59%
03.01.2013
:3.4.3-1.el6 epel 9.1 M
Installing for dependencies:
GraphicsMagick x86_64 1.3.17-1.el6 epel 2.2 M
GraphicsMagick-c++ x86_64 1.3.17-1.el6
59%
17.02.2015
for x in rep.df.rx2(2)])
17
18 devs.png(file=path, width=512, height=512)
19 ro.r.plot(x_vals, y_vals, xlab=x_lab, ylab=y_lab, main=main)
20 devs.dev_off()
21
22 rep ... The statistical programming language R dissects its database in a masterful way, and you can embed your R in Python using the Rpy2 interface. ... 25
59%
05.09.2011
control over what is displayed.
>>> pkts = sniff(prn=lambda x:x.sprintf(“{IP:%IP.src% → %IP.dst%\n}{Raw:%Raw.load%\n}”))
You can narrow down the ports that you sniff, as port 25 and 110 -- common ports
59%
25.03.2020
7 1 56008 loop1
06 7 2 56184 loop2
07 7 3 91264 loop3
08 259 0 244198584 nvme0n1
09 8 0 488386584 sda
10 8 1 1024 sda1
11
59%
28.11.2023
-data-dir /home/kevin/.vscode/cli tunnel service internal-run
|-- 35321 sh /home/kevin/.vscode/cli/servers/Stable-f1b07bd25dfad64b0167beb15359ae573aecd2cc/server/bin/code-server --connection-tok>
...
Oct 14 15:20
59%
09.04.2019
[...]
13 [...]
The JavaScript code (Listings 2-5) resolves the tags into a document fragment that includes stylesheet information. (For readability, the code is divided
59%
30.11.2025
4: Controlling Scapy output.
>>> pkts = sniff(prn=lambda x:x.sprintf("{IP:%IP.src% -> %IP.dst%\n}{Raw:%Raw.load%\n}"))
To sniff the common ports for mail clients, 25 and 110, enter
59%
22.08.2011
.keys.sort.each do |s|
14 printf "%20s %d\n", s, summary[s]
15 end
16 puts "Polling for changes (Ctrl-C to end)"
17 loop do
18 sleep 2
19 client.instances.each do |inst|
20 if state[inst.id] != inst.state
21
59%
20.03.2014
(hercules) 03.12.2013 _x86_64_ (2 CPU)
09:46:03 runq-sz plist-sz ldavg-1 ldavg-5 ldavg-15 blocked
09:46:13 1 468 0.02 0.06 0.14 0
9
59%
11.04.2016
hiawatha running
www-data 4766 0.1 0.3 118232 4016 ? Ssl 20:13 0:00 /usr/sbin/hiawatha
You can use netstat to check the bindings:
netstat -tulpn
See the output in Listing 2.
Listing 2