25%
30.11.2025
cgroup, which has no restrictions. You can test this by sending a SIGUSR1 to the process:
# kill -USR1 $pid
578804+0 records in
578804+0 records out
296347648 bytes (296 MB) copied, 7.00803 s, 42.3 MB/s
25%
31.10.2025
.168.2.14", "192.168.2.15";
06
07 logging to_file => "rex.log";
08
09 desc "Uptime estimate";
10 task "uptime", group => ["intranet", "accounting"], sub {
11 say run 'uptime';
12 };
Package Service
Listing
25%
30.11.2025
tcsh\r"
06 expect "#"
07 send "cp .ssh/authorized_keys ~root/.ssh\r"
08 expect "#"
09 send "cd /etc/ssh; cp sshd_config{,.0}\r"
10 expect "#"
11 send "cat sshd_config.0 | sed -e 's
24%
30.11.2025
. Current enterprise solutions for the virtualization of servers and desktops [3] are all based on KVM.
Setup and Software
The example discussed in this article uses two physical nodes: host1
and host2
24%
30.11.2025
Users$
07 ^%(__prefix_line)sauthentication failure; logname=\S* uid=\S* euid=\S* tty=\S* ruser=\S* rhost=(?:\s+user=.*)?\s*$
08 ^%(__prefix_line)srefused connect from \S+ \(\)\s