16%
31.10.2025
certain things. Two reasons a script
08 # might fail are:
09 #
10 # 1) timing - A surprising number of programs (rn, ksh, zsh, telnet,
11 # etc.) and devices discard or ignore keystrokes that arrive "too
16%
02.08.2022
.0.0.1
mysql -h localhost -u root -p
create database pdns;
Listing 1 shows a quick user addition to the database and the granting of permissions. To exit from the MariaDB shell, use the quit; command
16%
05.12.2016
Computer Congress (31C3) in 2014 on the basis of an error in the SSH network protocol from 2002 (CVE-2002-0083). There, a single bit decided whether an attacker could gain root privileges on the machine
16%
01.06.2024
* argv[])
08 {
09 long niter = 1000000000;
10 int myid; //holds process's rank id
11 double x,y; //x,y value for the random coordinate
12 int i;
13
16%
30.04.2013
several suspicious entries: The log entry in Listing 1, for example, shows the attacker attempting to send email-containing shell commands to the exim4
service.
Listing 1: Log Entry
2011-02-06 15:08:13 H
16%
21.07.2011
, each LVS router node must have IP forwarding turned on in the kernel. To do this, log in as root user on both LVS routers and change the line in /etc/sysctl.conf to the following:
net.ipv4.ip
16%
13.12.2011
ServerAlias www.domain1.de
04 [...]
05
06
07 ServerName domain1.de
08 ServerAlias www.domain1.de
09 [...]
10
Virtual Domains
16%
14.06.2017
, mounting it requires root access (or at least sudo
access).
As an example, I'll take a directory (/home/laytonjb/20170502
) on my desktop where I have stored PDFs, ZIP files, and other bits of information
16%
11.06.2014
.yourkolab.com
03 ServerAdmin support@yourkolab.com
04
05 DocumentRoot /usr/share/iRony/public_html/
06
07 ErrorLog logs/caldav.yourkolab.com-error_log
08 CustomLog logs
16%
21.08.2014
).
Listing 2
Simple Template for Packer
01 {
02 "builders": [{
03 "type": "virtualbox-ovf",
04 "source_path": "debian7.ovf",
05 "ssh_username": "root",
06 "ssh_password": "123456",
07 "ssh