17%
01.08.2019
) on path (example.net\Policies\{B30A27B8-8221-42B7-BA9F-BC6D2E9D7227}), should be O:DAG:DAD:PAR(A;OICI;0x001f01ff;;;DA)(A;OICI;0x001f01ff;;;EA)(A;OICIIO; 0x001f01ff;;;CO)(A;OICI;0x001f01ff;;;DA)(A;OICI;0x001
17%
30.04.2012
, use the winenum
script and the scraper
script. The winenum
script will dump tokens and hashes, providing you with lots of information (see Figure 6). The scraper
script will pull down the registry
17%
28.11.2021
Creating a graphical user interface (GUI) with the Fyne framework [1] requires some preparation, including installing the GCC compiler and a graphics driver [2]. You will also need at least Go v1.12
17%
13.06.2016
="hanscees@hanscees.con" #adjust
11
12 LECROOT="/etc/letsencrypt/live"
13 mkdir /root/letsencrypt #justincase
14
15 #lets get certs
16 echo "will get the certs now" & sleep 3
17 for i in `echo $DOMAINS` ; do
18 echo "getting certs
17%
22.05.2023
Zabbix monitoring stack with:
$ helm repo add zabbix-community https://github.com/zabbix-community/helm-zabbix
$ helm install -n zabbix --create-namespace zabbix --set zabbix_image_tag: alpine-6.4-latest
17%
27.09.2021
includes a wide variety of dynamic routing protocols. It should be noted that BSD-based operating systems do not support all functions. A close look at the feature matrix [6] is also recommended for Linux
17%
16.07.2019
a “wrapper function” for the library in Python (Listing 6).
Listing 6: Wrapper Function
import ctypes
_sum = ctypes.CDLL('libsum.so')
_sum.sum_function
17%
25.05.2012
):
6 partitions
130494 total reads
1796014 merged reads
15370134 read sectors
1467900 milli reading
211902 writes
1267923 merged writes
11997432 written sectors
17%
09.10.2013
is effectively designed like a supercomputer, with a host-side, dual-core Zynq-7010 ARM A9 CPU running Ubuntu 12.04, flanked by a 16-core Epiphany accelerator running at 700MHz. Priced at US$ 99, as opposed
17%
08.10.2015
. The container cannot write to them, thus preventing privileged processes in containers from manipulating the host system.
The kernel breaks down root privileges into capabilities [6] and assigns capabilities