29%
18.07.2013
: XXXXXXXXXXXXXXXXXX
6 Firmware Revision: 2CV102HD
7 Transport: Serial, ATA8-AST, SATA 1.0a, SATA II Extensions, SATA Rev 2.5, SATA Rev 2.6
8 Standards:
9 Used: ATA/ATAPI-7 T13 1532
29%
05.09.2011
can see how the arp cache poisoning works:
$ sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 \
-D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2:78:9E \
-H 00:22:6E:71:04:BB -M 00:0C:29:B2:78:9E
28%
24.02.2022
type: ldiskfs
Flags: 0x62
(OST first_time update )
Persistent mount opts: ,errors=remount-ro
Parameters: mgsnode=10.0.0.2@tcp
device size = 48128MB
formatting
28%
07.04.2022
=10.0.0.2@tcp
device size = 48128MB
formatting backing filesystem ldiskfs on /dev/sdb
target name testfs:OST0000
kilobytes 49283072
options -I 512 -i 1024 -J size
28%
06.10.2022
rd_size=524288
root@focal:~# ls /dev/ram0
/dev/ram0
root@focal:~# fallocate -l 2M header.img
root@focal:~# echo -n "not a secure passphrase" | cryptsetup luksFormat -q /dev/ram0 --header header
28%
04.08.2020
-slim[build]: info=image id=sha256:231d40e811cd970168fb0c4770f2161aa30b9ba6fe8e68527504df69643aa145 size.bytes=126323486 size.human=126 MB
docker-slim[build]: info=image.stack index=0 name='nginx:latest' id='sha256
28%
16.10.2012
bytes:215392635 (215.3 MB) TX bytes:1759757 (1.7 MB)
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK
28%
30.11.2020
):
11
12 s = 0.0
13 s += h * f(a)
14 for i in range(1, n):
15 s += 2.0 * h * f(a + i*h)
16 # end for
17 s += h * f(b)
18 return (s/2.)
19 # end def
20
21
22 # Main section
23 comm = MPI
28%
20.05.2014
Viewing Server Topology
01 # numactl --hardware
available: 8 nodes (0-7)
node 0 cpus: 0 1 2 3 4 5 6 7 8 9
node 0 size: 16373 MB
node 0 free: 15837 MB
node 1 cpus: 10 11 12 13 14 15 16 17 18 19
node 1
28%
05.12.2019
, as in Listing 2.
Listing 2
Output Including Banned IP Address
$ sudo iptables -L -n
Chain INPUT (policy ACCEPT)
target prot opt source destination
f2b-default tcp -- 0.0.0.0/0 0.0.0.0/0