100%
25.09.2023
Rubén Llorente ... is easy enough (superuser privileges are required):
arp -s 192.168.90.55 00:0c:29:c1:91:b1
The last field of the command is the MAC address, which is the unique identifier of the network device to which
96%
01.06.2024
Rubén Llorente ... because Sake sets a number of shell variables that are passed to the task being run, which can include:
S_NAME
S_HOST
S_USER
S_PORT
S_TAGS
Listing 3
Multi-OS Upgrade Task
95%
03.02.2022
Rubén Llorente ... either OpenPGP or S/MIME keys into the Nitrokey (see the "What is OpenPGP?" box). The steps for changing the PINs are very intuitive (Figure 3), but key initialization is not.
What is Open
74%
10.04.2015
Gateway is connected: Inktank itself provides detailed documentation that explains the entire process [6]. In the end, you have an instance of the Ceph Object Gateway that speaks S3 and can be used ... Admins can solve typical mail server scalability problems with Dovecot’s Amazon S3 plugin and the Ceph distributed object store. ... Dovecot and S3 ... Scalable mail storage with Dovecot and Amazon S3
72%
04.12.2024
Rubén Llorente ... of machines.
Tools such as FAI created for physical machines are of use when deploying virtual machines, as well, as are distro-specific tools (e.g., autoinstall for OpenBSD [2], preseed for Debian [3
72%
02.06.2020
Rubén Llorente ... fails to complete. If the script does not work with your distribution, a manual install will be required [3].
The EasyInstall script has the following prerequisites:
Apt or Yum package managers
71%
30.01.2024
Rubén Llorente ... iRedMail-related products.
The downloadable installer is the product I focus on in this article. The free-tier product, licensed as free open source software under the GPL3, is a set of scripts
71%
30.11.2025
Rubén Llorente ... service runs on is available, check Repology [3] to verify that openEuler has the packages you need.
I strongly advise backing up your servers before you attempt to upgrade them. While the migration suite
68%
14.11.2013
, the DDoS attack on Spamhaus was triggered by 36-byte data packets, each of which triggered a 3,000-byte response.
Although a normal desktop PC can handle about 1,000 DNS requests per second, a single DNS ... In some particularly sophisticated DDoS attacks, the attackers rely on and target the cloud, allowing attackers to work around conventional defense mechanisms. We explain how a DDoS attack ... DDoS in the Cloud
67%
09.10.2017
boto3
3
4 s3 = boto3.resource('s3')
5 bucket = s3.Bucket('prosnapshot')
6 bucket.download_file('hello.txt', 'hello-down.txt')
Figure 2 ... Data on AWS S3 is not necessarily stuck there. If you want your data back, you can siphon it out all at once with a little Python pump. ... Data Exchange with AWS S3 ... Getting data from AWS S3 via Python scripts