24%
27.05.2025
classifies each pair into self-defined optimization categories.
Category 0 means it cannot be optimized.
Category 1 means it can easily be optimized.
Category 2 means that although one or more other
24%
07.09.2025
The following packages will be downloaded:
...
Proceed ([y]/n)? y
Downloading and Extracting Packages:
Preparing transaction: done
Verifying transaction: done
Executing transaction: done
To mount the archive
24%
30.11.2025
Resident Pages: 0/15 0/60K 0%
05 Elapsed: 8.1e-05 seconds
06 $ ./vmtouch -vt /bin/gzip
07 /bin/gzip
08 [OOOOOOOOOOOOOOO] 15/15
09
10 Files: 1
11 Directories: 0
12 Touched Pages: 15 (60K)
13
24%
30.11.2025
) with 12 Serial ATA disks, a 320 UW SCSI controller for the host connection, and 512MB cache.
I configured various disk groups and logical volumes on this powerful hardware and exported them to the backup
24%
30.11.2025
. This type of attack is known as a man-in-the-middle attack.
In this article, I mention a number of tools used in ARP cache poisoning attacks, including ettercap, arpspoof, Nemesis, p0f, dsniff, and Scapy
24%
30.11.2025
\
02 --hostname=foo.bar.de --mac- address=00:40:26:CA:10:DD \
03 --kopts="stage=test app=www" --ksmeta="stage=test app=www"
04 # cobbler system edit --name=foo --interface=eth0 --mac=00:40:26:CA
24%
30.11.2025
565b5901d666de3bfe538be27aebb9f443de98f0 notification_proxy: use free() instead of g_free()
10 5c10f12e408b11afbd7c3cc93ddf7d85f1527417 ideviceinfo: fix possible segmentation fault when parsing empty
24%
30.11.2025
` ]]; then
078 mkdir ./`dirname $l` > /dev/null
079 fi
080 cp $l .$l
081 done
082 done
083
084 cd /export/home/jail/$JAILUSER/devices/pseudo
085 mknod mm@0:zero c 13 12
086 mknod mm@0:null c 13 2
24%
30.11.2025
CPU PROCESS/NLWP
# 173 daemon 17M 11M sleep 59 0 3:18:42 0.2% rcapd/1
# 17676 apl 6916K 3468K cpu4 59 0 0:00:00 0.1% prstat/1
# ...
# ZONEID NPROC SWAP RSS MEMORY TIME
24%
30.11.2025
-type traffic, as well as for the local link address (i.e., good old 127.0.0.1).
Getting IPv6 Connectivity
You can get IPv6 connectivity in several ways: native IPv6 access, IPv6 tunnels, Teredo (Miredo on Unix