100%
30.01.2024
Rubén Llorente ...
8, 9
Debian
11, 12
Ubuntu
20.04, 22.04
FreeBSD
13.x
OpenBSD
7.3
I recommend the downloadable installer, but I will skip
99%
02.06.2020
Rubén Llorente ... /DomainKeys signature: http://www.citadel.org/doku.php?id=faq:spam:dspam
Official Citadel instance: http://uncensored.citadel.org/
The Author
Rubén Llorente is a mechanical engineer, whose job
99%
25.09.2023
Rubén Llorente ... is easy enough (superuser privileges are required):
arp -s 192.168.90.55 00:0c:29:c1:91:b1
The last field of the command is the MAC address, which is the unique identifier of the network device to which
99%
01.06.2024
Rubén Llorente ... # A single task is defined, which by default will
20 # run only against "devuan" hosts.
21 tasks:
22 upgradeall:
23 desc: Upgrade all packages
24 target:
25 tags: [devuan]
26 cmd: |
27
99%
03.02.2022
Rubén Llorente ... Llorente is a mechanical engineer whose job is to ensure that the security measures of the IT infrastructure of a small clinic are both legally compliant and safe. He is also an OpenBSD enthusiast
99%
04.12.2024
Rubén Llorente ... _virtual_environment_file.network_cloud_config,
18 ]
19
20 initialization {
21 user_data_file_id = proxmox_virtual_environment_file.rproxy_cloud_config.id
22 network_data_file_id = proxmox_virtual_environment_file.network_cloud_config[0
39%
21.08.2012
====================================================================
Install 2 Package(s)
Total download size: 106 k
Installed size: 187 k
Downloading Packages:
(1/2): gkrellm-daemon-2.3.5-3.el6.x86_64.rpm | 69 kB 00:00
(2/2): lm_sensors-libs-3.1.1-10.el6.x
38%
05.12.2014
.519354 pkts=6 kpps=0.0 kbytes=0 mbps=0.0 nic_pkts=16 nic_drops=0 u=2 t=2 i=0 o=0 nonip=2
1415510244.519597 pkts=6 kpps=0.0 kbytes=0 mbps=0.0 nic_pkts=22 nic_drops=0 u=2 t=2 i=0 o=0 nonip=2
1415510247
36%
18.06.2015
XC40 before the system is placed into regular service.
The Excalibur system comes with 101,184 processors, and the Stanford team had access to 22,00 of them. The team was working on a new scalability
35%
05.09.2011
can see how the arp cache poisoning works:
$ sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 \
-D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2:78:9E \
-H 00:22:6E:71:04:BB -M 00:0C:29:B2:78:9E