19%
02.02.2021
file, you can use either the command,
$ export TELER_CONFIG="/root/teler.yaml"
a shell-wide environment variable (sometimes this path refers internally to a container path, so it might not work
19%
03.12.2015
, open a terminal window, become root (use sudo su on Ubuntu), then run the two following commands:
echo "* hardnofile 65535" > /etc/security/limits.conf
echo "* soft nofile 65535" > /etc
19%
11.02.2016
to the root domain of an AD structure (Listing 1). To do so, you need the administrator password for the domain with which you want to establish the trust. Another possibility is initiating the trust from
19%
11.02.2016
relating to the security of the individual containers. If you had root privileges in one container, you were able – for a long time – to issue arbitrary commands with root privileges on the host. This did
19%
11.04.2016
version 2.0 or newer (for Ubuntu in the python-boto
package).
Once the conditions are met, you can download the source code package from the Duplicity website, extract it, and then – working as root
19%
25.03.2020
------- 1 root root 253, 0 Jan 16 23:15 /dev/mapper/rc-wa_md0
Listing 5
Verify Mapping
$ sudo rapiddisk --list
rapiddisk 6.0
Copyright 2011 - 2019 Petros Koutoupis
List of RapidDisk device
19%
18.02.2018
, you could write the logs as a non-root user to a file located somewhere on a common cluster filesystem. A simple way to accomplish this is to create a special user, perhaps lumberjack, and have
19%
18.02.2018
needs to start and manage. For a JavaScript application, this step is very simple. The file name must be Procfile and has to be located in the repository's root directory.
The file instructs the platform
19%
08.10.2015
flavor of German.
SystemRescueCd: Back to the Roots
SystemRescueCd [5] is an appropriate name for the next project; it is a succinct description of the tasks its authors supply on a Live CD or USB stick
19%
08.10.2015
by root is not the ideal solution security-wise. Any attacker who has escalated their privileges to root can read it. However, the key makes random sniffing by curious users more difficult and provides