30%
16.03.2021
RAID Status
cat /proc/mdstat
Personalities : [linear] [multipath] [raid0] [raid1] [raid6] [raid5] [raid4] [raid10]
md0 : active raid1 sdd1[1] sdc1[0]
244065408 blocks super 1.2 [2/2] [UU
30%
10.09.2012
to logfiles, and it’s pretty simple to use:
[laytonjb@test1 ~]$ logger "This is a test"
...
[root@test1 ~]# tail -n 2 /var/log/messages
Aug 22 15:54:47 test1 avahi-daemon[1398]: Invalid query packet.
Aug 22 17
30%
28.11.2021
:/usr/sbin:/bin/sh
bin:x:2:2:bin:/bin:/bin/sh
sys:x:3:3:sys:/dev:/bin/sh
(...)
reboot;
Connection closed by foreign host.
Metasploitable runs many more insecure services that an Nmap scan brings to light (Listing 3
30%
31.07.2013
;
22 my_record.z = counter + 2;
23 my_record.value = (float) counter * 10.0;
24 /* write out my_record */
25 }
26 return 0;
27 }
One-by-One
Initially, I’m just going
30%
17.05.2017
, ALLOCATABLE, TARGET :: DATA(:,:) ! Data to write
18 INTEGER :: RANK = 2 ! Dataset rank
19
20 CHARACTER(MPI_MAX_PROCESSOR_NAME) HOSTNAME
21 CHARACTER(LEN=100) :: FILENAME ! File name
22 CHARACTER(LEN=3) :: C
30%
12.09.2018
. Moreover, you don't need to add or run a special client tool on the client nodes or a special server tool on the storage node; SSH just needs to be active on your system. Almost all firewalls allow port 22
30%
04.10.2018
't need to add or run a special client tool on the client nodes or a special server tool on the storage node; SSH just needs to be active on your system. Almost all firewalls allow port 22 access, so you
30%
04.10.2018
",
19 "VERSIONEDCONSULREGISTRATION": "false"
20 },
21 "retry_join": [
22 "consul.datacenter-a.internal.myprivatedns.net"
23 ],
24 "server": true
25 }
The Amazon
30%
02.08.2021
-physical-network physnet1 --share provisionnet
# openstack subnet create --network pxenet --subnet-range 192.168.21.0/24 --ip-version 4 --gateway 192.168.21.254 --allocation-pool start=192.168.21.22,end=192
30%
02.02.2021
the configuration file that I created, replacing the top stanza with my specific Apache logfile format.
Listing 3
log_format in Config File
# 68.XXX.XXX.XXX - - [22/Nov/2020:11:03:36 +0100] "GET /wp