31%
17.06.2011
sprzblog mysql ↩
limesurvey -uroot -ppassword > ↩
backup.sql
will take 21 seconds to complete:
real 0m21.626s
user 0m0.000s
sys 0m0.000s
In the case of larger databases on non
31%
30.11.2025
sprzblog mysql limesurvey -uroot -ppassword > backup.sql
will take 21 seconds to complete:
real 0m21.626s
user 0m0.000s
sys 0m0.000s
In the case of larger databases on non-replicated servers
31%
13.06.2016
_journal_init=0 /dev/vg00/ext4fs
To mount the filesystem, create an appropriate mountpoint up front and then run the mount command:
mkdir /mnt/ext4fs
mount /dev/vg00/ext4fs /mnt/ext4fs
If you want to mount
31%
09.10.2017
to adjust a few application parameters in the Fortran program for a longer run time:
nx = 8000
ny = 8000
it_max = 10000
tolerance = 0.00004D+00
The code was compiled using GCC 7.1 and run
31%
27.09.2024
, you can quickly become confused when you hear about K3s [2], k0s [3], minikube [4], Microkubes [5], and the many other variants.
These names relate to K8s distributions, all of which enrich the vanilla
31%
13.12.2011
scanner’s -sL
option (nmap -sL
) performs a reverse DNS lookup on every IP address in the scan and queries the DNS server each time an IP address is listed.
In addition to these standard DNS tools, a pair ...
Professional attackers have much more pointed at your site than just Nmap, and you should too if you want to test your network’s security. We’ll show you some tools intruders use to gather
31%
31.10.2025
/loadavg/ [3]:
1.00 0.97 0.94 1/1279 7743
The three additional numbers provided by Linux are the number of running processes (one in this case), the total number of processes, and the last process ID (PID
31%
20.03.2023
wrote on Lmod back in 2018, you will see a discussion about the three commands to run:
$ sudo ln -s /usr/local/lmod/lmod/init/profile /etc/profile.d/z00_lmod.sh
$ sudo ln -s /usr
31%
13.12.2011
3.105ubuntu1 add and remove users and groups
ii ant 1.7.0-3 Java based build tool like make
ii antlr
31%
27.03.2013
We look at the new features in Ceph version 0.56, alias “Bobtail,” talk about who would benefit from CephX Ceph encryption, and show you how a Ceph Cluster can be used as a replacement for classic ... by normal users. But there’s a flaw – although the mechanism is still reasonably easy to enable (in the new v0.56, three lines in /etc/ceph/ceph.conf
are all it takes), activating CephX will make many ...
We look at the new features in Ceph version 0.56, alias “Bobtail,” talk about who would benefit from CephX Ceph encryption, and show you how a Ceph Cluster can be used as a replacement for classic ... The RADOS Object Store and Ceph Filesystem: Part 3