14%
10.09.2012
to logfiles, and it’s pretty simple to use:
[laytonjb@test1 ~]$ logger "This is a test"
...
[root@test1 ~]# tail -n 2 /var/log/messages
Aug 22 15:54:47 test1 avahi-daemon[1398]: Invalid query packet.
Aug 22 17:00
14%
19.11.2019
, ioengine=libaio, iodepth=32
fio-3.12
Starting 1 process
Jobs: 1 (f=1): [w(1)][100.0%][w=475MiB/s][w=122k IOPS][eta 00m:00s]
test: (groupid=0, jobs=1): err= 0: pid=1634: Mon Oct 14 22:18:59 2019
write: IOPS=118k, BW=463Mi
14%
04.11.2011
-server 192.168.1.2;
filename "/pxelinux.0";
host node01 {
hardware ethernet 00:11:22:33:44:a0;
fixed-address 192.168.1.101;
}
host node01-bmc {
hardware ethernet 00:11:22:33:44:8d;
fixed-address 192
14%
30.11.2025
339.78
144.00
307.66
Total
9,262.97
12,094.00
12,325.79
Conclusion
Satellite Server offers an automated way of providing patches
14%
22.05.2012
.x86_64 0:1.9-22.el6_2.1
libacl.x86_64 0:2.2.49-6.el6 libattr.x86_64 0:2.4.44-7.el6 libblkid.x86_64 0:2.17.2-12.4.el6
libcap.x86_64 0
14%
13.06.2016
Standard Filesystems
Distribution
Filesystem
Debian (from v7.0 wheezy)
ext4
Ubuntu (from v9.04)
ext4
Fedora (from v22)
XFS
SLES (from v12
14%
27.08.2014
-1600)
CentOS 6.5 (updates current as of August 22, 2014)
For testing, I used a Samsung SSD 840 Series drive that has 120GB of raw capacity (unformatted) and is connected via a SATA 3 (6Gbps) connection
14%
01.08.2019
. The takeaway is the -j LOG option (line 12), which logs port scanning behavior to a logfile with the iptables:
prefix.
Listing 1
iptable Rules
01 *filter
02 *filter
03 :INPUT ACCEPT [0:0]
04
14%
30.07.2014
00:00:00 Thursday January 1, 1970, Coordinated Universal Time (UTC).
Listing 1: Perl Example Client
#!/usr/bin/perl
use strict;
use warnings;
use IO::Socket;
use Sys::CpuLoad;
my
14%
30.11.2025
/nsswitch.conf (Konfigurieren der Namensauflösung)
08 ...
09 hosts files dns
10 ipnodes files dns
11 ...
12 # vi /etc/hosts
13 ::1 localhost
14 127.0.0.1 localhost
15 192.168.1.200 myiscsiserver myiscsiserver.local loghost
16