25%
26.02.2014
-sent: 22,334 (total) 0/s (Per-Sec)
pkts-recv: 68,018 (total) 2/s (Per-Sec)
lo
Bytes-sent: 2.55 K (total) 0.00 B/s (Per-Sec)
Bytes
24%
07.10.2014
/lib/sheepdog
root 582 581 0 13:13 ? 12:00:00 AM sheep -p 7000 /var/lib/sheepdog
# grep sheep /proc/mounts
/dev/sdb1 /var/lib/sheepdog ext4 rw,relatime,data=ordered 0 0
# grep sheep /etc/fstab
/dev
24%
12.09.2013
. There are some new lines: 5 and 12 to 22. Line 22 installs the sig function as a signal handler for SIGTERM. When the signal arrives, line 13 opens a new connection to the database and calls the pg
24%
06.10.2022
....
03 {
04 "Path": "/",
05 "UserName": "liav",
06 "Arn": "arn:aws:iam::123456789:user/ferdinand",
07 "CreateDate": "2016-07-27 23:53:34+00:00",
08 "MFA": [
09
24%
01.08.2019
. The takeaway is the -j LOG option (line 12), which logs port scanning behavior to a logfile with the iptables:
prefix.
Listing 1
iptable Rules
01 *filter
02 *filter
03 :INPUT ACCEPT [0:0]
04
24%
02.06.2020
= sol.copy()
10
11 for j in range(0,ny-1):
12 sol[0,j] = 10.0
13 sol[nx-1,j] = 1.0
14 # end for
15
16 for i in range(0,nx-1):
17 sol[i,0] = 0.0
18 sol[i,ny-1] = 0.0
19 # end for
20
21 # Iterate
22
24%
09.01.2013
metadata tables...
08 Dumping metadata...
09 ..objects..
10 ..blocks..
11 ..inodes..
12 ..inode_blocks..
13 ..symlink_targets..
14 ..names..
15 ..contents..
16 ..ext_attributes..
17 Compressing and uploading
24%
10.04.2015
submitted his master's thesis on the subject of TCP Stealth in 2014 [12].
If you have been following the port knocking scenario for a few years, you might remember SilentKnock [13]. The project uses the same
24%
30.11.2020
):
11
12 s = 0.0
13 s += h * f(a)
14 for i in range(1, n):
15 s += 2.0 * h * f(a + i*h)
16 # end for
17 s += h * f(b)
18 return (s/2.)
19 # end def
20
21
22 # Main section
23 comm = MPI
24%
09.10.2017
rule phishing_pdf {
02
03 meta:
04 author = "James Stanger"
05 last_updated = "2017-09-12"
06 category = "phishing"
07 confidence = "high"
08 threat_type = "phishing exploit"
09 description