18%
07.10.2014
's S3. Scalability, (high) availability, and manageability were and still are the essential characteristics that Sheepdog seeks to provide. For Morita, setting up Ceph, which already existed at that time
18%
26.02.2014
total packets: sent: 12,243,355 recv: 1,467,914
bytes sent: total: 16.90 G per-sec: 3.22 M/s
bytes recv: total: 114.04 M
18%
11.10.2016
print "Cannot import matplotlib module - this is needed for this application.";
18 print "Exiting..."
19 sys.exit();
20 # end if
21
22
23 def column(matrix, i):
24 return [row[i] for row
18%
02.02.2012
in the region of 25 short URLs set up, and I can track hits in Apache’s logs and edit the URLs any way I like if any changes are made. Some URLs use words like demo
and others are extremely concise and just use
18%
04.12.2024
_awx_kube_ingress.yml) in the demo code declares an Ingress route:
apiVersion: networking.k8s.io/v1
kind: Ingress
Figure 1: Depending on your Kubernetes distribution, select an Open
18%
05.12.2016
't need a working X setup on the system, which is common in the admin world.
tput (TUI): Tput is part of the ncurses
package supplied with most Linux distributions. At first blush, tput [3] sounds really
18%
05.03.2014
-s 12:00:00 -e 13:00:00
Linux 3.5.0-43-generic (hercules) 02.12.2013 _x86_64_ (2 CPU)
12:05:01 CPU %user %nice %system %iowait %steal %idle
12
18%
20.03.2014
jcb@hercules:# sar -u -f /var/log/sysstat/sa02 -s 12:00:00 -e 13:00:00
Linux 3.5.0-43-generic (hercules) 02.12.2013 _x86_64_ (2 CPU)
12:05:01 CPU %user %nice %system
18%
27.09.2024
virtual instance for development and test purposes on which to carry out the work. Again, Ubuntu 22.04 is a good choice. The steps are quickly completed: Use curl to download the k0s binary, which you
18%
13.12.2011
packetstormsecurity.org
packetstormsecurity.org,199.58.210.12,A
NS25.WORLDNIC.COM,205.178.190.13,SOA
ns25.worldnic.com,205.178.190.13,NS
ns26.worldnic.com,206.188.198.13,NS
mail.packetstormsecurity.org,199.58.210.12,MX ...
Professional attackers have much more pointed at your site than just Nmap, and you should too if you want to test your network’s security. We’ll show you some tools intruders use to gather