75%
30.11.2025
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days.
Brute force is a single-character-at-a
75%
30.11.2025
tests and take some of the load off the SSD with the fstrim command from a recent util-linux package [9].
The workload from Listing 3, which measures the IOPS with a variable block size between 2Kb
75%
30.11.2025
,GotoIf($["${wl}" = "1"]?found:notfound)
05 exten => _.,n(notfound),agi,captcha.sh
06 exten => _.,n,Playback(to-call-num-press)
07 exten => _.,n,SayDigits(${captcha})
08 exten => _.,n,Read(usercaptcha||3|1|)
09 exten
74%
30.11.2025
},
11 "run_list": [ "recipe[bootstrap::client]" ]
12 }
Now you can launch Chef Solo:
sudo chef-solo -c ~/solo.rb -j ~/chef.json -r http://s3.amazonaws
74%
30.11.2025
total = summary.values.inject(0) { |sum, i| sum += i }
12 puts "Found #{total} instances in the following states:"
13 summary.keys.sort.each do |s|
14 printf "%20s %d\n", s, summary[s]
15 end
16 puts
74%
30.11.2025
temporarily with
Listing 5
Error Messages
sh: /sbin/ifconfig: Permission denied
120405 8:29:02 [ERROR] WSREP: Failed to read output of: '/sbin/ifconfig | \
grep -m1 -1 -E '^[a-z]?eth[0-9
74%
30.11.2025
------- ------ ----- ----- ----- ------ -- -----------
03 81 9 2392 3076 76 0.12 3996 AmIcoSinglun64
04 74 9 1464 2568 42 0.09 2172 armsvc
05 195 10 2380 2984 62 0 ... 9
72%
30.11.2025
's with all the colons?
Well, put simply, IPv4 addresses are short, so writing out the entire address is easy. With IPv6, however, you get something like 1.2.3.4.5.6.7.8.9.234.25.198.221.82.15.16. To make ... 3
72%
30.11.2025
) with 12 Serial ATA disks, a 320 UW SCSI controller for the host connection, and 512MB cache.
I configured various disk groups and logical volumes on this powerful hardware and exported them to the backup