16%
11.06.2014
architecture => 'i686'
10 kernel => 'Linux'
11 kernelrelease => '3.11.0-15-generic'
12 }
13 $hostname = 'sugar'
14 $operating_system = 'Ubuntu'
15 $operatingsystem = 'Ubuntu'
16 $operating
16%
18.09.2012
2 apache2-mpm-prefork apache2-utils apache2.2-bin \
apache2.2-common apache2-doc apache2-suexec libapache2-mod-php5 libapr1 \
libaprutil1 libaprutil1-dbd-sqlite3 libaprutil1-ldap libapr1
16%
17.08.2011
_costs = {
't1.micro' => 0.02,
'm1.small' => 0.095,
'c1.medium' => 0.19,
'm2.2xlarge' => 1.14,
'm2.4xlarge' => 2.28
}
Then I list the regions. This could have been dynamic, but I don’t want
16%
21.03.2017
18 print "dset.shape = ",dset.shape
19
20 print "dset.dtype = ",dset.dtype
21
22 print "dset.name = ",dset.name
23
24 print "f.name = ",f.name
25
26 grp
16%
14.08.2017
-A INPUT -p tcp -s [IP address of allowed server] --dport 22 -j ACCEPT
on the server to which you want to SSH.
Trick 2: Copying Files Securely
The SSH protocol also includes Secure Copy (SCP
16%
30.05.2021
can't be bothered to do what's right, although it's your responsibility to be sure they do. That sounds a lot like a classic catch-22 situation. Although, I never read the book or saw the movie, I
16%
09.04.2019
.stringify(arr));
22 }
23 }
24
25 delItem(text) {
26 const arr = this.listItem().filter(stext => text !== stext);
27 localStorage.setItem('annotations', JSON.stringify(arr.length>0?arr:[]));
28
16%
03.02.2022
"Accept" -> "text/html",
16 "User-Agent" -> "LinuxMagazine/1.0.1",
17 "Accept-Encoding" -> "gzip, deflate",
18 "Connection" -> "keep-alive",
19 "DNT" -> "1" )
20
21 // http connector
22
16%
31.10.2025
% of 454.22GB Processes: 168\r
60 Memory usage: 22% Users logged in: 1\r
61 Swap usage: 0% IP address for eth0: 192.168.1.250\r
62 \r
63 Graph this data
16%
30.11.2025
the smoke and mirrors that some pieces of software employ to keep their workings secret, fail2ban is transparent in the work it does behind the scenes.
In simple terms, fail2ban [3] keeps a close eye on your