29%
30.11.2025
under the
18 # following copyright:
19 #
20 # (c) 2002-2005 International Business Machines, Inc.
21 # 2005-2010 Linux-HA contributors
22 #
23 # See usage() function below for more details ...
24 #
25
29%
30.11.2025
"------------------------------------------------------"
18 echo -n "Replace stored data line (y)? ";read we
19 if [ "$we" = "y" ];
20 then
21
22 # Delete line and write to
23 # temporary file
24
25 # Build sed instruction
26
29%
30.11.2025
, the MAC address (e.g., 00:11:22:33:44:55) is split down the middle, and two bytes containing FF:FE are inserted. This gives you 64 bits. If the basis is a globally unique address (which should be the case
29%
07.10.2014
to its GPRS and 3G customers, this approach opened up our servers to many more IP addresses than in our old system, with its 10 or 20 authorized IP addresses at the company offices and at the homes
29%
15.08.2016
ns2 ip addr add 1.1.1.2/10 dev veth2
18 $ ip netns exec ns1 ip link set veth1 up
19 $ ip netns exec ns2 ip link set veth2 up
20
21 $ ip netns exec ns1 ping -c2 1.1.1.2
22 PING 1.1.1.2 (1.1.1.2) 56
29%
28.11.2023
:43 ubuntu22-vbox code[33011]: [2023-10-14 15:20:43] debug [tunnels::connections::ws] sent liveness ping
Oct 14 15:20:43 ubuntu22-vbox code[33011]: [2023-10-14 15:20:43] debug [tunnels
29%
12.09.2013
$st2->execute($dbh->{pg_pid});
16 if( !$st2->fetchrow_arrayref->[0] ) {
17 warn "couldn't stop backend PID=$dbh->{pg_pid}\n";
18 }
19 exit 1;
20 }
21
22 POSIX::sigaction(SIGTERM, POSIX
29%
30.11.2025
_dlm]
root 3467 7 0 20:07 ? 00:00:00 [o2net]
root 3965 7 0 20:24 ? 00:00:00 [ocfs2_wq]
root 7921 7 0 22:40 ? 00:00:00 [o2hb-BD5A574EC8]
root 7935 7
29%
10.09.2012
@test1 ~]$ su
Password:
[root@test1 laytonjb]# more /opt/logs/module
Aug 22 09:41:20 test1 laytonjb: This is a test
Notice that a user cannot look at the log or modify it, but root can.
No it’s time
29%
28.11.2021
:/usr/sbin:/bin/sh
bin:x:2:2:bin:/bin:/bin/sh
sys:x:3:3:sys:/dev:/bin/sh
(...)
reboot;
Connection closed by foreign host.
Metasploitable runs many more insecure services that an Nmap scan brings to light (Listing 3