16%
30.11.2020
[... Listing 8 ...]
07 # service kopano-dagent start
08 # service kopano-spooler start
09 # service postfix start
10 # exit
Listing 8
Editing the Configuration
# Edit /etc
16%
15.12.2017
08 action :install
09 end
10 service "apache2" do
11 action [ :enable, :start ]
12 end
13
14 directory node['main']['doc_root'] do
15 owner 'www1-data'
16 group 'www1-data'
17 mode '0744'
18 action
16%
04.08.2020
[vertices:6 edges:6]
03
04 gremlin> g = graph.traversal()
05 ==>graphtraversalsource[tinkergraph[vertices:6 edges:6], standard]
06
07 gremlin> g.V().label().groupCount()
08 ==>[software:2,person:4]
09
10
16%
30.01.2020
": "Allow",
06 "Action": "logs:CreateLogGroup",
07 "Resource": "arn:aws:logs:eu-west-1:XXXXXXX:*"
08 },
09 {
10 "Effect": "Allow",
11 "Action": [
12 "logs
16%
05.02.2019
/lib/apt/lists/*
08
09 # Deploy Mutillidae
10 RUN wget -O /mutillidae.zip https://sourceforge.net/projects/mutillidae/files/latest/download && unzip /mutillidae.zip && rm -rf /app/* && cp -r /mutillidae/* /app && rm
16%
18.07.2013
/zertifikat.pem
07 SSLCertificateKeyFile /etc/apache2/ssl/privatekey.pem
08
09
10 Options Indexes FollowSymLinks
11
12
13 CustomLog /var/log/apache2/ssl
16%
30.01.2020
Zhao through his summer internship at IBM Research. The dm-cache module was integrated into the Linux kernel tree as of version 3.9. It is an all-purpose caching module and is written and designed to run
16%
10.04.2015
"..................................................."
05 Add-Content $logfile -value "New log file $(Get-Date)"
06 $c = Get-Credential
07 ##A loop that is run for each server foreach ($server in $serverList)
08 {
09 ##check whether the server answer
16%
02.02.2021
08 # Network information
09 network --device=bond0 --bondslaves=ens1f0,ens1f1 --bondopts=mode=802.3ad,miimon-100 --bootproto=dhcp --activate
10 network --hostname=server.cloud.internal
11 network
16%
30.05.2021
that the attacker owns.
Rhino Security Labs [3], the creators of the open source web penetration framework Pacu [4], takes a more expansive view of what permissions are dangerous enough to be shadow