36%
04.08.2020
the new terminal the VAULT_ADDR environment variable with the command
$ export VAULT_ADDR="http://127.0.0.1:8200"
so that the shell can access the correct IP address and TCP port for the server.
The next
36%
01.08.2019
methods: static user list, login via Google or GitHub, LDAP connection, MongoDB, or an external program. Static access control lists (ACLs), MongoDB, or an external program can be used for authorization
36%
01.08.2019
VirtualBox on a laptop (Linux Mint Ubuntu 16.04 derivative) with UEFI, I had to install a new Machine Owner Key (MOK) after a reboot. To do this, I set a password for the VirtualBox package at installation
36%
06.10.2019
a block in a new line with a bracket (Pascal begin style), many view the loop header or the condition as sufficient and place the opening bracket at the end of the line. The pseudocode in Listing 1
36%
06.10.2019
to the cloud is the question of trust in the provider. It is particularly convenient to simply lease resources from one of the major providers – AWS, Azure, and Google's cloud platform. One of the largest slices
36%
15.08.2016
and add new animals with a few mouse clicks (Figure 1). The Swagger UI is written completely in HTML, CSS, and JavaScript; developers quite simply adapt the look of the documentation to suit their needs
36%
14.03.2018
Controllers
organizational unit (OU) and select Pre-create Read-only Domain Controller account
from the context menu. Then, run the wizard to create a new DC in the data center and assign it a computer
36%
02.03.2018
/O scheduler was changed to deadline
. When a change of scheduler is requested, the "old" scheduler completes all of its requests before control switches over to the new scheduler.
Summary
Today's systems can
36%
09.06.2018
Docker must have passed the peak of its hype. New versions no longer trigger the same kind of hustle and bustle in the community and no longer provoke a flood of specialist articles, not least
36%
13.06.2016
for possible workarounds for new vulnerabilities that don't have a patch yet or for recently developed attacks. The same rule applies on the server: regularly check the security of your configuration