17%
27.08.2014
.2% (53.2% cumulative)
20.1 GB 4.9% (58.0% cumulative)
22.4 GB 4.5% (62.5% cumulative)
24.6 GB 4.1% (66.7% cumulative)
26.8 GB 3.8% (70.5% cumulative)
29.1 GB 3.2% (73.7% cumulative)
31.3 GB 3.0% (76.6% cumulative)
33
17%
07.10.2014
to its GPRS and 3G customers, this approach opened up our servers to many more IP addresses than in our old system, with its 10 or 20 authorized IP addresses at the company offices and at the homes
17%
15.08.2016
ns2 ip addr add 1.1.1.2/10 dev veth2
18 $ ip netns exec ns1 ip link set veth1 up
19 $ ip netns exec ns2 ip link set veth2 up
20
21 $ ip netns exec ns1 ping -c2 1.1.1.2
22 PING 1.1.1.2 (1.1.1.2) 56
17%
28.11.2023
:43 ubuntu22-vbox code[33011]: [2023-10-14 15:20:43] debug [tunnels::connections::ws] sent liveness ping
Oct 14 15:20:43 ubuntu22-vbox code[33011]: [2023-10-14 15:20:43] debug [tunnels
17%
12.09.2013
$st2->execute($dbh->{pg_pid});
16 if( !$st2->fetchrow_arrayref->[0] ) {
17 warn "couldn't stop backend PID=$dbh->{pg_pid}\n";
18 }
19 exit 1;
20 }
21
22 POSIX::sigaction(SIGTERM, POSIX
17%
16.03.2021
=libaio, iodepth=32
fio-3.12
Starting 1 process
Jobs: 1 (f=1): [w(1)][100.0%][w=1420KiB/s][w=355 IOPS][eta 00m:00s]
test: (groupid=0, jobs=1): err= 0: pid=3377: Sat Jan 9 15:31:04 2021
write: IOPS=352, BW=1410Ki
17%
10.09.2012
@test1 ~]$ su
Password:
[root@test1 laytonjb]# more /opt/logs/module
Aug 22 09:41:20 test1 laytonjb: This is a test
Notice that a user cannot look at the log or modify it, but root can.
No it’s time
17%
28.11.2021
:/usr/sbin:/bin/sh
bin:x:2:2:bin:/bin:/bin/sh
sys:x:3:3:sys:/dev:/bin/sh
(...)
reboot;
Connection closed by foreign host.
Metasploitable runs many more insecure services that an Nmap scan brings to light (Listing 3
17%
17.05.2017
, ALLOCATABLE, TARGET :: DATA(:,:) ! Data to write
18 INTEGER :: RANK = 2 ! Dataset rank
19
20 CHARACTER(MPI_MAX_PROCESSOR_NAME) HOSTNAME
21 CHARACTER(LEN=100) :: FILENAME ! File name
22 CHARACTER(LEN=3) :: C
17%
12.09.2018
. Moreover, you don't need to add or run a special client tool on the client nodes or a special server tool on the storage node; SSH just needs to be active on your system. Almost all firewalls allow port 22