18%
27.09.2021
T), thanks to a binary of just 100MB. The perfect laboratory companion that offers immediate access to Kubernetes is the clever minikube [2].
Another distribution caught my eye recently when I was arriving ... A zero-ops installation of Kubernetes with MicroK8s operates on almost no compute capacity and roughly 700MB of RAM.
18%
01.06.2024
is, the fewer vulnerabilities it is likely to have. According to the report, container images smaller than 100MB had 4.4 high or critical vulnerabilities, versus 42.2 for images between 250 and 500MB ... and Management Software; LPI Launches Open Source Essentials Program; Apache Software Foundation Celebrates 25 Years; SUSE Announces Rancher Prime 3.0; NSA Issues Zero Trust Guidelines for Network Security
18%
05.09.2011
STAT
03 0 open-nebula-wn 0 100 99 100 1068948 921356 on
04 1 open-nebula-wn2 0 100 12 100 1173072 1027776 on
OpenNebula Configuration File
You
18%
29.09.2020
sitting at less than 50MB (and using less than half the RAM of a standard cluster) the binary that runs K3s is a sight to behold and well worth getting your hands on. Especially when it's deemed production
18%
05.12.2016
-address parameter in /etc/mysql/my.cnf does not point to localhost (127.0.0.1).
Listing 2
mysqld_safe_syslog.cnf
[...]
[mysqld_safe]
#skip_log_error
log-error = /var/log/mysql/error.log
syslog
18%
27.09.2024
scale. The integrated AI tools rather focus on helping the user than on creating hallucinated content. Grommunio Antispam 3.9.0 (released in July 2024) includes GPT-based spam detection, and upcoming
18%
17.04.2017
, "could allow remote code execution if an attacker sends specially crafted messages to a Microsoft Server Message Block 1.0 (SMBv1) server."
You can read more about all of the vulnerabilities that were
18%
30.01.2020
Id: 4e90b424-95d9-4453-a2f4-8f5259f5f263 Duration: 70.72 ms Billed Duration: 100 ms Memory Size: 128 MB Max Memory Used: 55 MB Init Duration: 129.20 ms
More or Less
18%
11.02.2016
DestinationSizeChange 41943106 (40.0 MB)
Another view of the file statistics lists which file effected the change:
# gunzip -c /mnt/backup/rdiff-backup-data/file_statistics.\
2015-03-15T10\:44\:06+01\:00.data.gz | awk '$2
18%
22.08.2011
systems is John the Ripper (John). John is a free tool from Openwall. System administrators should use John to perform internal password audits. It’s a small (<1MB) and simple-to-use password