if HA cluster has two ESXi hosts and two VMs running over them by VM Anti-affinity rule, if One host goes down then VM will migrate to second ESXi host in HA cluster, or VM will be shutdown with ESXi host same like as does in Must run rule?
If your first item in your table has attributes which have no value, those will not be added to the excel table, even if futures items have that information… meaning the excel table will only have the columns associated to what the first item had values for… any way around this, ie. force include all?
Hi, If the link is hidden behind a generic link, then how can get that accurate link?
example: link resolve by invoke command:
and while resolving in Chrome Browser:
It makes me wonder, where did they get their list of emails and passwords in the first place. Foreign contractors, Microsoft’s Foreign force, disgruntle employees, or the maybe a federal government? I would not give anyone any clues as to the users in my domain. You might as well be saying: “Hi Conner here is a list of my users. Put them in your database, please. And then sell them to your comrades.”
It’s foolware at best but let’s just presume they really do mean good, what happens when they are hacked? And they will be.
Do you know where the site is hosted? What country? Is it on a dedicated colocation server with little security, is it a VM server on a big tech Cloud ready to be copied, or are they simply spammers looking to build an easy spam list? Maybe it’s the MI6 or KGB, the CIA tally whackers, or is it the NWO monkeys. The point is, avoid it like the plague as some @*%$#$^ will eventually hack it one way or the other. Solar winds, and Amazon should be a huge lesson to any IT professional.
If you want security, get off the public clouds, traditionally known as web hosts, and create a secure private cloud with military grade Authentication using 2FA and smartcards at a minimum. Again avoid all big tech companies as much as possible. Big tech is not, and never was, your friend. Specifically after the federal antitrust shakedown that happened before 9/11. I miss my “paid for” relatively secure Windows 7.
I am close to finishing a book with Apress on “Building Secure Private Clouds”. Stay tuned.
Yes! Take it away from them , and do not let it be possible for them to find it.
And, keep a CLOSE watch… on your 13 year old; because it sounds like they have a dark side they don’t want you to know about.
And hiding the computer may lead them to become pilfersome, and later violent, if they cannot find it.
This sounds sketchy. Doesn’t this require you to trust HaveIBeenPwned? One may argue that you didn’t give them the entire hash but if they reply with a match that would be a hash try whether it is a valid match or not.