30%
04.08.2020
in the standard Python built-ins [2] and in the NumPy library [3].
Figure 1: IPython session comparing two implementations of a round routine.
Unless you
30%
30.01.2020
Receiving objects: 100% (2955/2955), 971.57 KiB | 915.00 KiB/s, done.
Resolving deltas: 100% (1934/1934), done.
The README file recommends installing the ansi2html
and detect-secrets
packages
30%
05.12.2016
, in which you create one or more rules of this type for each logfile with relevant information.
Listing 2
Log Entry Examples
# Feb 22 08:00:00 hostname sshd[1234]: Failed keyboard
30%
07.11.2023
B
Total PE 476931
Alloc PE / Size 0 / 0
Free PE / Size 476931 / <1.82 TiB
VG UUID o1Td3h-y72R-SR2R-HjHh-3mMG-ekXw-pkALKV
Listing 3: Volume Group Information
30%
30.11.2025
: 1487680 0 IO-APIC-fasteoi uhci_hcd:usb3
14 22: 22998855 0 IO-APIC-fasteoi psb@pci:0000:00:02.0
15 23: 3084145 0 IO-APIC-fasteoi hda_intel
16 24: 1 0
30%
30.11.2025
1
4,423.19
8,100.00
8,012.09
Proxy server subscription
2
4,500.00
3,850.00
4,006.04
Management/Provisioning subscription
2
30%
03.04.2024
containers for edge operation.
In this article, I look at three of these distributions: K3s (SUSE), MicroShift (Red Hat), and MicroK8s (Canonical). Of course, you will find other lean distributions
30%
21.04.2015
-r--r-- 2 root root 6 3. Feb 18:36 .glusterfs/0d/19/0d19fa3e-5413-4f6e-abfa-1f344b687ba7
#
# ls -alid dir1 .glusterfs/fe/9d/fe9d750b-c0e3-42ba-b2cb-22ff8de3edf0 .glusterfs
/00/00
30%
03.08.2023
: "routers",
"value": "192.168.2.254"
}],
"reservations": [{
"hw-address": "00:11:22:33:44:55",
"ip-address": "192.168.2.60",
hostname: "host-2-60"
}, {
"hw-address": "00:00:00:00:00
30%
28.11.2021
:/usr/sbin:/bin/sh
bin:x:2:2:bin:/bin:/bin/sh
sys:x:3:3:sys:/dev:/bin/sh
(...)
reboot;
Connection closed by foreign host.
Metasploitable runs many more insecure services that an Nmap scan brings to light (Listing 3