17%
12.09.2013
show shows you the low-level information about the interfaces (Figure 3) in a similar way to ip address. Using
ip -s link show
gives you a statistical overview of the available interfaces, which can
17%
07.01.2014
a great deal of power in a few lines:
rm -rf backup.3
mv backup.2 backup.3
mv backup.1 backup.2
cp -al backup.0 backup.1
rsync -a --delete source_directory/ backup.0/
To better understand the script, I
17%
08.04.2014
| elapsed: 0.0s remaining: 4.5s
[Parallel(n_jobs=2)]: Done 198 out of 1000 | elapsed: 1.2s remaining: 4.8s
[Parallel(n_jobs=2)]: Done 399 out of 1000 | elapsed: 2.3s remaining: 3.5s
17%
05.02.2019
of an application allows it to run faster and scale better than serial applications (see Amdahl's law [3]).
Today's processors have multiple cores, and accelerators such as GPUs have thousands of lightweight cores
17%
30.11.2025
(6192 bits), 774 bytes captured (6192 bits)
Ethernet II, Src: 00:1a:2b:3c:4d:5e, Dst: 00:6f:7g:8h:9i:0j
Internet Protocol Version 4, Src: 192.168.1.101, Dst: 192.168.1.104
User Datagram Protocol, Src Port
17%
30.11.2025
Model";
11 $work = "ebiz-tx";
12 $node1 = "WebServer";
13 $node2 = "AppServer";
14 $node3 = "DBMServer";
15 $think = 0.0 * 1e-3; # as per test system
16 $dtime = 2.2 * 1e-3; # dummy service time
17
18
17%
05.12.2016
that the top left of the screen is (0,0)
tput cup 3 15
# Set the foreground color using an ASCII escape
tput setaf 3
# Write a "title" to the screen
echo "Title of the company"
tput sgr0
# Write a menu title
17%
14.06.2017
example illustrating the change in file size:
$ ls -lsah FS_scan.csv
3.2M -rw-r--r-- 1 laytonjb laytonjb 3.2M 2014-06-09 20:31 FS_scan.csv
$ gzip -9 FS_scan.csv
$ ls -lsah FS_scan.csv.gz
268K
17%
21.08.2014
report [3] said weak passwords contributed to 31% of compromises investigated.
Without picking on any one organization, choose a company, a social network, and a cloud provider; now, look up
17%
30.01.2020
. For some additional context, sections on the AWS Security Blog [3] are worth digging into further.
To bring more to the party, the sophisticated Prowler also stealthily prowls for issues in compliance