12%
31.10.2025
.nmap.org (64.13.134.52):
Not shown: 994 filtered ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 4.3 (protocol 2.0)
25/tcp closed smtp
12%
30.11.2025
.network.type = veth
04 lxc.network.flags = up
05 lxc.network.link = br0
06 lxc.network.hwaddr = 08:00:12:34:56:78
07 #lxc.network.ipv4 = 0.0.0.0
08 lxc.network.ipv4 = 192.168.1.69
09 lxc.network.name = eth0
10 lxc
12%
30.11.2025
62
787
10MB < < 100MB
0
0
0
0
0
0
0
2
Table 4 from the MPI strace Analyzer report; all-zero rows for sizes >100MB
12%
30.11.2025
Model";
11 $work = "ebiz-tx";
12 $node1 = "WebServer";
13 $node2 = "AppServer";
14 $node3 = "DBMServer";
15 $think = 0.0 * 1e-3; # as per test system
16 $dtime = 2.2 * 1e-3; # dummy service time
17
18
12%
30.11.2025
\
02 --hostname=foo.bar.de --mac- address=00:40:26:CA:10:DD \
03 --kopts="stage=test app=www" --ksmeta="stage=test app=www"
04 # cobbler system edit --name=foo --interface=eth0 --mac=00:40:26:CA
11%
27.05.2025
server, you can search the web server logfile, access_log, for the HTTP GET request for the zoo RPM file from the client:
# grep zoo /var/log/httpd/access_log
10.8.12.141 - - [11/Oct/2024:00:14:14 -0500
11%
30.11.2025
686
oprofile-0.9.5-4.fc12.i686
To profile the kernel, you need to tell OProfile where the kernel image is located with the --vmlinux option:
opcontrol --setup --vmlinux=/usr/lib/debug/lib/ modules
11%
30.11.2025
Destination MAC address
Listing 1
Nemesis arp Packets
01 $ while true
02 > do
03 > sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 -D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2
11%
30.11.2025
/0K /s] [4137 /0 iops] [eta 00m:06s]
In the example, the first job is performing a sequential read, marked as r in square brackets, while Fio hasn't initialized the second job, marked as P
11%
30.11.2025
dh_group modp1024;
09 }
10 generate_policy off;
11 }
12
13 sainfo address 192.168.2.0/24 any address 172.16.0.0/16 any {
14 pfs_group modp1024;
15 encryption_algorithm aes256;
16