 
      
    | You are here | www.michaelcrump.net | ||
| | | | | ianduffy.ie | |
| | | | | Details how its possible to become an azure Storage account administrator from having root access on a virtual machine | |
| | | | | troubleshootingsql.com | |
| | | | | In the first post of this series, I had talked about the cheat sheet which documents the best practices for storage for SQL Server workloads running on Azure Virtual Machines. In this post, I am going to show how to automate additional checks for your virtual machine and your storage configuration. I am going to... | |
| | | | | jreypo.io | |
| | | | | Since the beginning of the service AKS has been able to use Azure Container Registry, or ACR, to pull the container images used in a deployment initiated either by an engineer or by a CD pipeline. However very recently the team shipped a new tight integration between AKS and ACR. | |
| | | | | blog.adnansiddiqi.me | |
| | | Image Source What Is Application Security? Application security is the practice of protecting computer systems and applications from threats and vulnerabilities. This includes measures to prevent unauthorized access, modification, use, destruction, disruption, or disclosure of an application or its data Application security is important because applications are often the primary targets of cyber attacks. Hackers | ||