11%
15.08.2016
is backed by the Linux Foundation. The specification was renamed OpenAPI Specification
[8]. Because it is based on version 2.0 of the Swagger specification, the OpenAPI Specification also has this version
11%
13.02.2017
opsi client manually, you need to specify the relevant information.
For example:
opsi-admin -d method host_create OpsiClient testclient.domain.local "null" "Testclient" "" 00:0c:29:12:34:56 192.168.0
11%
11.06.2014
# replace: olcRootDN
07 dn: olcDatabase={2}bdb,cn=config
08 changetype: modify
09 replace: olcRootPW
10 olcRootPW: {SSHA}f0pv70XFFox5UqKc6A4Uy39NcxkqcJbc
11 -
12 replace: olcAccess
13 olcAccess: {0}to attrs
11%
20.03.2014
"
05
06 start on (filesystem and net-device-up IFACE=lo)
07 stop on runlevel [!2345]
08
09 env DAEMON=/usr/local/openresty/nginx/sbin/nginx
10 env PID=/var/run/nginx.pid
11
12 expect fork
11%
01.08.2019
the process count and name of the top 10 most active processes. Finally,
SELECT name, path, pid FROM processes WHERE on_disk = 0;
displays processes with no associated binary – usually a red flag that means
11%
03.08.2023
) 3.0 [6].
Table 1
Ten Most Interesting Add-On Modules
Module name
License fee
Description
CRM
$10.99
Used to manage and search for customers; supports
11%
18.07.2013
says:
$ puppet apply .pp
notice: Scope(Class[main]): Let's build a server!
notice: Finished catalog run in 0.01 seconds
Next, create a simple and largely useless file in the same script, drop
11%
05.08.2024
ENTRYPOINT ["gcloud","beta","emulators","pubsub","start","--project=demo"]
CMD ["--host-port=0.0.0.0:8085"]
Now, create the script in Listing 2 for the Pub/Sub service to create a topic
11%
18.03.2013
is a classic bug in a web application: an SQL injection vulnerability. SQL injection, which has been known for around 12 years, is still one of the hacker’s most popular tools.
This article presents real
11%
07.10.2014
and the other on all IPv6 IP addresses.
Listing 1
Checking Open Ports
chris@DebianBox:~# lsof -i :22
COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME
sshd 3328 root 3r IPv4 33323 0t0 TCP *:ssh