Displays executable programs that have been used recently with a count of computers on which they have been used. Software metering must be enabled for this site to view this report. Software 07B - Computers that recently used a specified executable program Displays the computers on which a speci...
Type of database. CorsSettings Cross-Origin Resource Sharing (CORS) settings for the app. Expand table NameTypeDescription allowedOrigins string[] Gets or sets the list of origins that should be allowed to make cross-origin calls (for example: http://example.com:12345). Use "*" to all...
nextLink - the nextLink value to set. Returns: the NetworkSecurityGroupListResult object itself.withValue public NetworkSecurityGroupListResult withValue(List value) Set the value property: A list of NetworkSecurityGroup resources. Parameters: value - the value value to set. Returns: the NetworkSe...
An access list also allows you to prevent unwanted users and traffic. If you set up parameters that dictate which source or destination addresses and which users are allowed to access a network, you can prevent all others from getting inside. You can also categorize the kinds of traffic you ...
Gain insights while your users have full access to their data. (Demo, Source Code) Apache-2.0 Go/Docker Open Web Analytics - Web analytics framework that lets you stay in control of how you instrument and analyze the use of your websites and applications. (Source Code) GPL-2.0 PHP ...
A compiled list of companies who accept responsible disclosure Note Additions are welcome! Append your program to bounties.yaml, then follow the CONTRIBUTING.md guidelines to submit a PR. CompanyRewardsSubmissionNotes .nz Registry 🖃 Submit 0x Project 🖃 Submit 123 Contact Form 🌐 Submit ...
Learn lets learners enroll inindividual coursesin numerous subjects or pursue microcredentials and degrees. It also lets learners sign up for long-term access to courses and connect with other learners. The platform focuses on professional progression and learning, with varying costs for its programs...
Improve crash datacollection, kernel panics, out of memory the Embedded Packet Capture (EPC) feature is enhanced to support increased buffer size, continuous capture, and filtering of multiple MAC addresses in one EPC session. Cisco Catalyst IW9167I Heavy Duty Access Po...
This means that the communication partners can already adapt their interfaces for using the long field although only short material numbers are allowed. For example, the 18 character material number is also communicated via the 40 character field. This is also true if the extended field is used ...
You can ensure that people only sign in to Webex App using accounts from a predefined list of domains. Use a proxy server to intercept requests and limit the domains that are allowed.