Forms of phishing attacks
In this post, want to give a short overview of common social engineering attacks. We often hear about them or nor more or less about them. ...
In this post, want to give a short overview of common social engineering attacks. We often hear about them or nor more or less about them. ...
This short post demonstrates how use the AZ-cli task in the DevOps pipeline to set the AppSettings of some UI Application that needs to connect to ...
Almost ten years ago, I have started to teach Software Engineering at the Frankfurt University of Applied Sciences. Since 2012 I'm giving two courses there, Software ...
Sometimes you will need the function key to build the function URL of the Azure Function that needs to e to invoked from your code. This ...
The list of all roles in Azure is mostly a kind of hidden detail, that is not explicitelly very often used. For more information about RBAC, ...