30%
20.08.2012
the port after the file transfer has completed (but not without moving to the netcat-traditional
package, as mentioned before):
{ echo -ne "HTTP/1.0 200 OK\r\n\r\n"; cat filename.tar.gz; } | nc -l -p 15000
30%
31.10.2025
):
{ echo -ne "HTTP/1.0 200 OK\r\n\r\n"; \
cat filename.tar.gz; } | nc -l -p 15000
Be warned that this might not work for you, but with some trial and error, to enable some extra interaction, you could try
30%
20.05.2014
the Zabbix server. Zabbix nodes are subordinate servers but offer the same functions as a Zabbix server.
In version 2.2, Zabbix has more than 100 new features compared with version 2.0.9. For example, a value ... in version 2.2. ... Zabbix 2.2 ... Zabbix release 2.2
30%
05.02.2019
Containers, this was 1.6 seconds. The classic runC run time needs 0.6 seconds for the same task, and this value is stable even if the number of passes that can be configured in the script varies by using the N
30%
17.06.2011
,200, comprising 55 different commands, were issued. The system, a server with 768MB RAM and a Pentium 3 CPU, took a total of 22 seconds to answer them, the longest response took 32 milliseconds, the shortest
30%
10.09.2012
to logfiles, and it’s pretty simple to use:
[laytonjb@test1 ~]$ logger "This is a test"
...
[root@test1 ~]# tail -n 2 /var/log/messages
Aug 22 15:54:47 test1 avahi-daemon[1398]: Invalid query packet.
Aug 22 17
30%
07.10.2014
Amount of virtual memory used by the process
1405m
1,405MB
RES
Amount of physical memory used by the process
1.0g
1.0GB
SHR
Shared memory used
30%
18.02.2018
. The required modifications are explained in the Huginn wiki [3].
The software is based on Ruby on Rails [4] and therefore requires an installed Ruby environment; in fact, it needs version 2.2 or 2
30%
02.10.2012
port 22) to port 2222, for example, to stop port scans filling up your logs. Without TCP Wrappers enabled, scans might run dictionary attacks on your server where password combinations are guessed by one
30%
31.10.2025
's usually TCP port 22) to port 2222, for example, to keep port scans from filling up your logs. Without TCP Wrappers enabled, scans might run dictionary attacks on your server where password combinations