17%
14.11.2013
of the virtual computer models; their hardware configurations follow on the right. For example, the computer named m1.small only has one CPU and 256MB of RAM. The free/max column is also interesting: The number
17%
22.08.2011
[inst.id] = inst.state
08 summary[inst.state] += 1
09 state
10 end
11 total = summary.values.inject(0) { |sum, i| sum += i }
12 puts "Found #{total} instances in the following states:"
13 summary
17%
30.11.2025
total = summary.values.inject(0) { |sum, i| sum += i }
12 puts "Found #{total} instances in the following states:"
13 summary.keys.sort.each do |s|
14 printf "%20s %d\n", s, summary[s]
15 end
16 puts
17%
30.11.2025
=""
04 PING="ping -c1 -w 3"
05 PING2=""
06
07 case $OS in
08 HP-UX*)
09 PING=ping
10 PING2="-n 1"
11 RSH="remsh"
12 RSH2="-l user"
13 ;;
14 Sun
17%
05.12.2016
tput cup 5 17
# Set reverse mode
tput rev
echo "M-A-I-N M-E-N_U"
tput sgr0
# Write first line of menu
tput cup 7 15
echo "1. User"
# Write second line of menu
tput cup 8 15
echo "2. Service"
# Get
17%
25.10.2011
authentication_algorithm pre_shared_key;
08 dh_group modp1024;
09 }
10 generate_policy off;
11 }
12
13 sainfo address 192.168.2.0/24 any address 172.16.0.0/16 any {
14 pfs_group modp1024;
15
17%
05.12.2014
. For example, to run a report every three seconds for five iterations on eth0, you would use the command in Listing 4.
Listing 4
capstats
/opt/bro/bin/capstats -I 3 -n 5 -i eth0
1415510235
17%
05.12.2016
), Kubernetes is written in Go and available under the Apache 2.0 license; the stable version when this issue was written was 1.3.
Figure 1: Kubernetes comes
17%
30.11.2025
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple
17%
08.07.2018
read the hosts from a file other than the WCOLL
environment variable:
$ pdsh -w ^/tmp/hosts uptime
192.168.1.4: 15:51:39 up 8:35, 12 users, load average: 0.64, 0.38, 0.20
192.168.1.250: 15:47:53 up