28%
08.05.2019
(i=0; i < n; i++)
{
...
}
for (j=0; j < m; j++)
{
...
}
for (k=0; k < n*m; k++)
{
...
}
Listing 2: Parallelized Sets of Loops
Fortran
C
!$omp parallel do
do i=1,n
28%
04.12.2024
and a volume using the built-in guidance wizard, which prompts you to select the preferred RAID type. In my case, JBOD, RAID 0, RAID 1, RAID 5, RAID 6, and even a proprietary solution called SHR were available
28%
17.02.2015
_full_action = SUSPEND
disk_error_action = SUSPEND
tcp_listen_queue = 5
tcp_max_per_addr = 1
##tcp_client_ports = 1024-65535
tcp_client_max_idle = 0
enable_krb5 = no
krb5_principal = auditd
You can also spread
28%
22.10.2012
store?
The first part of this workshop demonstrated how an additional node can be added to an existing cluster using
ceph osd crush add 4 osd.4 1.0 pool=default host=daisy
assuming that daisy
28%
05.09.2011
is Computer A. This type of attack is known as Man in the Middle attack.
This article covers a number of tools used in arp cache poisoning attacks, including ettercap, arpspoof, nemesis, p0f, dsniff, and scapy
28%
25.05.2012
bo in cs us sy id wa
0 0 1360 27788 125860 269804 0 0 390 43 308 572 8 3 84 5
In this case, it’s the io
section you’re interested in. Input/Output is seemingly defined
28%
21.08.2012
/primary_db | 419 kB 00:00
epel | 4.0 kB 00:00
epel
28%
05.12.2014
with the start command:
[BroControl] > start
starting bro ...
[BroControl] >
Whenever Bro starts up, it starts its daemon to listen to all the traffic defined in its /opt/bro/etc/node.cfg file. This is eth0
28%
06.10.2022
brd rd_nr=1 rd_size=524288
# ls /dev/ram0
/dev/ram0
You can use this approach to evaluate the performance effect of encrypted partitions without having to worry about the noise of the underlying
28%
09.08.2015
the passwords these "security experts" were using to protect their data? Some of the passwords uncovered in the attack were:
HTPassw0rd
Passw0rd!81
Passw0rd
Passw0rd!
Pas$w0rd
Rite1