13%
17.09.2013
-keygen -t rsa
(optionally, ssh-keygen -t dsa
) to generate a new RSA or DSA key pair of public and private keys (Figure 3).
Figure 3: Generating a RSA key
13%
26.10.2012
, or simulated by the honeypot. The set of services visible to the attacker on the target system is equal to the total set of the services offered by the server and the analysis system (Figures 3 and 4
13%
22.01.2013
agent. This agent basically consists of an input mask (Figure 3). Each desktop environment can supply its own authentication agent.
Figure 3
13%
19.12.2012
development for several years. In early 2013, the developers from the Institute of Compute Technology (ICT) at the Chinese Academy of Sciences will present the latest development called the Godson-3B
13%
24.06.2013
server (hosting)
Resolving DNS server (caching)
API to provision zones and records
DNSSEC support (as of 3.x)
Web-based management options
DNS data stored in plaintext (BIND compatible
13%
02.07.2014
:
pdsh -w host[1-11]
pdsh -w host[1-4,8-11]
In the first case, pdsh expands the host range to host1, host2, host3, …, host11.
In the second case, it expands the hosts similarly (host1, host2, host3, host
13%
13.12.2011
), and -t
specifies the target directory to download the files.
Now open up a web browser and look at the results of the warnerbros.html
file (see Figure 3
13%
03.02.2012
pointed out as early as 2009 a lack of publications on the cloud security problem and on corresponding legal issues [1]. This paucity of information was confirmed by other publications [2] [3]. Despite this
13%
14.06.2017
example illustrating the change in file size:
$ ls -lsah FS_scan.csv
3.2M -rw-r--r-- 1 laytonjb laytonjb 3.2M 2014-06-09 20:31 FS_scan.csv
$ gzip -9 FS_scan.csv
$ ls -lsah FS_scan.csv.gz
268K
13%
10.10.2022
is installed by default on my Ubuntu 20.04 systems.
Listing 1: logrotate
$ logrotate --version
logrotate 3.14.0
Default mail command: /usr/bin/mail
Default