support.
ClamAV still seems to be the closest choice, but I haven’t found anything that met the above reqs. Any recommendations?
I have a list of sqlserver on on table on tbl_servers which have 500 server. example:
Select IP_instance, DBname, username, password from tbl_servers which will return the all sql server and their sa credential.
–> 10.10.1.30, myDatabase, sa, password
I would like to add all of this into the Registered server, can this done by SQL scripting? or any faster way to add?
I’m working on my own homebrew rpg system which I want to keep light on rules. Therefore I add only rules when they are needed. One rule which I did not use was an implementation of "initiative".
In combat, everyone’s actions happen at the same time. There is no order imposed by stats, dice rolls, or activity chosen, i.e. no initiative scores or initiative rolls such as in DnD 5e. It is more like melee from Warhammer Fantasy (the strategy game, not the rpg).
I did like the feeling in general during playtest, however management of combat turns was very chaotic, since I could obviously not do all the adjudication at the same time.
My question therefore is: What mechanics, tools, and techniques can I use to facilitate combat adjudication without imposing an order of action? I prefer answers referencing published RPG systems. Nonmechanical concepts should work without the use of online tools / software.
I’m having to connect to a customer’s Microsoft SQL Server. I generally don’t need to do much in databases besides your average SQL, so using the database features in IntelliJ IDEA have so far been more than sufficient for various PostgreSQL and Orcacle databases. In this case though I was given a heads-up that I will have to change my password first, and when I use IDEA to connect with the credentials I received it does indeed reject them and gives me an error message saying I need to change my password. I was also told to use SQL Server Management Studio (SSMS) to do so.
SSMS is only for Windows, I’m running a Mac. The SSMS download page refers to Azure Data Studio for use on a different OS. An initial try of the latter did not let me change the password though. Even if I eventually find a way to do it, is there really no other easier way to do this that doesn’t involve installing another full-blown db tool that I have no intention of using in the long run? Or worst case: buy a windows computer for the sole purpose of installing SSMS so I can change a password? Surely there must be a bunch of Mac- or Linux-using DBA’s that know of a simple command-line tool or alike that allows them to change their password initially on a Microsoft SQL Server, after which they just use their favorite db management tool to access it?
There is this question in my textbook (Operating Systems: Internals and Design Principles by William Stallings):
Write the binary translation of the logical address 0011000000110011 under the following hypothetical memory management schemes, and explain your answer:
a. A paging system with a 512-address page size, using a page table in which the frame number happens to be half of the page number.
b. A segmentation system with a 2K-address maximum segment size, using a segment table in which bases happen to be regularly placed at real addresses: segment# + 20 + offset + 4,096.
I am having trouble with understanding part b. I’m not a native English speaker. Initially, I assumed that “using a segment table in which bases happen to be regularly placed at real addresses” means that the segment number in the logical address is the number of the physical segment, but then I read this “segment# + 20 + offset + 4,096”, and I am not sure what to make of it. So does this mean that the base number in the segment table contains segment# (in the logical address) + 20 + offset (in the logical address) + 4,096?
Despite the continuous effort in our company to resolve vulnerabilities, we are still report a significant number of vulnerabilities after each scan we perform.
We would like to understand if there are industry benchmarks or ratios, like number of vulnerabilities per asset out there that we can use to compare ourselves with.
Is any of you aware of any industry benchmark in this regard?
I love how WordPress.com allows you to “Subscribe” to different blogs and the management interface it offers. Does something similar exists for single blog websites that lets users subscribe to different tags?
My high school has many custom root domains for all of their various sports teams and other clubs. This seems needlessly expensive.
Let’s say I have a single root domain (e.g. example.org) and I want to let the coaches/admins of each team modify only their own subdomains (e.g. Coach Priya can create and manage any kind of records for football.example.org or *.football.example.org, and Coach Marco similarly for swim.example.org etc).
As the manager of the root domain, all I want to do is assign permissions – I shouldn’t need to be involved when teams move from one host to another.
Do any domain registrars support delegating access on the granularity of a subdomain? Would I have to write my subdomain management app and hook it up to a registrar’s API?
I am working on a new project with a team of developers. The SOPA web services will be the main channel to publish the services.
I’d like to make secure those services from the begging and give the developers the guidelines on how to securely develop. I’d like to assign requirements from chapter “Session management verification” of OWASP ASVS 3.0.1 for SOAP web services. But those requirements are specialized for the Web application. So could you advise me which one of them are adequate for SOAP?
My Question is very simple, how to disable the SMM. I know there are some Methodes they are listed here. Ref: https://patents.google.com/patent/US9977682B2/en
But I have found nothing where it is explained in more detail. For Newbies, its not easy to understand. I want to check the behavior of the system without SMM.
I think the best way, would be to turn off SMM via. MSR Write into the Register. If its not Write-Protected. Or MOD the UEFI BIOS. ( Set Bits to the right Location or Removal of SMM Modules/Firmware ? )
Thanks in advance.