17%
07.10.2014
seq_timeout = 10
08 tcpflags = syn
09 command = /usr/sbin/iptables -A INPUT -s \
%IP% -p tcp --dport 22 -j ACCEPT
10
11 [closeSSH]
12 sequence = 9000
17%
06.10.2022
_init_remote(&unw_cursor, g_unw_as, unw_ctx));
05
06 /* - Search - */
07 bool found_stack_entry = false;
08 do {
09 unw_word_t ip = 0;
10 unw_get_reg(&unw_cursor, UNW_REG_IP, &ip);
11
12 Dwfl_Module* module = dwfl
17%
21.11.2012
_get_num_threads()
04
05 !$OMP PARALLEL PRIVATE (id)
06
07 id = omp_get_thread_num()
08 write(*,*) 'Thread ',id,' Checking in'
09
10 IF (id == 0) THEN
11 WRITE(*,*) ' Number of threads in use is ',omp
17%
06.10.2019
response = urllib.urlopen(url);
06 data = json.loads(response.read())
07
08 for userentry in data:
09 if userentry.get('active'):
10 username = userentry.get('username')
11
12 if os
17%
13.06.2016
='netfs'>
02
virtstore
03
04
05
06
07
08
09
17%
05.02.2019
/lib/apt/lists/*
08
09 # Deploy Mutillidae
10 RUN wget -O /mutillidae.zip https://sourceforge.net/projects/mutillidae/files/latest/download && unzip /mutillidae.zip && rm -rf /app/* && cp -r /mutillidae/* /app && rm
17%
30.05.2021
that the attacker owns.
Rhino Security Labs [3], the creators of the open source web penetration framework Pacu [4], takes a more expansive view of what permissions are dangerous enough to be shadow
17%
18.07.2013
/zertifikat.pem
07 SSLCertificateKeyFile /etc/apache2/ssl/privatekey.pem
08
09
10 Options Indexes FollowSymLinks
11
12
13 CustomLog /var/log/apache2/ssl
16%
09.04.2019
Version: networking.istio.io/v1alpha3
02 kind: Gateway
03 metadata:
04 name: wordpress-gateway
05 spec:
06 selector:
07 istio: ingressgateway
08 servers:
09 - port:
10 number: 443
11 name: https
16%
13.06.2016
are not defenseless: The Enhanced Mitigation Experience Toolkit (EMET) has had a function similar to pinning since version 4.0 [3].
Until recently, the server was basically defenseless against these attacks. All data