13%
13.02.2017
of around 250MB to Amazon's S3 storage very effectively. A number of successful container technologies have been used extensively in the past, including LXC, Solaris Zones, and FreeBSD jails, to name
13%
10.06.2015
://analyticsacademy.withgoogle.com/course02/assets/html/GoogleAnalyticsAcademy-PlatformPrinciples-Lesson1.2-TextLesson.html
NetFlow Export Datagram Formats: http://www.cisco.com/c/en/us/td/docs/net_mgmt/netflow_collection_engine/5-0-3/user
13%
09.10.2017
volumes that also contain the respective filesystems. The smallest units of a logical volume system are the physical extents (4MB by default), which are comparable to sectors in classical partitioning
13%
30.04.2013
forensic analysis application.
Memory Dumping
Current kernel versions restrict access to the Linux system’s main memory. In the past, you could use two device drivers, /dev/mem
and /dev/kmem
, to read
13%
02.06.2020
is still in transition, so you'll see both product names mentioned throughout this article. Adding to the confusion, Palo Alto Networks offers two similarly named products [2]: the software-as-a-service (SaaS
13%
10.04.2015
with TurnKey Linux
TurnKey Linux version 13.0 has been available since August 2014. All TKL appliances have been based on Debian since version 12.0; whereas previous versions were based on Ubuntu
13%
03.08.2023
Catcher in the Rye', 'J.D. Salinger', '1951-07-16', 15.99),
('To Kill a Mockingbird', 'Harper Lee', '1960-07-11', 12.99),
('Pride and Prejudice', 'Jane Austen', '1813-01-28', 9.99);
At this point
13%
18.02.2018
-bundler ruby-foreman ruby2.3-dev rake
Debian 8 and Ubuntu 14.04 only offer Ruby 2.1 and 2.0 in their repositories, so you need to build Ruby and the required helpers from the source code (Listing 2); however
13%
05.02.2023
and recommendations come in. Examples include:
Microsoft security baselines from the Microsoft Security Compliance Toolkit [4]
SiSyPHuS, a study of system design, logging, hardening, and security features
13%
11.06.2014
application server.
On a system in a stable state, throughput initially is not affected by file operations, but after a certain value (e.g., 16,384MB), performance collapses. As Figure 1 shows