|
You are here |
cyber-intruder.com | ||
| | | | |
blog.tyang.org
|
|
| | | | | I hope I am not the only one who's struggling with git commands and parsing the results in PowerShell scripts. | |
| | | | |
www.devjev.nl
|
|
| | | | | Learn how to deploy Azure Sentinel to an existing Log Analytics workspace using Bicep for a streamlined and efficient setup. | |
| | | | |
gregorsuttie.com
|
|
| | | | | Deploying a Log Analytics Workspace using Azure Verified Modules (AVM) with Bicep is a streamlined process that leverages the standardized practices of the Azure infrastructure-as-code framework. Here's a concise guide on how to set up your workspace using the AVM project on GitHub: The following is example Bicep code, I will let you create the... | |
| | | | |
newcome.wordpress.com
|
|
| | | I wanted to spin up a Linux development environment to hack on some code that needed epoll. I could have run everything in a Docker container, but I kinda wanted to be in that environment for total hackage. I thought maybe I'd just do it in a Virtualbox instance. Then I didn't want to install... | ||