Trylogia ciągu
Trylogia ciąguNeuromancer / Graf Zero / Mona Liza Turbo Author: William Gibson empik.com
Trylogia ciąguNeuromancer / Graf Zero / Mona Liza Turbo Author: William Gibson empik.com
Inne pieśniAuthor: Jacek Dukaj empik.com
Black Hat PythonJęzyk Python dla hakerów i pentesterów Author: Justin Seitz amazon.plempik.comhelion.pl
SzpiegCzyli podstawy szpiegowskiego fachu Author: Wiktor Suworow empik.com
Sztuka wojnyWydanie 3 Authors: Sun Tzu, Sun Pin maklerska.pl
ExtensaAuthor: Jacek Dukaj empik.com
Wydajność JavyPoznaj i wykorzystaj optymalne sposoby na regulowanie wydajności oprogramowania Java! Authors: Charlie Hunt, Binu John helion.pl
Gra EnderaSaga Endera. Tom 1 Author: Card Orson Scott empik.com
I had stragne statistics on one memcached servers. I had to look what it’s doing there. I found such commands that may be used to sniff, extract and make statistics from running memcached server. Debug GET commands tcpflow -c dst port 11211 | cut -b46- | grep ^get cut command will remove 46 bytes at beginning of every string (src, dst, port). You may need to adjust numeric parameter for cut to leave commands only....
It happen to me all the time that one of developers notifies me about some kind of problem that I can’t confirm from my account. Sometimes it was because of bad ssh keys configuration, other times file permissions, mostly such stuff. It’s sometimes convenient to “enter into someone’s shoes” to see what’s going on there. If you’re root on machine you may do that like this: su developer - Easy one but that’s not enough for all cases....