11%
20.06.2022
.4'
02 services:
03 keycloak:
04 container_name: keycloak
05 image: quay.io/keycloak/keycloak:17.0.1
06 ports:
07 - 8080:8080
08 environment:
09 - KEYCLOAK
11%
12.09.2013
CREATE OR REPLACE FUNCTION burncpu (tm INTERVAL)
02 RETURNS INTERVAL AS $CODE$
03 DECLARE
04 stmp TIMESTAMP := now()+tm;
05 i INT;
06 BEGIN
07 WHILE clock_timestamp()09
11%
04.02.2014
.mynet.internal', port '5432');
To create a foreign table, you need to tell the data source which user can log in to the remote PostgreSQL instance and with what combination of role name and password. To do so, you need
11%
09.01.2013
'5432');
To create a foreign table, you need to tell the data source which user can log in to the remote PostgreSQL instance and with what combination of role name and password. To do so, you need a user
11%
04.10.2018
"data_dir": "/var/consul",
08 "datacenter": "Datacenter-A",
09 "disable_update_check": true,
10 "enable_script_checks": true,
11 "enable_syslog": true,
12 "encrypt": "xxxxxxxxxxxxxx
11%
04.08.2020
five-star reviews that look very similar. The problem is so evident on Amazon that customers rub their eyes in amazement wondering why the online giant doesn't intervene.
Graph databases can help
10%
20.02.2012
.51, 0, 0.36, 17.74, 0.00, 6.38, 90, 0
2012-01-09 21:10:00, 92, 4.42, 0, 0.35, 20.81, 0.00, 7.22, 100, 0
2012-01-09 21
10%
14.03.2018
port 22/TCP). The same applies to the external gateway computer. Here, the VPN input can then be limited to the local VPN gateways' static IPs – if available. This does not offer very strong protection
10%
02.02.2021
.
As surely as night follows day, automated attacks will target the default Secure Shell port (TCP port 22), so I will use SSH as the guinea pig test case with the knowledge that I can move the real SSH service
10%
10.06.2015
"} )
09
10 # force called programs to english output
11 LANG=C LC_ALL=C
12
13 function die {
14 echo 1>&2 "$*"
15 exit 10
16 }
17
18 function get_display_resolution {
19 local find_display="$1