28%
10.04.2015
-way handshake for establishing a connection. A request for comment (RFC) [8] has already been submitted to the Internet Engineering Task Force (IETF) [9]. The method, also known as silent port knocking
28%
28.11.2023
):
ssh-keygen -t ed25519 -a 100 -f
ubuntu-sre-id_ed25519 -q -N
2. Copy the SSH public key data on the target server to the authorized_keys file in the $HOME/.ssh directory. You can use the secure copy
28%
20.06.2012
fingerprint is:
a9:90:af:81:69:fc:4f:b5:ef:6e:b5:d4:b7:cb:c6:02 laytonjb@test1
The key's randomart image is:
+--[ RSA 2048
28%
21.08.2012
15/20
Installing : glib2-2.22.5-6.el6.i686 16/20
Installing : gamin-0.1.10-9.el6.i686
28%
05.12.2016
_RESORT_IPS='
013 127.0.0.1
014 '
015
016 FILTER='
017 cat /var/log/secure | awk '\''$5~/^ssh/ && $6~/^Failed/ && $7~/^keyboard-interactive/ && $9~/[^invalid]/ {print $11}'\''
018 cat /var/log/secure | awk '\''$5
28%
20.10.2013
Modern drives use S.M.A.R.T. (self-monitoring, analysis, and reporting technology) to gather information and run self-tests. Smartmontools is a Linux tool for interacting with the S.M.A ... ://smartmontools.sourceforge.net
=== START OF INFORMATION SECTION ===
Device Model: Samsung SSD 840 Series
Serial Number: S19HNSAD620517N
LU WWN Device Id: 5 002538 5a005092e
Firmware Version: DXT08B0Q
User Capacity: 120,034,123,776 bytes ...
Modern drives use S.M.A.R.T. (self-monitoring, analysis, and reporting technology) to gather information and run self-tests. Smartmontools is a Linux tool for interacting with the S.M.A ... S.M.A.R.T., Smartmontools, and Drive Monitoring
28%
25.09.2023
: 55 ms.
Port: 80: op 2.1. 10.0.0.23 80 Time: 26 ms.
Port: 80: op 2.2. 10.0.0.23 80 Time: 56 ms.
Port: 80: op 3.1. 10.0.0.23 80 Time: 25 ms.
Port: 80: op 3.2. 10.0.0.23 80 Time: 48 ms.
Port: 80: op 4
28%
15.12.2016
are over i
= 2,n
− 1 and j
= 2,n
−1. Here is how you can write the iteration over the domain using array notation:
a(2:n-1,2:n-1) = 0.25 * &
(a(1:n-2,2:n) + a(3:n,2:n) + a(2:n,1:n-2) + a(2:n,3:n
28%
03.08.2023
://localhost:8000
$ curl -s -H "Content-type: application/json" -X POST -d '{ "command": "lease4-add", "arguments":{"ip-address":"172.17.6.8", "hw-address": "52:54:00:8a:17:9f"}, "service": [ "dhcp4" ] }' http
28%
17.02.2015
/json;charset=utf-8\n\r\n\r%s" %json.dumps(obj)
Lines 9 through 18 iterate against all entries of a database cursor, which the call to the find() method in line 9, generates from the queried data collection