15%
20.05.2014
Viewing Server Topology
01 # numactl --hardware
available: 8 nodes (0-7)
node 0 cpus: 0 1 2 3 4 5 6 7 8 9
node 0 size: 16373 MB
node 0 free: 15837 MB
node 1 cpus: 10 11 12 13 14 15 16 17 18 19
node 1
15%
21.08.2014
} 'a'..'c';
12
13 $s .= $one;
14 $s .= $two;
15 $s .= $three;
16
17 my $temp;
18 for (my $i=0; $i<12288; $i++) {
19 $temp=substr($s,length($s)-1,1);
20 $s=$temp.$s;
21 $s = substr($s,0
15%
21.08.2012
, 0.02
n0001: 18:58:49 up 1:13, 0 users, load average: 0.00, 0.00, 0.00
With a simple Bash, Perl, or Python script and pdsh, you can query almost anything. Just be warned that you need to play
15%
13.12.2011
packetstormsecurity.org
packetstormsecurity.org,199.58.210.12,A
NS25.WORLDNIC.COM,205.178.190.13,SOA
ns25.worldnic.com,205.178.190.13,NS
ns26.worldnic.com,206.188.198.13,NS
mail.packetstormsecurity.org,199.58.210.12,MX ...
Professional attackers have much more pointed at your site than just Nmap, and you should too if you want to test your network’s security. We’ll show you some tools intruders use to gather
15%
30.11.2025
01 # zfs set volsize=3g mypool/vol1
12 02 # zfs get volsize mypool/vol1
13 03 NAME PROPERTY VALUE SOURCE
14 04 mypool/vol1 volsize 3G -
15 05 # sbdadm modify-lu -s 3g 600144f05f71070000004bc981ec0001
15%
07.06.2019
$ ethstats -c1
eth0: 0.03 Mb/s In 0.14 Mb/s Out - 51.4 p/s In 38.8 p/s Out
requests a single sample and shows a somewhat idle system.
Grand Finale
With a nearly inexhaustible supply
15%
12.09.2013
approx. US$ 600
approx. US$ 335
CPU
Via Eden X2/1GHz
Via Eden X2/1GHz
AMD G-T44R/1.2GHz
AMD G-T56N/1.6GHz
Marvell ARMADA PXA 510 v7.1
Chipset
15%
07.10.2014
by the process
12m
12MB
S
Status of process
R
S
= sleeping, R
= running, Z
= zombie
%CPU
Percent CPU being used by the process on a per-CPU basis
15%
07.04.2022
,BROADCAST,RUNNING,MULTICAST> mtu 1460
inet 10.0.0.2 netmask 255.255.255.255 broadcast 0.0.0.0
inet6 fe80::bfd3:1a4b:f76b:872a prefixlen 64 scopeid 0x20
ether 42:01:0a:80:00:02 txqueuelen 1000
15%
24.02.2022
.255.255.255 broadcast 0.0.0.0
inet6 fe80::bfd3:1a4b:f76b:872a prefixlen 64 scopeid 0x20
ether 42:01:0a:80:00:02 txqueuelen 1000 (Ethernet)
RX packets 11919 bytes 61663030 (58.8 Mi