16%
11.10.2016
redundantly, you can't use this feature. The software RAID drivers cannot access the data [6] because the process of creating and saving data ideally happens on the NVDIMMs, removing the need to copy from DRAM
16%
05.12.2014
at the Bro website [2].
The installation instructions I cover here are based on a CentOS 6.5 Linux distribution. (Note: At the time of publication, CentOS 7 still has a missing dependency for the Python
16%
05.12.2014
: chris@linux.tld
[->] Subject: Picture yourself, on a boat, on a river
[->] User-Agent: Heirloom mailx 12.5 6/20/10
[->] MIME-Version: 1.0
[->] Content-Type: multipart/mixed;
boundary="=_546791b1.cwvb6n4
16%
21.11.2012
(unew(i,j)-u(i,j)) )
141 ENDDO
142 ENDDO
143
144 IF(MOD(iter,10)==0) WRITE(*,"('iter,diff:',i6,e12.4)") iter,diff
145
146 ! Update solution
147 DO j=2,m-1
148 DO i=2,m-1
149 u(i,j) = unew
16%
05.12.2016
to the local network. The app also supports IPv6, but is not set up using mobile device management (MDM, i.e., security software used by the IT department to manage and secure mobile devices
16%
27.12.2017
~ # cd /etc/audit/
chrisbinnie audit # ls
auditd.conf audit.rules rules.d
chrisbinnie audit # ls -al
total 20
drwxr-x--- 3 root root 4096 Dec 16 12:34 .
drwxr-xr-x 95 root root 4096 Dec 16 12:34 ..
-rw-r----- 1 root
16%
18.02.2018
.conf audit.rules rules.d
chrisbinnie audit # ls -al
total 20
drwxr-x--- 3 root root 4096 Dec 16 12:34 .
drwxr-xr-x 95 root root 4096 Dec 16 12:34 ..
-rw-r----- 1 root root 701 Dec 9 2014 auditd.conf
-rw
16%
16.08.2018
correctly. This simple test gets the kernel version of a different node using the IP address of the other node.
$ pdsh -w 192.168.1.250 uname -r
192.168.1.250: 2.6.32-431.11.2.el6.x86_64
The -w option means
16%
09.10.2013
is effectively designed like a supercomputer, with a host-side, dual-core Zynq-7010 ARM A9 CPU running Ubuntu 12.04, flanked by a 16-core Epiphany accelerator running at 700MHz. Priced at US$ 99, as opposed
16%
08.10.2015
. The container cannot write to them, thus preventing privileged processes in containers from manipulating the host system.
The kernel breaks down root privileges into capabilities [6] and assigns capabilities