11%
03.09.2013
. In the Manage Devices
section, all Teradici PCoIP devices on the network are detected and listed automatically (Figure 6).
Figure 6: Simple but functional
11%
17.09.2013
with ssh-agent
; the -l
option lists the currently stored keys. With the Windows MobaXterm SSH client, you can easily enable the SSH agent, for example, in the program settings (Figure 6). The PuTTY Suite
11%
21.05.2014
Stack definitely allows users to collect data on VMs and store the data persistently beyond a restart of the virtual machine. This is where Cinder enters the game (Figure 6): Cinder equips virtual machines
11%
26.10.2012
that the frequently forwarded ports belong to services typically used by malware to infect new systems (Figure 6).
Figure 6: Registered attacks on various ports
11%
12.08.2013
.tool
The output is given in JSON format (Figure 5), so piping it to python -m json.tool
makes the output readable (Figure 6).
Figure 5: Performance data queried
11%
03.02.2012
be sure that the evidence is genuine and has not been injected by a malicious third-party? In this context, the term data provenance [6] becomes extremely meaningful: It covers the origins of the piece
11%
16.07.2019
a “wrapper function” for the library in Python (Listing 6).
Listing 6: Wrapper Function
import ctypes
_sum = ctypes.CDLL('libsum.so')
_sum.sum_function
11%
03.04.2019
) by each thread, you would probably put the parallel region around the outside loop (Table 6); otherwise, the work on each thread is less (fewer loops), and you aren't taking advantage of parallelism
11%
10.04.2015
on other Linux systems such as CentOS or Fedora.
First, you need to grab the JBoss Data Virtualization software [2]. Then, unpack the JAR archive using
java -jar jboss-dv-installer-6.0.0.GA-redhat-4.jar
11%
04.10.2018
requires it. Finally, the all-important group settings allow you to assign individual apps per user (Figure 6).
Figure 6: Adding the group search details