6%
13.12.2011
`id -g` -perm -g=w -perm -u=s \
-o -perm -o=w -perm -u=s \
-o -perm -o=w -perm -g=s \
-ls 2>/dev/null
echo SUID and GUID files
find / -type f -perm -u=s -o -type f -perm -g=s \
-ls 2>/dev
6%
20.03.2014
:\Program Files (x86)\Windows Kits\8.0\bin\x64 directory. You can create a certificate like this:
makecert.exe -r -pe -nCN= -ssmy -sr localmachine-eku \
1.3.6.1.5.5.7.3.2 -len 2048 -e01
6%
01.08.2019
_options)
File "/usr/lib/python2.7/dist-packages/samba/drs_utils.py", line 87, in sendDsReplicaSync
raise drsException("DsReplicaSync failed %s" % estr)
No matter from which of the two domain
6%
04.12.2024
(Listing 2).
Listing 2
Embedded Document
01 {
02 "type": "Car",
03 "brand: "BMW,
04 "model": "X5",
05 "year": 2021,
06 "mileage": 15000,
07 "features": ["Sunroof", "Leather seats
6%
05.12.2014
services. In the latter case, the test team chose providers with a fixed price model. Phraseanet [1] and ResourceSpace [2] are open source, and they take on the two commercial candidates Razuna [3
6%
28.11.2021
GlobalSign, change the previous entry as follows:
domainname.tld CAA 0 issuewild "globalsign.com"
Alternatively, by specifying both entries, you can allow wildcard certificates to be issued
6%
22.08.2011
-based algorithm and a small word list:
$ john -single passfile.txt
Loaded 2 password hashes with 2 different salts (FreeBSD MD5 [32/64 X2])
guesses: 0 time: 0:00:00:01 100% c/s: 9433 trying: hken1900
Finally ...
Easy to remember but difficult to guess isn’t just a catchy phrase for choosing passwords, it’s the law of the Net. Learn how to check your password using a tool network intruders use every day
6%
01.08.2019
-control-setup
You will see Unbound generating keys. Now restart container and test whether nothing has broken:
docker restart caa97f2fe1fe
dig @192.168.0.110 time.hanscees.com
To install the remote client, just
6%
28.11.2022
into a deceptive sense of security: Thanks to technologies such as self-monitoring analysis and reporting technology (S.M.A.R.T.) and wear leveling, these data storage devices can predict their demise and usually
6%
20.06.2022
access (DMA) protection, SystemGuard, Secure Boot, virtualization-based security (VBS), and Trusted Platform Module (TPM) 2.0 security features. These technologies must be present and enabled on the server