Install BT (aaPanel) in Oracle ARM-based Virtual Instance with Oracle Linux 8
Oracle’s newly exited ARM can actually have up to 4 cores, 24G memory, 4G bandwidth, and 200G storage instances. But the CPU is an arm architecture, so in actual use,…
Learning, Sharing, Creating
Oracle’s newly exited ARM can actually have up to 4 cores, 24G memory, 4G bandwidth, and 200G storage instances. But the CPU is an arm architecture, so in actual use,…
What is discovery in Thycotic Secret Server: Discovery finds secrets in an IT environment and imports them into secret server. Secret server is most effective when it covers all privileged…
What is Web Password Filler (WPF)? Help Users log on to their websites by Finding and entering credentials from secret server. Add new secrets to secret server Generating strong passwords…
What is Connection Manager: Launch ad-hoc connections to manage sessions with remote resources Supports RDP and SSH Makes the management of multiple active session is easy Use as a stand-alone…
AutoIT is basically a way of automating stuff in the windows GUI and has lots of uses. Here is an working launcher and example script for SSMS with SQL Authentication…
One of my projects is going to use AutoIt script to launch client application on Windows machine. It will usually require to auto-fill in some information on popped up windows.…
Why do we need time tracking software? Because it is tough to track the working time of employees who work from home, especially during this COVID-19 epidemic. Usually, medium to…
ARM is a RISC architecture. RISC stands for Reduced Instruction Set Computing. This means that the CPU has a limited number of instructions it can use. As a result, each…
This post is a quick sum up how to get GNS3 VM running in your VMWare environment. A basic GRE tunnel lab has been created for demonstrating the configuration. Download…
Product Thycotic’s DevOps Secrets Vault is a high velocity vault that centralizes secrets management, enforces access, and provides automated logging trails. This cloud-based solution is platform agnostic and designed to…
This is the second post regarding basic configuration of Raspberry Pi 2. Raspberry Pi 2 Model B Basic Configuration 1 Raspberry Pi 2 Model B Basic Configuration 2 Table of…
All interaction between the SSC tenant and your on premises network uses our distributed engine service to communicate. The work tasks that distributed engine completes includes Active Directory authentication, password…