25%
16.05.2013
), such as EXISTS or EXPUNGE. The client itself cannot send any commands of its own at this time.
The master/slave relationship ends as soon as the client sends a DONE. In this case, the server sends any outstanding
25%
16.05.2013
-user) or reserve a certain minimum size for a share. The Nexenta Community Edition offers more granular settings. Only here, can you set a record size for the filesystem, adjust case sensitivity, stipulate different
25%
17.06.2017
server. SQL can run on the MIM server if you like. Later, I will look at the requirements for commissioning in more detail.
In many cases, AD is likely to be where you will find most of the objects
25%
07.04.2022
to be misguided in the vast majority of cases, and you can assume that the job will need to be done at the most inopportune moment – in the context of an outage, when the administrator then has to reconstruct
25%
13.03.2012
-term RAS requirement can be difficult to estimate. Choosing the wrong component can result in poor performance, increased downtime, and, in the worst case, an unfixable problem. This situation can also
25%
16.10.2012
not found a file called file.php
and discovers the local path on the server filesystem, under which the web application is stored. In this case, the attacker could possibly even deduce the file paths
25%
17.02.2015
shows all the currently active rules:
# auditctl -l
w /etc/hosts -p rwa -k hosts-file
In addition to these simple file watches, complex access cases can be monitored. Four different lists are available
25%
10.04.2015
through the configurations they can map. The control software determines what these maps look like – and in some cases, the control software is Linux.
Linux runs on practically any CPU architecture
25%
07.10.2014
images. The new FreeBSD 10 in particular can cause Linux admins problems when reconstructing data from ZFS pools.
As a case in point, an expert in a recent court case was tasked with evaluating a disk
25%
05.12.2019
to which an outside attacker can attach. To disable it, an attacker would have to compromise the system before Fail2ban bans the offending host, which is unlikely in the case of a dictionary or brute force