28%
11.06.2014
/joe/.ssh/google_compute_engine -A -p 22 joe@1.2.3.4 --
11 Warning: Permanently added '1.2.3.4' (ECDSA) to the list of known hosts.
12 Enter passphrase for key '/home/joe/.ssh/google_compute_engine':
13 Linux gcerocks-instance-1 3
28%
06.10.2022
, as in this code fragment, which implements and calls a multiply function:
package function
multiply(a,b) = m {
m := a*b
}
result1 = r {
r := multiply(3,4)
}
result2 = r {
r := multiply(3,9)
}
The Rego
28%
14.03.2013
wrote this article I have started running test applications as Platform-as-a-Service apps in OpenShift [3]. OpenShift now also has a cartridge that lets you install MongoDB as an add-on. If you
28%
09.12.2021
#
, where #
is the number of threads and a space falls between it and the switch (Listing 3).
Listing 3: lbzip2
$ lbzip2 -v -n 4 package-list.txt
lbzip2: compressing
28%
30.11.2025
686
oprofile-0.9.5-4.fc12.i686
To profile the kernel, you need to tell OProfile where the kernel image is located with the --vmlinux option:
opcontrol --setup --vmlinux=/usr/lib/debug/lib/ modules
28%
16.05.2013
a9a6615fb5c045693 |
root@alice:~# quantum port-list
+--------------------------------------+------+-------------------+
| 0c478fa6-c12c-... | | fa:16:3e:29 ... OpenStack workshop, part 3:Gimmicks, extensions, and high availability
28%
20.08.2012
examplehost.tld 22
If firewalling is in place and you need to originate your connection from a specific IP address to open a port, entering
# nc -s 1.2.3.4 examplehost.tld 8181
will connect to examplhost
28%
31.10.2025
seconds, for example:
# nc -p 16000 -w 30 examplehost.tld 22
If firewalling is in place and you need to originate your connection from a specific IP address to open a port, then you can enter:
# nc -s 1.2.3
28%
12.05.2014
The revelation of wide-spread government snooping has sparked a renewed interest in data storage security via encryption. In this article, we review some options for encrypting files, directories ... recipient versus people who get access that information and try to break the encryption (decrypt it). There are literally hundreds of books on the subject (a quick Amazon search turned up 3,998 results ...
The revelation of wide-spread government snooping has sparked a renewed interest in data storage security via encryption. In this article, we review some options for encrypting files, directories
28%
27.05.2025
:svrmtype:priority:signorm:sigforce:display:waittime:grpname:mariadb::-c "ulimit -n unlimited; ulimit -c 10; ulimit -m unlimited; ulimit -d unlimited; /opt/freeware/libexec/mysqld" :/usr/bin/sh:27:0:/dev/console:/dev/console:/dev/console:-O:-Q:-S:0:0:20:15:9:-d:20::
Now