11%
11.02.2016
.com/hashicorp/otto/examples/mongodb"
06 }
07 }
08
09 project {
10 name = "my-project"
11 infrastructure = "my-infrastructure"
12 }
13
14 infrastructure "my-infrastructure" {
15 type = "aws"
16
11%
18.07.2013
/zertifikat.pem
07 SSLCertificateKeyFile /etc/apache2/ssl/privatekey.pem
08
09
10 Options Indexes FollowSymLinks
11
12
13 CustomLog /var/log/apache2/ssl
11%
02.08.2021
:13 ipa.initramfs.sha256
13 -rw-r--r-- 1 42422 42422 9.1M Mar 2 10:13 ipa.kernel
14 -rw-r--r-- 1 42422 42422 101 Mar 2 10:12 ipa.kernel.sha256
15
16 # file /var
11%
30.11.2025
clear
03 while true
04 do
05 echo "New record"
06 maxrecord=`ls -1 *.dat | sort | tail -1 | cut -d. -f 1`
07 newrecord=$(echo $maxrecord + 1 | bc )
08 width=`echo $newrecord | wc -c`
09
10 ...
11
12
11%
30.11.2025
Finding I/O-Intensive Apps
01 #!/usr/bin/stap
02
03 global totals;
04 probe vfs.read
05
06 {
07 totals[execname(), pid()]++
08 }
09
10 probe end
11 {
12 printf("** Summary ** \n")
13 foreach
11%
23.03.2022
laytonjb laytonjb 19946519 Nov 20 2020 Lmod-8.4.15.tar.gz
31988342 drwxrwxr-x 2 laytonjb laytonjb 4096 Oct 27 14:22 mpibzip2-0.6
31988329 -rw-rw-r-- 1 laytonjb laytonjb 92160 Oct 27 14:18 mpibzip
11%
07.06.2019
-jdk-alpine
02
03 RUN apk add --no-cache git openssh-client curl bash # for Jenkins AWT
04 ttf-dejavu
05
06 ARG JENKINS_USER=jenkins
07 ARG UID=1000
08 ARG HTTP_PORT=8080
09 ARG JENKINS
11%
30.11.2025
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple
11%
30.11.2025
08 default:
09 $(MAKE) -C $(KDIR) M=$(PWD) modules
10 endif
11
12 clean:
13 rm -rf *.ko *.o *.mod.c *.mod.o modules.order
14 rm -rf Module.symvers .*.cmd .tmp
11%
30.11.2025
an Asterisk PBX as an HA resource
07 #
08 # Authors: Martin Gerhard Loschwitz
09 # Florian Haas
10 #
11 # Support: linux-ha@lists.linux-ha.org
12 # License: GNU General Public