13%
05.02.2019
:
$ curl http://169.254.169.254
1.0
2007-01-19
2007-03-01
2007-08-29
2007-10-10
2007-12-15
2008-02-01
2008-09-01
2009-04-04
The cloud-init
package installed on an instance contains utilities for its early
13%
27.09.2021
08 integer :: counter
09 integer :: counter_limit
10 integer :: ierr
11
12 type(rec) :: my_record
13
14 counter_limit = 2000
15
16 ierr = -1
17 open(unit=8,file
13%
30.11.2025
to install RADOS and Ceph. Ceph, which is a plain vanilla filesystem driver on Linux systems (e.g., ext3 or ext4), made its way into the Linux kernel in Linux 2.6.34 and is thus available for any distribution
13%
30.11.2025
-specific language (DSL), which is oriented on a natural language and should not be viewed as a programming language.
Cucumber-Nagios [3] applies both of these principles and supports their application ... 3
13%
06.10.2019
response = urllib.urlopen(url);
06 data = json.loads(response.read())
07
08 for userentry in data:
09 if userentry.get('active'):
10 username = userentry.get('username')
11
12 if os
13%
22.12.2017
$keyfile /etc/ssh
08 chmod 644 /etc/ssh/$filename
09 done
10 if [ -f .ssh/config ]; then
11 cat .ssh/config >> /etc/ssh/ssh_config
12 sed -i 's|~/.ssh|/etc/ssh|g' /etc/ssh/ssh_config
13
13%
30.04.2013
abuse of these devices by malware, it was necessary to disable this kind of access [3]. To remove this restriction, you need to rebuild the kernel without CONFIG_STRICT_DEVMEM
, but this approach
13%
27.09.2024
}
]}
Listing 7
View Grouped by Key
$ curl -X GET localhost:5984/messages/_design/queries/_view/by-hours-count?group=true
{"rows":[
{"key":"02","value":1},
{"key":"08","value":1},
{"key":"12","value":2
13%
18.07.2013
, it is already in the /etc/apache2/ports.conf file; openSUSE 12.3 uses /etc/apache2/listen.conf, and on CentOS it's in /etc/httpd/conf.d/ssl.conf. If necessary, remove the hash signs (#) that comment out
13%
30.11.2025
but comprehensively documented [3]. It logs HTTP requests and gives administrators unrestricted access to the individual elements of a request, such as the content of a POST
request. It also identifies attacks in real