16%
05.12.2016
/state/log"
05 dumpuser "amanda"
06 labelstr "MyData[0-9][0-9]"
07 autolabel "MyData%%" EMPTY VOLUME_ERROR
08 tpchanger "chg-disk:/amanda/vtapes"
09 tapecycle 4
10 dumpcycle 3 days
11 amrecover_changer "changer
16%
02.08.2022
A quick edit of your pristine MariaDB server's configuration file /etc/my.cnf.d/server.cnf (1) binds the MariaDB service to the localhost and (2) connects and (3) creates the database:
Bind-address = 127
16%
09.06.2018
handling, string processing, and mathematical operations [3].
Communication between the DBS and the outside world can be established using either a database console in a terminal, intermediary software
16%
30.11.2020
requires the .NET Core runtime on the target machine in the version against which the application was originally compiled. At the time of print, version 3.1 of the framework is up to date. All code examples
16%
27.09.2021
password t0ps3cr3t
06 neighbor 192.0.2.1 peer-group LAB
07 ...
08 address-family ipv4 unicast network 192.168.1.1/32
09 exit-address-family
10 #FRR2
11 router bgp 65541
12 neighbor LAB peer
16%
02.06.2020
this article.
TensorFlow provides stable Python (for version 3.7) and C APIs. However, other programming languages supported without guaranteed API backward compatibility are C++, Go, Java, Java
16%
14.08.2017
such as containers. In native cloud environments, Prometheus [3], with its time series database approach, has therefore blossomed into an indispensable tool. The software is related to the Kubernetes [4] container
16%
29.09.2020
at the blog [3] reveals that new versions of Cockpit are released approximately every two weeks.
In an article from 2015 [4], ADMIN
looked into the topic of managing Linux servers with Cockpit; since then
16%
04.04.2023
(NIST) National Vulnerability [2] or the Aqua Vulnerability [3] database.
Figure 1: An image scan with Trivy generates a long list of vulnerabilities
16%
10.06.2015
exploits like the OpenSSH bug CVE-2002-0083 [2] show that sometimes changing just one bit is sufficient to install a backdoor [3]. For sophisticated attacks, attackers could dump a kernel rootkit