80%
02.06.2020
://cockpit-project.org/
Elephant Shed download: https://elephant-shed.io/#download
"Managing and provisioning VMs" by Mayank Sharma, Linux Pro Magazine
, issue 235, June 2020, pg. 22, https://www.linuxpromagazine.com/Issues/2020
80%
30.11.2025
.
Infos
"Monitoring Linux Performance with Orca" by Kenneth Hess, Linux Magazine
, April 2006, http://www.linux-magazine.com/issue/65/Linux_Performance_Monitoring_With_Orca.pdf
R, Open Source
80%
20.03.2014
unauthorized access.
Infos
Windows Azure Backup: http://www.windowsazure.com/en-us/services/backup
Azure pricing: http://www.windowsazure.com/en-us/pricing/details/storage/
Management Interface
80%
03.12.2015
like this:
REGION eu-central-1 ec2.eu-central-1.amazonaws.com
REGION sa-east-1 ec2.sa-east-1.amazonaws.com
REGION ap-northeast-1 ec2.ap-northeast-1.amazonaws.com
...
You are now ready to start creating
80%
30.09.2013
the scan tool. The preceding call to Nmap would return the following text output on a web server:
Host: 10.1.123.123 (www.example.com) Ports: 80/open/tcp//http///, 443/open/tcp//https/// Ignored State
80%
10.04.2015
: http://www.jython.org
JMagick: https://github.com/techblue/jmagick
Im4java: http://im4java.sourceforge.net
Mozilla's Rhino project: https
79%
05.12.2014
/software/grep/manual/html_node/Context-Line-Control.html
vgrep: http://en.wikipedia.org/wiki/Visual_inspection#Humorous_terminology
"Network Grep" by Chris Binnie, Linux Pro Magazine
, March 2013, issue 148, pg. 50, http://www.admin-magazine.com
79%
05.02.2019
)
Figure 2 shows an attacker using Nmap to conduct a quick discovery with the command:
system1$ sudo nmap -sV -O -A 172.16.190.159 -p 445
Figure 2: Attack
79%
14.01.2016
/Panel3.Layton.pdf
Intel Shows Off 3D XPoint Memory Performance: http://www.nextplatform.com/2015/10/28/intel-shows-off-3d-xpoint-memory-performance/
NVMe
79%
03.12.2015
like a 1U two-socket server from Oracle that had two Intel Xeon E5v3 "Haswell" processors. One processor used an Intel P3700 SSD and a prototype Optane SSD. Both drives were connected to the system using