88%
14.08.2017
api.raml
01 #%Raml 0.8
02 title: Contacts
03 version: 0.1
04 #baseUri: http://www.rve.com/contactshelf
05 baseUri: https://mocksvc.mulesoft.com/mocks/d4c4356f-0508-4277-9060-00ab6dd36e9b
88%
11.04.2016
Memory Errors" by Jeff Layton, ADMIN, issue 17, 2014: http://www.admin-magazine.com/Archive/2013/17/Error-correcting-code-memory-keeps-single-bit-errors-at-bay/%28language%29/eng-US
EDAC from kernel
88%
06.10.2022
.
Infos
"Goodbye virtual machines, hello container machines" by Ankur Kumar, ADMIN
, issue 68, 2022, pg. 46, https://www.admin-magazine.com/Archive/2022/68/Goodbye
88%
06.10.2022
.openpolicyagent.org
Rego Playground: https://play.openpolicyagent.org
Styra Academy: https://academy.styra.com
OPA installation: https://www.openpolicyagent.org/docs/latest/kubernetes-tutorial/
OPA Gatekeeper
88%
16.08.2018
and communicate.
Infos
Qualys SSL Server Test: https://www.ssllabs.com/ssltest/
OWASP: https://www.owasp.org/
88%
25.10.2011
).
Listing 5: /etc/inet/ike/secret/ike.preshared
01 {
02 localidtype IP
03 localid 192.168.1.105
04 remoteidtype IP
05 remoteid 192.168.1.7
06 key f04e8e75162390ba9da8000cb24e8a93fb77af519ce
88%
13.06.2016
are in place before the session hijacking, anyway.
This hijacking is even possible if the user doesn't visit the website in questions (e.g., www.bank.example), as long as the MitM is active. The browser just
88%
05.02.2023
/en_us/research/22/e/new-linux-based-ransomware-cheerscrypt-targets-exsi-devices.html
Antivirus protection on hypervisors: https://kb.vmware.com/s/article/80768
Ransom letter: https://www
88%
25.09.2023
a DNS entry of type CNAME (Listing 3). Cloudflare generates a special random hostname for the tunnel, .cfargotunnel.com , where is something like:
f99fbf8ba1945738cc292667441e6858e69d8f9f
88%
14.11.2013
://en.wikipedia.org/wiki/System_Management_BIOS
Predictable network interface names: http://www.freedesktop.org/wiki/Software/systemd/PredictableNetworkInterfaceNames
RFC: Predictable network: http://www.mail-archive.com