24%
19.11.2019
, ioengine=libaio, iodepth=32
fio-3.12
Starting 1 process
Jobs: 1 (f=1): [w(1)][100.0%][w=475MiB/s][w=122k IOPS][eta 00m:00s]
test: (groupid=0, jobs=1): err= 0: pid=1634: Mon Oct 14 22:18:59 2019
write: IOPS=118k, BW=463Mi
24%
30.11.2025
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple
24%
18.07.2013
buffered disk reads: 616 MB in
3.00 seconds = 205.03 MB/sec
$ hdparm -T /dev/sda
/dev/sda:
Timing cached reads: 6292 MB in
2.00 seconds = 3153.09 MB/sec
If this were a spinning disk, you would also
24%
11.04.2016
-fastcgi are running, as expected.
Listing 1
Process List
root 589 0.0 0.3 142492 3092 ? Ss 20:35 0:00 nginx: master process
/usr/sbin/nginx -g daemon on; master_process on;
www
24%
18.12.2013
2P).
Listing 2P: Python Code Example with Output in Loop (One-by-One)
1 #!/usr/bin/python
2
3 if __name__ == "__main__":
4
5 local_dict = {'x':0, 'y':0, 'z':0,'value':0.0};
6
7 counter
24%
16.10.2012
bytes:215392635 (215.3 MB) TX bytes:1759757 (1.7 MB)
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK
24%
29.09.2020
and doubles the cache size (from 3 to 6MB), in exchange for a small drop in baseline clock speed – 2.3 to 2.2GHz (peak drops from 3.2 to 3.1GHz).
Major Surgery
Legend has it that no one has ever
opened
24%
30.11.2025
YZCD
03 # DaemonOpts: -f /var/log/collectl -r00:00,7 -m -F60 -s+YZCD --iosize
04 ################################################################################
05 # Collectl: V3.6.1-4 HiRes: 1 Options
24%
25.10.2011
-interface st0.0;
16 ike {
17 gateway racoon;
18 proxy-identity {
19 local 192.168.1.0/24;
20 remote 192.168.2.0/24;
21 service any;
22 }
23
24%
30.11.2025
aes256-sha1;
13 }
14 vpn racoonvpn {
15 bind-interface st0.0;
16 ike {
17 gateway racoon;
18 proxy-identity {
19 local 192.168.1.0/24;
20 remote