Trylogia ciągu

Trylogia ciąguNeuromancer / Graf Zero / Mona Liza Turbo Author: William Gibson empik.com

2017-08-11 · 1 min · timor

Inne pieśni

Inne pieśniAuthor: Jacek Dukaj empik.com

2017-05-27 · 1 min · timor

Black Hat Python

Black Hat PythonJęzyk Python dla hakerów i pentesterów Author: Justin Seitz amazon.plempik.comhelion.pl

2017-05-22 · 1 min · timor

Szpieg

SzpiegCzyli podstawy szpiegowskiego fachu Author: Wiktor Suworow empik.com

2017-05-22 · 1 min · timor

Sztuka wojny

Sztuka wojnyWydanie 3 Authors: Sun Tzu, Sun Pin maklerska.pl

2017-05-22 · 1 min · timor

Extensa

ExtensaAuthor: Jacek Dukaj empik.com

2017-03-13 · 1 min · timor

Wydajność Javy

Wydajność JavyPoznaj i wykorzystaj optymalne sposoby na regulowanie wydajności oprogramowania Java! Authors: Charlie Hunt, Binu John helion.pl

2017-02-10 · 1 min · timor

Gra Endera

Gra EnderaSaga Endera. Tom 1 Author: Card Orson Scott empik.com

2016-10-10 · 1 min · timor

Debuging commands running on memcached

I had stragne statistics on one memcached servers. I had to look what it’s doing there. I found such commands that may be used to sniff, extract and make statistics from running memcached server. Debug GET commands tcpflow -c dst port 11211 | cut -b46- | grep ^get cut command will remove 46 bytes at beginning of every string (src, dst, port). You may need to adjust numeric parameter for cut to leave commands only....

2016-07-13 · 1 min · timor

How to stole ssh session when you’re root

It happen to me all the time that one of developers notifies me about some kind of problem that I can’t confirm from my account. Sometimes it was because of bad ssh keys configuration, other times file permissions, mostly such stuff. It’s sometimes convenient to “enter into someone’s shoes” to see what’s going on there. If you’re root on machine you may do that like this: su developer - Easy one but that’s not enough for all cases....

2016-04-27 · 1 min · timor