18%
01.08.2019
whoami
ls -al /usr/share/nginx
root
total 12
drwxr-xr-x 3 root root 4096 Feb 6 08:11 .
drwxr-xr-x 1 root root 4096 Feb 18 13
18%
26.01.2025
the binary media data as text. Among the myriad ways to do this, the standard in browsers is Base64 encoding [22], provided in Julia by the IBase64
package.
Listing 4 shows the server program from Listing 3
18%
30.11.2025
cluster nodes, and the ext3 driver on node A wouldn't have the option of querying the state of the same DRBD resources on node B if it wanted to write to the medium.
In the worst case, a write to the DRBD
18%
07.06.2019
= 50ms;
07 .interval = 3s;
08 .window = 10;
09 .threshold = 8;
10 }
11 }
12
13 set beresp.grace = 12h;
Changes on the Fly
The reverse proxy not only delivers web pages
18%
05.02.2019
Kubernetes Service (AKS) [3], make it possible to provision immensely complex orchestration platforms and tools with point-and-click web interfaces or a simple command-line invocation. In this dimension, many
18%
20.06.2022
: It is not based on open standards, and it uses proprietary protocols and APIs like MAPI [3] for internal communication. Clients for Exchange are pre-installed on all Windows, Android, and Apple devices
18%
11.04.2016
. One easy way to set up a Hiawatha virtual machine is to start up the TurnKey Linux Nginx VM [3], then remove Nginx and add Hiawatha.
Start by downloading the TurnKey Linux Nginx VM, a small Linux
18%
25.03.2021
/var/www/html;
18
19 # Required for server push:
20 location /css/ {
21 expires 3h;
22 }
23
24 location /js/ {
25 expires 3h;
26 }
27
28 location /index-2.html {
29
18%
30.04.2012
, severity, name, and family of each plugin as it relates to the Metasploit Framework (see Figure 3). The Name
section tells you which Metasploit exploits have the best chance to be successfully against
18%
05.03.2013
: "Red"
08 Model year: 1988
Listing 2: JavaScript Code for Listing 1
01 // JavaScript
02 var autos;
03
04 autos = {
05 bmw: {
06 color: "Blue",
07 Model year: 1990
08 },
09 vw: {
10