14%
30.11.2025
creates a 256MB file in the current directory along with process for the job. This process reads complete file content in random order. Fio records the areas that have already been read and reads each area
14%
30.01.2020
sports a few additional capabilities, the most noteworthy being its ability to measure page faults and swapping activity by the tested binary:
$ /usr/bin/time gcc test.c -o test
0.03user 0.01system 0:00
14%
22.12.2017
for an intrusion attempt.
Figure 1: PC1 sends out a data frame with the destination address ABCD.EF00.0004. The switch receives it at port 1 and then searches
14%
14.03.2013
/sbin/named ...
774 ?? SsJ 0:00,12 /usr/sbin/sshd ...
781 ?? IsJ 0:00,87 /usr/sbin/cron -s
...
The jls command lets you view all the currently active jails, as shown in Listing 6.
Listing 6
Active Jails
14%
21.04.2015
-r--r-- 2 root root 6 3. Feb 18:36 .glusterfs/0d/19/0d19fa3e-5413-4f6e-abfa-1f344b687ba7
#
# ls -alid dir1 .glusterfs/fe/9d/fe9d750b-c0e3-42ba-b2cb-22ff8de3edf0 .glusterfs
/00/00
14%
01.02.2013
at the output of uptime
[1] on OS X:
13:03 up 2 days, 12:01, 2 users, load averages: 0.52 0.59 0.63
The uptime
command displays the load average in its common form, averaging the last one, five, and 15
14%
14.11.2013
-persistent-net-generator.rules
openSUSE, Red Hat 6
* /etc/udev/rules.d/70-persistent-net.rules* No net generator rules since 12.3. Instead, the biosdevname package is used to identify the NICs
14%
27.05.2025
server, you can search the web server logfile, access_log, for the HTTP GET request for the zoo RPM file from the client:
# grep zoo /var/log/httpd/access_log
10.8.12.141 - - [11/Oct/2024:00:14:14 -0500
14%
28.11.2021
can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection" [1], has been written up in a number of books. Linux Magazine
reported more than 12 years ago [2
13%
30.11.2025
. To automate this process on a Windows DHCP server, you can use the netsh command. To create a new reservation, just issue the following:
netsh dhcp server scope 10.10.0.0 add reservedip 10.10.47.11 00E0C0E0B0B