Advanced Search
Search Results
84 total results found
Introduction & Concepts
What's New in Domain 8? 8.2 Identify and Apply Security Controls in Software Development Ecosystems Programming Concepts: Programming languages Libraries Tool sets Integrated Development Environment (IDE) Runtime Code repositories Continuous Int...
Database Concepts and Threats
RDBMS Architecture Tables (relations): Comprises multiple attributes or fields. Each attribute corresponds to a column in the table. Rows (records/tuples): A singular data record in a table. Each row, representing a specific item data, holds varying data but...
Machine Learning and Artificial Intelligence
Introduction to Machine Learning Machine Learning Techniques Focus on algorithmically discovering knowledge from datasets. Aids in deriving insights and patterns from vast data. Expert Systems Comprises two main components: Knowledge Base: Conta...
Software Development Concepts
SDLC Phase Steps Phase Name Description Mnemonic ⬇️ Requirements and Analysis In this phase, the needs of potential users are understood and analyzed to produce a requirements specification. Real ⬇️ Design This phase involves creating...
Software Security and Threats
Change, Configuration, and Testing Change and Configuration Management Provides an organized framework. Enables cost/benefit analysis. Request Control - Enables users to request modifications. Change Control - Used to recreate and analyze situations...
Systems Security Concepts
Protection Rings: Protection rings structure privilege levels in a hierarchical manner, typically visualized as concentric rings. The innermost ring (Ring 0) has the most privileges, and as you move outward, privileges decrease. Ring 0 (Kernel Mode): The...
Types of Attacks
In the realm of cybersecurity, we often encounter various types of attacks. We'll dig deeper into each of these attacks, providing a detailed breakdown of their mechanisms. But for now, let's look at the most comprehensive attacks, and explore other complex at...
Types of Law
Type of Law Standard Description Criminal Law Beyond a reasonable doubt Contains prohibitions against actions like murder, assault, and robbery. Can lead to jailtime. Civil Law Preponderance of evidence Addresses contractual disputes...
Identity, Access Management
Key Term Description Examples Subject Active participant that requests access. Users, processes, organizations. Object Passive participant that responds to an access request. Files, printers, users, processes, orgs. Access Relat...
Exam 2
1, add if you have time 10. The separation of network infrastructure from the control layer, combined with the ability to centrally program a network design in a vendor-neutral, standards-based implementation, is an example of what important concept? A. ...
GitLab: Migrate YH CE to BM EE
Overview This guide covers migrating a GitLab instance from Yunohost to a standalone server, including: Data migration from Yunohost User migration from LDAP to local authentication Upgrade from Community Edition (CE) to Enterprise Edition (EE) 1. Create and...
PVE: NVIDIA GPU Passthrough
This guide walks you through creating a Linux VM in Proxmox (with GPU pass-through or related capabilities) and installing the NVIDIA driver on both Arch Linux and Debian (Bookworm). 1. Proxmox VM Configuration Locate and edit the VM configuration file: /et...
PVE: Custom VLANs
This guide presents two methods for setting up VLANs in Proxmox and configuring a UniFi switch to work with them. Prerequisites Proxmox VE installed Root access to the Proxmox host UniFi Network Controller access Network interface(s) available for configurati...
PBS: Backup Strategy
3-2-1 Backup Setup In this example, we are backing up a ZFS pool RAID 1 consisting of two 2TB Samsung 990 EVO PRO SSDs. The goal is to implement the 3-2-1 backup strategy: three copies of your data on two different media, with one copy offsite. This setup is d...
1: 声母: "J Q X" and "Zh Ch Sh"
声母 (shēngmǔ): "J Q X" and "Zh Ch Sh" Tones in Mandarin Each syllable in Mandarin has a tone, which can completely change its meaning: Tone Mark Example Different Meanings 1st (High) ā mā 妈 (mother) 2nd (Rising) á má 麻 (hemp) 3rd (Low-dipping) ǎ mǎ 马...
2: 韵母: i, u, ü
Basic Finals and Common Phrases Final Description Tips i Similar to "ee" Keep tongue high and forward u Like "oo" Round lips ü Like German "ü" Say "ee" and round lips Note: ü is sometimes written as u with dots (ü) or as 'v' in some texts Importa...
3. Pronouns and Their Forms
Pronouns and Their Forms Base With 们 (Plural) With 的 (Possession) Notes 我 (wǒ) - I/me 我们 (wǒmen) - we/us 我的 (wǒ de) - my/mine 你 (nǐ) - you 你们 (nǐmen) - you all 你的 (nǐ de) - your/yours 他 (tā) - he 他们 (tāmen) - they 他的 (tā de) - his 她 (tā) - she ...
4. Family Members & "是" (To Be)
New Vocabulary Character Pinyin Literal Character Meaning English Usage 是 shì be am/is/are 弟弟 dìdi younger + younger younger brother 哥哥 gēge older + older older brother 谁 shéi who who 绿 lǜ green green 吕 lǚ (surname) surname Lü Possessive Ph...
5. Key Grammar Elements
Character Pinyin Function Usage 是 shì to be Links subject with identity/description 的 de possessive marker Shows ownership/relationship 叫 jiào to be called/named Used specifically for names Family Relationships & Introductions Chinese Pinyin L...
GitLab Pages: Cloudflared
Below is a minimal example of how to configure a self-hosted GitLab instance to serve GitLab Pages behind Cloudflared. This guide walks through: Setting the GitLab Pages config on your self-hosted instance. Creating a Cloudflared configuration to route traf...