12%
05.12.2016
: The project tests under various conditions, including other distributions. (Slide by Holger Levsen [2])
As part of the test, the system builds around 10,000 packages twice. In May 2016, source packages
12%
05.08.2024
://gb.archive.ubuntu.com/ubuntu jammy-updates/main amd64 curl amd64 7.81.0-1ubuntu1.15 [194 kB]
[...]
Setting up pkg-config (0.29.2-1ubuntu3) ...
Setting up git (1:2.34.1-1ubuntu1.10) ...
Setting up curl (7.81.0-1ubuntu1
12%
18.02.2018
on the server(s). You have several ways to accomplish this, ranging from easy to a bit more difficult.
Remote Logging the Easy Way
The simple way to perform remote logging comes with some risk: Configure a cron
12%
06.10.2019
The end of the road is nothing like nigh for Google's Kubernetes container orchestrator, reflected not least in sheer numbers: The May 2019 KubeCon saw 7,700 participants. Clearly, no manufacturer
12%
04.06.2014
No matter how jaded the word “cloud” has become as a buzzword, it has had little effect on the cloud’s popularity, especially in the enterprise: OpenNebula, openQRM, and Eucalyptus are all examples
12%
05.02.2019
namespace starts the pods that run the Ceph components themselves.
Remember that for a Ceph cluster to work, it needs at least the monitoring servers (MONs) and its data silos, the object storage daemons
12%
27.09.2021
The object ID (1c9c09d7-4b3c-4f37-b2cf-e3b8ad0a2ecf
in this example) can then be used to search for audit entries:
Get-AzureADAuditDirectoryLogs -Filter "targetResources/any (tr:tr/id eq '1c9c09d7-4b3c-4f37
12%
30.05.2021
be vulnerable.
In a PowerShell command prompt window (CMD), run the following command under the SkyArk folder:
PS C:\SkyArk> Scan -AWShadowAdmins -AccessKeyID AKIA5DWQIQ2MR6OXXXXX -SecretKey BYptvF+QF2kk8W4
12%
28.11.2021
("
") method specifies a title for the header of the newly created program window.
Listing 1
Basic Fyne Framework
01 package main
02
03 import (
04 "fyne.io/fyne/v2"
05 "fyne.io/fyne/v2/app
12%
09.06.2018
, or a traditional PC, notebook, mobile phone, or tablet.
A third threat is social engineering. The con man has been around for thousands of years in one form or another, but the majority of successful attacks start