17%
30.11.2025
directories, sets up links, and copies files into the zone to create the new system's layout (Listings 2 and 3). The installation also creates the zone's chrooted directory /zones/web1
and sets the appropriate
17%
30.11.2020
'd for the filenames, which are placed in @filelist (lines 52, 53). A foreach loop then opens and reads each file, byte-by-byte, the content of which is placed in the aptly name scalar $text.
Next, the code splits
17%
05.02.2023
of its useful life," and NIST recommends that IT professionals replace it with newer, more secure options. "We recommend that anyone relying on SHA-1 for security migrate to SHA-2 or SHA-3 as soon
17%
04.08.2020
], LANDESK [3], Google's G Suite Mobile Management [4], and bitFit [5].
Herd Immunity
One of the most impressive aspects of Netflix's Stethoscope is that, when it displays its findings, it generously
17%
30.11.2025
|21|" | cut -d\| -f3`
48 b=`cat $newdat | grep "50|25|" | cut -d\| -f3`
49
50 a=$(echo $a | tr \, \.)
51 b=$(echo $b | tr \, \.)
52
53
54 psum=$(echo "$a+$b" | bc )
55 echo -n "Invoice amount: $psum, continue
17%
14.09.2021
$(find /sys/devices/system/cpu -regex ".*cpu[0-9]+/topology/thread_siblings_list") | sort -n | uniq
0,32
1,33
2,34
3,35
4,36
5,37
6,38
7,39
8,40
9,41
10,42
11,43
12,44
13,45
14,46
15,47
16,48
17,49
18,50
19,51
20,52
21,53
22,54
23,55
24,56
25
17%
22.05.2023
/pods/synapse:/data:Z
-e SYNAPSE_SERVER_NAME=domain.com
-e SYNAPSE_REPORT_STATS=yes
--net virt_net
--ip 192.168.122.26
--mac-address 52:54:C0:A8:7A:1a docker.io/matrixdotorg/synapse:latest
Exec
17%
28.11.2023
.json files (Listings 1 and 2) [2] to launch a Monitoror stack and supply its configuration, respectively.
Listing 1
monitoror_stack.yml
01 version: '3.5'
02 services:
03 monitoror:
04
17%
03.02.2022
,32
1,33
2,34
3,35
4,36
5,37
6,38
7,39
8,40
9,41
10,42
11,43
12,44
13,45
14,46
15,47
16,48
17,49
18,50
19,51
20,52
21,53
22,54
23,55
24,56
25,57
26,58
27,59
28,60
29,61
30,62
31,63
The lstopo tool
17%
30.11.2025
_seq=3 ttl=52 time=103 ms
Personally, I prefer using tunnels over Teredo and 6to4 for several reasons – the simplest is that it works with a public IP or behind a NAT box (well, usually). Tunnels ... 3