9%
03.12.2015
(msg.payload))
07
08 mqtt = paho.Client()
09 mqtt.on_message = on_message
10
11 mqtt.connect("localhost", 1883, 60)
12 mqtt.subscribe("linux/+", 0)
13
14 mqtt.loop_forever()
The client now connects
9%
30.11.2025
in your kernel configuration and possibly rebuild the kernel. Including the symbols, vmlinux weighs in at more than 40MB.
Next, open a connection to the debug server by typing target remote :1234 (Figure 3
9%
18.07.2013
rq2 ra92
08 set rq3 cdrom
09
10 attach rq0 d0.dsk
11 attach rq1 d1.dsk
12 attach rq2 d2.dsk
13
14 attach -r rq3 cdrom.iso
15
16 set rl disable
17 set ts disable
18
19 set xq mac=08-00-2B-AA-BB-CC
20
9%
30.11.2025
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple
9%
20.10.2013
database [for details use: -P show]
ATA Version is: 8
ATA Standard is: ACS-2 (unknown minor revision code: 0x001f)
Local Time is: Sun Oct 13 09:12:15 2013 EDT
SMART support is: Available - device has SMART
9%
30.11.2025
--------- ------ ---- ----- ----
12 Throughput Cashier Customers 0.7500 Cust/Sec
13 Utilization Cashier Customers 75.0000 Percent
14 Queue Length Cashier Customers 3.0000 Cust
15 Residence Time Cashier Customers 4.0000 Sec
16 N Sws
9%
01.08.2019
, uncompress the tarball and enter the resulting directory:
$ tar xvfz minishift-1.33.0-linux-amd64.tgz
$ cd minishift-1.33.0-linux-amd64
If you run the ls command, you can see a 27MB binary called minishift
9%
07.01.2024
/snap/snap-store/638
loop11 7:11 0 219M 1 loop /snap/gnome-3-34-1804/77
loop12 7:12 0 218.4M 1 loop /snap/gnome-3-34-1804/93
loop13 7:13 0 40.9M 1 loop /snap/snapd/20290
loop14 7:14 0 73.9M 1
9%
13.04.2023
@warewulf pkgs]$ pwd
/opt/apps/apps/conda/pkgs
[laytonjb@warewulf pkgs]$ ls -lstar
total 552
4 drwxrwxrwx 4 root root 4096 Mar 12 11:28 ..
0 -rw-rw-r-- 1 laytonjb laytonjb 0 Mar 14 19:28 urls
4 drwxrwsr-x 2
9%
02.02.2021
_servers:
- 10.42.0.10
- 10.42.0.11
dhcp_pxeboot_server: 10.42.0.12
The subnet must be a subrange of the subnet where the VM with the infrastructure services itself is located. However, when