19%
07.04.2022
.cfg
# Name Count Image Networks Ports([hostPort:]containerPort)
kafka 3 rockylinux8 cldinabox-demo 22,2181,8080,9092,38080,52812,58080
spark 3 quay.io/footloose/centos7 cldinabox-demo 22
19%
11.06.2014
/joe/.ssh/google_compute_engine -A -p 22 joe@1.2.3.4 --
11 Warning: Permanently added '1.2.3.4' (ECDSA) to the list of known hosts.
12 Enter passphrase for key '/home/joe/.ssh/google_compute_engine':
13 Linux gcerocks-instance-1 3.2.0
19%
09.10.2017
to adjust a few application parameters in the Fortran program for a longer run time:
nx = 8000
ny = 8000
it_max = 10000
tolerance = 0.00004D+00
The code was compiled using GCC 7.1 and run
19%
30.11.2025
OS*)
15 PING="ping"
16 PING2=""
17 ;;
18 esac
19 ...
20
21 for i in server1 server2 server3 workstation1 workstation2
22 do
23 $PING $i $PING2 > /dev/null
24 if [ "$?" != "0
19%
27.09.2021
Request timeout for icmp_seq 0
Request timeout for icmp_seq 1
Request timeout for icmp_seq 2
64 bytes from 52.90.56.122: icmp_seq=3 ttl=48
time=40.492 ms
[ output truncated ]
Welcome to Ubuntu 20.04.1 LTS
19%
30.11.2025
:31:40: [6694] DEBUG: (lifebyte = 0:0)
04 2011-01-28 17:31:40: [6694] DEBUG: enctype = 7:7
05 2011-01-28 17:31:40: [6694] DEBUG: (encklen = 128:128)
06 2011-01-28 17:31:40: [6694] DEBUG: hashtype = SHA:SHA
07
19%
13.12.2011
scanner’s -sL
option (nmap -sL
) performs a reverse DNS lookup on every IP address in the scan and queries the DNS server each time an IP address is listed.
In addition to these standard DNS tools, a pair ...
Professional attackers have much more pointed at your site than just Nmap, and you should too if you want to test your network’s security. We’ll show you some tools intruders use to gather
19%
02.07.2014
free buff cache si so bi bo in cs us sy id wa st
192.168.1.4: 1 0 0 30198704 286340 751652 0 0 2 3 48 66 1 0 98 0 0
192.168.1.250: procs
19%
31.10.2025
/loadavg/ [3]:
1.00 0.97 0.94 1/1279 7743
The three additional numbers provided by Linux are the number of running processes (one in this case), the total number of processes, and the last process ID (PID
19%
20.03.2023
wrote on Lmod back in 2018, you will see a discussion about the three commands to run:
$ sudo ln -s /usr/local/lmod/lmod/init/profile /etc/profile.d/z00_lmod.sh
$ sudo ln -s /usr