30%
31.10.2025
on Linux servers.
Windows 8 and Windows Server 2012 introduce the new SMB protocol 2.2. It accelerates access to data on the network that has normally been stored locally, such as SQL Server databases
30%
27.08.2014
was the sequential write test using 1MB record sizes:
./iozone -i 0 -c -e -w -r 1024k -s 32g -t 2 -+n > iozone_write_1.out
To gather the block statistics, I ran ioprof in a different terminal window before I ran
30%
07.10.2014
seq_timeout = 10
08 tcpflags = syn
09 command = /usr/sbin/iptables -A INPUT -s \
%IP% -p tcp --dport 22 -j ACCEPT
10
11 [closeSSH]
12 sequence = 9000
30%
15.08.2016
via 192.168.1.1 dev eth1
13 $ ip netns exec ns1 ping -c2 8.8.8.8
14 PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.
15 64 bytes from 8.8.8.8: icmp_seq=1 ttl=51 time=22.1 ms
16 64 bytes from 8.8.8.8: icmp
30%
28.11.2023
):
ssh-keygen -t ed25519 -a 100 -f
ubuntu-sre-id_ed25519 -q -N
2. Copy the SSH public key data on the target server to the authorized_keys file in the $HOME/.ssh directory. You can use the secure copy
30%
12.09.2013
$st2->execute($dbh->{pg_pid});
16 if( !$st2->fetchrow_arrayref->[0] ) {
17 warn "couldn't stop backend PID=$dbh->{pg_pid}\n";
18 }
19 exit 1;
20 }
21
22 POSIX::sigaction(SIGTERM, POSIX
30%
16.03.2021
(local to host dev-machine)
UUID : a84b0db5:8a716c6d:ce1e9ca6:8265de17
Events : 22
Number Major Minor RaidDevice State
0 8 33 0 active
30%
10.09.2012
to logfiles, and it’s pretty simple to use:
[laytonjb@test1 ~]$ logger "This is a test"
...
[root@test1 ~]# tail -n 2 /var/log/messages
Aug 22 15:54:47 test1 avahi-daemon[1398]: Invalid query packet.
Aug 22 17
30%
28.11.2021
for a graphical approach to Metasploit.
Meterpreter [9] is probably the most appealing payload an attacker can install on a remote computer. It can be easily hidden in other file formats (e.g., PDFs), sent
30%
31.07.2013
Code Example
1 #include
2
3 /* Our structure */
4 struct rec
5 {
6 int x,y,z;
7 float value;
8 };
9
10 int main()
11 {
12 int counter;
13 struct rec my