29%
04.08.2020
Manipulation
The ntopng Edge (nEdge) [2] version of ntopng actively manipulates network traffic. nEdge lets you analyze network traffic at the protocol level (Layer 7) and block or restrict application
28%
10.06.2015
, the encryption is very good if used correctly, the code is open source, and it follows the OpenPGP specification [5], which is also an IETF standard [6]. GPG was really designed as a command-line encryption tool
28%
12.09.2013
as a Linux cluster in a single expansion card [6]. The Intel design is essentially a symmetric multiprocessor on a single chip die. The Xeon Phi 5110P, code-named "Knights Corner" [7], features 60 x86 cores
28%
01.08.2019
. The takeaway is the -j LOG option (line 12), which logs port scanning behavior to a logfile with the iptables:
prefix.
Listing 1
iptable Rules
01 *filter
02 *filter
03 :INPUT ACCEPT [0:0]
04
28%
05.09.2011
can see how the arp cache poisoning works:
$ sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 \
-D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2:78:9E \
-H 00:22:6E:71:04:BB -M 00:0C:29:B2:78:9E
28%
10.04.2015
or humanly readable; for example, iso.org.dod.internet.mgmt
and 1.3.6.1.2
refer to the same object, and they can be used as equivalents in queries.
SNMPv1 and SNMPv2 use what are known as "communities
28%
16.11.2017
scrolling terminal output.
For a quick example, the simple command
$ watch -n 1 uptime
tells watch
to run a command (uptime
) every second (-n 1
). It will continue to run this command forever unless you
28%
04.12.2013
3 type rec
4 integer :: x, y, z
5 real :: value
6 end type rec
7
8 integer :: counter
9 integer :: counter_limit
10 integer :: ierr
11
12 type (rec) :: my
28%
10.04.2015
.4 PHP 5.4 web
12 zend-6.1 PHP 5.4 with Zend Server 6.1 web
13 python-2.6 Python 2.6 web
14 python-2
28%
14.03.2013
Platform (HDP) 1.2 that lets users investigate and evaluate Apache Hadoop projects, such as Apache Pig, Apache Hive, Apache HCatalog, and Apache HBase, in an isolated protected environment. You can download