59%
22.12.2017
experience, the DebOps developers have learned that they need to check the condition of the target systems. The DebOps documentation recommends you enter the command
debops-task all -m setup
after you set up
59%
30.11.2025
, a request like http://www.example.com/index.html?file=/etc/passwd
would trigger the sample rule in line 8. Then the action defined in line 9 would block the request. The client sees an HTTP 403 Forbidden
59%
30.11.2025
, which makes for a ridiculously large address space, although back when IPv4 was created, I'm sure they thought the same thing (see the "IPv6 Logging" box).
IPv6 Logging
For any logging of network
59%
30.01.2024
Flux
Figure 3: … as M.2 memory modules for the corresponding slots. The type and scope of the installed components are identical across the different form factors. © ScaleFlux
The manufacturer
59%
03.02.2022
OTP (mOTP) in their smartphones for the same effect. Although it might be argued that a smartphone is less secure than the Nitrokey, because a smartphone can suffer malware attacks more easily than
59%
08.10.2015
books [5] online can help you get started.
High-Level Libraries
The last approach to parallel I/O I'm going to mention is high-level libraries that you can use for storing data (read and write
59%
30.11.2025
/spool/mlmmj/global.libreoffice.org/users -m
outputs the addresses of the moderators. To manually subscribe and unsubscribe recipients, you can use mlmmj-sub and mlmmj-unsub, respectively. For example, this command
sudo -u mlmmj /usr
57%
30.11.2025
apparently been saved with a Windows editor, and Linux shells can have problems with the superfluous Ctrl-M's at the end of each line. This apparently was the case with all of the shell scripts because each
56%
14.11.2013
Status Director
*status director
...
Terminated Jobs:
JobId Level Files Bytes Status Finished Name
=====================================================
1 Full 135 6.679 M OK 18-Jul-13 16:00 Backup