13%
30.01.2024
, which Apt relies on to ensure that the packets come from a reliable source (line 2); add the package sources for Docker to the local list of package directories (line 3); and update the local package
13%
01.06.2024
a key pair for the service principal, (2) create the service principal itself with its configuration, and (3) grant consent for the Graph authorizations.
The example creates a service principal
13%
28.11.2023
the various MACsec encryption scenarios on a switch. The examples are based on Cisco Catalyst 9300 switches [2] [3] with IOS XE version 17.6 as the authenticator, a Windows endpoint with Cisco Secure Client
13%
09.01.2013
source products, such as OpenStack [1], openQRM [2], Eucalyptus [3], or Ganeti [4], each with its specific functionality and concepts.
Because of the diversity of scenarios, most cloud stacks behave
13%
13.02.2017
will be followed this time, although test builds are now available online [2].
Jigsawing
One core feature of Java 9 par excellence is the Java Platform Module System that became known as Project Jigsaw [3]. Thus
13%
03.02.2022
. To create a bootable USB stick, you can use the USB installer of your choice (e.g., Rufus [3]).
Now take the downloaded ce-2020.09.16.iso file and create a bootable USB CE installation stick with one
13%
07.04.2022
. Where rpm or dpkg take the stage on conventional systems, Helm comes into play with K8s.
Old Hand
Helm has been around for a few years in the K8s universe. The current version 3 is quite different from
13%
20.10.2013
of the drives (more on that later).
Smartmontools is compatible with all S.M.A.R.T. features and supports ATA/ATAPI/SATA-3 to -8 disks and SCSI disks and tape devices. It also supports the major Linux RAID cards
13%
08.08.2014
.
Another way to think of data analytics is the combination of two concepts: ``data analysis'' and ``analytics.'' Data analysis [3] is very similar to data analytics, in that it is the process of massaging
13%
28.11.2021
] about how the Dalai Lama and many a government had exploits foisted on them in PDFs [3]. Metasploit is everywhere.
Charly Kühnast also covered the topic in his Linux Magazine
sys admin column [4