22%
09.04.2019
: https://www.youtube.com/watch?v=y3ylZl-aFFg
iptraf: https://www.youtube.com/watch?v=cO0huATNxps
Glances: https://www.youtube.com/watch?v=TQgB0MD9crA
atop article: https://www.tecmint.com/how-to
22%
17.03.2020
:
$ cat /proc/partitions|grep nvme
259 0 244198584 nvme0n1
259 3 97654784 nvme0n1p1
259 4 96679936 nvme0n1p2
I will be using partition 1 for the L2ARC read cache, so to enable
22%
02.06.2020
around the GIL is to run computationally intensive code outside of Python with tools such as Cython [1] and ctypes [2]. You can even use F2PY [3] with compiled C functions.
All of the previously mentioned
22%
16.03.2021
(local to host dev-machine)
UUID : a84b0db5:8a716c6d:ce1e9ca6:8265de17
Events : 22
Number Major Minor RaidDevice State
0 8 33 0 active
22%
28.11.2021
:/usr/sbin:/bin/sh
bin:x:2:2:bin:/bin:/bin/sh
sys:x:3:3:sys:/dev:/bin/sh
(...)
reboot;
Connection closed by foreign host.
Metasploitable runs many more insecure services that an Nmap scan brings to light (Listing 3
22%
18.12.2013
(One-by-One)
1 #include
2
3 /* Our structure */
4 struct rec
5 {
6 int x,y,z;
7 float value;
8 };
9
10 int main()
11 {
12 int counter;
13 struct rec my_record;
14 int counter_limit;
15
22%
13.12.2018
18
19 Modules pm_buffer
20 MaxSize 102400 # 100 MByte buffer on the hard disk
21 Type disk
22
23
24
22%
20.10.2020
.2 gen 2 Type-A ports, 1 USB 3.2 Type-C, 2 RJ-45 LAN ports, 5 audio jacks, built-in Intel® Wireless-AC (a/b/g/n/ac/ax), and Bluetooth 5.0
To accommodate such power, System 76 had to put serious work
21%
02.02.2021
is enabled on that Apache server), such as this entry:
[Directory Bruteforce] /s?p=8f0f9570a1e1fb28f829a361441ab&t=bfd6c7c4&h=645cd72507b5af9d66d3425
I also found a number of WordPress attacks, most commonly
21%
10.06.2015
(c) 1999-2010 Igor Pavlov 2010-11-18
p7zip Version 9.20 (locale=en_US.UTF-8,Utf16=on,HugeFiles=on,1 CPU)
Scanning
Creating archive hpc_001.html.7z
Enter password (will not be echoed) :
Verify password