28%
20.05.2014
LAN_IF=eth0
DMZ_IF=eth2
LAN_NET=2001:db8:1::/64
DMZ_NET=2001:db8:2::/64
Next, completely reset the firewall rules to delete any previously existing rules. You can use the -F option for this. You also
28%
04.08.2020
. For example, reviewer 8 rated products 2 and 5, and reviewer 4 rated products 2 and 4, both receiving only 0.5 on the similarity scale because their behavior was less suspicious.
In the Thick of It
The best
28%
07.06.2019
--retry 3 --retry-delay 0 --retry-max-time 60 ${JENKINS_UC}/jenkins.war -o ${JENKINS_HOME}/jenkins.war
30 RUN for P in ${PLUGINS}; do curl -sSfL --connect-timeout 20 --retry 2 --retry-delay 0 --retry
28%
14.11.2013
. These flows are assigned a priority and an action. A simple OpenFlow rule looks like this:
match="dl_type=ip, nw_type=tcp,tp_dst_port=80", action="output=2",priority="10"
This rule states that all IP packets
28%
30.01.2024
, which Apt relies on to ensure that the packets come from a reliable source (line 2); add the package sources for Docker to the local list of package directories (line 3); and update the local package
28%
03.04.2024
af09e029fdab27858'
/* - Compute hash H2 and MD5 hash H3 from it */
LET H2 = SELECT hash(path=FullPath).MD5 AS Hash FROM glob(globs=Datei)
LET H3 = H2[0].Hash
/* - Compare the hash values and log
28%
01.06.2024
-NlbCluster -InterfaceName "Vlan-3" -ClusterPrimaryIP 10.0.0.1 -ClusterName "Cluster001"
This command creates an NLB cluster named Cluster001 with the primary IP address 10.0.0.1. The -InterfaceName option specifies
28%
03.08.2023
. However, you can set up test clusters specifically for management and API tests in a far easier and cheaper way. The suitable tool comes from the Kubernetes makers themselves and is named kind [2
28%
03.02.2022
-name="Martin Loschwitz" --uid=2000 --image-path=/dev/disk/by-id/usb-SanDisk_Ultra_4C530000060908106243-0:0 --fido2-device=auto
The user created in this way has a personal directory on a USB stick and logs ... The systemd Homed service makes it easy to move your home directory, and FIDO2 or PKCS#11 can secure the stored files.
28%
12.09.2013
]. I looked at how the cluster takes care of internal redundancy of stored objects, what possibilities exist besides Ceph for accessing the data in the object store, and how to avoid pitfalls [2]. I also