6%
25.03.2021
normally does not add a footer to the pages with Apache Server at www.example.com Port 443
. In contrast, ServerTokens defaults to Full, and the resulting output is a header. You can query this header
6%
17.02.2015
.041GFLOPS for double-precision. This level of performance won't get a cluster of Raspberry Pi's on the TOP500 any time soon, but that's not the real point of the RPi. The point is to get fully featured
6%
09.08.2015
. The "Vivid Vervet" box describes how to compile the software for Ubuntu 15.04.
Vivid Vervet
You first need to install all required packages [5] to install Cockpit in Ubuntu 4.15:
sudo apt-get install
6%
04.12.2024
administrators are happy to see that export functions are available, at to least export the content to, for example, XML, so those who know how to use scripts will achieve quick and good results manually.
A pair
6%
14.03.2018
's configuration. This can't start with the installation of Python, because apt first has to get to know the upstream proxy; this again happens in raw mode here.
Listing 6
Internal VM Configuration
01
6%
30.11.2025
of the client request (both for POST and for GET), as well as the most important server environment details [6]. Additionally, you can use regular expressions. For example, to investigate an HTTP request to find
6%
20.03.2014
:
cd /
curl -k http://pkgsrc.joyent.com/packages/SmartOS/bootstrap/bootstrap-2013Q3-x86_64.tar.gz | gzcat | tar-xf -
To rebuild the package database and update it, enter:
pkg_admin rebuild
pkgin -y up
6%
18.08.2021
to test a simple example so I can get a feel for the postprocessing output. I grabbed an example from a previous article (Listing 1). Although this example doesn’t produce much I/O, I was curious to see
6%
05.08.2024
].
Figure 1: The IBM AIX collection is available for download from Ansible Galaxy.
Getting Started
The AIX collection [6] contains a large number of modules and roles to help you manage AIX
6%
22.05.2023
-us/windows-hardware/design/device-experiences/oem-secure-boot
Using TPM on Windows: https://learn.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm#tpm-in-windows
Root of trust for protecting Windows: https://learn.microsoft