20%
05.12.2014
(HostCt, ServerOwner, Date) %>%
106 arrange(desc(HostCt))
107 head12 <- head(top12, 25)
108
109 mergedTop25 <- rbind(head1,head2,head3,head4,head5,
head6,head7,head8,head9,head10,head11,head12)
110
111
20%
01.08.2019
INPUT
iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -A INPUT -i eth0 -j DROP
iptables -A INPUT -i eth1 -p tcp --dport 22 -j ACCEPT
iptables -A INPUT -i eth1 -j DROP
20%
05.12.2016
as the user name.
Amanda versions before 3.3.9 have a vulnerability that lets this user execute arbitrary code with root privileges. A (manual) upgrade to version 3.3.9 is only necessary if you don't trust
20%
16.10.2012
bytes:215392635 (215.3 MB) TX bytes:1759757 (1.7 MB)
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK
20%
25.03.2020
7 1 56008 loop1
06 7 2 56184 loop2
07 7 3 91264 loop3
08 259 0 244198584 nvme0n1
09 8 0 488386584 sda
10 8 1 1024 sda1
11
20%
10.04.2015
.org
Tutanota
ProtonMail
Mailbox from EUR1
Yes/2GB
Yes/2GB
Free/1GB
Free/500MB
Storage space expansion
Yes
Yes
Yes
Currently
20%
21.01.2020
7 1 56008 loop1
06 7 2 56184 loop2
07 7 3 91264 loop3
08 259 0 244198584 nvme0n1
09 8 0 488386584 sda
10 8 1 1024 sda1
11
20%
25.03.2020
"TracingConfig": {
17 "Mode": "PassThrough"
18 },
19 "CodeSha256": "37n/rzJz4o2lyvh4s2aet2aBlY=adc",
20 "Description": "",
21 "CodeSize": 432,
22 "FunctionArn": "arn
20%
02.08.2022
.
The primary changes made to the benchmarks of the latest version 3.4.2 of the NPB are:
added class F to the existing S, W, A, B, C, D, E
added dynamic memory allocation
added MPI and Open
20%
07.01.2014
a great deal of power in a few lines:
rm -rf backup.3
mv backup.2 backup.3
mv backup.1 backup.2
cp -al backup.0 backup.1
rsync -a --delete source_directory/ backup.0/
To better understand the script, I