13%
26.01.2025
installing the software locally and enter a proxy address of 127.0.0.1:8080
. You could also use a proxy auto-configuration (PAC) file to simplify the global network configuration; the required files
13%
21.04.2015
mounts and store data directly on GlusterFS. For this, the emulator and virtualizer must at least be version 1.3:
# ldd /usr/bin/qemu-system-x86_64\
|grep libgfapi libgfapi.so.0 => \
/lib64/libgfapi
13%
28.06.2011
storage, cost me just US$ 0.02. Alternatively, these providers will happily let you scale up and use massive amounts of capacity, as witness Netflix living in Amazon's EC2 cloud.
On the security side
13%
16.08.2018
dad34a3168?68d634f
foobar: test
Listing 2
Retrieving Credentials
$ rails console
Running via Spring preloader in process 19662
Loading production environment (Rails 5.2.0)
>> Shop
13%
13.12.2018
on http://127.0.0.1:5000
. You will see the overview of your local MISP server and can proceed to complete the configuration. If you click on Server Settings & Maintenance
below Administration
, you
13%
27.09.2021
/.acme.sh/www.example.com/www.example.com.cer -noout -issuer -subject -dates -serial
issuer= /C=US/O=Let's Encrypt/CN=R3
subject= /CN=www.example.com
notBefore=Feb 21 13:00:28 2021 GMT
notAfter=May 22 13:00:28 2021 GMT
serial=03B46ADF0F26B94C19443669
13%
05.02.2023
if the backup was not encrypted. Encryption was introduced in vSphere version 7.0 U2. However, the key remains in the hardware's trusted platform module (TPM), and the file can only be recovered on the same host
13%
30.05.2021
Buffer Language [4].
Infos
New features in sudo version 1.9.0: https://www.sudo.ws/stable.html#1.9.0
sudo source code: https://github.com/sudo-project/sudo
sudo download: https
13%
03.12.2015
for the Juju orchestration tool, Open vSwitch 2.4.0, and the Ceph 0.94.3 "Hammer" distributed storage system.
Ubuntu provides separate editions for various IT use cases, including Desktop and Server, as well
13%
09.04.2019
-found vulnerabilities (CVE-2019-1986, CVE-2019-1987, and CVE-2019-1988) can affect handsets running anything between Android 7.0 Nougat and current Android 9.0 Pie.
One of the three vulnerabilities allows a compromised