100%
30.11.2025
friday 00:00-24:00
10 saturday 00:00-24:00
11 }
12
13 define timeperiod{
14 timeperiod_name wochentags
15 alias Robot Robot
93%
30.11.2025
sda 0 0 0 0 0 0 0 0 0 0 0
26 20120310 13:39:50 sdb 4 0 97 1 2 11 21 0 5 5 2 sda 0 0 0 0 0 0 0 0 0 0 0
27 20120310 13:40:00 sdb 83 91 3518 2 4 23 42 1 7 6 54 sda 0 0 0 0 0 0 0 0 0 0 0
28 20120310 13
89%
31.10.2025
12 # quickly" after prompts. If you find your new script hanging up at
13 # one spot, try adding a short sleep just before the previous send.
14 # Setting "force_conservative" to 1 (see below) makes
87%
30.11.2025
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple ... 6
85%
30.11.2025
# svcadm disable stmf
09 # fcinfo hba-port
10 ?
11 HBA Port WWN: 10000000c93805a6
12 Port Mode: Target
13 Port ID: 10200
14 OS Device Name: Not Applicable
15 Manufacturer: Emulex
16 Model: LP9002L
17 ?
18
83%
31.10.2025
.nmap.org (64.13.134.52):
Not shown: 994 filtered ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 4.3 (protocol 2.0)
25/tcp closed smtp
82%
31.10.2025
, admins need three things: a 2.6.13 kernel or newer, a kernel configured for kexec, and the corresponding userland tools (Figure 1).
Figure 1: Dependencies
82%
31.10.2025
)
13 Index Cond: (sale_date > (('now'::text)::date - '6 mons'::interval month))
14 Filter:<+>3<+> (eur_value >= 10::numeric)
15 -> Hash (cost=1672.00..1672.00 <+>4<+>rows=10000 width=1035)
16 -> Seq Scan
80%
30.11.2025
]
13 rw=randread
14 runtime=60
15
16 [sequentialread]
17 stonewall
18 rw=read
19 runtime=60
20
21 [randomwrite]
22 stonewall
23 rw=randwrite
24 runtime=60
25
26 [sequentialread]
27 stonewall
28 rw
79%
30.11.2025
is adding these entries to the Cobbler database. A typical example looks something like Listing 1.
Listing 1
System Settings
01 # cobbler system add --name=foo --profile=ksprofile-devel-rhel6 ... 6