Remove Authentication Remove Download Remove Linux Remove Resources
article thumbnail

Azure Virtual Machine Tutorial

The Crazy Programmer

Resource group – Here you have to choose a resource group where you want to store the resources related to your virtual machine. Basically resource groups are used to group the resources related to a project. you can think it as a folder containing resources so you can monitor it easily.

Azure 249
article thumbnail

How to make your web application more secure by using Dynamic Application Security Testing (DAST) – PART 2 of Application Security Testing series

Xebia

You can download the source code here: vulnap p. However, nothing stops you from downloading ZAP to use it manually in your own local environment. You can download Docker here. Download or clone the OWASP ZAP source code here. It contains credentials for authentication and the login/logout url. SNAPSHOT.jar.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MicroK8s: Up and Running in Azure

Linux Academy

By now you’ve heard the stories that Microsoft loves Linux and fully embraces the open-source world. Windows Subsystem for Linux (WSL). Contact them via email: linux@microsoft.com. The only requirement is a Linux VM. Cloud sandboxes are included with your Linux Academy subscription. Visual Studio Code.

Azure 143
article thumbnail

Universal API Access from Postgres and SQLite

O'Reilly Media - Ideas

Using a Steampipe Plugin as a Standalone Postgres Foreign Data Wrapper (FDW) Visit Steampipe downloads to find the installer for your OS, and run it to acquire the Postgres FDW distribution of a plugin—in this case, the GitHub plugin. Y/n): Downloading steampipe_postgres_github.pg14.linux_amd64.tar.gz. linux_amd64.tar.gz linux_amd64.tar.gz

article thumbnail

New Lacework report reveals increase in sophisticated cloud attacks

Lacework

Threat actors are refining their techniques to gain illicit access to cloud data and resources. Specifically, compromising Docker sockets and deploying malicious container images, some of which are being downloaded and deployed by thousands of unsuspecting users, ultimately leading to cryptomining infections. View Infographic.

Report 91
article thumbnail

Building Docker images for multiple operating system architectures

CircleCI

For instance, developing an application on Windows and deploying it to Linux and macOS machines involves provisioning and configuring build machines for each of the operating systems and architecture platforms you’re targeting. It shares hardware resources from the host, and can emulate various processor architectures/kernels within the VM.

article thumbnail

Learn Azure by Doing with New Azure Training!

Linux Academy

We’re excited to announce our completely new Azure courses that meet 100% of exam objectives and include Hands-On Labs, Interactive Diagrams, flash cards, study groups, practice exams, downloadable course videos, and more! We Azure, just like Microsoft Linux! Implement authentication. appeared first on Linux Academy Blog.

Azure 80