51%
02.06.2020
on a local NVMe device:
$ cat /proc/partitions|grep nvme
259 0 244198584 nvme0n1
259 3 97654784 nvme0n1p1
259 4 96679936 nvme0n1p2
I will be using partition 1 for the L2ARC read
51%
02.10.2012
addresses to connect /etc/hosts.allow
, the file would simply look like this:
sshd: 10.10.10.10, 1.2.3.4, 21.21.21.21
TCP Wrappers works nicely, even if you change the standard SSH port (it’s usually TCP
51%
17.03.2020
:
$ cat /proc/partitions|grep nvme
259 0 244198584 nvme0n1
259 3 97654784 nvme0n1p1
259 4 96679936 nvme0n1p2
I will be using partition 1 for the L2ARC read cache, so to enable
51%
06.10.2019
, Splint [9] for C offers thorough code analysis. Listing 2 shows a deliberately broken sample program. The potential buffer overflow in line 8 and the format string vulnerability in line 9 are even
50%
23.03.2022
20 2020 openmpi-4.0.5.tar.gz
39322319 drwxrwxr-x 7 laytonjb laytonjb 4096 Oct 24 2020 psutil-release-5.7.3
32639755 drwxrwxr-x 2 laytonjb laytonjb 4096 Nov 6 10:25 pxz-master
31866302
50%
12.09.2013
;
05
06 print "Status: 200\nContent-Type: text/plain\n\n";
07 $|=1; $|=0; # flush
08
09 my $dbh=DBI->connect('dbi:Pg:dbname=r2', 'ipp', undef, {RaiseError=>1});
10
11 my $sth
50%
22.05.2012
9.3 k
dhclient x86_64 12:4.1.1-25.P1.el6_2.1 sl-security 315 k
e2fsprogs x86
50%
25.09.2023
guest
82a84,88
>
> tee /etc/.htpasswd <<'EOF'
> guest:$apr1$gz4n7s6o$P.O/V1k9rZuV9nN/5lh3l0
> admin:$apr1$esczj7wu$ffu/6j8vETMAMJaVTKn7a1
> EOF
Monit is configured to load service
50%
21.08.2012
686 0.9.5-1.el6 sl 25 k
libpng i686 2:1.2.49-1.el6_2 sl-security 183 k
libselinux i686
50%
25.09.2023
hosts [9]. A more apt comparison is found in Listing 2, with the results posted by a Raspberry Pi 400 [10], which is essentially a Raspberry Pi 4 (Broadcom BCM2711 Cortex-A72, ARM v8 quad-core running