9%
25.03.2020
a separate installation package on GitHub. On macOS machines, you need at least macOS 10.12. Additionally, PowerShell Core 6.x can also run in Docker containers and on the Kali Linux security distribution
9%
05.12.2016
to the local network. The app also supports IPv6, but is not set up using mobile device management (MDM, i.e., security software used by the IT department to manage and secure mobile devices
9%
18.07.2013
on the Apache Foundation download page [4] in Other files
, below the binaries/win32 directories. In CentOS 6.4, the mod_ssl module is not part of the Apache2 package; you have to install the mod_ssl package
9%
26.01.2025
contributorGalleryRole
11 ]
12 }
13
14 resource networkConnection 'Microsoft.DevCenter/networkConnections@2024-02-01' = {
15 name: networkConnectionName .. .. }
16
17 resource attachedNetworks 'Microsoft
9%
27.03.2013
as a regular client to gain access to the data. Libvirt 0.9.12 or later can handle CephX, but the setup is not very intuitive. The following example is based on the assumption that a user named libvirt
exists
9%
07.04.2022
.
Magic?!
To create a new policy and escalate the privilege [6] inside the environment to the administrator, the attacker can use the command:
$ aws iam create-policy-version --policy-arn arn
9%
30.05.2021
ensure => installed,
10 before => File[$config_file],
11 }
12 file { $config_file:
13 ensure => file,
14 content => template('apache/httpd.conf'),
15 notify => Service[$service_name],
16 }
17
9%
20.03.2014
is tailored to work closely with Red Hat's own OpenStack distribution, RDO [2]. Kickstack, in turn, is more concerned with the classic Ubuntu environment running Ubuntu LTS version 12.04. Until one of the two
9%
13.06.2016
Standard Filesystems
Distribution
Filesystem
Debian (from v7.0 wheezy)
ext4
Ubuntu (from v9.04)
ext4
Fedora (from v22)
XFS
SLES (from v12
9%
30.11.2025
of Ubuntu, 10.04 (Lucid Lynx), which comes with Postfix 2.7 and Dovecot 1.2. In the following example, both components should be installed and functional, and the individual user accounts should come from