28%
10.04.2015
/mfeilner/.openshift/express.conf ... done
20
21 Checking for git ... found git version 2.1.0
22
23 Checking common problems .. done
24
25 Checking for a domain ... feilner
26
27 Checking for applications ... none
28
29 Run 'rhc create
28%
05.02.2023
://www.freedesktop.org/wiki/Software/systemd/ContainerInterface/
STOPSIGNAL SIGRTMIN+3
CMD ["/bin/bash"]
Listing 2
setup_goss.sh
#! /bin/bash
set -uo pipefail
GOSSVER='0.3.18'
GOSSCDIR='/etc/goss'
RQRDCMNDS="chmod
echo
sha256sum
tee
wget"
pre
28%
12.09.2013
have them in their software repositories – and you also need to customize the login information for the database.
Listing 2
burn0.pl
01 #!/usr/bin/perl
02
03 use common::sense;
04 use DBI
28%
08.10.2015
:/etc/smtpd_remote.db
04 listen on 192.0.2.15 inet4 port 25 hostname post.example.org tls pki post
05 listen on 192.0.2.15 inet4 port 587 hostname mail.example.org tls-require pki mail auth tag remote
06 listen
28%
27.08.2014
was the sequential write test using 1MB record sizes:
./iozone -i 0 -c -e -w -r 1024k -s 32g -t 2 -+n > iozone_write_1.out
To gather the block statistics, I ran ioprof in a different terminal window before I ran
28%
08.05.2019
(i=0; i < n; i++)
{
...
}
for (j=0; j < m; j++)
{
...
}
for (k=0; k < n*m; k++)
{
...
}
Listing 2: Parallelized Sets of Loops
Fortran
C
!$omp parallel do
do i=1,n
28%
04.12.2024
and a volume using the built-in guidance wizard, which prompts you to select the preferred RAID type. In my case, JBOD, RAID 0, RAID 1, RAID 5, RAID 6, and even a proprietary solution called SHR were available
28%
17.02.2015
_full_action = SUSPEND
disk_error_action = SUSPEND
tcp_listen_queue = 5
tcp_max_per_addr = 1
##tcp_client_ports = 1024-65535
tcp_client_max_idle = 0
enable_krb5 = no
krb5_principal = auditd
You can also spread
28%
22.10.2012
store?
The first part of this workshop demonstrated how an additional node can be added to an existing cluster using
ceph osd crush add 4 osd.4 1.0 pool=default host=daisy
assuming that daisy
28%
05.09.2011
is Computer A. This type of attack is known as Man in the Middle attack.
This article covers a number of tools used in arp cache poisoning attacks, including ettercap, arpspoof, nemesis, p0f, dsniff, and scapy