74%
21.08.2014
and production.
To show how monitoring profiles can be implemented for a specific server, the example distinguishes between mail, web, and database servers. It assumes that the stable version 1.12.3 of OpenNMS [6 ... 22
73%
21.08.2014
to be heartily unimpressed by the hustle and bustle of Neutron, because more functionality inevitably comes at the price of more complexity.
In Icehouse, the order of the day seems to be IPv6. To date, IPv6 ... 22
73%
21.08.2014
=TSM
HP Data Protector
BACKUP=DP
Symantec NetBackup
BACKUP=NBU
Duplicity/Duply
BACKUP=DUPLICITY (still experimental)
CommVault Galaxy 5, 6 and 7
BACKUP ... 22
73%
21.08.2014
[6]
Julia (up and coming) [7]
Java [8]
Matlab [9] and Matlab-compatible tools (Octave [10], Scilab [11], etc.)
Java is the lingua franca of MapReduce [12] and Hadoop [13]. Many toolkits ... 22
61%
25.09.2023
Rubén Llorente ... is easy enough (superuser privileges are required):
arp -s 192.168.90.55 00:0c:29:c1:91:b1
The last field of the command is the MAC address, which is the unique identifier of the network device to which
49%
04.12.2024
Rubén Llorente ... them in an orderly manner. Proxmox VE has been covered before in other articles [5][6], so I suggest you check them out if you want an in-depth review
49%
02.06.2020
Rubén Llorente ... .
Citadel Rooms
Citadel's main characteristic is that everything is a room, at least internally. Rooms are arranged by floors (Figure 6). For example, on a floor called Animal Talk
, you might have the rooms
49%
01.06.2024
Rubén Llorente ... : [devuan]
10 donkey:
11 user: root
12 host: donkey.operationalsecurity.es
13 tags: [devuan]
14 zebra:
15 user: root
16 host: zebra.operationalsecurity.es
17 tags: [devuan]
18
19
48%
30.01.2024
Rubén Llorente ...
8, 9
Debian
11, 12
Ubuntu
20.04, 22.04
FreeBSD
13.x
OpenBSD
7.3
I recommend the downloadable installer, but I will skip
48%
20.05.2014
, you can define the following anti-spoofing rules:
# Anti-spoofing
ip6tables -A INPUT ! -i lo -s ::1/128 -j DROP
ip6tables -A INPUT -i $WAN_IF -s FC00::/7 -j DROP
ip6tables -A FORWARD -s ::1/128 -j DROP ... We design a basic set of ip6tables rules for an IPv6 firewall. ... ip6tables Rules ... IPv6 Tables ... Creating Firewall Rules with ip6tables