15%
12.03.2013
MB_nor/s rMB_dir/s wMB_dir/s rMB_svr/s wMB_svr/s ops/s rops/s wops/s
192.168.1.250:/home
1230649.19 1843536.81 0.00 0.00 1229407.77 1843781
15%
16.10.2012
to the screen (STDOUT; line 15).
Listing 1: SSH Script
01 #!/usr/bin/php
02
03
04 $ssh = ssh2_connect('192.168.1.85', 22);
05 ssh2_auth_password($ssh, 'khess', 'password');
06 $stream = ssh2_exec
15%
26.11.2013
ability of web browsers to encrypt and decrypt application data using JavaScript, is currently under review by the World Wide Web consortium (W3C) as a draft. This promising technology reaches well beyond
15%
20.05.2014
, and physical memory (32- and 64-bit windows).
dc3dd [2] – a tool that captures the content of memory on the infected system; dc3dd is basically the standard *nix dd utility upgraded for forensic use, which
15%
02.08.2021
within 90 days at the latest, you can set an expiration date:
Set-ADAccountExpiration -Identity svc_low_SQL3 -TimeSpan 90.00:00:00
You will certainly want to minimize the number of accounts whose
15%
03.08.2023
: "routers",
"value": "192.168.2.254"
}],
"reservations": [{
"hw-address": "00:11:22:33:44:55",
"ip-address": "192.168.2.60",
hostname: "host-2-60"
}, {
"hw-address": "00:00:00:00:00
15%
05.12.2019
TIME CMD
Root 1 0 0 19:05 ? 00:00:00 sleep 1000
Listing 2
Process on the Host
$ ps -ef|grep sleep
Cherf 30328 29757 0 20:44 ? 00:00:00 sleep 1000
Cherf 30396 3353
15%
02.02.2021
interacts with the environment as an agent, much like a sentient being (Figure 3). The agent has to explore the environment and typically only learns after a certain number of actions whether
15%
31.05.2012
_mat_stat
3.37
39.34
11.64
54.54
22.07
8.12
rand_mat_mul
1.00
1.18
0.70
1.65
8.64
41.79
Table 1: Benchmark Times
15%
21.04.2015
-r--r-- 2 root root 6 3. Feb 18:36 .glusterfs/0d/19/0d19fa3e-5413-4f6e-abfa-1f344b687ba7
#
# ls -alid dir1 .glusterfs/fe/9d/fe9d750b-c0e3-42ba-b2cb-22ff8de3edf0 .glusterfs
/00/00