19%
04.04.2023
(NIST) National Vulnerability [2] or the Aqua Vulnerability [3] database.
Figure 1: An image scan with Trivy generates a long list of vulnerabilities
19%
14.03.2013
details as well [3]. The files in the Linux /proc directory also have a pleasingly hackable penchant for being directly readable as plain text, as opposed to more binary-centric proc implementations
19%
30.11.2025
client requests (1) in the auth.log file (2). Then sshguard (3) monitors the file and creates a firewall rule (4) that blocks the client (5) if it notices to many login attempts.
If the attacker ... 3
19%
16.05.2013
[3] runs on the client. Facter collects information about the system and forwards it to the Puppet master when Puppet runs. On the basis of collected facts, the master can generate a dynamic catalog
19%
03.12.2015
with the client; 547 with the server).
Several options are available for DHCP in IPv6, including Dibbler [2], Internet Systems Consortium (ISC) DHCPv6 [3], and WIDE-DHCPv6 [4], and each has a slightly different
19%
30.11.2025
qemu_x86_defconfigmake menuconfig (build-option, Kernel-Version 3.2, gdb, tty1)makemake linux-menuconfig (debug info) make
3. Compile the module and copy it to the root directory:cd driverexport CROSS
19%
18.07.2013
backend3.example.com server;
05 backend4.example.com server down;
06 backend5.example.com backup server;
07 }
08
09 upstream fallback {
10 fallback1.example.com server: 8081;
11 }
12
13
14 server {
15 %
16
19%
02.08.2021
and Service Manager) are used to deploy an operating system on a node. OSISM [3], the deployment and lifecycle management framework, installs and configures all the required OpenStack components on that node so
19%
11.06.2014
the central calendar and address book. Mobile devices needed Microsoft's ActiveSync protocol or (up to Kolab 3) the outdated SyncML to connect with the open source groupware.
As of version 3.1, the Kolab team ... Open standards and open source are requisite in Kolab groupware. The alpha release of version 3.1 hugely extended the number of compatible clients with the CalDAV and CardDAV protocols, making Kolab
19%
20.09.2021
barriers between operating systems.”
Black Lotus has identified a series of samples that were uploaded every two to three weeks, dating back to May 3, 2021, through August 22, 2021. The attacks were