14%
05.12.2016
as the user name.
Amanda versions before 3.3.9 have a vulnerability that lets this user execute arbitrary code with root privileges. A (manual) upgrade to version 3.3.9 is only necessary if you don't trust
14%
12.09.2013
Server
For this portion of the article, I'll assume you've installed Ubuntu Server 12.04 LTS and updated and patched fully with:
sudo aptitude update && aptitude dist-upgrade
Moving forward, I want
14%
07.06.2019
packages.
Listing 4
Two Packages, One Task
> # base
> dat <- data.frame(a = c(10, 11, 12),
+ b = c(4, 5, 6),
+ colour = c("blue", "green", "yellow
14%
25.03.2021
_idle_timeout 3m;
10 http2_max_requests 1000;
11
12 access_log /usr/local/var/log/nginx/http2.log http2;
13
14 ssl_certificate /test.crt;
15 ssl_certificate_key /test.key;
16
17 root
14%
19.05.2014
of completeness, the basic steps for building SSHFSM are
$ ./configure --prefix=/usr
$ make
$ make install
where the last step is performed as root. Be sure to read the SSHFSM page for package prerequisites
14%
13.12.2011
packetstormsecurity.org
packetstormsecurity.org,199.58.210.12,A
NS25.WORLDNIC.COM,205.178.190.13,SOA
ns25.worldnic.com,205.178.190.13,NS
ns26.worldnic.com,206.188.198.13,NS
mail.packetstormsecurity.org,199.58.210.12,MX
14%
20.02.2023
the total size, use the command du -sh
on the root directory (/). Recall that /home
and /opt
are NFS exported to the compute node so the output of the command includes the space for those directories
14%
29.09.2020
command run as root (so check the script that the command downloads and executes before trusting it implicitly by omitting the sh - after the pipe):
$ curl -sfL https://get.k3s.io | sh -
The website tells
14%
02.08.2021
, change into the repository's root directory and build and install both the kernel modules and userspace utilities:
$ cd rapiddisk
$ make && sudo make install
Assuming that all libraries and package
14%
22.12.2017
random MAC addresses and sends them out to the interface.
Listing 1
Generating random MAC addresses
root@kali:~# macof -e eth1
e3:8b:88:3:b4:cd d8:25:98:35:61:87 0.0.0.0.9537 > 0