- Micron® 9300 MAX NVMe™ SSDs + Red Hat® Ceph® Storage for 2nd Gen AMD EPYC™ Processors
- Micron® 7300 MAX NVMe™ SSDs + Red Hat® Ceph® Storage for 2nd Gen AMD EPYC™ Processors
- Dell EMC Ready Architecture for Red Hat Ceph Storage 3.2 Cost Optimized Block Storage Architecture Guide
- Red Hat Ceph Storage on Dell EMC servers Object storage performance and sizing guide
- [Dell EMC Ready Architecture for Red Hat Ceph Storage 3.2 Performance Optimized Block Storage Architecture Guide](https://www.delle
<body onload=z=c.getContext`2d`,setInterval(`c.width=W=150,Y<W&&P<Y&Y<P+E|9<p?z.fillText(S++${Y=`,9,9|z.fillRect(p`}*0,Y-=--M${Y+Y},P+E,9,W),P))):p=M=Y=S=6,p=p-6||(P=S%E,W)`,E=49) onclick=M=9><canvas id=c> |
[toplevel] | |
# Put this in ~/.aws/cli/alias | |
# and you'll have an "aws upgrade" | |
# and an "aws check-upgrade" command. | |
# | |
# Only works on macOS and installs using | |
# the .pkg installer. | |
# | |
upgrade = !f() { | |
curl -s "https://awscli.amazonaws.com/AWSCLIV2.pkg" -o "/tmp/AWSCLIV2.pkg" |
import seaborn as sns | |
import matplotlib.pyplot as plt | |
sns.boxplot(data=random_data) |
import sys | |
# choose() is the same as computing the number of combinations. Normally this is | |
# equal to: | |
# | |
# factorial(N) / (factorial(m) * factorial(N - m)) | |
# | |
# but this is very slow to run and requires a deep stack (without tail | |
# recursion). | |
# |
kubectl run hack1 --restart=Never -t -i -n kube-system --image overridden --overrides '{"spec":{"hostPID": true, "containers":[{"name":"busybox","image":"alpine:3.7","command":["nsenter","--mount=/proc/1/ns/mnt","--","/bin/bash"],"stdin": true,"tty":true,"securityContext":{"privileged":true}}]}}' --rm --attach |
Other languages:
by injecting commands into the wifi channel config
This exploit requires opening the "Files" page of the card's web interface and escaping to the root of the file system.
Often referred to as the "swiss army of knife" for TCP/IP networking, [Netcat][1] is an extremely versatile Linux utility that allows you to do anything under the sun using TCP/UDP sockets. It is one of the most favorite tools for system admins when they need to do networking related troubleshooting and experimentation.
In this tutorial, I am sharing a few useful netcat examples, although the sky is the limit when it comes to possible netcat
use cases. If you are using netcat
regularly, feel free to share your use case.
Note that when you are binding to well-known ports (0-1023) with nc
, you need root privilege. Otherwise, run nc
as a normal user.
$ nc -vn 192.168.233.208 5000
Copyright (c) 2015, Shahar Evron | |
All rights reserved. | |
Redistribution and use in source and binary forms, with or without modification, | |
are permitted provided that the following conditions are met: | |
1. Redistributions of source code must retain the above copyright notice, this | |
list of conditions and the following disclaimer. | |
2. Redistributions in binary form must reproduce the above copyright notice, |
#include <Ethernet.h> | |
#include <SFEbarGraph.h> | |
#include <SPI.h> | |
// Default 'ino MAC address | |
byte mac[] = { 0xDE, 0xAD, 0xBE, 0xEF, 0xFE, 0xED }; | |
byte ip[] = { 192, 168, 0, 2 }; | |
int up = 8; | |
int down = 7; |