20%
13.06.2016
_journal_init=0 /dev/vg00/ext4fs
To mount the filesystem, create an appropriate mountpoint up front and then run the mount command:
mkdir /mnt/ext4fs
mount /dev/vg00/ext4fs /mnt/ext4fs
If you want to mount
20%
09.10.2017
to adjust a few application parameters in the Fortran program for a longer run time:
nx = 8000
ny = 8000
it_max = 10000
tolerance = 0.00004D+00
The code was compiled using GCC 7.1 and run
20%
27.09.2024
, you can quickly become confused when you hear about K3s [2], k0s [3], minikube [4], Microkubes [5], and the many other variants.
These names relate to K8s distributions, all of which enrich the vanilla
20%
13.12.2011
scanner’s -sL
option (nmap -sL
) performs a reverse DNS lookup on every IP address in the scan and queries the DNS server each time an IP address is listed.
In addition to these standard DNS tools, a pair ...
Professional attackers have much more pointed at your site than just Nmap, and you should too if you want to test your network’s security. We’ll show you some tools intruders use to gather
20%
20.03.2023
wrote on Lmod back in 2018, you will see a discussion about the three commands to run:
$ sudo ln -s /usr/local/lmod/lmod/init/profile /etc/profile.d/z00_lmod.sh
$ sudo ln -s /usr
19%
13.12.2011
3.105ubuntu1 add and remove users and groups
ii ant 1.7.0-3 Java based build tool like make
ii antlr
19%
27.03.2013
We look at the new features in Ceph version 0.56, alias “Bobtail,” talk about who would benefit from CephX Ceph encryption, and show you how a Ceph Cluster can be used as a replacement for classic ... by normal users. But there’s a flaw – although the mechanism is still reasonably easy to enable (in the new v0.56, three lines in /etc/ceph/ceph.conf
are all it takes), activating CephX will make many ...
We look at the new features in Ceph version 0.56, alias “Bobtail,” talk about who would benefit from CephX Ceph encryption, and show you how a Ceph Cluster can be used as a replacement for classic ... The RADOS Object Store and Ceph Filesystem: Part 3
19%
01.06.2024
1,
47 MPI_LONG,
48 0,
49 2,
50 MPI_COMM_WORLD);
51 }
52
19%
09.10.2017
_anchor_tag == 1 or (#s_uri > 0 and #s_uri < 3))
18 }
You can also use Yara to monitor applications, rather than simply files. For example, using the strings command, I reviewed the contents of a database
19%
02.02.2021
.sin(periods * 2 * np.pi * t)
12 return max(value, 0.0)
13 else:
14 value = np.sin(periods * 2 * np.pi * t)
15 return max(value, 0.0)
16
17 # building the data vector
18 my_data = []
19 i = 0
20 while