100%
31.10.2025
-- "PASSWORD\r"
49 expect -exact "\r
50 Linux aspen 2.6.32-43-server #97-Ubuntu SMP Wed Sep 5 16:56:41 UTC 2012 x86_64 GNU/Linux\r
51 Ubuntu 10.04.4 LTS\r
52 \r
53 Welcome to the Ubuntu Server!\r
54 ... 12
16%
30.11.2025
friday 00:00-24:00
10 saturday 00:00-24:00
11 }
12
13 define timeperiod{
14 timeperiod_name wochentags
15 alias Robot Robot
16%
30.11.2025
YZCD
03 # DaemonOpts: -f /var/log/collectl -r00:00,7 -m -F60 -s+YZCD --iosize
04 ################################################################################
05 # Collectl: V3.6.1-4 HiRes: 1 Options
16%
31.10.2025
.93 scanme.nmap.org (64.13.134.52)
Nmap done: 1 IP address (1 host up) scanned in 17.00 seconds
Whether or not you have much experience with networks and operating systems, you should see
16%
30.11.2025
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple ... 6
15%
31.10.2025
System, DUP: total=8.00MB, used=4.00KB
Metadata, DUP: total=1.00GB, used=79.20MB
If Btrfs only has one device available when the filesystem is created, it automatically generates a duplicate
15%
31.10.2025
at the output of uptime [1] on OS X:
13:03 up 2 days, 12:01, 2 users, load averages: 0.52 0.59 0.63
The uptime command displays the load average in its common form, averaging the last one, five, and 15 minutes
14%
30.11.2025
# svcadm disable stmf
09 # fcinfo hba-port
10 ?
11 HBA Port WWN: 10000000c93805a6
12 Port Mode: Target
13 Port ID: 10200
14 OS Device Name: Not Applicable
15 Manufacturer: Emulex
16 Model: LP9002L
17 ?
18
14%
30.11.2025
is adding these entries to the Cobbler database. A typical example looks something like Listing 1.
Listing 1
System Settings
01 # cobbler system add --name=foo --profile=ksprofile-devel-rhel6 ... 6
14%
30.11.2025
.47
1,336.37
2,383.80
225.23
1.55
parse_int
1.44
16.50
815.19
6,454.50
337.52
2.17
quicksort
1.49
55