30%
25.03.2021
disable unnecessary modules. On Debian and Ubuntu this task is quite easy thanks to the a2dismod command. Otherwise, you will have to search for the LoadModule directive.
The primary candidates
30%
03.12.2015
protocols, for example, http-brute, oracle-brute, and snmp-brute.
default
These are standard scripts that are used if you run Nmap with the -sC or -A options.
discovery
30%
18.02.2018
_python_interpreter variables ideally remain unchanged: They cause Python to connect to the host on standard SSH port 22 and to use Python 3 when calling commands on the target system.
Next, check whether the devops.hosts setup
30%
05.02.2019
:
$ curl http://169.254.169.254/openstack
2012-08-10
2013-04-04
2013-10-17
2015-10-15
2016-06-30
2016-10-06
2017-02-22
To retrieve a list of supported versions for the EC2-compatible metadata API, enter
30%
20.05.2014
the questions, making them understandable, deleting inappropriate and duplicate content, and assigning tags. Two open source platforms in this genre are Open Source Q&A [2] and Shapado [3], both licensed under
30%
20.05.2014
restrict access to the LAN subnet. The bottom line is the following multiport rule:
# Administration
ip6tables -A INPUT -i $LAN_IF -s $LAN_NET -p tcp -m multiport --dport 22,80,443 -j ACCEPT
Depending
30%
07.06.2019
# Jenkins home directory is a volume, so configuration and build history
22 # can be persisted and survive image upgrades
23 VOLUME ${JENKINS_HOME}
24 USER ${JENKINS_USER}
25
26 ARG JENKINS
30%
07.06.2019
-y
17
18 RUN apt-get install -y \
19 autoconf \
20 automake \
21 build-essential \
22 ca-certificates \
23 cmake \
24 curl \
25 g++-7 \
26 git \
27 less \
28
30%
01.08.2019
understands, it is compiled to machine code with LLVM. This compilation happens the first time you execute the code. The example code in Listing 1 is borrowed from a presentation by Matthew Rocklin [9
30%
01.08.2019
INPUT
iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -A INPUT -i eth0 -j DROP
iptables -A INPUT -i eth1 -p tcp --dport 22 -j ACCEPT
iptables -A INPUT -i eth1 -j DROP