10%
14.09.2021
$(find /sys/devices/system/cpu -regex ".*cpu[0-9]+/topology/thread_siblings_list") | sort -n | uniq
0,32
1,33
2,34
3,35
4,36
5,37
6,38
7,39
8,40
9,41
10,42
11,43
12,44
13,45
14,46
15,47
16,48
17,49
18,50
19,51
20,52
21,53
22,54
23,55
24,56
25
10%
28.11.2023
image: monitoror/monitoror:${MTRRTAG:-latest}
05 ports:
06 - "38080:8080"
07 environment:
08 - "MO_CONFIG=/etc/config.json"
09 restart: unless-stopped
10
11 networks:
12 default
10%
03.02.2022
,32
1,33
2,34
3,35
4,36
5,37
6,38
7,39
8,40
9,41
10,42
11,43
12,44
13,45
14,46
15,47
16,48
17,49
18,50
19,51
20,52
21,53
22,54
23,55
24,56
25,57
26,58
27,59
28,60
29,61
30,62
31,63
The lstopo tool
10%
10.06.2015
"} )
09
10 # force called programs to english output
11 LANG=C LC_ALL=C
12
13 function die {
14 echo 1>&2 "$*"
15 exit 10
16 }
17
18 function get_display_resolution {
19 local find_display="$1
10%
27.09.2021
Request timeout for icmp_seq 0
Request timeout for icmp_seq 1
Request timeout for icmp_seq 2
64 bytes from 52.90.56.122: icmp_seq=3 ttl=48
time=40.492 ms
[ output truncated ]
Welcome to Ubuntu 20.04.1 LTS
10%
25.03.2021
[1] sdc1[0]
244065408 blocks super 1.2 [2/2] [UU]
[=>...................] resync = 6.4% (15812032/244065408) finish=19.1min speed=198449K/sec
bitmap: 2/2 pages [8KB], 65536KB chunk
10%
02.02.2021
.
As surely as night follows day, automated attacks will target the default Secure Shell port (TCP port 22), so I will use SSH as the guinea pig test case with the knowledge that I can move the real SSH service
10%
01.06.2024
* argv[])
08 {
09 long niter = 1000000000;
10 int myid; //holds process's rank id
11 double x,y; //x,y value for the random coordinate
12 int i;
13
10%
05.08.2024
= [size][size]int {{0},{0},}
08
09 for i := 0; i < size; i++ {
10 for j := 0; j < size; j++ {
11 array[i][j]++
12 }
13 }
14
15
10%
04.08.2020
// (c) 2020 by Federico Lucifredi
04
05 #include
06 #include
07 #include
08 #include
09 #include
10 #include
11 #include
12
13