21%
17.04.2012
and Windows Server 8 use the new PowerShell 3.0 that I’ll cover in a later entry.
Starting and Stopping Services
One of the basic duties of an Administrator is to start, stop, and restart services on systems
21%
10.04.2015
Number: 00282-30340-00000-AB9A5
Version: 6.3.9600
The information you read from the operating system can also be formatted and customized. For example, normally only the operating system's most
21%
05.12.2019
2010. The last major update of OGMRip [3], which was developed for the Gnome desktop, also dates from 2015. The Thoggen [4] DVD transcoder is still available for download but has not seen any updates
21%
03.08.2023
:
kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/stable/manifests/install.yaml
If you are installing Argo CD into a different namespace, make sure to update the namespace
21%
02.02.2021
: records) {
08 String key = record.key();
09 Payment value = record.value();
10 System.out.printf("key = %s, value = %s%n", key, value);
11 }
12 }
13 }
14 [...]
Kafka Ecosystem
21%
12.09.2022
Parallel-NetCDF that uses MPI-IO underneath. The initial goal was to focus on older formats: CDF-1, the “classic” format primarily used for netCDF through version 3.5, and CDF-2, added in CDF-1 version 3.6.0 onward, which
21%
04.12.2024
percent of the vulnerable versions have safer alternatives available.
3.6 percent of dependencies are still vulnerable because they were updated to another insecure version.
Reliance on end
21%
20.05.2014
Script. This approach allows event-based processing of work requests and, thus, more concurrent requests than the Apache server can handle – although Apache also has an event-based processing module [3] in its more
21%
03.12.2015
something like Listing 2.
Listing 2
Sample Output
Starting Nmap 6.47 (http://nmap.org) at 2015-03-12:00:00 CET
Nmap scan report for targethost (192.168.1.100)
Host is up (0.023s latency).
r
21%
10.06.2015
] on its laptops that allows the software to steal web traffic using man-in-the-middle attacks.
When you use an encrypted filesystem or SEDs [3], all of the data is encrypted. However, if you forget