Popular Website Dashboards to List Your Web Application
Recently, I spent quite a few time to look for an application which can provide me a list for organizing my personal web applications created in the cloud and at…
Learning, Sharing, Creating
Recently, I spent quite a few time to look for an application which can provide me a list for organizing my personal web applications created in the cloud and at…
Acunetix is not just a web vulnerability scanner. With the deployment in a docker environment, just one person with one computer, this complete web application security testing solution can be…
Thycotic SS upgrade could be very simple, but also could be complicated if you are having multiple clustering servers, Database Mirroring configuration and remote DR clustering. In this post, all…
Privilege Manager’s toolset is two-fold. First, Local Security discovers all accounts that exist on endpoints and allows Privilege Manager Administrators to control the exact membership of every local group. This…
Privilege Manager’s dashboard is completely interactive and actionable so you can quickly gain visibility into all your endpoints. You’ll see what your users are doing, and discover what top applications…
This post summarizes the process how to use aaPanel to create your own WordPress website. Verify aaPanel’s information aaPanel has special security entrance for admin portal. If you comes from…
Oracle Cloud Infrastructure Compute service provides console connections that enable a user to remotely troubleshooting malfunctioning instances using: Serial Console Connections VNC Console Connections In this post, I am going…
Windows 11 brings several performance enhancements over the previous-gen Windows 10. It’s sleeker, faster, and more productive. However, many users, especially those who have installed Windows 11 on unsupported devices,…
This post is to show the steps how to use Portainer to create a custom template to launch your WordPress stack if default stack template is not working. WordPress Template…
Oracle’s newly exited ARM can actually have up to 4 cores, 24G memory, 4G bandwidth, and 200G storage instances. But the CPU is an arm architecture, so in actual use,…
What is discovery in Thycotic Secret Server: Discovery finds secrets in an IT environment and imports them into secret server. Secret server is most effective when it covers all privileged…
What is Web Password Filler (WPF)? Help Users log on to their websites by Finding and entering credentials from secret server. Add new secrets to secret server Generating strong passwords…