30%
18.02.2018
. The required modifications are explained in the Huginn wiki [3].
The software is based on Ruby on Rails [4] and therefore requires an installed Ruby environment; in fact, it needs version 2.2 or 2
30%
10.06.2015
to encrypt my data with a very long cipher key (almost as large as I can get). According to the Evil 32 website [9], using modern GPUs, 32-bit key IDs can be decoded. They say that it only takes four seconds
30%
25.03.2020
, according to the README file, requires "half the memory, all in a binary less than 40MB" to run. By design, it is authored with a healthy degree of foresight by the people at Rancher [3]. The GitHub page [4
30%
04.08.2020
REPOSITORY TAG IMAGE ID CREATED SIZE
dslim/docker-slim latest 2622a843b5f5 3 weeks ago 21.3MB
nginx latest 231d40e811cd 4 weeks ago 126MB
30%
04.08.2020
grants permissions to enable GuardDuty.
If some instances expose ports like 22 or 3389 to the world (0.0.0.0/0), you should soon see some findings of malicious IPs trying to get into your systems
30%
06.10.2019
.path.isfile( "/opt/openvpn/ca/keys/" + username + ".crt"):
13 # print "Cert for " + username + " exists"
14 a=1
15 else:
16
17 # get user details
18 detailsurl
30%
06.10.2019
# Configuration for the seed node DC1N1
04 # The name could stand for datacenter 1, node 1
05 DC1N1:
06 image: cassandra:3.10
07 command: bash -c 'if [ -z "$$(ls -A /var
30%
11.10.2016
Kingsbury and his team recommend proactive monitoring with Riemann [1], which allows you to predict imminent failures and initiate countermeasures in a timely manner.
The program, first published in 2012
30%
13.02.2017
of around 250MB to Amazon's S3 storage very effectively. A number of successful container technologies have been used extensively in the past, including LXC, Solaris Zones, and FreeBSD jails, to name
30%
09.06.2018
as the kernel and all other processes. Isolation from the rest of the environment only occurs if you take care of this yourself with tools such as chroot [8], SELinux [9], or AppArmor [10].
Flatpak's structure