19%
25.02.2013
on the options you chose, but some sample output is shown in Listing 1.
Listing 1: Sample iostat Output
[laytonj@home8 IOSTAT]$ iostat -c -d -x -t -m /dev/md1 2 100
Linux 2.6.18-308.16.1.el5.centos.plus (home8
19%
12.05.2014
The revelation of wide-spread government snooping has sparked a renewed interest in data storage security via encryption. In this article, we review some options for encrypting files, directories ... ]$ cd ~/encrypted
[laytonjb@test1 encrypted]$ ls -l
total 8
lrwxrwxrwx 1 laytonjb laytonjb 24 Sep 4 15:12 acS5u3K9TJ,9FWTDUq0yWqx6 -> XuD50Mah2kp2vukDeo04cOv,
-rw-rw-r-- 1 laytonjb laytonjb 18 Sep 4 15:12 WvPjlWtCaq5g9hE1 ...
The revelation of wide-spread government snooping has sparked a renewed interest in data storage security via encryption. In this article, we review some options for encrypting files, directories
19%
15.08.2012
=readall(`date`)
"Tue Jul 31 15:51:58 EDT 2012\n"
julia> print(d)
Tue Jul 31 15:51:58 EDT 2012
In addition to efficient shell integration, Julia also has a very nice C and Fortran interface. Typically, every new
19%
21.01.2021
This first article of a series looks at the forces that have driven desktop supercomputing, beginning with the history of PC and supercomputing processors through the 1990s into the early 2000s.
...
May 1988
AMD K6-2
MMX and 3DNOW! SIMD, 200–570MHz; 64KiB L1 cache
Jun 1998
Pentium II Xeon
SIMD; L2 cache from 512KB to 2MB
Feb 1999
Pentium III
9 ...
This first article of a series looks at the forces that have driven desktop supercomputing, beginning with the history of PC and supercomputing processors through the 1990s into the early 2000s.
19%
31.10.2025
password 8 ZDF339a.20a3E
05 log file /var/log/quagga/zebra.log
06 service password-encryption
07 !
08 interface eth0
09 multicast
10 ipv6 nd suppress-ra
11 !
12 interface eth1
13 ip address 10
19%
27.09.2024
Design Document with Views
{
"_id": "_design/queries",
"_rev": "6-856a5c52b1a9f33e136b7f044b14a8e6",
"language": "javascript",
"views": {
"by-timestamp": {
"map": "function (doc) {\n
19%
20.05.2014
–
–
UTM 220
–
FullGuard Bundle
–
US$ 2,870
Endian 3.0
Endian released the new version of its firewall in January. The version jump from 2.5.2 to 3.0 already shows
19%
23.01.2012
fingerprint is 87:17:c3:92:44:ba:1a:df:d7:9c:44:b2:5b:73:52:09.
Are you sure you want to continue connecting (yes/no)?
This prompt wants to establish a permanent secure key between the two hosts for future
19%
17.04.2012
(2208)?
[Y] Yes [A] Yes to All [N] No [L] No to All [?] Help (default is "Y"): Y
The process will end immediately on receipt of the Stop-Process
signal.
Now try to run a CMD process
18%
17.02.2015
RR can be removed as soon as its DNS time to live (TTL) has expired.
Listing 2
Fingerprint in the TLSA RR
$ dig TLSA _25._tcp.mail.sys4.de +short
3 0 1 9273B4E9040C1B9EE7C946EFC0BA8AAF2C