20%
09.10.2017
server with a compromised MySQL binary. A forensics professional informed me that the following strings belonged to a Trojan:
7A 50 15 00 40 00 67 30 15 02 11
9E 68 2B C2 99 6A 59 F7 F9 8D 30
20%
07.02.2019
data copy(a)
!$acc parallel loop
do i=1,n
a(i) = 0.0
enddo
!$acc data end
#pragma acc data copy(a)
{
#pragma acc parallel loop
{
for (int i=0; i < n; i++)
{
a[i] = 0.0
20%
28.11.2011
to show seconds and microseconds since the beginning of the Unix epoch (00:00:00 UTC on January 1, 1970) (Figure 3).
Figure 3: Reporting time since
20%
25.03.2020
/server/node-token
K10fc63f5c9923fc0b5b377cac1432ca2a4daa0b8ebb2ed1df6c2b63df13b092002::server:bf7e806276f76d4bc00fdbf1b27ab921
API Token
Make sure you note the API token correctly or you might see the error
20%
17.01.2023
:
ohpc-slurm-client x86_64 2.6-7.1.ohpc.2.6 OpenHPC-updates 6.9 k
Installing dependencies:
cairo x86_64 1.15.12-6.el8 appstream
20%
04.04.2023
:
ohpc-slurm-client x86_64 2.6-7.1.ohpc.2.6 OpenHPC-updates 6.9 k
Installing dependencies:
cairo x86_64 1.15.12-6.el8 appstream
20%
30.01.2020
sports a few additional capabilities, the most noteworthy being its ability to measure page faults and swapping activity by the tested binary:
$ /usr/bin/time gcc test.c -o test
0.03user 0.01system 0:00
20%
22.12.2017
for an intrusion attempt.
Figure 1: PC1 sends out a data frame with the destination address ABCD.EF00.0004. The switch receives it at port 1 and then searches
20%
14.03.2013
/sbin/named ...
774 ?? SsJ 0:00,12 /usr/sbin/sshd ...
781 ?? IsJ 0:00,87 /usr/sbin/cron -s
...
The jls command lets you view all the currently active jails, as shown in Listing 6.
Listing 6
Active Jails
20%
21.04.2015
-r--r-- 2 root root 6 3. Feb 18:36 .glusterfs/0d/19/0d19fa3e-5413-4f6e-abfa-1f344b687ba7
#
# ls -alid dir1 .glusterfs/fe/9d/fe9d750b-c0e3-42ba-b2cb-22ff8de3edf0 .glusterfs
/00/00