27%
30.11.2020
on and the certificate to be used are defined as parts of the same configuration. The PFX file with the TLS certificate must be located in the root directory of the web application. The password is in plain text in the C
27%
30.11.2020
and run
inspec exec
or use InSpec's SSH capabilities, which may be the better approach,
inspec exec Example --key-files $HOME/.ssh/id_rsa --target ssh://root@10.42.0.1
especially
27%
14.03.2018
with different accounts within the Windows Server standard services. Windows Server offers different user groups that are available by default. These standard groups are important in the root domain, especially
27%
14.03.2018
.
Listing 1
MaxScale Top Queries Results
01 [root@drive-mgmt1 sessions]# cat top10.1181
02 Top 10 longest running queries in session.
03 ==========================================
04 Time (sec
27%
25.03.2021
the previous Order/Allow/Deny syntax.
Without explicit configuration, the Directory directive allows access to the entire root filesystem, which can be prevented by the configuration shown in Listing 1
27%
30.05.2021
location / {
root /usr/share/nginx/html;
index index.html index.htm;
http2_push /style.css;
http2_push /logo.png;
}
Many Small Files vs. One Big File
Over the years, HTTP/1.1 has shown
27%
02.08.2021
, change into the repository's root directory and build and install both the kernel modules and userspace utilities:
$ cd rapiddisk
$ make && sudo make install
Assuming that all libraries and package
27%
27.09.2021
and now under the auspices of the Linux Foundation, now also allow direct access to physical resources without placing too much strain on remaining resources such as the CPU.
Single-root I/O virtualization
27%
03.02.2022
cannot easily modify their own user records unless they know the system's secret key, which is protected under /var and should therefore only be known to the system and root. Second, when moving a home
27%
07.04.2022
the machine is launched, the script is executed and the attacker is able to get a running shell on the machine with the root user (Figure 14). In this way, the attacker has full control over the machine