23%
    
    
    05.02.2023
        
    
    	
        Map
18 metadata:
19    name: mariadb
20    labels:
21       app: mariadb
22 data:
23    MYSQL_ROOT_PASSWORD: mysqlroot
24    MYSQL_DATABASE: db1
25    MYSQL_USER: mysqluser
26    MYSQL_PASSWORD: mysqlpwd
    
 
		    
				        
    23%
    
    
    10.06.2015
        
    
    	
         7). The options used are -r, recursively Zip; -0, no compression (for faster execution); and -e, encrypt (prompts the user for a passphrase).
Listing 7
Secure ZIP Encryption
$ zip -r -0
    
 
		    
				        
    23%
    
    
    12.09.2013
        
    
    	
         client PuTTY, developed by Simon Tatham, is also a free SSH implementation. It is subject to the MIT license and is currently at version 0.62 from 2011. All versions of SSH are largely compatible
    
 
		    
				        
    23%
    
    
    05.10.2018
        
    
    	
         install -y autoconf automake libtool bison
$ yum install -y gcc-c++ patch readline readline-devel zlib zlib-devel
$ yum install -y libyaml-devel libffi-devel openssl-devel make bzip2
$ gem install public_suffix -v 2.0.5
$ yum
    
 
		    
				        
    23%
    
    
    22.12.2017
        
    
    	
         into the compiler (Haskell is type safe) makes attacks time-consuming or impossible, and SQL and JavaScript injections unlikely. Additionally, the Glasgow Haskell Compiler (GHC) [6], version 1.0 of which has existed
    
 
		    
				        
    23%
    
    
    28.11.2021
        
    
    	
         the performance characteristics of Solr and Lucene.
The Regain [5] project was another product that used Lucene as a search engine on the desktop. However, it was discontinued after the release of version 2.1.0
    
 
		    
				    
    23%
    
    
    08.01.2013
        
    
    	 
        _LOCAL_MACHINE\System\CurrentControlSet\Services\LanManWorkstation\Parameters]
DWORD DomainCompatibilityMode 1
DWORD DNSNameResolutionRequired 0
The preceding code tells the registry to add two DWORD
    
 
		    
				        
    23%
    
    
    28.11.2021
        
    
    	
        ) string {
16   var h hash.Hash
17
18   f, err := os.Open(file)
19   if err != nil {
20     log.Fatal(err)
21   }
22
23   defer f.Close()
24
25   switch hashfunc {
26   case "md5":
27     h = md5.New()
28
    
 
		    
				        
    23%
    
    
    11.06.2014
        
    
    	
         installation of Kolab 3.0 and later is a matter of one or two cups of coffee and does not impose too many requirements on the admin. The Kolab developers recommend a recent CentOS (preferably 6.4) as the basis
    
 
		    
				        
    23%
    
    
    05.02.2019
        
    
    	
         manipulate it? One simple approach to spoofing can be found in the base.c file in the sources of older kernel versions:
res = access_process_vm(task, mm->arg_start, buffer, len, 0);
For each entry