91%
30.11.2025
); i+= 4096) newblock[i] = 'Y';
12 printf("Allocated %d MB\n", allocation);
13 }
14 }
Things are more interesting when memory is being used. Uncommenting line 11 does just that. The OOM
90%
30.11.2025
(number, label):
07 for i in xrange(number):
08 print ' ' + str(i) + ' ' + label
09 sleep((number - 15)/10.0)
10
11 if '__main__' == __name__:
12
13 p1 = Process(target = count, args = (20
90%
30.11.2025
: -p localhost-20120310-133840.raw.gz -P -f ./PLOT -ocz
06 # Host: localhost DaemonOpts:
07 # Distro: Scientific Linux release 6.2 (Carbon) Platform: GA-MA78GM-US2H
08 # Date: 20120310-133840 Secs
90%
30.11.2025
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple ... 6
90%
30.11.2025
an Asterisk PBX as an HA resource
07 #
08 # Authors: Martin Gerhard Loschwitz
09 # Florian Haas
10 #
11 # Support: linux-ha@lists.linux-ha.org
12 # License: GNU General Public
90%
30.11.2025
08 default:
09 $(MAKE) -C $(KDIR) M=$(PWD) modules
10 endif
11
12 clean:
13 rm -rf *.ko *.o *.mod.c *.mod.o modules.order
14 rm -rf Module.symvers .*.cmd .tmp
89%
30.11.2025
$spin
08 @$molecule.xyz
09
10 END
11
12 done
13 done
The Gaussian 09 (g09) computational chemistry simulation package uses a small input that tells it what type of predictions are desired and which
89%
30.11.2025
the Buffer
01 [global]
02 ioengine=libaio
03 direct=1
04 filename=testfile
05 size=2g
06 bs=4m
07
08 refill_buffers=1
09
10 [write]
11 rw=write
12 write_bw_log
13
14 [read]
15 stonewall
16 rw=read
17 write
89%
30.11.2025
endpoint1=192.168.80.0/24
07 endpoint2=192.168.2.0/24
08 action=requireinrequireout
09 auth1=computerpsk
10 auth1psk="test123"
11 qmsecmethods=esp:sha1-3des
12 qmpfs=dhgroup2
If you need
89%
30.11.2025
, some parts of which are standardized and some of which are defined by the device manufacturer.
In production, the Standard MIB II ranges (1.3.6.1.2.1.*) and the vendor-specific area below