17%
06.08.2012
IPv6 is establishing itself in everyday IT life, and all modern operating systems from Windows, through Mac OS X, to Linux have it on board; but if you let IPv6 introduce itself into your ...
In 1995, the Internet Engineering Task Force (IETF) chose IPv6 as the successor to IPv4. Initially, this was not an issue that raised much interest. But this changed when Microsoft added IPv6 ...
IPv6 is establishing itself in everyday IT life, and all modern operating systems from Windows, through Mac OS X, to Linux have it on board; but if you let IPv6 introduce itself into your ... Neglected IPv6 Features ... Securing IPv6
17%
05.12.2014
OS 6.5.
The first step is to install a base server with a static IP as you normally would. Installing the basic Desktop package is also required, because some steps will require it later for producing
17%
10.06.2015
(xrandr) "provides automatic discovery of modes (resolutions, refresh rates, …) [and] the ability to configure output dynamically (resize, rotate, move, …)" [3]. The xrandr configuration tool lets me
17%
02.08.2022
A quick edit of your pristine MariaDB server's configuration file /etc/my.cnf.d/server.cnf (1) binds the MariaDB service to the localhost and (2) connects and (3) creates the database:
Bind-address = 127
17%
22.12.2017
and Brotli Comparison
01 -rw-r--r-- 1 sw sw 124 8 Sep 16:52 hello-world.html
02 -rw-r--r-- 1 sw sw 77 8 Sep 16:53 hello-world.html.br
03 -rw-r--r-- 1 sw sw 113 8 Sep 16:53 hello
17%
11.06.2014
on the Rex host and then copy the public key over to the client (Listing 3). After that, a test login on the client without password should work.
Listing 3
Key-Based Authentication
01 root
17%
11.10.2016
, the exact details of these components varies from processor to processor, making CPU utilization comparison difficult.
Current processors can have shared L3 caches across all cores or shared L2 and L1 caches
17%
14.11.2013
-persistent-net-generator.rules
openSUSE, Red Hat 6
* /etc/udev/rules.d/70-persistent-net.rules* No net generator rules since 12.3. Instead, the biosdevname package is used to identify the NICs
17%
01.06.2024
PI
resulting in a brief burst of computation on cores 0, 1, and 6 (Figure 4) and an approximation of pi (purely out of randomness and geometry) to 3.139, computed in just half a second (Figure 5). Executing
17%
27.09.2024
and theft in non-production environments, while 53 percent reported data corruption and alteration, and 52 percent cited audit issues and failures.
Read more at Delphix (https://www