18%
26.11.2013
ability of web browsers to encrypt and decrypt application data using JavaScript, is currently under review by the World Wide Web consortium (W3C) as a draft. This promising technology reaches well beyond
18%
30.11.2025
Figure 4 for the results.
Listing 3
search.sh
01 #! /bin/sh
02 while true;
03 do
04 clear
05
06 # Search key
07 echo -n "Enter search key: ";read sube
08
09 # Query
10 namazu -f
18%
27.05.2025
a particularly important role if you don't have access to powerful, but potentially expensive, tools like SUSE Multi-Linux Manager [1] or Uyuni [2]. In such a case, it's worth considering Ansible [3].
Inventory
18%
25.10.2011
-algorithm sha1;
07 encryption-algorithm 3des-cbc;
08 }
09 policy test123 {
10 mode main;
11 proposals Phase1-3des-sha;
12 pre-shared-key ascii-text "$9$dQVgJiHmTF/.PO1Ehrlgoa
18%
04.10.2018
of their internal 2.5-inch SATA devices, coming in at a mere 2.3x3x0.5 inches (5.8x7.6x1.3 cm) – smaller than a Post-it note (Figure 1). Available in sizes ranging from 256GB to 2TB, the specimen in our lab is the MU
18%
09.10.2017
three to examine in this article. Two are popular Internet services from Twitter [2] and WordPress [3]. Because of the high number of users and open interfaces, you can expect an affinity with REST
18%
05.03.2014
3.5.0-44-generic (hercules) 03.12.2013 _x86_64_ (2 CPU)
09:46:03 runq-sz plist-sz ldavg-1 ldavg-5 ldavg-15 blocked
09:46:13
18%
20.03.2014
)
w
Task creation and task-switching activity
y
TTY activities
Listing 1
Query with Interval and Number
jcb@hercules:# sar -q 10 2
Linux 3.5.0-44-generic
18%
13.06.2016
an additional section by creating a new profile to do so (see Listing 3).
Listing 2
Integrating Vim
{
"include": "fedora-atomic-docker-host.json",
"packages": ["vim"]
}
Listing 3
18%
30.11.2025
=""
04 PING="ping -c1 -w 3"
05 PING2=""
06
07 case $OS in
08 HP-UX*)
09 PING=ping
10 PING2="-n 1"
11 RSH="remsh"
12 RSH2="-l user"
13 ;;
14 Sun