71%
26.03.2025
with a small script that runs once a minute as a root cron job:
#!/bin/bash
ipset -q flush maltrail
ipset -q create maltrail hash:net
for ip in $(curl http://127.0.0.1:8338/fail2ban 2>/dev/null | grep -P '^[0-9
71%
28.07.2025
[i] + b[i];
}
When the number of cycles is known at compile time, a loop can be fully unrolled:
c[0] = a[0] + b[0];
c[1] = a[1] + b[1];
c[2] = a[2] + b[2];
c[3] = a[3] + b[3];
However, it remains
70%
30.11.2025
. If a hostname is used it
06 * must match the reverse dns of the server.
07 * /
08 host = "10.42.0.1";
09
10 /* passwords: the passwords we send (OLD C:) and accept (OLD N:).
11
70%
30.11.2025
/openvpn/keys/CA.crt
08 cert /etc/openvpn/keys/server.crt
09 key /etc/openvpn/keys/server.key
10 tls-auth /etc/openvpn/keys/tls-auth.key
11
12 server 192.168.1.0 255.255.255.0
13
14 keepalive 10 60
15 comp-lzo
16
17
70%
31.10.2025
the explain plan for command in combination with the DBMS_XPLAN.DISPLAY function call (see Example 1).
Example 1: Oracle Execution Plan
01 SQL> explain plan for<+>1<+>
02 2> SELECT *
03 3> FROM sales
70%
30.11.2025
_64
07 enabled = 1
08 sslverify = 0
09 gpgcheck = 1
10 baseurl = https://ipa1.virt.tuxgeek.de/pulp/repos/pub/fedora/linux/releases/14/Everything/x86_64/os
To help you keep track of which clients
70%
30.11.2025
interval="0" timeout="60"
05 op stop interval="0" timeout="60"
06 op monitor start-delay="0" interval="1200"
07 meta resource-stickiness="0" failure-timeout="180"
08
09 primitive stonith_bob stonith
70%
30.11.2025
/bin/python
02
03 import func.overlord.client as fc
04
05 results = fc.Client("@ldap").service.status("dirsrv")
06
07 for (host, returns) in results.iteritems():
08 if returns == 0:
09 print host, "LDAP ... 3