10%
30.11.2025
/ceph/$name.keyring
04 [mon]
05 mon data = /srv/mon.$id
06 [mds]
07 [osd]
08 osd data = /srv/osd.$id
09 osd journal = /srv/osd.$id.journal
10 osd journal size = 1000
11 [mon.a]
12 host = alice
13 mon
10%
01.06.2024
is, the fewer vulnerabilities it is likely to have. According to the report, container images smaller than 100MB had 4.4 high or critical vulnerabilities, versus 42.2 for images between 250 and 500MB ... and Management Software; LPI Launches Open Source Essentials Program; Apache Software Foundation Celebrates 25 Years; SUSE Announces Rancher Prime 3.0; NSA Issues Zero Trust Guidelines for Network Security
10%
27.09.2021
08 integer :: counter
09 integer :: counter_limit
10 integer :: ierr
11
12 type(rec) :: my_record
13
14 counter_limit = 2000
15
16 ierr = -1
17 open(unit=8,file
10%
30.05.2021
='y' clause along with the create table statement:
mysql> create table testTB (c1 INT) encryption='y';
mysql> alter table testTB encryption='y';
Query OK, 1 row affected (0.33 sec)
Records: 1 Duplicates: 0
10%
04.02.2014
Recheck: 978
11 -> Bitmap Index Scan on mail_msg_idx (cost=0.00..128.03 rows=4 width=0)
12 (actual time=34.925..34.925 rows=1650 loops=1)
13 Index Cond: (msg ~ '(updatable|views)'::text)
14
10%
18.03.2013
the matching compiler and a few packages. You can install these with the following command, for example, on Ubuntu 12.10:
sudo apt-get install ocaml ocaml-findlib libcalendar-ocaml libcalendar-ocaml-dev camlp4
10%
20.03.2014
the output accordingly with --type=service. All told, systemd currently provides 12 different unit types.
However, how do you know which fields belong to a log message? In this case, the journald -o verbose
10%
02.06.2020
has a 1.2 GHz quad-core processor, 1 Gb of RAM and up to 32 Gb eMMC storage. Compute modules sell for approximately $35 USD each.
Constantin Alexandrov, founder of Turing Machines Inc., says
10%
06.10.2019
of the Linux kernel's OOM logic [9] that went mainstream when Ubuntu 12.04 shipped version 3.2 of the Linux kernel. Processes are assigned a badness score
[10], primarily based on their memory footprint
10%
05.12.2016
to recover the encrypted files.
Once the encryption process is complete, Locky stores a ransom demand and also sets up a desktop background with a ransom demand. It requires the victim to pay a ransom of 0