65%
07.06.2019
.
In this article, I'm going to use a Docker container running the sophisticated open source web scanner, Nikto to, among other things, look for files and directories that could potentially be considered security
65%
07.07.2020
: active (running) since Sat 2020-07-04 11:00:41 EDT; 33min ago
Docs: man:systemd-sysv-generator(8)
Process: 819 ExecStart=/etc/init.d/cachefilesd start (code=exited, status=0/SUCCESS)
Tasks: 1 (limit: 4915)
CGroup
65%
18.07.2013
Network Satellite: http://www.redhat.com/products/enterprise-linux/rhn-satellite/
CloudForms 1.0: http://tinyurl.com/mwtaz4d
Red Hat Storage Server:http://redhat.com/products/storage-server/
Red
65%
04.11.2011
-p 50 -j ACCEPT
-A RH-Firewall-1-INPUT -p 51 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp --dport 5353 -d 224.0.0.251 -j ACCEPT
#-A RH-Firewall-1-INPUT -p udp -m udp --dport 631 -j ACCEPT
#-A RH-Firewall-1
65%
02.02.2021
man page: http://manpages.ubuntu.com/manpages/cosmic/man8/tc.8.html
Server Fault: https://serverfault.com/questions/611063/does-tarpit-have-any-known-vulnerabilities-or-downsides
65%
07.11.2011
.
Listing 8: Calculating Pi
01 /* pi‑openmp.c (OpenMP version) */
02 #
03 #include
04 #define STEPCOUNTER 1000000000
05 int main(int argc, char *argv[])
06 {
07 long i;
08 double pi = 0;
09
64%
30.01.2020
: 1 (f=1): [w(1)][100.0%][r=0KiB/s,w=1401KiB/s][r=0,w=350 IOPS][eta 00m:00s]
test: (groupid=0, jobs=1): err= 0: pid=3104: Sat Oct 12 14:39:08 2019
write: IOPS=352, BW=1410KiB/s (1444kB/s)(82.8Mi
64%
12.09.2013
Timeout Test
$ time curl http://localhost/cgi/burn0.pl\?4.9
00:00:04.900198
real 0m4.958s
user 0m0.003s
sys 0m0.006s
$ time curl http://localhost/cgi/burn0.pl\?5.1
curl: (52) Empty reply from
64%
02.07.2014
WCOLL points:
[laytonjb@home4 ~]$ pdsh -w ^/tmp/hosts uptime
192.168.1.4: 15:51:39 up 8:35, 12 users, load average: 0.64, 0.38, 0.20
192.168.1.250: 15:47:53 up 2 min, 0 users, load average: 0.10, 0.10, 0
64%
25.09.2023
.cf_account_id
tunnel_id = cloudflare_tunnel.server.id
config {
origin_request {
connect_timeout = "1m0s"
tcp_keep_alive = "1m0s"
}
ingress_rule {
hostname = "${var