6%
06.05.2025
provisioned by Warewulf
Profiles
: categories of nodes with a shared configuration
Images
: operating system payloads for deployment
Overlays
: built-in and site-specific customizations layered onto
6%
04.08.2020
there, you can either specify the exact time period you want to analyze or use shortcuts to select, say, an hour, day, or month as the period.
Traffic Profiles
With the help of traffic profiles, network
6%
05.12.2016
with Windows Phone 8.1, and a Google Nexus 7 with Android 5.0.2 – integrated without difficulties, as well. If a device is already integrated into another MDM structure, the profile install does not work
6%
14.08.2017
not include any security features (e.g., encryption) and therefore only ensures logical separation of the data paths. These overlay tunnels are configured and optimized, depending on the application profile
6%
30.01.2024
for a desktop system, which explains why protection profiles are different. The Protection Profile for general-purpose operating systems [2] clearly stipulates that user sessions must either be terminated or
6%
30.11.2025
to define "profiles" (or use a similar term). For example, you define a Linux MySQL profile, assign it to a subset of your machines, and the backup software automatically knows which directories to include
6%
27.05.2025
profile, where you can manage the VPN profiles for your current user account. Of course, you will not want to save any information there at this point. When you press the button to add a connection, you
6%
19.02.2020
to be on the system. If you want to build or run containers, you need to be part of that group. Adding someone to an existing group is not difficult:
$ sudo usermod -a -G docker layton
Chris Hoffman wrote an article
6%
21.06.2013
of unauthorized queries, GreenSQL returns an empty result set, closes the connection to the database, or returns an error message.
GreenSQL as an IDS
GreenSQL can operate in combination with a risk profile
6%
06.11.2012
.2.9/ default
The easiest way to initialize Modules is to use the standard /etc/profile.d
mechanism. This can be done by copying the following initialization files to /etc/profile.d
. For instance, copy