13%
07.01.2025
SC24 took place in Atlanta, GA, November 17-22. As I'm writing this, 17,959 attendees – that’s 3,000+ more than last year – registered. More than 500 companies filled the exhibition floor, which
13%
02.08.2022
) NOT NULL,
06 master VARCHAR(128) DEFAULT NULL,
07 last_check INT DEFAULT NULL,
08 type VARCHAR(6) NOT NULL,
09 notified_serial INT UNSIGNED DEFAULT
13%
22.12.2017
if TLS connections (SSL) are used.
Fortunately, the free Let's Encrypt [6] certification service makes light work of configuring SSL on the web server [7]. Install the Let's Encrypt client on Debian
13%
20.03.2014
with the popular Linux distributions; in other words, you need to build it from the source code. To do this, you also need to install some packages and libraries: Perl 5.6.1 or later, libreadline, libpcre
13%
30.11.2025
and Drupal 7. Extensions also exist that retrospectively add Phpass to Drupal 5 and 6, and Typo3.
Phpass mainly comprises a small PHP class that you can easily integrate into your own PHP application. Start
13%
12.11.2012
@trapper:~\$ "
send -- "ssh aspen\r"
expect -exact "ssh aspen\r
khess@aspen’s password: "
send -- "PASSWORD\r"
expect -exact "\r
Linux aspen 2.6.32-43-server #97-Ubuntu SMP Wed Sep 5 16:56:41 UTC 2012 x86_64 GNU
13%
28.11.2021
in each mode.
# TYPE node_cpu_seconds_total counter
node_cpu_seconds_total{cpu="0",mode="idle"} 71039.6
node_cpu_seconds_total{cpu="0",mode="iowait"} 54.79
node_cpu_seconds_total{cpu="0",mode="irq"} 865
13%
14.08.2017
it as an open source project with an official announcement [5], although it previously also existed as open source on GitHub [6]. Today, programmers interested in doing so can develop Prometheus under
13%
25.03.2021
sensible defaults (e.g., in version 2.2, RequestReadTimeout was still set to ).
LimitRequestBody also has a value of zero in the current Apache version, which means that a client is always allowed
13%
03.12.2015
, it outputs the message Hello World!
.
To test the script on a local web server, run the following command:
# nmap --script /path/http-vuln-check local targetlhost -p 22,80,443
The output should look