92%
31.10.2025
password 8 ZDF339a.20a3E
05 log file /var/log/quagga/zebra.log
06 service password-encryption
07 !
08 interface eth0
09 multicast
10 ipv6 nd suppress-ra
11 !
12 interface eth1
13 ip address 10
91%
30.11.2025
Finding I/O-Intensive Apps
01 #!/usr/bin/stap
02
03 global totals;
04 probe vfs.read
05
06 {
07 totals[execname(), pid()]++
08 }
09
10 probe end
11 {
12 printf("** Summary ** \n")
13 foreach
90%
31.10.2025
Application Definition File for CentOS
01 name: centos
02 summary: CentOS installation with BoxGrinder
03 os:
04 name: centos
05 version: 6
06 hardware:
07 partitions:
08 "/":
09 size: 4
10
90%
30.11.2025
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple ... 6
90%
30.11.2025
(number, label):
07 for i in xrange(number):
08 print ' ' + str(i) + ' ' + label
09 sleep((number - 15)/10.0)
10
11 if '__main__' == __name__:
12
13 p1 = Process(target = count, args = (20
90%
30.11.2025
08 default:
09 $(MAKE) -C $(KDIR) M=$(PWD) modules
10 endif
11
12 clean:
13 rm -rf *.ko *.o *.mod.c *.mod.o modules.order
14 rm -rf Module.symvers .*.cmd .tmp
90%
30.11.2025
, some parts of which are standardized and some of which are defined by the device manufacturer.
In production, the Standard MIB II ranges (1.3.6.1.2.1.*) and the vendor-specific area below
89%
30.11.2025
); i+= 4096) newblock[i] = 'Y';
12 printf("Allocated %d MB\n", allocation);
13 }
14 }
Things are more interesting when memory is being used. Uncommenting line 11 does just that. The OOM
89%
30.11.2025
_NOT_RUNNING
08 fi
09
10 pid=`cat $ASTRUNDIR/asterisk.pid`
11 ocf_run kill -s 0 $pid
12 rc=$?
13
14 if [ $rc -eq 0 ]; then
15 if ocf_is_true "$OCF_RESKEY_realtime"; then
16
89%
30.11.2025
of the stress test shown in Figure 2, shows that some 19,200 queries composed of 55 different commands were issued. The system, a server with 768MB of RAM and a Pentium 3 CPU, took a total of 22 seconds to answer