Your First Docker Container (How to Get Started)Programming
Your First Docker Container (How to Get Started)
068
In this beginner tutorial on Docker. For a new app that needs to be created, you need to set up and setup the Redis software (an in-memory database, NoSQL).
pkgcore.org
5 Reasons Why You Should Learn SQLProgramming
5 Reasons Why You Should Learn SQL
086
As (aspiring) database developers or data scientists, we need a thorough understanding of a company’s goals and direction if data is to be used purposefully.
pkgcore.org
Why is it important to secure your websiteCyber Security
Why is it important to secure your website?
072
Imagine you are on vacation and are not at home for a few weeks. In your absence, someone breaks into your apartment and makes himself at home there.
pkgcore.org
Cross-site scripting with Script GadgetsCyber Security
Cross-site scripting with Script Gadgets
066
Cross-site scripting (XSS) is one of the major problems of the World Wide Web. From the first public documentation in 2000 until today, XSS is one of the
pkgcore.org
steps after a Wordpress hackCyber Security
WordPress Hacked? What to Do? The Most Important Steps
065
Your WordPress site has been blocked – please identify and remove the injected malicious code immediately.” These or similar email notifications
pkgcore.org
Deep LearningMachine Learning
Deep Learning vs. Machine Learning
066
Deep Learning can solve complex problems under the right conditions. Here’s what you need to know about the topic. Deep Learning can be used to solve
pkgcore.org
MitC attacks. Secure Cloud UseCyber Security
MitC attacks. Five Tips for Secure Cloud Use
076
The use of cloud services has long been an integral part of the IT strategy for the majority of companies. The ability to access data anytime, anywhere
pkgcore.org
BadUSB AttacksCyber Security
BadUSB Attacks
086
BadUSB refers to USB devices that can execute malicious commands on a computer using a virtual keyboard, for example. These can be USB devices with modified
pkgcore.org
Data Protection in WordPressCyber Security
Data Protection in WordPress
066
A self-hosted version of WordPress offers the advantage that it can be configured very easily in a data protection-friendly way. With a few simple steps
pkgcore.org
Datalore from JetBrainsMachine Learning
Datalore from JetBrains: A Web Application for Machine Learning
075
In most cases, humans still have to teach machines how to interpret data. With the Datalore web application, the developers at JetBrains want to make this
pkgcore.org