13%
14.08.2017
can understand, independent of the programming language. The specification is available under the Apache 2.0 license; its supporters include Google, PayPal, Red Hat, and Microsoft. The many supporting
13%
05.12.2019
print WRITEHANDLE "Here is some text";
11 close(WRITEHANDLE);
12 waitpid($processed, 0);
13 } else {
14 close(WRITEHANDLE);
15 while (defined($text = )) {
16 print $text;
17
13%
28.11.2021
edit podman.socket
08 mkdir -p /etc/systemd/system/podman.socket.d
09 cat >/etc/systemd/system/podman.socket.d/override.conf
10 [Socket]
11 SocketMode=0660
12 SocketUser=root
13 Socket
13%
13.12.2018
. In Figure 9, the user has opened an unauthenticated Bash shell that the attacker exploits in Figure 10. The IP address of this system is 10.0.2.20. This particular script could easily be executed within
13%
02.08.2022
/libgalera_smm.so
wsrep_cluster_address=gcomm://192.168.0.10,192.168.0.20,192.168.0.30
binlog_format=row
innodb_autoinc_lock_mode=2
Take note that the variables shown in Listing 3 are the minimal
13%
27.12.2017
~ # cd /etc/audit/
chrisbinnie audit # ls
auditd.conf audit.rules rules.d
chrisbinnie audit # ls -al
total 20
drwxr-x--- 3 root root 4096 Dec 16 12:34 .
drwxr-xr-x 95 root root 4096 Dec 16 12:34 ..
-rw-r----- 1 root
13%
18.02.2018
.conf audit.rules rules.d
chrisbinnie audit # ls -al
total 20
drwxr-x--- 3 root root 4096 Dec 16 12:34 .
drwxr-xr-x 95 root root 4096 Dec 16 12:34 ..
-rw-r----- 1 root root 701 Dec 9 2014 auditd.conf
-rw
13%
14.03.2013
: 6
08 microcode : 0x60c
09 cpu MHz : 800.000
10 cache size : 6144 KB
11 physical id : 0
12 siblings : 2
13 core id : 0
14 cpu cores : 2
15 apicid
13%
28.06.2011
0000 / 0000 2 512 10
07 AVAILABILITYZONE |- m1.xlarge 0000 / 0000 2 1024 20
08 AVAILABILITYZONE |- c1.xlarge 0000 / 0000 4 2048 20
Making Images
13%
27.09.2021
[2] (section 3.2). Next, I built the Darshan utilities (darshan-util) with the command:
./configure CC=gcc --prefix=[binary location]
Because I'm running these tests on an Ubuntu 20.04 system, I had