100%
30.11.2025
friday 00:00-24:00
10 saturday 00:00-24:00
11 }
12
13 define timeperiod{
14 timeperiod_name wochentags
15 alias Robot Robot
93%
30.11.2025
sda 0 0 0 0 0 0 0 0 0 0 0
26 20120310 13:39:50 sdb 4 0 97 1 2 11 21 0 5 5 2 sda 0 0 0 0 0 0 0 0 0 0 0
27 20120310 13:40:00 sdb 83 91 3518 2 4 23 42 1 7 6 54 sda 0 0 0 0 0 0 0 0 0 0 0
28 20120310 13
87%
30.11.2025
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple ... 6
85%
30.11.2025
# svcadm disable stmf
09 # fcinfo hba-port
10 ?
11 HBA Port WWN: 10000000c93805a6
12 Port Mode: Target
13 Port ID: 10200
14 OS Device Name: Not Applicable
15 Manufacturer: Emulex
16 Model: LP9002L
17 ?
18
80%
30.11.2025
]
13 rw=randread
14 runtime=60
15
16 [sequentialread]
17 stonewall
18 rw=read
19 runtime=60
20
21 [randomwrite]
22 stonewall
23 rw=randwrite
24 runtime=60
25
26 [sequentialread]
27 stonewall
28 rw
79%
30.11.2025
is adding these entries to the Cobbler database. A typical example looks something like Listing 1.
Listing 1
System Settings
01 # cobbler system add --name=foo --profile=ksprofile-devel-rhel6 ... 6
79%
30.11.2025
. The target systems only require the systemtap-runtime RPM and the staprun program it contains. The following command creates a prebuilt binary kernel module for the target system:
stap -r kernel-PAE-2.6.31.12-174.2.22
79%
30.11.2025
Model";
11 $work = "ebiz-tx";
12 $node1 = "WebServer";
13 $node2 = "AppServer";
14 $node3 = "DBMServer";
15 $think = 0.0 * 1e-3; # as per test system
16 $dtime = 2.2 * 1e-3; # dummy service time
17
18 ... 6
78%
30.11.2025
aes256-sha1;
13 }
14 vpn racoonvpn {
15 bind-interface st0.0;
16 ike {
17 gateway racoon;
18 proxy-identity {
19 local 192.168.1.0/24;
20 remote
76%
30.11.2025
"creating" $vmname
09
10 virsh suspend rhstorage
11 virt-clone -o rhstorage -n $vmname -f /var/lib/libvirt/images/$vmname.qcow
12 virsh resume rhstorage
13
14 oldmac="52:54:00:B4:DF:EB"
15 newmac