14%
04.08.2011
the biggest rentable cloud today: the Amazon Web Service. Based on this extremely mature technology, Citrix launched Version 5.6 of its XenServer product family in May 2010. XenServer, the product built around ... Version 5.6 of Citrix XenServer is a feature-stripped version of the virtualization product and is available free, in addition to the commercial Advanced, Enterprise, and Platinum editions.
14%
30.11.2025
.Xensource.xenapi.Connection;
07 import com.Xensource.xenapi.Host;
08 import com.Xensource.xenapi.Session;
09 import com.Xensource.xenapi.Task;
10
11 import de.pm.xenserver.utils.Server;
12
13 public class TestAPI {
14
15 ... Version 5.6 of Citrix XenServer is a feature-stripped version of the virtualization product and is available free, in addition to the commercial Advanced, Enterprise, and Platinum editions.
14%
20.06.2012
:root
bin:x:1:root,bin,daemon
daemon:x:2:root,bin,daemon
sys:x:3:root,bin,adm
adm:x:4:root,adm,daemon
tty:x:5:
disk:x:6:root
lp:x:7:daemon,lp
mem:x:8:
kmem:x:9:
wheel:x:10:root
mail:x:12:mail
uucp:x:14
14%
25.03.2020
_DATA=$1
06
07 # This is the Event Data
08 echo $EVENT_DATA
09
10 # Example of command usage
11 EVENT_JSON=$(echo $EVENT_DATA | jq .)
12
13 # Example of AWS command that's output will show up
14%
30.11.2025
: 1331404720 TZ: -0500
09 # SubSys: bcdfijmnstYZCD Options: cz Interval: 10:60 NumCPUs: 4 NumBud: 3 Flags: ix
10 # Filters: NfsFilt: EnvFilt:
11 # HZ: 100 Arch: x86_64-linux-thread-multi PageSize: 4096
12 # Cpu
14%
06.10.2019
used the example configuration file from the installation help page [6] (Listing 1). As you can see in line 12, the following container image registries are to be searched:
docker.io
registry
14%
05.09.2011
= kvmVM #specify the name
02 CPU = 1 # How many CPUs required?
03 MEMORY = 512 # RAM in MB
04 OS = [
05 KERNAL = "/boot/vmlinuz-2.6.32-24-generic", # Kernel to use
06
14%
11.02.2016
prompts you for your access and secret key (Figure 6). As an Amazon user, you are given both on registering with the service [12]. Next, click on your own name in the top right corner, select Security
14%
30.11.2025
the Buffer
01 [global]
02 ioengine=libaio
03 direct=1
04 filename=testfile
05 size=2g
06 bs=4m
07
08 refill_buffers=1
09
10 [write]
11 rw=write
12 write_bw_log
13
14 [read]
15 stonewall
16 rw=read
17 write
14%
30.11.2025
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple ... 6