16%
    
    
    13.06.2022
        
    
    	
        
Many HPC systems check the state of a node 
b
efore
 running a
n
 application, but not very many check that the 
performance 
of the node is acceptable before running the job.
 ...   made to the benchmarks of the latest version 3.4.2 of the NPB are:
added class F to the existing S, W, A, B, C, D, E
added dynamic memory allocation
added MPI and OpenMP programming models ...  
Many HPC systems check the state of a node 
b
efore
 running a
n
 application, but not very many check that the 
performance 
of the node is acceptable before running the job.
    
 
		    
				        
    16%
    
    
    03.04.2024
        
    
    	
        64ae120c27e504088d8c2ce29a0fa7f85c
The example code in Listing 2 uses Python to demonstrate how to use the API to retrieve user information. To begin, import the Python Requests API and define the URL
    
 
		    
				        
    16%
    
    
    05.12.2014
        
    
    	
         of this attack, including a description, walk-through, and exploit is available at Exploit-DB [11].
Over the years, I've made use of a Perl script that reduces very long W3C Apache log entries down to just
    
 
		    
				        
    16%
    
    
    18.02.2018
        
    
    	
        . The required modifications are explained in the Huginn wiki [3].
The software is based on Ruby on Rails [4] and therefore requires an installed Ruby environment; in fact, it needs version 2.2 or 2.3
    
 
		    
				        
    16%
    
    
    05.12.2016
        
    
    	
        
 as the user name.
Amanda versions before 3.3.9 have a vulnerability that lets this user execute arbitrary code with root privileges. A (manual) upgrade to version 3.3.9 is only necessary if you don't trust
    
 
		    
				        
    16%
    
    
    17.02.2015
        
    
    	
         use                     generic-service
21 host_name               w2k12srv
22 service_description     Memory Usage
23 check_command       check_nt!MEMUSE!-w 80 -c 90
24         }
25 define service{
26
    
 
		    
				        
    16%
    
    
    14.03.2013
        
    
    	
         command:
# sockstat | grep "\*:[0-9]"
The description for rc.conf(5) lists the services that need to be bound to a fixed IP address via parameters. One example is the inetd service:
inetd_flags="-wW -a
    
 
		    
				        
    15%
    
    
    22.12.2017
        
    
    	
           in   cs us sy id wa st
04  1  0      0 5279852   2256 668972    0    0  1724    25  965 1042 17  9 71  2  0
05  1  0      0 5269008   2256 669004    0    0     0     0 2667 1679 28  3 69  0  0
06  1  0
    
 
		    
				        
    15%
    
    
    14.08.2017
        
    
    	
         to manage them disappeared.
Container Linux ruthlessly replaces the entire /usr directory instead of individual files (Figure 3). The main work is handled by Linux containers à la Docker [20], or Rkt [21
    
 
		    
				    
    15%
    
    
    22.08.2011
        
    
    	 
        .keys.sort.each do |s|
14   printf "%20s %d\n", s, summary[s]
15 end
16 puts "Polling for changes (Ctrl-C to end)"
17 loop do
18   sleep 2
19   client.instances.each do |inst|
20    if state[inst.id] != inst.state
21