17%
30.07.2014
=> SOCK_STREAM)
or die "Couldn't connect to $remote_host:$remote_port: $@ \n";
while() {
my @lavg = Sys::CpuLoad::load();
my $ts=time();
print $socket "system.loadavg_1min $lavg[0] $ts\n";
print
17%
02.10.2012
port 22) to port 2222, for example, to stop port scans filling up your logs. Without TCP Wrappers enabled, scans might run dictionary attacks on your server where password combinations are guessed by one
17%
05.08.2024
://linuxnewmedia.thegood.cloud/s/9nFQcFb2p8oRMEJ
Pub/Sub: https://cloud.google.com/pubsub/docs/emulator
Bigtable quickstart: https://cloud.google.com/bigtable/docs/create-instance-write-data-cbt-cli
Cloud Spanner: https
17%
03.12.2015
of various as-a-service modules. Like OpenStack itself, requirements and expectations of OpenStack's users have also grown.
From a data center perspective, it might be sufficient to be able to provision
17%
03.04.2024
call up the application (line 6). You need to specify a profile to save the tool's configuration. As soon as the software has launched, you will find the password in the logs (line 9); it is generated
17%
28.11.2022
There Be Dell
Switching to a fourth system, this one running Linux on an Intel processor, I can make use of i7z [9], a tool explicitly written to visualize the state of Intel processors – including
17%
27.09.2021
Types "Unified" -MailEnabled $true -SecurityEnabled $true -LabelId f460a5b0-8d8e-4ac1-bb92-afb9ea22f9da
If you followed the steps and created the LabelActions as shown in the example, the labeled team
17%
20.03.2014
"name": "net0",
22 "description": "public"
23 }
24 ],
25 "ssh_key": true
26 },
27 "disk_driver": "virtio",
28 "nic_driver": "virtio",
29 "uuid": "555793a9-3c
17%
22.02.2017
, 6 ) / ( 4, 6 ) }
DATA {
1, 2, 3, 4, 5, 6,
7, 8, 9, 10, 11, 12,
13, 14, 15, 16, 17, 18,
19, 20, 21, 22, 23, 24
}
}
}
}
HDF5 has many ways to represent the same datatype
17%
01.08.2019
INPUT
iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -A INPUT -i eth0 -j DROP
iptables -A INPUT -i eth1 -p tcp --dport 22 -j ACCEPT
iptables -A INPUT -i eth1 -j DROP