30%
25.09.2023
hosts [9]. A more apt comparison is found in Listing 2, with the results posted by a Raspberry Pi 400 [10], which is essentially a Raspberry Pi 4 (Broadcom BCM2711 Cortex-A72, ARM v8 quad-core running
30%
14.03.2013
results= clubs.find({"club":club})
22 results = results.count()
23
24
25 return bottle.template('result', {"club":club, "results":results})
26
27 bottle.run(host='localhost', port=8080, debug=1
30%
27.08.2014
.2% (53.2% cumulative)
20.1 GB 4.9% (58.0% cumulative)
22.4 GB 4.5% (62.5% cumulative)
24.6 GB 4.1% (66.7% cumulative)
26.8 GB 3.8% (70.5% cumulative)
29.1 GB 3.2% (73.7% cumulative)
31.3 GB 3.0% (76.6% cumulative)
33
30%
07.10.2014
seq_timeout = 10
08 tcpflags = syn
09 command = /usr/sbin/iptables -A INPUT -s \
%IP% -p tcp --dport 22 -j ACCEPT
10
11 [closeSSH]
12 sequence = 9000
30%
15.08.2016
$ ip link set br0 up
24 $ ip -f inet addr show br0
25 9: br0: mtu 1500 qdisc noqueue state UNKNOWN group default
26 inet 192.168.56.130/24 scope global br0
27
30%
28.11.2023
):
ssh-keygen -t ed25519 -a 100 -f
ubuntu-sre-id_ed25519 -q -N
2. Copy the SSH public key data on the target server to the authorized_keys file in the $HOME/.ssh directory. You can use the secure copy
30%
12.09.2013
$st2->execute($dbh->{pg_pid});
16 if( !$st2->fetchrow_arrayref->[0] ) {
17 warn "couldn't stop backend PID=$dbh->{pg_pid}\n";
18 }
19 exit 1;
20 }
21
22 POSIX::sigaction(SIGTERM, POSIX
30%
16.03.2021
(local to host dev-machine)
UUID : a84b0db5:8a716c6d:ce1e9ca6:8265de17
Events : 22
Number Major Minor RaidDevice State
0 8 33 0 active
30%
10.09.2012
to logfiles, and it’s pretty simple to use:
[laytonjb@test1 ~]$ logger "This is a test"
...
[root@test1 ~]# tail -n 2 /var/log/messages
Aug 22 15:54:47 test1 avahi-daemon[1398]: Invalid query packet.
Aug 22 17
30%
28.11.2021
://nmap.org ) at 2021-07-25 22:05 CEST
Nmap scan report for metasploitable (192.168.122.236)
Host is up (0.095s latency).
Not shown: 65506 closed ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
23