18%
28.11.2023
location, use -B <n>; -A <n> does the same thing for lines after the find. You can search compressed text archives with -z -a and a combination of options (Figure 6
18%
28.11.2021
). The import statement brings in the required packages. To create an executable program, line 9 defines the main() function as the entry point. The app.New() method creates a new Fyne instance, and the a
18%
07.06.2019
.97 18 3.902 1.89e-10 ***
s(dayOfYear):as.factor(wday)Friday 12.15 18 3.953 4.59e-11 ***
s(dayOfYear):as.factor(wday)Wednesday 13.85 18 5.314 9.31e-15 ***
s
18%
28.11.2023
):
ssh-keygen -t ed25519 -a 100 -f
ubuntu-sre-id_ed25519 -q -N
2. Copy the SSH public key data on the target server to the authorized_keys file in the $HOME/.ssh directory. You can use the secure copy
18%
01.08.2019
to check the hash reported by your SHA256 checksum tool with the listed checksum to verify that you have indeed downloaded the correct file and it has not been tampered with en route:
$ sha256sum backbox-5.3
18%
05.12.2014
.12.6)
DSM 5.0-4493 Update 5 (Linux 3.2.40)
Thecus OS 5.0 (Linux 3.10.47)
ReadyNAS OS 6.1.9
Price (without disks,EUR incl. VAT)
$350/EUR390
$300/EUR250
$370/EUR430
18%
11.04.2016
toolkit for joomla
UrlToolkit {
ToolkitID = joomla
Match base64_encode[^(]*\([^)]*\) DenyAccess
Match (<|%3C)([^s]*s)+cript.*(>|%3E) DenyAccess
Match GLOBALS(=|\[|\%[0-9A-Z]{0,2}) Deny
18%
10.04.2015
3
04 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
05 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
06 | Source Port
18%
18.06.2014
,658
2.75
5.05
56–112
12,079
3.11
8.16
112–168
27,551
7.10
15.26
168–252
9,819
2.53
17.79
252–365
79
18%
14.11.2013
they are addressed
Which files should be backed up (a FileSet)
The plugin configuration
The before and after jobs (i.e., programs that are started before or after a backup job, e.g., to start and stop