Search

Help

Page 8 of 15. Showing 149 results (0.116 seconds)

  1. Setup a Real SSL Certificate for Tomcat

    This page is the form of quick notes and needs to be rewritten as an article. Create Local Certificate In this example we are generating a key called … are usually obtained from the respective Certificate Authority. In a simple scenario, one certificate is returned which authenticates the CA's public key
    www.bonsaiframework.comAug 23, 2011
  2. 6.x WordPress v0.1 - ACLs Fail

    hardened. When the setup steps required using the browser, I use ssh tunnelling to access 80 securely. A writeup of using ssh tunnelling should be added … of the effective problem. Directories seem to be fine though. March 13, 2013 Notice that the mask also changed from rx to rwx. This might be the key. Actually more test
    www.bonsaiframework.comAug 26, 2019
  3. 4.4 Apache and SSL Certificates

    https://helloworld.letsencrypt.org/. SSL Setup (using openssl) Server keys must be generated for the Certificate Signing Request (CSR) http://en.wikipedia.org/wiki/Certificatesigningrequest. Openssl will be used to generate this CSR. Generate Server Private Key There are two options for generating the key, Without Passphrase
    www.bonsaiframework.comJul 17, 2018
  4. You_Exec_-_Keynote_Presentation_-_Infographics-1.pptx

    a script, or walk around the stage, the key thing to remember is to be yourself. Give your own presentation. // Don’t try to imitate someone else Innovative ideas
  5. Basics of Name Resolution and Internal Network Name Resolution

    . For example if the hostname is plex, it can be access as plex.local. Quick Summary The key to understanding how data is transmitted on to the internet and how … request (hostname) Path Browser version Os server Key value pair Port Protocol (ex. http or https) Once the information is received the webserver sends back
    www.bonsaiframework.comNov 09, 2017
  6. Software Picks - Linux

    This list is an attempt to bring about all the nice programs I am used to in my Windows 7 Software PIcks. This list is still relatively sparse as I do not use Linux as my main desktop OS. Gnome Connection Manager http://kuthulu.com/gcm/?module=home&lang= A SSH connection manager similar to Windows Putty Connection
    www.bonsaiframework.comAug 19, 2011
  7. byobu

    .... Basic Commands byobu will start or return to the last screen session. Less Used Commands share ssh session
    www.bonsaiframework.comFeb 11, 2012
  8. Health Check

    Connectivity Basic test to ensure connection works. Make sure to keep this very limited. Key Services Verifies key services are working. Key Integration Points
    www.bonsaiframework.comAug 19, 2016
  9. rsync

    Information' exclude='Temporary Items' exclude='Thumbs.db' Over SSH Protocol rsync .... Rsync over the Internet rsync archive verbose compress delete progress e "ssh c … = Verbose. Using vv will provide additional detail. Additionally more v's may be added. e ssh = Specify remote shell to be ssh. c arcfour = uses the weakest
    www.bonsaiframework.comAug 20, 2022
  10. Oct 2016 Gartner Magic Quadrant for Digital Marketing Analytics.pdf

    adoption by marketing practitioners. As Gartner defines it, digital marketing analytics encompasses five key areas. These areas represent the crucial ways … , influencer marketing, measurement and other key tasks. While much advanced analysis is still done with specialized and opensource tools, commercial products