18%
09.08.2015
the passwords these "security experts" were using to protect their data? Some of the passwords uncovered in the attack were:
HTPassw0rd
Passw0rd!81
Passw0rd
Passw0rd!
Pas$w0rd
Rite1
18%
07.11.2011
shows an example of how Linux outputs this information for x86 architectures.
Listing 1: Linux Topology
$ cat /proc/cpuinfo
[...]
processor : 3
[...]
physical id : 0
siblings : 4
core id : 3
cpu
18%
17.08.2011
_costs = {
't1.micro' => 0.02,
'm1.small' => 0.095,
'c1.medium' => 0.19,
'm2.2xlarge' => 1.14,
'm2.4xlarge' => 2.28
}
Then I list the regions. This could have been dynamic, but I don’t want
18%
13.02.2017
.g., Wireshark). Despite this failing, VLANs are considered safer than normal networks. In truth, a network is also based on a VLAN where all nodes on the network work with a VLAN ID of 0.
Multivendor VLANs
18%
08.07.2018
read the hosts from a file other than the WCOLL
environment variable:
$ pdsh -w ^/tmp/hosts uptime
192.168.1.4: 15:51:39 up 8:35, 12 users, load average: 0.64, 0.38, 0.20
192.168.1.250: 15:47:53 up
18%
29.09.2020
~ $ kubectl get pods --all-namespaces
NAMESPACE NAME READY STATUS RESTARTS AGE
kube-system metrics-server-6d684c7b5-ssck9 1/1 Running 0
18%
15.08.2016
, one of which is now exclusively assigned to ns1. As a whole, it functions very rigorously, as a look into the sysfs virtual filesystem demonstrates:
$ tree /sys/class/net
/sys/class/net
|---eth0
18%
07.02.2019
data copy(a)
!$acc parallel loop
do i=1,n
a(i) = 0.0
enddo
!$acc data end
#pragma acc data copy(a)
{
#pragma acc parallel loop
{
for (int i=0; i < n; i++)
{
a[i] = 0.0
18%
02.08.2021
-Lo ./kind https://kind.sigs.k8s.io/dl/v0.10.0/kind-linux-amd64
$ chmod +x ./kind
$ mv ./kind /usr/local/bin/kind
$ kind --version
kind version 0.10.0
Get an incredibly quick start
18%
01.02.2013
at the output of uptime
[1] on OS X:
13:03 up 2 days, 12:01, 2 users, load averages: 0.52 0.59 0.63
The uptime
command displays the load average in its common form, averaging the last one, five, and 15