26%
20.06.2012
was there. To test whether this worked, ssh
to the node n0001
as root.
[root@test1 ~]# ssh n0001
Last login: Sat May 26 12:00:06 2012 from 10.1.0.250
The /etc/hosts
on the master node works fine
26%
02.06.2020
= sol.copy()
10
11 for j in range(0,ny-1):
12 sol[0,j] = 10.0
13 sol[nx-1,j] = 1.0
14 # end for
15
16 for i in range(0,nx-1):
17 sol[i,0] = 0.0
18 sol[i,ny-1] = 0.0
19 # end for
20
21 # Iterate
22
26%
05.09.2011
can see how the arp cache poisoning works:
$ sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 \
-D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2:78:9E \
-H 00:22:6E:71:04:BB -M 00:0C:29:B2:78:9E
26%
10.09.2012
to logfiles, and it’s pretty simple to use:
[laytonjb@test1 ~]$ logger "This is a test"
...
[root@test1 ~]# tail -n 2 /var/log/messages
Aug 22 15:54:47 test1 avahi-daemon[1398]: Invalid query packet.
Aug 22 17:00
26%
19.11.2019
, ioengine=libaio, iodepth=32
fio-3.12
Starting 1 process
Jobs: 1 (f=1): [w(1)][100.0%][w=475MiB/s][w=122k IOPS][eta 00m:00s]
test: (groupid=0, jobs=1): err= 0: pid=1634: Mon Oct 14 22:18:59 2019
write: IOPS=118k, BW=463Mi
26%
04.11.2011
-server 192.168.1.2;
filename "/pxelinux.0";
host node01 {
hardware ethernet 00:11:22:33:44:a0;
fixed-address 192.168.1.101;
}
host node01-bmc {
hardware ethernet 00:11:22:33:44:8d;
fixed-address 192
26%
22.05.2012
.x86_64 0:1.9-22.el6_2.1
libacl.x86_64 0:2.2.49-6.el6 libattr.x86_64 0:2.4.44-7.el6 libblkid.x86_64 0:2.17.2-12.4.el6
libcap.x86_64 0
26%
13.06.2016
Standard Filesystems
Distribution
Filesystem
Debian (from v7.0 wheezy)
ext4
Ubuntu (from v9.04)
ext4
Fedora (from v22)
XFS
SLES (from v12
26%
28.11.2022
of alternative sources.
Listing 1
sensors Output
federico@ferenginar:~$ sensors
k10temp-pci-00c3
Adapter: PCI adapter
temp1: +42.5¡C (high = +70.0¡C)
(crit = +100.0¡C
26%
01.08.2019
. The takeaway is the -j LOG option (line 12), which logs port scanning behavior to a logfile with the iptables:
prefix.
Listing 1
iptable Rules
01 *filter
02 *filter
03 :INPUT ACCEPT [0:0]
04