36%
04.12.2024
://bsd-cloud-image.org/ is used as a source
mkdir tmpimages
cd tmpimages
wget https://github.com/hcartiaux/openbsd-cloud-image/releases/download/v7.5_2024-05-13-15-25/openbsd-min.qcow2
# Create a virtual machine and assign
36%
10.06.2015
the account with the global administrative privileges in Azure AD. The account is specified in the form of an email address (e.g., syncadmin@contoso.onmicrosoft.com
). Next, define your local AD's service
36%
05.08.2024
_GCPCPSTST
FROM alpine:3.19 AS dockerize
ENV DOCKERIZE_VERSION v0.7.0
RUN wget https://github.com/jwilder/dockerize/releases/download/$DOCKERIZE_VERSION/dockerize-alpine-linux-amd64-$DOCKERIZE_VERSION.tar.gz && tar
36%
03.09.2012
on your system, use:
oscap oval eval --id oval:com.redhat.rhsa:def:20120017 com.redhat.rhsa-all.xml
Of course, the OpenSCAP scanner will only provide meaningful results if the content you want
36%
01.02.2013
).
Figure 3: The tload tool [7] graphs system load averages in the terminal.
Info
[1] Uptime man page (search on “uptime” if it doesn’t redirect): [https://developer.apple.com
36%
29.06.2011
graphics performance out to the host system, which is particularly interesting for a Virtual Desktop Infrastructure.
Infos
Microsoft Hyper-V product page:http://www.microsoft.com
36%
21.08.2012
speeds from cached hostfile
* elrepo: mirror.symnds.com
* epel: www.gtlib.gatech.edu
* rpmforge: mirror.teklinks.com
* sl: ftp.scientificlinux.org
* sl-security: ftp.scientificlinux.org
Setting up
36%
21.08.2012
speeds from cached hostfile
* elrepo: mirror.symnds.com
* epel: www.gtlib.gatech.edu
* rpmforge: mirror.teklinks.com
* sl: ftp.scientificlinux.org
* sl-security: ftp.scientificlinux.org
Setting up
36%
04.10.2018
Given "sslyze" is installed # gauntlt-1.0.13/lib/gauntlt/attack_adapters/sslyze.rb:1
sslyze.py not installed or $SSLYZE_PATH not set!
1. Download sslyze from: https://github.com
36%
04.10.2018
PowerSploit: https://powersploit.readthedocs.io/en/latest/
DDL manipulation: https://github.com/PowerShellMafia/PowerSploit/blob/master/CodeExecution/Invoke-DllInjection.ps1
PowerForensics module