10%
05.12.2016
, in which you create one or more rules of this type for each logfile with relevant information.
Listing 2
Log Entry Examples
# Feb 22 08:00:00 hostname sshd[1234]: Failed keyboard
10%
25.09.2023
: 55 ms.
Port: 80: op 2.1. 10.0.0.23 80 Time: 26 ms.
Port: 80: op 2.2. 10.0.0.23 80 Time: 56 ms.
Port: 80: op 3.1. 10.0.0.23 80 Time: 25 ms.
Port: 80: op 3.2. 10.0.0.23 80 Time: 48 ms.
Port: 80: op 4
10%
20.06.2022
-Host "Removing outdated $MigMBox.pst file." -fore yellow
20 }
21 Write-Host ""
22
23 # Create a .pst file for every mailbox found on system.
24 #
25 Write-Host "Exporting mailbox $MigMBox to file $Mig
9%
22.05.2012
psmisc.x86_64 0:22.6-15.el6_0.1 rdate.x86_64 0:1.4-16.el6
rpcbind.x86_64 0:0.2.0-8.el6 sed.x86_64 0:4.2.1-7.el6 setup
9%
17.09.2013
iptables.service
, or create a rule for port 22 (SSH).
Administrators typically do not need to make any adjustments to the main configuration file – usually /etc/ssh/sshd_config
– with one exception
9%
08.01.2013
The Secure Boot feature, officially known as the UEFI 2.2 specification, requires the use of digital signatures to allow – or prevent – the loading of device drivers and operating systems. This precaution
9%
18.03.2012
8 7144 9564 54 1132 2XRedundancy
116 3 1016 4144 22 1188 appmgr
It works the same way for services:
PS> Get-Service -ComputerName XenApp1
9%
02.07.2014
-----------memory---------- ---swap-- -----io---- --system-- -----cpu-----
192.168.1.250: r b swpd free buff cache si so bi bo in cs us sy id wa st
192.168.1.250: 0 0 0 7248836 25632 79268 0 0 14 2 22 21 0 0 99 0 0
192.168.1
9%
17.10.2011
, 5900 for VNC and optionally 22 for SSH) and thus a minimal attack surface (Figure 4). You can use the web interface in Administration | Server
to decide which services you want to provide
9%
21.07.2011
address = 192.168.1.250 eth0:0
17 vip_nmask = 255.255.255.0
18 port = 80
19 send = "GET / HTTP/1.0\r\n\r\n"
20 expect = "HTTP"
21 use_regex = 0
22 load_monitor = rup
23