17%
29.08.2011
will be installed:
bridge-utils libaio1 libvirt-bin libvirt0 libxen3 qemu-common qemu-kvm seabios vgabiosSuggested packages: lvm2 mol-drivers-macosx openbios-sparc kvm-pxe ubuntu-vm-builder uml
17%
05.12.2014
and email and embeds data from external platforms such as YouTube or Vimeo. The users can also link cloud storage like Dropbox or Amazon S3 buckets with the service.
The program generates preview images
17%
17.04.2017
developed by the Scalable Platforms Management Forum (SPMF) of the Distributed Management Task Force (DMTF). Version 1.0 of the standards was released in August 2015, followed by version 1.0.2 in December
17%
12.08.2013
example, the last OSD in the cluster is osd.2
– that is, the OSD with ID 2 (counting starts at 0).
The next OSD will then have ID 3 On Charlie, you need to create the OSD directory:
mkdir -p /var
17%
07.06.2019
with timeout 15 seconds
03 if status != 0 for 3 cycles then exec "/usr/bin/ansible-playbook rebuild_node.yml"
04 if status != 0 for 3 cycles then exec "/usr/bin/mail -s 'Node 5 ping failed
17%
16.05.2013
, with NOMODULES set, no modules are available:
Listing 2
Setting NOMODULES
$ module list
Currently Loaded Modulefiles:
1) fftw/3.3.2/gnu4 2) mpich2/1.4.1p1/gnu4
$ ssh n0
$ module list
Currently
17%
30.11.2025
virtual webs.test.com {
15 active = 1
16 address = 192.168.1.250 eth0:0
17 vip_nmask = 255.255.255.0
18 port = 80
19 send = "GET / HTTP/1.0\r\n\r\n"
20 expect = "HTTP"
21 ... 3
17%
02.10.2012
addresses to connect /etc/hosts.allow
, the file would simply look like this:
sshd: 10.10.10.10, 1.2.3.4, 21.21.21.21
TCP Wrappers works nicely, even if you change the standard SSH port (it’s usually TCP
17%
30.04.2012
, severity, name, and family of each plugin as it relates to the Metasploit Framework (see Figure 3). The Name
section tells you which Metasploit exploits have the best chance to be successfully against
17%
30.11.2025
Version 3.0 of Hyper-V in Windows Server 8 offers several improvements in terms of networking that improve the system's performance. Examples include direct access by virtual machines to the network