100%
30.11.2025
: AuthenticAMD Speed(MHz): 2812.629 Cores: 4 Siblings: 4 Nodes: 1
13 # Kernel: 2.6.32-220.4.1.el6.x86_64 Memory: 7540044 Swap:
14 # NumDisks: 2 DiskNames: sdb sda
15 # NumNets: 2 NetNames: lo: eth0:100
16 # Num
99%
30.11.2025
#! /usr/bin/perl
02 # groxq.pl
03 use pdq;
04 #--------------- INPUTS ---------------
05 $ArrivalRate = 3/4; # customers per second
06 $ServiceRate = 1.0; # customers per second
07 $SeviceTime = 1/$Service
96%
30.11.2025
100.net) 56 data bytes
03 64 bytes from iy-in-x63.1e100.net: icmp_seq=1 ttl=52 time=99.6 ms
04 64 bytes from iy-in-x63.1e100.net: icmp_seq=2 ttl=52 time=100 ms
05 64 bytes from iy-in-x63.1e100.net: icmp
96%
31.10.2025
password 8 ZDF339a.20a3E
05 log file /var/log/quagga/zebra.log
06 service password-encryption
07 !
08 interface eth0
09 multicast
10 ipv6 nd suppress-ra
11 !
12 interface eth1
13 ip address 10
95%
30.11.2025
server, such as Xming [3] or the Mocha X Server [4].
Listing 2
Xeyes Test
01 $ xeyes &
02
03 [1] 4342
04 $ X connection to localhost:10.0 broken (explicit kill or server shutdown).
05 [1 ... 0
95%
30.11.2025
presence provides the system with a last chance for a soft landing before more drastic action is taken. This month, I examine the darker side of the picture: Swap hits 100%, and hard out-of-memory errors
94%
31.10.2025
immediately notice about this device is its excellent equipment, with USB 3.0 (4x plus 4x USB2.0!), eSATA, and HDMI, optional 10Gb Ethernet (PCI Express slot), and a Sandy Bridge processor. You can retrofit
93%
30.11.2025
Catalyst
01 Switch# configure terminal
02 Switch(config)# aaa new-model
03 Switch(config)# aaa authentication dot1x default group radius
04 Switch(config)# aaa authorization network group radius
05 ... Mobile devices require special security considerations. In combination with IEEE 802.1X, Network Access Protection can ensure that mobile devices maintain the necessary security standards before they ... NAP with 802.1X ... Port-based access protection with NAP and 802.1X
92%
30.11.2025
$ john -wordlist:password.lst passfile.txt
02 Loaded 2 passwords with 2 different salts (FreeBSD MD5 [32/64])
03 admin (root)
04 t-bone (khess)
05 guesses: 2 time: 0:00:00:00 100% c
92%
26.01.2025
.add(layers.BatchNormalization())
model.add(layers.Conv2D(64, (3,3), padding='same', activation='relu'))
model.add(layers.BatchNormalization())
model.add(layers.MaxPooling2D(pool_size=(2,2)))
model.add(layers.Dropout(0.5))
input