9%
05.02.2019
to sleep at night knowing that your network is vulnerable, unwatched for at least 12 hours a day, and probably compromised so badly and so stealthily that you won't be able to find that you've been
9%
02.06.2020
it that problematic.
Yes, we spent a lot of time working. Rather than a typical eight to nine hours per day, we logged somewhere between 10 and 12 hours. We were also on call, and once the layoffs started in October
9%
07.06.2019
${WORK_DIR}
10 VOLUME ${WORK_DIR}
11
12 COPY Debian/stretch-backports.list /etc/apt/sources.list.d/
13 COPY Debian/testing.list /etc/apt/sources.list.d/
14
15 RUN apt-get update -y \
16 && apt-get upgrade
9%
05.12.2016
the user input
# Set bold mode
tput bold
tput cup 10 15
read -p "Enter Your Choice [1-2] " choice
tput clear
tput sgr0
tput rc
Figure 3: tput sample
9%
05.12.2016
that the opposite is true. It's a little better than leaving the doors and windows unlocked but, in reality, not that much better. We assume that our 12-character complex passwords protect us, but they don't. Sure
9%
16.05.2013
have been read
a002 OK [READ-WRITE] SELECT completed
Client may make changes to mail
a003 fetch 12 full
Client requests information about message 12
9%
03.02.2022
class BlazeDemoV1 extends Simulation {
08
09 var qualifiedhost = "http://blazedemo.com"
10 var proxyport = 0
11 var proxyhost = "not set"
12
13 // headers for HTTP call
14 val headers = Map(
15
9%
30.11.2025
(s) you wish to process (or 'all' to process all packages). (default: all) [?,??,q]: all
12
13 Processing package instance from
14
9%
30.11.2025
Resident Pages: 0/15 0/60K 0%
05 Elapsed: 8.1e-05 seconds
06 $ ./vmtouch -vt /bin/gzip
07 /bin/gzip
08 [OOOOOOOOOOOOOOO] 15/15
09
10 Files: 1
11 Directories: 0
12 Touched Pages: 15 (60K)
13
9%
30.11.2025
specified IP addresses and demand a password, but for simplicity, my .htaccess looks like the following:
Order Deny,Allow
Deny from All
Allow from 12.12.12.12
Allow from 23.23.23.23
Allow from 34