Topics that don't fit in to the other categories
Trusted Foundry Programme

Hi All,

I am currently needing to understand more about the Trusted Foundry Programme this is what I understand so far: it’s a US Department Of Defense (DOD) initiative that verifies the supply chain all the way through for hardware components. I think it’s also aimed at trying to prevent supply chain attacks but I could be wrong on that. Can someone help me with some notes on this please? I did try to do some research on Google to find out more but only found snippts of information. Any notes that anyone would be willing to share would be really appreciated.

Thank you in advance.

read more

A+, Network+, IT Fundamentals

hi team what is the best way to become good Troubelschooter and have you any racommandation about some episode with practise to Unterstand the concept

@wes-bryan said in hi team what is the best way to become good Troubelschooter and have you any racommandation about some episode with practise to Unterstand the concept:

great question! I believe the best approach is to apply a methodology to your troubleshooting and stick with that approach every time. This way it will become second nature

Thanks wes , Believe also to create my self Diagram for troubelschooting metholodgy,,, What do you think about this Idea ?

read more
CCENT, CCNA Routing & Switching, CCNA Security
CISCO VPN connection problem

@WU-TANG said in CISCO VPN connection problem:

I will considered this solved by default... do you mark something as solved??? I don't see any such function????

You didn't post this as a question to be solved so no need to mark it solved. But if you do in the future. just click on the topic tools button!

read more
MTA, MCSA Windows 8, MCSE Windows Server 2012
INSERT worked despite NOT NULL constraints
INSERT INTO Sales.SalesTerritory ( [NAME], CountryRegionCode, [Group]) VALUES ( 'Pacific Islands', 'US', 'North America');

Why didn't the INSERT fail? To some extent, I understand. A subsequent query reveals that attribute values not provided in the INSERT are indeed NOT NULL. But how did that happen?

Take the SalesYTD attribute for example. The query shows a value of 0.00. Is the answer to my above question in the following screenshot?

read more
Security+, CASP, CEH, SSCP and CISSP

I've moved this topic to the security section of our forums.

read more
i tune and ICLOUD

Hey @Abdullah-khalaf great question, here is a reference link from Apple support that might be of use. It compares the difference between the two Apple-based platforms:

read more

IT Service Managment

ITIL V4 course and certification

Hi Jo. Perfect, thank you for the reply. That answers my question. I also just happened to find your Webinar session with Yvonne with tips for passing the new ITIL V4 Foundation exam, so I'll be watching that one too once I finish the course. And speaking of "continual improvement" maybe this webinar session should be added or linked to in the ITIL v4 Foundation course list, if it's not already mentioned in one of the later course videos :) as I only stumbled across it by chance.

read more

AWS, Amazon Web Services, Cloud Services

AWS Certified Security - Specialty

This is certainly something I would be interested in teaching. I have a bunch of Cisco and Google Cloud Platform training to get through, but I will keep this request in mind and bring it up in our course planning discussions here. Security and cloud are "so hot right now". :-)

read more

Topics related to Microsoft Azure

Windows 10 Start Menu

Thank you Mike. I have enjoyed your InTune videos.

read more

Topics surrounding to VMware vSphere and related products

vcp 6.7 course

@Engin-Altug ,

I definitely do cover these items in the show, and If you look at the picture. I have highlighted the areas to look at.

If you have any other questions as you continue through the show, please let me know.



read more

GNU/Linux, Ubuntu, Red Hat and others

Difference between setting up chroot jail and chroot command?

I knew the Wu-Tang Clan were some of the greatest musicians the world had ever seen, but I had no idea they were Linux proficient as well :)

That being said, Wu-Tang is absolutely right. The chroot command pre-dates jails by over a decade and was originally designed to manage remote shells and FTP sessions. Users would connect and be presented with their home directory as the root of the file system. The original implementations weren't terribly secure and there were a number of ways to escape out into the rest of the file system through commands that weren't bounded by the false root. The newer chroot jails are designed to be actual security tools with protections to prevent escaping the jail, even through the use of commands unaware of the jail.

So, think of it this way: Use the chroot command when you just want to alias a directory to "/" but use chroot jails when you want to securely restrict an application environment.

Let me know if there is anything else I can help with.

Don "Bring da Ruckus" Pezet

read more