14%
15.05.2023
started this process, my day job didn’t allow me to get back to the project for over a month, and counting, so I haven’t been able to build and test the container from the chroot.) I could also write
14%
04.02.2014
for the victim’s email address (Figure 1) led to F:\Users\Sandy\AppData\Local\Microsoft\Windows\TemporaryInternetFiles\Low\Content.IE5\BYO5TPM7\display[1].html
14%
05.12.2014
takes everything literally, it is faster than grep. An example pattern file could look like this:
patternR2
patternD2
patternC3
patternP0
A very large logfile might also start with lots of similar
14%
09.01.2013
the virtual machines. The iSCSI standard does not actually envisage concurrent access to the same logical unit number (LUN) for two servers, so workarounds using LVM or cluster filesystems like OCFS2 and GFS2
14%
16.05.2013
, with the first alpha release on January 4, 1993, and the 1.0 release on February 17, 1994. In 1997, Octave became GNU Octave (starting with version 2.0.6). From the beginning, it was published under the GNU GPL
14%
20.03.2023
/local/lmod/lmod/init/cshrc /etc/profile.d/z00_lmod.csh
$ sudo ln -s /usr/local/lmod/lmod/init/profile.fish /etc/profile.d/z00_lmod.fish
The commands create links from specific Lmod init files in /usr/loal/lmod/lmod/init
to the general
14%
27.09.2021
the backup data. Since Windows Server 2016, this has been available in S2D. Note that you need the Datacenter Edition to run it because the Standard Edition does not offer this feature. With ordinary server
14%
11.04.2016
you install and set up ATA – which should take around 10 minutes – the system starts to analyze the network. If a trojan program or an attacker attempts to read usernames from AD, for example, the tool
14%
11.02.2016
, in_started date, in_expires date) RETURNS void
02 LANGUAGE plpgsql
03 STRICT
04 AS $$
05 BEGIN
06 <>
07 LOOP
08 UPDATE subscriptions
09 SET (started, expires) = (in_started, in
14%
03.02.2022
WinPcap. On Windows 10/11 and Windows Server 2016/2019, Npcap is better suited for analyzing data on the network in combination with Wireshark.
After starting Wireshark, the first step is to prepare