18%
09.10.2017
_consumer_secret>"
06 config.access_token = ""
07 config.access_token_secret = ""
08 end
09
10 user = client.user("23Cent")
11 puts user.name
12
13 def collect
18%
05.12.2016
, in which you create one or more rules of this type for each logfile with relevant information.
Listing 2
Log Entry Examples
# Feb 22 08:00:00 hostname sshd[1234]: Failed keyboard
18%
10.04.2015
cloud offerings from Red Hat.
Gears and Cartridges
Like other PaaS technologies, OpenShift is generally focused on web development. Only Ports 22, 80, 443, 8000, and 8443 are available from the outside
18%
09.10.2017
dir=os.path.dirname(path)
07 if dir and not os.path.exists(dir):
08 os.makedirs(dir)
09 if os.path.basename(path):
10 bucket.download_file(path,path)
11
12 bname='prosnapshot'
13
18%
28.11.2021
edit podman.socket
08 mkdir -p /etc/systemd/system/podman.socket.d
09 cat >/etc/systemd/system/podman.socket.d/override.conf
10 [Socket]
11 SocketMode=0660
12 SocketUser=root
13 Socket
18%
02.10.2012
port 22) to port 2222, for example, to stop port scans filling up your logs. Without TCP Wrappers enabled, scans might run dictionary attacks on your server where password combinations are guessed by one
18%
10.04.2015
/local/sbin/sync.sh"
11 ],
12 "append_files": true,
13 "stdin": [
14 "name",
15 "exists",
16 "new",
17 "size",
18 "mode"
19
18%
30.05.2021
the following:
$ gpustat -P
[0] Tesla V100-SXM2-16GB | 37'C, 0 %, 24 / 300 W | 0 / 16160 MB |
One GPU is present, running at a cool 37 Celsius and drawing 24W while doing absolutely nothing. To proceed further
18%
07.04.2016
Inventory suite using open source software that includes SQLite, Ruby, and Apache. The spiceworks.exe application is a single, small (66MB) Windows executable file that installs and scans your network devices
18%
19.02.2013
to a 100Mb network, the path through the faster router wins. Where the paths are equivalent, the administrator can manually add a weighting value to the configuration, which is then reflected in the LSA