20%
08.04.2025
of the system names (to run hostname
). In this example, the system names are compute-01
, compute-02
, compute-03
, and compute-04
. You can use all sorts of range combinations with pdsh
, such as compute-[01-03,05-08,10,13,14,15
20%
30.11.2025
. We're still left running regular expressions on config files on the server's disk. How old fashioned will this sound in 15 years?
Duck, Duck, NoSQL
There are two ways of offering a low-level cloud
20%
30.11.2025
were run on a virtual system (using ESX as the hypervisor) with fixed reservations for CPU and memory. To be more precise, I used a virtual CPU running at 1.5GHz and with 512MB of RAM in the virtual
20%
30.11.2025
="60"
14 op monitor start-delay="0" interval="1200"
15 meta resource-stickiness="0" failure-timeout="180"
16
17 location l_stonith_alice stonith_alice -inf: alice
18 location l_stonith_bob stonith
20%
30.11.2025
-Server is UP"
10
11 else:
12 print host, "LDAP-Server is DOWN - starting it up"
13 result = fc.Client(host).service.start("dirsrv")
14 if result[host] == 0:
15 print host, "LDAP-Server is now UP"
16
20%
30.11.2025
: " . $password . "\n
";
13 echo "Hash: " . $hashvalue . "\n
";
14
15 // Compare $password with the store has:
16 $passwordfromdb = '$P$9IQRaTwmfeRo7ud9Fh4E2PdI0S3r.L0';
17 // stored hash, would
20%
30.11.2025
c/s virtual
12
13 Benchmarking: OpenBSD Blowfish (x32) [32/64 X2]... DONE
14 Raw: 723 c/s real, 723 c/s virtual
15
16 Benchmarking: Kerberos AFS DES [48/64 4K]... DONE
17 Short: 378501 c/s real
20%
30.11.2025
/dumpfile.pcap")
>>> a
15 Other:611>
>>> a[423].pdfdump(layer_shift=1)
If you want to sniff traffic on a host, enter the following command at the Scapy prompt:
>>> sniff(filter="tcp and host
20%
30.11.2025
.Xensource.xenapi.Connection;
07 import com.Xensource.xenapi.Host;
08 import com.Xensource.xenapi.Session;
09 import com.Xensource.xenapi.Task;
10
11 import de.pm.xenserver.utils.Server;
12
13 public class TestAPI {
14
15
20%
30.11.2025
:
Figure 4: Header bytes 12-15.
# tcpdump -n -r dumpfile.lpc -c 10 'tcp[13] == 18' and host 172.16.183.2
Figure 5 is an example what this command returns. When capturing data with tcpdump, you can