62%
06.10.2019
in the background with command lines like that shown in Listing 1.
Listing 1
OpenSSL from Hell
openssl x509
-req
-CA ca.crt
-CAkey ca.key
-set_serial 0x$(openssl rand -hex 16)
-days 3650
62%
16.03.2021
: this array has metadata at the start and
may not be suitable as a boot device. If you plan to
store '/boot' on this device please ensure that
your boot-loader understands md/v1.x metadata, or use
62%
18.07.2013
.
The current version of Mutil, version 1.76.6, is built against coreutils version 7.6. However, more recent Linux distributions, such as RHEL 6.x, use a newer version of coreutils, so it might not be easy to use
62%
31.10.2025
System, DUP: total=8.00MB, used=4.00KB
Metadata, DUP: total=1.00GB, used=79.20MB
If Btrfs only has one device available when the filesystem is created, it automatically generates a duplicate
62%
19.05.2014
the desktop storage has the following characteristics:
CentOS 6.5 (updates current as of March 29, 2014)
GigaByte MAA78GM-US2H motherboard
AMD Phenom II X4 920 CPU (four cores)
8GB of memory (DDR2
62%
12.11.2013
orchestrated DDoS attacks. In the DDoS attacks on US financial institutions last year, the offenders achieved 20 times the effect of ordinary desktop botnets with a handful of servers.
This trend exacerbated
62%
22.10.2012
must ensure that its contents are available redundantly within the whole cluster. Not the least of developers’ problems is dealing with “rack awareness.” If you have a 20-node cluster with RADOS in your
62%
25.11.2012
by the kdump
startup script, but only if a protected memory area is also present. To let the original kernel know this, you need to specify the boot loader option crashkernel=XM[ @YM]
, where X
is the size
62%
19.02.2013
on the administrator’s own machine, which even can be a Windows or Mac OS X machine; the only important thing is that you have a Perl environment in place. To install Rex, first pick up the git
versioning tool (using
62%
02.04.2013
, therefore, decide in advance whether they want to work with certificates, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the X.509