23%
17.04.2012
highlighting for SQL statements, thus making the code far easier to read and syntax errors far easier to identify. Chive also lets you export SQL and CSV files (Figure 4
23%
14.05.2013
account and get a terminal session (Figures 4 and 5). The first time I do this, I will be asked to accept a key fingerprint.
Figure 4: Login via SSH
23%
12.10.2011
.3.11
Successfully installed actionmailer-2.3.11
Successfully installed activeresource-2.3.11
Successfully installed rails-2.3.11
6 gems installed
-----> Compiled slug size is 4.7MB
23%
29.06.2011
.
Dynamic memory technology manages memory on virtual machines (VMs) running on Hyper-V hosts (Figure 4). Virtual guests communicate with the hypervisor and tell it their RAM requirements. If the host has
23%
18.08.2021
).
Figure 3: Job summary tables from darshan-job-summary.pl output PDF.
Another group of useful tables are shown in Figure 4. The top table presents the cumulative time spent in reads and writes
23%
08.08.2022
commands.
For example, a user on a Linux system starts tty-share
(Figure 4). The URL is shared with the Windows user who then pastes it in their browser. Figure 5 is a screenshot of the Brave browser
23%
10.04.2015
-WMIObject Win32_OperatingSystem | fl Name, BuildNumber, Version
Name: Microsoft Windows 8.1 Enterprise|C:\Windows|\Device\Harddisk0\Partition4
BuildNumber: 9600
Version: 6.3.9600
The command
23%
14.08.2018
Suites:
Forward Secrecy OK - Supported
RC4 OK - Not Supported
* SSLV3 Cipher Suites:
Server rejected all cipher suites.
* Downgrade
23%
27.09.2021
, such as:
_acme-challenge.www.example.org. 300 IN TXT "Y5YvkzC_4qh9gKj6...jxAjEuX1"
Additionally, the protocol uses nonces to protect against replay attacks and provides a workflow for revoking issued
23%
28.11.2021
] about how the Dalai Lama and many a government had exploits foisted on them in PDFs [3]. Metasploit is everywhere.
Charly Kühnast also covered the topic in his Linux Magazine
sys admin column [4