13%
22.01.2013
agent. This agent basically consists of an input mask (Figure 3). Each desktop environment can supply its own authentication agent.
Figure 3
13%
19.12.2012
development for several years. In early 2013, the developers from the Institute of Compute Technology (ICT) at the Chinese Academy of Sciences will present the latest development called the Godson-3B
13%
24.06.2013
server (hosting)
Resolving DNS server (caching)
API to provision zones and records
DNSSEC support (as of 3.x)
Web-based management options
DNS data stored in plaintext (BIND compatible
13%
02.07.2014
:
pdsh -w host[1-11]
pdsh -w host[1-4,8-11]
In the first case, pdsh expands the host range to host1, host2, host3, …, host11.
In the second case, it expands the hosts similarly (host1, host2, host3, host
13%
13.12.2011
), and -t
specifies the target directory to download the files.
Now open up a web browser and look at the results of the warnerbros.html
file (see Figure 3
13%
03.02.2012
pointed out as early as 2009 a lack of publications on the cloud security problem and on corresponding legal issues [1]. This paucity of information was confirmed by other publications [2] [3]. Despite this
13%
14.06.2017
example illustrating the change in file size:
$ ls -lsah FS_scan.csv
3.2M -rw-r--r-- 1 laytonjb laytonjb 3.2M 2014-06-09 20:31 FS_scan.csv
$ gzip -9 FS_scan.csv
$ ls -lsah FS_scan.csv.gz
268K
13%
10.10.2022
is installed by default on my Ubuntu 20.04 systems.
Listing 1: logrotate
$ logrotate --version
logrotate 3.14.0
Default mail command: /usr/bin/mail
Default
13%
08.07.2024
Shifter
Apptainer (formerly Singularity)
Sarus
Podman
Docker
Enroot/enroot
Kubernetes
CRI-O, containerd
, Kata
NVIDIA/enroot
, Pyxis
Containers/runc
Fuzzball
K3s
13%
17.02.2015
efficiency, along with simpler management, explains the meteoric rise of Docker [3], LXD [4], OpenStack [5], and other container-based tools: Everything called a "container" is currently very popular