33%
14.08.2020
S.M.A.R.T. (Self-Monitoring, Analysis, and Reporting Technology) is a monitoring system for storage devices that provides information about the status of a device and allows for the running of self
33%
22.08.2011
x]... DONE
Raw: 10635K c/s real, 10635K c/s virtual
Benchmarking: Eggdrop [blowfish]... DONE
Raw: 23744 c/s real, 23744 c/s virtual
Benchmarking: M$ Cache Hash [Generic 1x]... DONE
Many salts
33%
09.01.2013
B (78.11% of total)
07 After compression: 1216.23 MiB (56.00% of total, 71.70% of de-duplicated)
08 Database size: 3.81 MiB (uncompressed)
09 (some values do not take into account not
33%
10.09.2012
@test1 ~]$ su
Password:
[root@test1 laytonjb]# more /opt/logs/module
Aug 22 09:41:20 test1 laytonjb: This is a test
Notice that a user cannot look at the log or modify it, but root can.
No it’s time
33%
09.10.2017
server with a compromised MySQL binary. A forensics professional informed me that the following strings belonged to a Trojan:
7A 50 15 00 40 00 67 30 15 02 11
9E 68 2B C2 99 6A 59 F7 F9 8D 30
33%
14.06.2017
example illustrating the change in file size:
$ ls -lsah FS_scan.csv
3.2M -rw-r--r-- 1 laytonjb laytonjb 3.2M 2014-06-09 20:31 FS_scan.csv
$ gzip -9 FS_scan.csv
$ ls -lsah FS_scan.csv.gz
268K
33%
14.08.2017
to compress data files. Listing 1 shows a quick example illustrating the change in file size.
Listing 1
Gzip Example
$ ls -lsah FS_scan.csv
3.2M -rw-r--r-- 1 laytonjb laytonjb 3.2M 2014-06-09 20
32%
13.12.2018
://linux.die.net/man/8/hdparm
dmesg(1) man page: https://linux.die.net/man/1/dmesg
sysfs file attributes for USB devices and interfaces: https://github.com
32%
04.11.2011
.
Listing 1: Running Many Commands at Once
01 $ cat commands
02 date
03 hostname
04 echo foo | md5sum
05
06 $ cat commands | parallel
07 Thu Jul 8 10:37:20 EST 2010
08 desktop‑machine
09 d3b07384d113edec49
32%
21.08.2014
00:00-24:00
07 wednesday 00:00-24:00
08 thursday 00:00-24:00
09 friday 00:00-24:00
10 saturday