30%
25.03.2020
"TracingConfig": {
17 "Mode": "PassThrough"
18 },
19 "CodeSha256": "37n/rzJz4o2lyvh4s2aet2aBlY=adc",
20 "Description": "",
21 "CodeSize": 432,
22 "FunctionArn": "arn
30%
22.12.2017
Message FormApp FormMessage where
18 renderMessage _ _ = defaultFormMessage
19 - the "FormApp" web application only provides one route
20 mkYesod "FormApp" [parseRoutes|
21 /contact ContactR GET |]
22
30%
18.02.2018
. The required modifications are explained in the Huginn wiki [3].
The software is based on Ruby on Rails [4] and therefore requires an installed Ruby environment; in fact, it needs version 2.2 or 2
30%
10.06.2015
that at an online MCrypt man page [22]. Using mcrypt is very similar to the other Crypt replacement tools (Listing 11).
Listing 11
Using MCrypt
$ ls -s
total 7288
196 hpc_001.html 7092 MFS2007.pdf
30%
25.03.2020
.30.2.181/24.
The standard security groups (SGs) in AWS only open TCP port 22, so I've made sure that any instances in that newly baked VPC can talk to each other. As you will see in a later command, only TCP port 6443
30%
04.08.2020
"mprotect",
19 "capget",
20 "getuid",
21 "wait4",
22 "pread64",
23 "Capset",
24 [snip...]
Unfortunately, I can't go too deep into seccomp in this article
30%
04.08.2020
grants permissions to enable GuardDuty.
If some instances expose ports like 22 or 3389 to the world (0.0.0.0/0), you should soon see some findings of malicious IPs trying to get into your systems
30%
06.10.2019
.get('mail')
22 if not useremail:
23 print "User " + username + " has no Email address in LDAP"
24 # Import smtplib for the actual sending function
25
30%
06.10.2019
# Intra-node communication
22 - 7000
23 # TLS intra-node communication
24 - 7001
25 # JMX
26 - 7199
27 # CQL
28 - 9042
29
30%
11.10.2016
(streams
22 (default :ttl 60
23 ; immediate indexing of all incoming events:
24 index
25
26 ; Forward errors, sorted by tags:
27 (where (state "error")
28 (where (tagged