How to Use Nexus Repository with Maven Deploy [VIDEO]

Most of the time it is fairly difficult for a junior developer to make sense out of things happening behind the scenes. This happened in one of my interactions with a junior ...

Sonatype Nexus Repository 3.20 Installation, Admin Login, and Port Change [VIDEO]

There are often times in agile teams where DevOps is constrained by bandwidth. This tutorial is aimed at developers to help them get things up and running without hassle. This will give ...

Managing Nexus API Using Jenkins X

In my last post, Jenkins X — Managing Jenkins, I talked about how we manage our Jenkins server. This time around, I’ll be looking at the Nexus server and how it too ...

Kubernetes in 10 Seconds

Sonatype’s DJ Schleen (@djschleen) demonstrates Kubernetes in 10 seconds: ...

Top 5 Tomcat Vulnerabilities

Those who spend time monitoring and patching open source projects will be quite aware that Tomcat has some vulnerabilities ...
How to block ads like a pro

How to block ads like a pro

In part one of this series, we had a look at a few reasons why you should block ads on your network and devices. In the second part, we’ll cover a few ...
So you’ve been asked to start a threat intel program

So you’ve been asked to start a threat intel program

What are the bumps in the road you can expect and avoid when setting up a threat intel progarm for your business? Categories: Business How-tos Tags: remediationThreat Intel (Read more...) The post ...
Internet Safety Month: How to manage your child’s online presence

Internet Safety Month: How to manage your child’s online presence

Parents with good intentions may not realize that by sharing photos of their children on social media, they have already created their online presence. The good news is that their online reputation ...
Five easy ways to recognize and dispose of malicious emails

Five easy ways to recognize and dispose of malicious emails

What should you check for to determine if an email is spam or malicious? Here are five red flags to look for—and what to do with those malicious emails when you find ...
Where did the tech support scam blacklist go?

Where did the tech support scam blacklist go?

We've removed our blacklist of recognized tech support scammers from our tech scam support page. Here's what we're doing instead. Categories: How-tos Tags: how toscambaitingtech support scamTSS (Read more...) The post Where ...