13%
03.02.2022
,32
1,33
2,34
3,35
4,36
5,37
6,38
7,39
8,40
9,41
10,42
11,43
12,44
13,45
14,46
15,47
16,48
17,49
18,50
19,51
20,52
21,53
22,54
23,55
24,56
25,57
26,58
27,59
28,60
29,61
30,62
31,63
The lstopo tool
13%
30.01.2020
: 1 (f=1): [w(1)][100.0%][r=0KiB/s,w=1401KiB/s][r=0,w=350 IOPS][eta 00m:00s]
test: (groupid=0, jobs=1): err= 0: pid=3104: Sat Oct 12 14:39:08 2019
write: IOPS=352, BW=1410KiB/s (1444kB/s)(82.8Mi
13%
07.10.2014
/lib/sheepdog
root 582 581 0 13:13 ? 12:00:00 AM sheep -p 7000 /var/lib/sheepdog
# grep sheep /proc/mounts
/dev/sdb1 /var/lib/sheepdog ext4 rw,relatime,data=ordered 0 0
# grep sheep /etc/fstab
/dev
13%
23.03.2022
14 14 0 100% /snap/gtk2-common-themes/13
/dev/loop10 24054 24054 0 100% /snap/p7zip-desktop/220
/dev/loop12 65095 65095 0 100% /snap/gtk-common-themes/1519
/dev/loop13
13%
11.02.2016
.com/hashicorp/otto/examples/mongodb"
06 }
07 }
08
09 project {
10 name = "my-project"
11 infrastructure = "my-infrastructure"
12 }
13
14 infrastructure "my-infrastructure" {
15 type = "aws"
16
13%
19.11.2019
, ioengine=libaio, iodepth=32
fio-3.1
Starting 1 process
Jobs: 1 (f=1): [w(1)][100.0%][r=0KiB/s,w=1401KiB/s][r=0,w=350 IOPS][eta 00m:00s]
test: (groupid=0, jobs=1): err= 0: pid=3104: Sat Oct 12 14:39:08 2019
write: IOPS=352
13%
11.02.2016
amount of available RAM: 117,080MB in this case.
Mem used
: Amount of RAM used by the applications: 48,810MB in this case.
Mem free
: Potentially free RAM: 68,270MB in this case.
Mem cached
: RAM
13%
26.02.2014
total packets: sent: 12,243,355 recv: 1,467,914
bytes sent: total: 16.90 G per-sec: 3.22 M/s
bytes recv: total: 114.04 M
13%
06.08.2012
-07-28 19:06 .bash_history
-rw-r--r-- 1 khess khess 220 2012-05-25 22:11 .bash_logout
-rw-r--r-- 1 khess khess 2940 2012-05-25 22:11 .bashrc
To show files in date-sorted order, try the following commands
13%
30.11.2025
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple