29%
09.10.2017
] image designed to run on the Raspberry Pi 3 microcomputer and the Odroid XU4/4Q – so far. NEMS was developed by Robbie Ferguson [3] to be a nearly turnkey package; that is, the majority of the work ... Nagios on a Rasp Pi 3 with NEMS
29%
20.04.2022
very useful metadata.
In the Linux kernel, names can be a maximum of 255 bytes and the value can be up to 65,536 bytes (64KiB). XFS and ReiserFS allow these limits; however, ext3/4 and Btrfs impose
29%
11.06.2014
/joe/.ssh/google_compute_engine -A -p 22 joe@1.2.3.4 --
11 Warning: Permanently added '1.2.3.4' (ECDSA) to the list of known hosts.
12 Enter passphrase for key '/home/joe/.ssh/google_compute_engine':
13 Linux gcerocks-instance-1 3
29%
06.10.2022
, as in this code fragment, which implements and calls a multiply function:
package function
multiply(a,b) = m {
m := a*b
}
result1 = r {
r := multiply(3,4)
}
result2 = r {
r := multiply(3,9)
}
The Rego
29%
14.03.2013
wrote this article I have started running test applications as Platform-as-a-Service apps in OpenShift [3]. OpenShift now also has a cartridge that lets you install MongoDB as an add-on. If you
29%
09.12.2021
#
, where #
is the number of threads and a space falls between it and the switch (Listing 3).
Listing 3: lbzip2
$ lbzip2 -v -n 4 package-list.txt
lbzip2: compressing
29%
16.05.2013
a9a6615fb5c045693 |
root@alice:~# quantum port-list
+--------------------------------------+------+-------------------+
| 0c478fa6-c12c-... | | fa:16:3e:29 ... OpenStack workshop, part 3:Gimmicks, extensions, and high availability
29%
20.08.2012
examplehost.tld 22
If firewalling is in place and you need to originate your connection from a specific IP address to open a port, entering
# nc -s 1.2.3.4 examplehost.tld 8181
will connect to examplhost
29%
12.05.2014
The revelation of wide-spread government snooping has sparked a renewed interest in data storage security via encryption. In this article, we review some options for encrypting files, directories ... recipient versus people who get access that information and try to break the encryption (decrypt it). There are literally hundreds of books on the subject (a quick Amazon search turned up 3,998 results ...
The revelation of wide-spread government snooping has sparked a renewed interest in data storage security via encryption. In this article, we review some options for encrypting files, directories
29%
04.10.2018
active Fa0/1, Fa0/2, Fa0/3, Fa0/4,
Fa0/5, Fa0/6, Fa0/7, Fa0/8,
Fa0/9, Fa0/10, Fa0/11, Fa0/12
10