11%
26.01.2012
capture local I/O using iostat), so the most likely use of iostat is on the storage server or servers.
nfsiostat
A tool called nfsiostat, which is very similar to iostat, is part of the sysstat collection
11%
10.06.2015
configure settings for RandR [4] in Linux. The call to xrandr is pretty bulky:
xrandr --fb 1600x900 --output LVDS1 --mode 1600x900 \
--scale 1x1 --output HDMI3 --same-as LVDS1 --mode 1920x1200 \
--scale
11%
04.10.2018
or in an event-controlled manner in an orchestration or identity management system. The calling account must have the appropriate rights in AD. With PowerShell, all you need is the AD module, which is part
11%
07.10.2014
A few years ago I was spending a great deal of time on call – day and night. It rapidly became obvious that we needed to implement company-wide server security that would be effective when on-call
11%
17.06.2017
, it duplicates it back to SW1, and the process repeats forever. This phenomenon is called a broadcast storm, which can consume all available CPU resources and network bandwidth. The entire network could
11%
25.03.2021
" for the technology, with the essential difference from so-called legacy systems being that all management components of the storage layer run as pods in the Kubernetes cluster itself. Of course, this is not a unique
11%
05.12.2019
-time environment as needed, which you call in the browser without having to worry about the technical underpinnings.
The Rub
Everyone will be familiar with this scenario: A project you recently discovered and find
11%
05.02.2019
in this article? Can only a few people do this? The know-how and software are easily obtained on the Internet, such as the Mimikatz pass-the-hash attack tool. USB sticks that act like a keyboard are called USB
11%
20.03.2014
).
Figure 1: A small Lua script that makes use of libguestfs.
Calling the Lua interpreter with lua, launches in an interactive mode, in which you can enter code. Alternatively, it executes Lua scripts
11%
11.06.2014
the command center – the Rex host, which is sometimes called Rex Control Master – needs a few software modules. By the way, the Rex developers call the program (R)?ex
, which is totally unpronounceable, so I