19%
04.04.2023
(NIST) National Vulnerability [2] or the Aqua Vulnerability [3] database.
Figure 1: An image scan with Trivy generates a long list of vulnerabilities
19%
05.08.2024
/.ansible/collections:/usr/share/ansible/collections
executable location = /usr/bin/ansible
python version = 3.11.2 (main, Feb 17 2023, 09:48:02) [GCC 8.5.0 20210514 (Red Hat 8.5.0-18)] (/usr/bin/python3.11)
jinja version = 3.1.2
libyaml = False
19%
27.09.2021
The object ID (1c9c09d7-4b3c-4f37-b2cf-e3b8ad0a2ecf
in this example) can then be used to search for audit entries:
Get-AzureADAuditDirectoryLogs -Filter "targetResources/any (tr:tr/id eq '1c9c09d7-4b3c-4f37
19%
17.02.2015
ip addr show
which lists the interfaces recognized by the system. In my case, the Ethernet interface was identified as enp0s3. Next, you can edit the network configuration file for the interface with
19%
07.01.2024
loop /snap/core22/864
loop15 7:15 0 12.3M 1 loop /snap/snap-store/959
loop16 7:16 0 73.9M 1 loop /snap/core22/817
loop17 7:17 0 349.7M 1 loop /snap/gnome-3-38-2004/140
loop18 7:18 0
19%
25.03.2021
of the Nginx web server, the ngx_http_v2_module module replaced its predecessor ngx_http_spdy_module in September 2015 (Nginx 1.9.5). April 2016 saw the module enter the stable branch (Nginx 1.10.0) [3
19%
05.12.2014
2.
Listing 2
PatchStatsTop10.v.0.3.R
001 ## Server Owner Trend Analysis
002 ## -Missing Security Patches
003 ## Russ McRee, @holisticinfosec
004
005 library(XLConnect)
006 library
19%
30.11.2025
addr = 10.42.0.101:6789
14 [mon.b]
15 host = bob
16 mon addr = 10.42.0.102:6789
17 [mon.c]
18 host = charlie
19 mon addr = 10.42.0.103:6789
20 [osd.0]
21 host = alice
22 [osd.1]
23 host
19%
30.01.2020
Management Console [3] Lambda service page with an orange Create function
button.
Figure 1: The page where you will create a Lambda function.
If you
19%
11.04.2016
; in Listing 3, the bridge device is then configured with its IP address and other parameters.
Listing 2
Network Configuration (1)
[Match]
Name=enp2s25
[Network]
Bridge=docker0
Listing 3