25%
16.05.2013
-list
+--------------------------------------+-----------+------------------
| id | name | subnets |
+--------------------------------------+-----------+------------------
| 42a99eb6-3de7-4ffb-b34e-6ce622dbdefc | admin-net|928598b5 ... OpenStack workshop, part 3:Gimmicks, extensions, and high availability
25%
30.01.2020
and needs 900MB of storage space (Figure 1). If you have fast Internet access on the system on which you call the fai-diskimage command, the process is also quick. It hardly takes a minute for the finished
25%
25.03.2021
they are checked.
The use of analysis tools such as Mimikatz [3] to grab valid login or session data through the Local Security Authority Subsystem Service (LSASS) are restricted with the rule 9E6C4E1F-7D60-472F
25%
14.11.2013
-persistent-net-generator.rules
openSUSE, Red Hat 6
* /etc/udev/rules.d/70-persistent-net.rules* No net generator rules since 12.3. Instead, the biosdevname package is used to identify the NICs
25%
27.09.2024
Design Document with Views
{
"_id": "_design/queries",
"_rev": "6-856a5c52b1a9f33e136b7f044b14a8e6",
"language": "javascript",
"views": {
"by-timestamp": {
"map": "function (doc) {\n
25%
14.08.2018
25%
07.04.2022
security misconfigurations. I'll showcase how it would be possible for an attacker to use those IAM misconfigurations and create serious hassles.
Big Deal?
AWS IAM [3] lets you manage access to AWS
25%
04.08.2020
], LANDESK [3], Google's G Suite Mobile Management [4], and bitFit [5].
Herd Immunity
One of the most impressive aspects of Netflix's Stethoscope is that, when it displays its findings, it generously
25%
05.03.2014
tool.
Enter GlusterFS (Figures 3 and 4).
Figure 3: Internally, RHSS relies on Gluster software, and you can use many Gluster commands for storage
25%
11.10.2016
, the exact details of these components varies from processor to processor, making CPU utilization comparison difficult.
Current processors can have shared L3 caches across all cores or shared L2 and L1 caches