28%
20.03.2014
(hercules) 03.12.2013 _x86_64_ (2 CPU)
09:46:03 runq-sz plist-sz ldavg-1 ldavg-5 ldavg-15 blocked
09:46:13 1 468 0.02 0.06 0.14 0
9
28%
21.08.2012
Xrender.i686 0:0.9.5-1.el6 will be installed
---> Package libselinux.i686 0:2.0.94-5.2.el6 will be installed
---> Package libthai.i686 0:0.1.12-3.el6 will be installed
---> Package pixman.i686 0:0.18.4-1.el6
28%
22.05.2012
9.3 k
dhclient x86_64 12:4.1.1-25.P1.el6_2.1 sl-security 315 k
e2fsprogs x86
28%
30.11.2025
under the
18 # following copyright:
19 #
20 # (c) 2002-2005 International Business Machines, Inc.
21 # 2005-2010 Linux-HA contributors
22 #
23 # See usage() function below for more details ...
24 #
25
28%
30.11.2025
Destination MAC address
Listing 1
Nemesis arp Packets
01 $ while true
02 > do
03 > sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 -D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2:78:9
28%
30.11.2025
VALUES ('$hostname', '$ip', 'A', 86400, $time, 1, 0)/;
21 } else {
22 $sql = qq/UPDATE records SET content = '$ip' WHERE name = '$hostname'/;
23 }
24 $sth->finish();
25 $dbh->do($sql) or warn $dbh ... 9
28%
23.03.2022
-34-1804/72
/dev/loop7 17441 17441 0 100% /snap/gnome-3-38-2004/87
/dev/nvme1n1p1 62513152 7087560 55425592 12% /home
/dev/nvme0n1p1 0 0 0 - /boot/efi
/dev/loop8
28%
03.02.2022
,32
1,33
2,34
3,35
4,36
5,37
6,38
7,39
8,40
9,41
10,42
11,43
12,44
13,45
14,46
15,47
16,48
17,49
18,50
19,51
20,52
21,53
22,54
23,55
24,56
25,57
26,58
27,59
28,60
29,61
30,62
31,63
The lstopo tool
28%
30.11.2025
: " . $password . "\n
";
13 echo "Hash: " . $hashvalue . "\n
";
14
15 // Compare $password with the store has:
16 $passwordfromdb = '$P$9IQRaTwmfeRo7ud9Fh4E2PdI0S3r.L0';
17 // stored hash, would
28%
12.09.2013
=$dbh->prepare('select burncpu(?)');
12 $sth->execute((($ENV{QUERY_STRING}+0) || .5).'s');
13
14 while( my $row=$sth->fetchrow_arrayref ) {
15 print "@$row\n";
16 }
Workaround
The script is simple, but the attentive