14%
25.10.2011
authentication_algorithm pre_shared_key;
08 dh_group modp1024;
09 }
10 generate_policy off;
11 }
12
13 sainfo address 192.168.2.0/24 any address 172.16.0.0/16 any {
14 pfs_group modp1024;
15
14%
12.09.2013
\nContent-Type: text/plain\n\n";
09 $|=1; $|=0; # flush
10
11 my $dbh;
12
13 $SIG{TERM}=sub {
14 $dbh->pg_cancel if $dbh and $dbh->{pg_async_status}==1;
15 };
16
17 $dbh
14%
16.02.2012
[OOOOOOOOOOOOOOO] 15/15
09
10 Files: 1
11 Directories: 0
12 Touched Pages: 15 (60K)
13 Elapsed: 0.001102 seconds
14 $
The -t
option “touches” the pages of the file, causing it to be loaded into the page
14%
30.11.2025
Resident Pages: 0/15 0/60K 0%
05 Elapsed: 8.1e-05 seconds
06 $ ./vmtouch -vt /bin/gzip
07 /bin/gzip
08 [OOOOOOOOOOOOOOO] 15/15
09
10 Files: 1
11 Directories: 0
12 Touched Pages: 15 (60K)
13
14%
30.11.2025
check) or as RC scripts.
Listing 2
CUPS Monitoring
01 #! /bin/sh
02
03 while true
04 do
05
06 lpq -Plp | grep -q "lp is ready"
07
08 if [ $? -gt 0 ]
09 then
10 cupsenable lp
11 fi
12
14%
07.06.2019
-jdk-alpine
02
03 RUN apk add --no-cache git openssh-client curl bash # for Jenkins AWT
04 ttf-dejavu
05
06 ARG JENKINS_USER=jenkins
07 ARG UID=1000
08 ARG HTTP_PORT=8080
09 ARG JENKINS
14%
20.10.2013
database [for details use: -P show]
ATA Version is: 8
ATA Standard is: ACS-2 (unknown minor revision code: 0x001f)
Local Time is: Sun Oct 13 09:12:15 2013 EDT
SMART support is: Available - device has SMART
14%
30.01.2020
region: eu-west-3
08 licensefile: license.lic
09 wholenet: 10.100.0.0/16
10 frontnet: 10.100.254.0/28
11 netmaskback: 17
12 backnet: "10.100.0.0/{{ netmaskback }}"
13 lnet: 10.0.2.0
14%
09.10.2017
rule phishing_pdf {
02
03 meta:
04 author = "James Stanger"
05 last_updated = "2017-09-12"
06 category = "phishing"
07 confidence = "high"
08 threat_type = "phishing exploit"
09 description
14%
23.03.2022
-34-1804/72
/dev/loop7 17441 17441 0 100% /snap/gnome-3-38-2004/87
/dev/nvme1n1p1 62513152 7087560 55425592 12% /home
/dev/nvme0n1p1 0 0 0 - /boot/efi
/dev/loop8 17495 17495 0