47%
02.02.2021
gentoo-bind
636634f1308a: Layer already exists
latest-amd64: digest: sha256:667609580127bd14d287204eaa00f4844d9a5fd2847118a6025e386969fc88d5 size: 1996
cd gentoo-java; docker build -t dockerrepo
47%
02.03.2012
.8.8.8:300
@mydomainname.com::mydomainname.com:20:300
+mx3.mydomainname.com:9.9.9.9:300
@mydomainname.com::mx3.mydomainname.com:30:300
Although you have other ways to configure IP addresses, this way should illustrate how
47%
03.04.2024
.0.
The default meaning of UTF8 is different under MySQL 5.7 and MySQL 8.0. On MySQL 5.7, utf8 is interpreted as utf8mb3
, whereas under MySQL 8.0 it is utf8mb4
. Although utf8 and utf8mb3 are largely compatible
47%
05.12.2016
the filter rule
152 eval FOUND_IPS=\`${RULE}\`
153 IPS="${IPS}
154 ${FOUND_IPS}"
155 done
156
157 # Filter by IP address, incidence count, and use of the IP threshold
158 IPS=`echo "${IPS}" | grep -E '([0-9]{1,3}\.){3}[0-9]{1,3
47%
16.01.2013
$ starcluster start -s 1 foocluster -n ami-999d49f0
$ starcluster get foocluster /opt/sge6-fresh .
$ starcluster terminate foocluster
$ starcluster start -o -s 1 -i t1.micro -n ami-e2a0058b imagehost
47%
17.02.2015
RR can be removed as soon as its DNS time to live (TTL) has expired.
Listing 2
Fingerprint in the TLSA RR
$ dig TLSA _25._tcp.mail.sys4.de +short
3 0 1 9273B4E9040C1B9EE7C946EFC0BA8AAF2C
47%
11.10.2016
network operating system in cooperation with Accton Technology Corporation, Arista, Broadcom, Intel, and VMware. The series of Altoline switches [3] by HP Enterprise (HPE), as the group is now called, were
47%
10.11.2021
a directory
-v
or -vv
creates verbose output
-b
uses bzip2
compression
-g
uses gzip
compression
-l
uses lzo
compression
-L
n
uses compression level n
(1
-9
, with 7
being the default
47%
25.09.2023
in a variety of programming languages, is open source, and is available for download [3]. Yet the idea occurred to me to implement zing as a Bash shell script, which has the advantage of avoiding recompilation
47%
18.03.2013
and password
, are added to the database query. This approach works in theory, but imagine an attacker changing the query like this:
Password = ' OR 'a' = 'a'
The query to the database is now:
SELECT * FROM