18%
13.06.2016
/run/systemd/resolve/resolv.conf /etc/resolv.conf
mkdir /etc/systemd/network
Listings 2 and 3 show the two configuration files for the regular Ethernet card (Listing 2) and bridge device (Listing 3
18%
14.08.2017
% 0 0.0KB/s 00:00
To copy a file from a remote system, change the syntax slightly:
scp bob@calypso:/opt/test/file.txt .
The trailing dot means the copy is to the current directory
18%
28.11.2022
/s, 133M issued at 133M/s, 81.6M total
0B repaired, 163.06% done, no estimated completion time
scan: resilvered (draid1:3d:5c:1s-0) 20.2M in 00:00:00 with 0 errors on Mon Oct 24 17:11:22 2022
18%
05.12.2014
instances in that file, as shown in Figure 3.
Figure 3: Grep says the five-line text file has four lines of the pattern "one."
Many extensions exist
18%
03.04.2024
: https://ciq.com/.
Apple's PQ3 Brings Post-Quantum Security to iMessage
The Apple security team has announced PQ3, a cryptographic security upgrade in iMessage. According to the announcement (https ... In the news: CIQ Offers Long-Term Support for Rocky Linux on AWS; Apple's PQ3 Brings Post-Quantum Security to iMessage; Google Open Sources Magika File-Type Detection System; Microsoft Announces Sudo
18%
06.10.2022
find ready-made policy bundles online for many use cases, and they are likely to contain a useful, predefined set of rules. A freely accessible Playground [2] and a free Styra Academy [3] can help you
18%
28.03.2012
/log/collectl -r00:00,7 -m -F60 -s+YZCD --iosize
################################################################################
# Collectl: V3.6.1-4 HiRes: 1 Options: -p localhost-20120310-133840.raw.gz -P -f
18%
13.12.2022
Packages:
(1/6): dhcp-common-4.3.6-47.el8.noarch.rpm 902 kB/s | 206 kB 00:00
(2/6): dhcp-libs-4.3.6-47.el8.x86_64.rpm 3.1 MB/s | 147 kB 00:00
(3
18%
05.08.2024
, as in Python [3] or Node [4].
Recent books have been published about writing shell commands in Rust [5], Python [6], Node.js [7], and even Go [8], and it is into this last language's interesting performance
18%
22.08.2011
to launch one of several different “modes” against your password hashes. The first mode is a quick crack attempt using the supplied password list file, password.lst
. This list contains more than 3