I am currently needing to understand more about the Trusted Foundry Programme this is what I understand so far: it’s a US Department Of Defense (DOD) initiative that verifies the supply chain all the way through for hardware components. I think it’s also aimed at trying to prevent supply chain attacks but I could be wrong on that. Can someone help me with some notes on this please? I did try to do some research on Google to find out more but only found snippts of information. Any notes that anyone would be willing to share would be really appreciated.
Thank you in advance.
A+, Network+, IT Fundamentals
great question! I believe the best approach is to apply a methodology to your troubleshooting and stick with that approach every time. This way it will become second nature
Thanks wes , Believe also to create my self Diagram for troubelschooting metholodgy,,, What do you think about this Idea ?
I will considered this solved by default...
...how do you mark something as solved??? I don't see any such function????
You didn't post this as a question to be solved so no need to mark it solved. But if you do in the future. just click on the topic tools button!
Why didn't the INSERT fail? To some extent, I understand. A subsequent query reveals that attribute values not provided in the INSERT are indeed NOT NULL. But how did that happen?
Take the SalesYTD attribute for example. The query shows a value of 0.00. Is the answer to my above question in the following screenshot?
IT Service Managment
Hi Jo. Perfect, thank you for the reply. That answers my question. I also just happened to find your Webinar session with Yvonne with tips for passing the new ITIL V4 Foundation exam, so I'll be watching that one too once I finish the course. And speaking of "continual improvement" maybe this webinar session should be added or linked to in the ITIL v4 Foundation course list, if it's not already mentioned in one of the later course videos :) as I only stumbled across it by chance.
AWS, Amazon Web Services, Cloud Services
This is certainly something I would be interested in teaching. I have a bunch of Cisco and Google Cloud Platform training to get through, but I will keep this request in mind and bring it up in our course planning discussions here. Security and cloud are "so hot right now". :-)
Topics surrounding to VMware vSphere and related products
GNU/Linux, Ubuntu, Red Hat and others
I knew the Wu-Tang Clan were some of the greatest musicians the world had ever seen, but I had no idea they were Linux proficient as well :)
That being said, Wu-Tang is absolutely right. The chroot command pre-dates jails by over a decade and was originally designed to manage remote shells and FTP sessions. Users would connect and be presented with their home directory as the root of the file system. The original implementations weren't terribly secure and there were a number of ways to escape out into the rest of the file system through commands that weren't bounded by the false root. The newer chroot jails are designed to be actual security tools with protections to prevent escaping the jail, even through the use of commands unaware of the jail.
So, think of it this way: Use the chroot command when you just want to alias a directory to "/" but use chroot jails when you want to securely restrict an application environment.
Let me know if there is anything else I can help with.
Don "Bring da Ruckus" Pezet