49%
10.12.2023
to A2 on the second storage device on the right. The third block is written to A3, and so on, in a round robin fashion. This is referred to as striping data across the two devices. As the I/O rate goes
49%
19.08.2014
characters or a diversified character set. "An automated tool can crack a completely random eight-character password including four character types such as "N^a&$1nG" much faster than a 28-character passphrase
49%
16.08.2018
| nova | compute |
| 266b6275884945d39dbc08cb3297eaa2 | ceilometer | metering |
| 4f0ebe86b6284fb689387bbc3212f9f5 | cinder | volume |
| 59392edd44984143bc47a89e111beb0a
49%
07.03.2019
; you should collapse two or more loops.
Table 4: Collapsing Loops
Fortran
C
!$acc parallel loop collapse(2)
do i=1,n
...
do j=1,m
...
enddo
49%
30.11.2025
.168.209.200
07 192.168.209.200:3260,1 iqn.1986-03.com.sun:02:8f4cd1fa-b81d-c42b-c008-a70649501262
08 # iscsiadm -m node
09 # /etc/init.d/open-iscsi restart
10 # fdisk -l
11 Disk /dev/sdb: 2147 MB, 2147418112 bytes
49%
30.11.2025
types (geographical, infrastructure, and so on), which is part of the default installation scope.
Shapes and Sizes
Zabbix is released under the GNU GPL, and the latest version 1.8.9 can be downloaded
49%
06.10.2022
in this article [4] supports upgrades from CentOS 8, and another script called migrate2rocky9.sh supports RHEL 9-based distributions. If you are still using CentOS 7, the recommended solution is to set up a new ... CentOS users need to find a replacement soon. If you use CentOS 8 and you're looking for safer ground, the migrate2rocky script will automatically migrate your system to Rocky Linux – an enterprise ... migrate2rocky ... Migrating CentOS to Rocky Linux with migrate2rocky
49%
02.08.2021
%[=============================================================================================>] 1.77M 8.85MB/s in 0.2s
2021-03-21 15:40:30 (8.85 MB/s) - 'perf-5.9.0.tar.xz' saved [1857268/1857268]
Extract the file into a local working directory
$ tar xJf perf-5.9.0.tar.xz
and change
49%
05.09.2011
can see how the arp cache poisoning works:
$ sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 \
-D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2:78:9E \
-H 00:22:6E:71:04:BB -M 00:0C:29:B2:78:9E
49%
05.12.2014
[<-] 220 mx.google.com ESMTP t2fjm4427fd213ply.2523 - gsmtp
[->] EHLO smtp.box.tld
[<-] 250 SMTPUTF8
[->] STARTTLS
[<-] 220 2.0.0 Ready to start TLS
[->] EHLO smtp.box.tld
[<-] 250 SMTPUTF8
[->] AUTH LOGIN