19%
30.11.2025
"Polling for changes (Ctrl-C to end)"
17 loop do
18 sleep 2
19 client.instances.each do |inst|
20 if state[inst.id] != inst.state
21 if state[inst.id]
22 puts "#{inst.id} changed from
19%
05.02.2019
Laboratory Technical Report 536, 2002: https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-536.pdf
Becher, M., M. Dornseif, and C.N. Klein. "FireWire: All Your Memory are Belong to Us." A presentation at Can
19%
25.03.2020
"RevisionId": "aa63-b5c0-4ec2-a5e99",
11 "MemorySize": 128,
12 "Version": "$LATEST",
13 "Role": "arn:aws:iam::XXXXX:role/bashFunctionRole",
14 "Timeout": 3,
15 "Runtime": "provided",
16
19%
08.05.2019
; ia[i] = i;
test(a,b,c, SIZE);
for (i=0; in", a[i], b[i], c[i]);
}
Listing 9: nowait Output
0
19%
30.11.2025
:
09 bb:0f:e3:7f:3e:ab:c3:5d:32:78:85:04:a2:da:f1:61 root@host1
You need to distribute the public part, that is the /root/.ssh/id_rsa_cluster.pub
file, to all nodes in the cluster. The Strict
19%
30.11.2025
version [9].
Listing 3
/etc/openvpn/ccd/John_Doe
01 # John Doe
02 ifconfig-push 192.168.1.3 255.255.255.0
03 push "topology subnet"
04 push "redirect-gateway"
05 push "dhcp-option DNS 192
19%
21.04.2015
-r--r-- 2 root root 6 3. Feb 18:36 .glusterfs/0d/19/0d19fa3e-5413-4f6e-abfa-1f344b687ba7
#
# ls -alid dir1 .glusterfs/fe/9d/fe9d750b-c0e3-42ba-b2cb-22ff8de3edf0 .glusterfs
/00
19%
25.03.2020
7 1 56008 loop1
06 7 2 56184 loop2
07 7 3 91264 loop3
08 259 0 244198584 nvme0n1
09 8 0 488386584 sda
10 8 1 1024 sda1
11
19%
30.11.2025
existing backups, enter:
burp -a l -b a
Of course, more complex queries are also possible. For example,
burp -a l -b 3 -r
lists all of the files in backup 3 that match the "regular
19%
04.12.2024
applications from creating child processes
No
d4f940ab-401b-4efc-aadc-ad5f3c50688a
Blocks credential theft from the local security authority subsystem (lsass.exe)
Yes
9e6c4e1f