25%
30.11.2025
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple
25%
08.07.2018
read the hosts from a file other than the WCOLL
environment variable:
$ pdsh -w ^/tmp/hosts uptime
192.168.1.4: 15:51:39 up 8:35, 12 users, load average: 0.64, 0.38, 0.20
192.168.1.250: 15:47:53 up
25%
13.12.2011
.
First, get the distribution name:
$ cat /etc/issue
Ubuntu 8.04 \n \l
An intruder typically executes some basic commands to get to know the system. Of particular interest are the \etc directory
25%
07.06.2019
:
Estimate Std. Error t value Pr(>|t|)
(Intercept) 517.340 18.270 28.316 < 2e-16 ***
wdayThursday -31.046 16.119 -1.926 0.0545 .
wdayFriday -116.981 16.122 -7.256 1.08e-12 ***
wday
25%
02.02.2021
$this->name = $n;
10 $this->$birthday = $g;
11 }
12 }
13
14 // ---- in PHP 8 --------
15 class Address
16 {
17 public function __construct(
18 public string $name,
19 public Date
25%
30.11.2025
to install the Pen load balancer, and Listing 12 shows a query to Pen.
Listing 11
Installing and Starting Pen
wget http://siag.nu/pub/pen/pen-0.18.0.tar.gz
tar xf /download/pen-0.18.0.tar
25%
30.11.2025
. If a hostname is used it
06 * must match the reverse dns of the server.
07 * /
08 host = "10.42.0.1";
09
10 /* passwords: the passwords we send (OLD C:) and accept (OLD N:).
11
25%
03.02.2022
are updated automatically.
For this article, I looked at the Windows Terminal Preview, which at the time was version 1.10.1933.0 with the then current Stable version at 1.9.1942.0. Both the Preview and Stable
24%
09.04.2019
Script
1/2
0
0
0
0.5
0.5
0.5
Listing 1 contains part of a Julia interactive session that shows how Julia's rational numbers work. One interesting
24%
10.12.2023
is reasonable because you can write to (N – 1) devices as you would RAID 0 (e.g., write a stripe of data).
RAID 6
Somewhat similar to RAID 5, two copies of the parity are written to two storage devices