20%
11.04.2016
Example
# iostat -xmt 1 /dev/sda
Linux 3.16.7-21-desktop (tweedleburg) 08/07/15 _x86_64_ (8 CPU)
08/07/15 17:25:13
avg-cpu: %user %nice %system %iowait %steal %idle
1
20%
28.07.2025
designed for Live use on optical data carriers were first seen more than 20 years ago. In the meantime, USB flash memory has largely replaced the CDs and DVDs used in the past. They are not only smaller than
20%
04.08.2020
# Names of all persons:
11 gremlin> g.V().hasLabel('person').values('name')
12 ==>marko
13 ==>vadas
14 ==>josh
15 ==>peter
16
17 # Name of person with ID 1
18 gremlin> g.V(1).values('name')
19 ==>marko
20
20%
27.05.2025
the minimum requirements. DNF operates on AIX 7.1 TL5 and later versions. The openssl fileset, version 1.1.X.X (or higher), must be installed. Ideally you'll have the latest version on your system. You must
20%
30.11.2025
-APIC-fasteoi pciehp, ath9k
10 18: 0 0 IO-APIC-fasteoi uhci_hcd:usb4
11 19: 2384012 0 IO-APIC-fasteoi ehci_hcd:usb1
12 20: 199725 0 IO-APIC-fasteoi uhci_hcd:usb2
13 21
20%
06.10.2019
in the background with command lines like that shown in Listing 1.
Listing 1
OpenSSL from Hell
openssl x509
-req
-CA ca.crt
-CAkey ca.key
-set_serial 0x$(openssl rand -hex 16)
-days 3650
20%
07.04.2022
a redundant power supply or hard disks. Its Intel Xeon 4110 processor has eight CPU cores and 32GB of RAM.
Its bigger siblings, the SNS 3655 and SNS 3695, come with 12 CPU cores on the Intel Xeon 4116 CPU
20%
30.11.2025
/ceph/$name.keyring
04 [mon]
05 mon data = /srv/mon.$id
06 [mds]
07 [osd]
08 osd data = /srv/osd.$id
09 osd journal = /srv/osd.$id.journal
10 osd journal size = 1000
11 [mon.a]
12 host = alice
13 mon
20%
20.06.2022
-Host "Removing outdated $MigMBox.pst file." -fore yellow
20 }
21 Write-Host ""
22
23 # Create a .pst file for every mailbox found on system.
24 #
25 Write-Host "Exporting mailbox $MigMBox to file $Mig
20%
05.02.2019
solutions, such as those proposed in a paper presented at The Digital Forensic Research Workshop in 2013 [11]. Although annoying in forensic investigations, because attackers could also exploit such backdoors