14%
16.05.2013
a9a6615fb5c045693 |
root@alice:~# quantum port-list
+--------------------------------------+------+-------------------+
| 0c478fa6-c12c-... | | fa:16:3e:29
14%
30.11.2025
environment, make sure the JAVA_HOME variable points to the Java root directory (Listing 1).
Listing 1
Java Environment
01 # export JAVA_HOME=/usr/lib/jvm/jre-1.6.0-openjdk
02 # echo $JAVA
14%
02.08.2021
:33 deployment_image.qcow2
10 -rw-r--r-- 1 root root 57 Mar 2 10:21 deployment_image.qcow2.CHECKSUMS
11 -rw-r--r-- 1 42422 42422 318M Mar 2 10:13 ipa.initramfs
12 -rw-r--r-- 1 42422 42422 104 Mar 2 10
14%
27.09.2021
packages up software so that it can run on almost any device [8].
To install snap on the Raspberry Pi, you should run as root the commands:
$ apt update; apt install -y snapd
The packages pulled down
14%
01.08.2019
$4dIrCZLpgSYDClrS6pN2BOxVm.rkPy/4IgnurlHbukOxOJldlhJM."
12 acl:
13 - match: {account: "admin"}
14 actions: ["*"]
15 comment: "Admin has full access to everything."
16 - match
14%
05.12.2016
_upgrade with --force or -f. Beware: The master has also taken on the root password:
sudo mysql_upgrade -f -u root -p <root_password_for_master>
In the data directory you will find the human-readable xtrabackup
14%
18.02.2018
, you first log in as root and run the sudo command-line tool, which lets you run commands under a different user account:
su root
apt install sudo
You will need a text editor, such as Nano, used
14%
09.10.2017
rule phishing_pdf {
02
03 meta:
04 author = "James Stanger"
05 last_updated = "2017-09-12"
06 category = "phishing"
07 confidence = "high"
08 threat_type = "phishing exploit"
09 description
14%
30.11.2025
_notification_commands notify-host-by-email
11 service_notification_commands notify-service-by-email
12 email root@localhost
13 }
The contact configuration can
14%
17.02.2015
NEW packages will be installed:
libdate-manip-perl libyaml-syck-perl logwatch
As a result, about 12.5MB of new software is installed.
Logwatch gets configuration details several ways:
from script