9%
30.11.2025
Container
04 ou: SUDOers
05
06 dn: cn=goodboys_rule,ou=SUDOers,dc=tuxgeek,dc=de
07 objectClass: top
08 objectClass: sudoRole
09 cn: goodboys_rule
10 sudoUser: %goodboys
11 sudoHost: ALL
12 sudoCommand: /usr
9%
30.11.2025
#! /bin/sh
02
03 while true
04 do
05
06 zeit=$(date +%d.%m.%y\ %H:%M\ )
07
08 psql -U monitor -d monitor -c "select * from watch;"
09
10 if [ $? -eq 2 ];
11
12 then
13
14 echo "$time: Database
9%
30.11.2025
a supportable release available for Ubuntu 12.04. According to the blueprint, the plan is "to achieve a high quality level under functional and load conditions for the identified use cases. The Ubuntu team plans
9%
27.08.2014
provide useful information beyond how ioprof works. The benchmark I will use is IOzone.
IOzone Example
The ioprof test ran while I was running iozone three ways: (1) sequential write testing with 1MB
9%
19.02.2013
computers running the Linux distributions CentOS 5 and 6, Debian 5 and 6, Fedora, Gentoo, Mageia, openSUSE, RHEL 5 and 6, Scientific Linux, and Ubuntu 10.04, 11.04, and 12.04. Additionally, it can handle
9%
04.10.2018
"data_dir": "/var/consul",
08 "datacenter": "Datacenter-A",
09 "disable_update_check": true,
10 "enable_script_checks": true,
11 "enable_syslog": true,
12 "encrypt": "xxxxxxxxxxxxxx
9%
13.12.2018
is the distribution must include systemd [3].
However, if you really want to stay safe, you might want to rely on one of the three distributions officially supported by Microsoft:
RHEL 7.3+
SELS v12 SP2
9%
30.11.2020
== 0:
08 data = { 'key1' : [10,10.1,10+11j],
09 'key2' : ('mpi4py' , 'python'),
10 'key3' : array([1, 2, 3]) }
11 else:
12 data = None
13 # end if
14
15 data = comm
9%
02.02.2021
}
12 }
13
14 // ---- in PHP 8 --------
15 $bdate = $user?->address?->getBirthday()?->asString();
Where a class needs to encapsulate an address or other data, the developer usually first notes
9%
09.10.2017
rule phishing_pdf {
02
03 meta:
04 author = "James Stanger"
05 last_updated = "2017-09-12"
06 category = "phishing"
07 confidence = "high"
08 threat_type = "phishing exploit"
09 description