ubuntu server guidection Introduction 3 cloud-images/amazon-ec2 Amazon EC2 3 cloud-images/google-cloud-engine Google Compute Engine (GCE) 3 find-ubuntu-images-on-azure Microsoft Azure 2 Multipath 3 device-mapper-mul to seed database containers: $ echo 'CREATE DATABASE my_db;' > my-database.sql $ sudo docker run -d --name my-database -e TZ=UTC \ -e POSTGRES_PASSWORD=mysecret \ -v $(pwd)/my-database.sql:/docker-entrypoint-initdb initdb.d/my-database.sql:ro \ ubuntu/postgres:latest The docker-entrypoint-initdb.d/ directory we’re using here is special in that files ending in the .sql extension (or .sql.gz or .sql.xz) will be0 码力 | 486 页 | 3.33 MB | 1 年前3
Ubuntu Server Guide 18.04blogs, wikis, etc. The large amount of information available can be overwhelming, but a good search engine query can usually provide an answer to your questions. See the Ubuntu Support4 page for more information Selects packages needed for an OpenSSH server. • PostgreSQL database: This task selects client and server packages for the PostgreSQL database. • Print server: This task sets up your system to be a print effect, so use with caution. • Update the Package Index: The APT package index is essentially a database of available packages from the repositories defined in the /etc/apt/sources.list file and in the0 码力 | 413 页 | 1.40 MB | 1 年前3
openEuler OS Technical Whitepaper
Innovation Projects
(June, 2023)Scenario enablement Linux kernel x86, Arm, RISC-V GPU NPU Real-time kernel Security kernel Database Big data Resource orchestration Desktop system Industrial application ... ... openEuler OpenHarmony active-active failover in the event of storage faults or host-side I/O timeouts, effectively resolving cross-engine failures and host unawareness issues. Server 013 openEuler OS Technical White Paper Innovation White Paper Innovation Projects Rubik sig-CloudNative Rubik is a hybrid container deployment engine with adaptive single-node computing power optimization and quality of service (QoS) assurance.0 码力 | 116 页 | 3.16 MB | 1 年前3
openEuler 21.03 技术白皮书token management, creation, and modification functions for other OpenStack components, and uses a database such as MySQL to store authentication information. • Nova provides VM creation, running, migration ecosystem. Compared with Docker, which is compiled using Golang, iSulad is a new universal container engine that meets different requirements in the CT and IT fields through a unified architecture. The lightweight a fault within 10 seconds and complete the switchover within 1 second. Application scenario 2: database and system service protection The HA cluster solution supports mainstream OSs and application software0 码力 | 21 页 | 948.66 KB | 1 年前3
大学霸 Kali Linux 安全渗透教程--------------------------------- add Adds records to the database back Exits current prompt level del Deletes records from the database exit Exits current prompt level help Loads specified module pdb Starts a Python Debugger session query Queries the database record Records commands to a resource file reload Reloads all modules resource Executes :PRINTABLE:'om' Certificate is to be certified until Apr 25 06:55:05 2015 GMT (365 days) Write out database with 1 new entries Data Base Updated User om added to OpenVAS. 以上输出的信息显示了生成客户端证书的详细过程,并添加了om用户。0 码力 | 444 页 | 25.79 MB | 1 年前3
This Debian Reference (version 2.109) character clipboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 8.1 List of IBus and its engine packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 9 locate -d . pattern find matching filenames using shell ”pattern” (quicker using regularly generated database) grep -e ”pattern” *.html find a ”pattern” in all files ending with ”.html” in current directory ”/var/lib/dpkg/info/*.md5sums” file with debsums(1). See Section 10.3.5 for how MD5sum works. Note Because MD5sum database may be tampered by the intruder, debsums(1) is of limited use as a security tool. It is only good0 码力 | 266 页 | 1.25 MB | 1 年前3
Linux命令大全搜索工具 v1.8(DER/PEM/ENG) (SSL) —key 私钥文件名 (SSL) —key-type 私钥文件类型 (DER/PEM/ENG) (SSL) —pass 私钥密码 (SSL) —engine 加密引擎使用 (SSL). “—engine list” for list —cacert CA证书 (SSL) —capath CA目录 (made using c_rehash) to verify peer shell中,将LS_COLORS设为目前预设置的shell指令; 2. -c或--csh或--c-shell:显示在C shell中,将LS_COLORS设为目前预设置的shell指令; 3. -p或--print-database:显示预设置; 4. -help:显示帮助; 5. -version:显示版本信息。 文件:指定用来设置颜色的文件。 1. [root@localhost ~]# dircolors -p 143/tcp 内部使用: file nfs -> 123/udp samba -> 137/138/139/445/tcp ftp -> 20/21/tcp remote ssh -> 22/tcp sql mysql -> 3306/tcp oracle -> 1521/tcp 场景四 nat 转发 场景五 防CC攻击 1. iptables -L -F -A -D # list flush0 码力 | 1347 页 | 8.79 MB | 1 年前3
Cilium v1.7 DocumentationKafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing Memcached Locking down external access using AWS metadata Advanced Networking Policy Enforcement Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Getting Started Using MicroK8s This guide uses microk8s [https://microk8s Policy Enforcement Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Getting Started Using K3s This guide walks you through installation of0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.8 DocumentationKafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing Memcached Locking down external access using AWS metadata Creating policies Policy Enforcement Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Getting Started Using MicroK8s This guide uses microk8s [https://microk8s Policy Enforcement Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Getting Started Using K3s This guide walks you through installation of0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.9 DocumentationKafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing Memcached Locking down external access using AWS metadata Creating policies Policy Enforcement Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Getting Started Using MicroK8s This guide uses microk8s [https://microk8s Policy Enforcement Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Getting Started Using K3s This guide walks you through installation of0 码力 | 1263 页 | 18.62 MB | 1 年前3
共 56 条
- 1
- 2
- 3
- 4
- 5
- 6













