18%
14.06.2017
example illustrating the change in file size:
$ ls -lsah FS_scan.csv
3.2M -rw-r--r-- 1 laytonjb laytonjb 3.2M 2014-06-09 20:31 FS_scan.csv
$ gzip -9 FS_scan.csv
$ ls -lsah FS_scan.csv.gz
268K
18%
21.08.2014
report [3] said weak passwords contributed to 31% of compromises investigated.
Without picking on any one organization, choose a company, a social network, and a cloud provider; now, look up
18%
30.01.2020
. For some additional context, sections on the AWS Security Blog [3] are worth digging into further.
To bring more to the party, the sophisticated Prowler also stealthily prowls for issues in compliance
18%
18.07.2013
rq2 ra92
08 set rq3 cdrom
09
10 attach rq0 d0.dsk
11 attach rq1 d1.dsk
12 attach rq2 d2.dsk
13
14 attach -r rq3 cdrom.iso
15
16 set rl disable
17 set ts disable
18
19 set xq mac=08-00-2B-AA-BB-CC
20
18%
28.11.2021
] about how the Dalai Lama and many a government had exploits foisted on them in PDFs [3]. Metasploit is everywhere.
Charly Kühnast also covered the topic in his Linux Magazine
sys admin column [4
18%
25.03.2020
ZJOUoUsZGlkk
client2:q0eL78zFrbnESW6c/F0qit5MNCpS8IBgyh1BdXiyyuI
client3:zkq8eT31Nib3IHWfp0yyu15BCW52VMbY8+LhVUt3ylA
The client uses the appropriate password in the /etc/stunnel/psk-client1.txt file:
client1:Wf
18%
09.01.2019
as shown in Table 3, each gang will execute each loop redundantly (i.e., each gang will run the exact same code). These gangs are executed at the same time but independently of one another (Figure 2).
Table
18%
05.02.2023
a user or group in Azure AD, use the cmdlet with the ObjectID parameter
Get-AzureADUser -ObjectID 3b47a729-16c1-4be1-9ee2-7f3bd00a346b
You can retrieve the ObjectID for each user after entering Get
18%
03.12.2015
the output. For example:
nmap -sV --script exploit -d3 targethost
NSE scripts have a clear-cut structure. This becomes most clear when you take a look at an existing script. The scripts not only define
18%
04.12.2024
,
"created_at": "2024-05-17T10:00:00Z" }
The corresponding BSON document would contain the following elements in binary code:
A 32-bit integer for the length of the document
A byte for the field types