69%
30.11.2025
://www.zabbix.com
https://www.icinga.org
http://www.nagios.org
Version
1.8.x
1.8.6
1.6
3.3.1
License
GPLv2
GPLv2
GPLv2
Core
68%
30.11.2025
be in the database for a production web application
18 $result = $hasher->CheckPassword($password, $passwordfromdb);
19
20 if ($result) {
21 echo "Password match!";
22 }
23 else {
24 echo "Password
68%
31.10.2025
| 355 |
18 |* 3 | INDEX RANGE SCAN | SALES_DATE | | 26 |
19 | 4 | TABLE ACCESS FULL | EMPLOYEES | 9M | 478 |
20
68%
28.07.2025
ensure => file,
18 owner => 'root',
19 group => 'root',
20 mode => '0644',
21 source => 'puppet:///modules/profile/systemd/puppet-sshd-watch.path',
22 notify => Exec
68%
30.11.2025
","stage","app","gateway","eth0-ip","eth0-mask","eth1-mac","eth1-ip","eth1-mask" ]
19 system_dict = {}
20
21 f = open(cblr_systems, "r")
22 for line in f:
23 if line.startswith("#"):
24 continue
25 system
68%
30.11.2025
runs with root privileges. The exceptions are Mac OS X and Solaris, where the user only needs access privileges for the network interface card device file.
By default, Tcpdump reads all the data
67%
30.11.2025
/filter.d/sasl.conf:
failregex = (?i): warning: [-._\w]+\[\]: SASL (?:LOGIN|PLAIN|(?:CRAM|DIGEST)-MD5) authentication failed: authentication failure
A quick hunt through my /var/log/mail.log files reveals:
Dec 20 22
67%
30.11.2025
Scenarios:
21 cucumber /usr/lib/nagios/plugins/cucumber-nagios/checks/features/www.xing.com/startpage.feature:4 # Scenario: Visiting home page
22
23 1 scenario (1 failed)
24 4 steps (1 failed, 3 skipped)
25 0 ... 3
67%
30.11.2025
]
13 rw=randread
14 runtime=60
15
16 [sequentialread]
17 stonewall
18 rw=read
19 runtime=60
20
21 [randomwrite]
22 stonewall
23 rw=randwrite
24 runtime=60
25
26 [sequentialread]
27 stonewall
28 rw
67%
30.11.2025
.84
132.71
3,127.50
713.77
4.11
mandel
5.55
31.15
65.44
824.68
156.68
5.67
pi_sum
0.74
18.03
1.08
328