9%
14.03.2013
enable TLS 1.2 – given OpenSSL 1.0.1 and a recent 2.2 or 2.4 version of the Apache web server – using the SSLProtocol configuration option. Listing 1 provides a potential server configuration.
Listing
9%
17.06.2011
,200, comprising 55 different commands, were issued. The system, a server with 768MB RAM and a Pentium 3 CPU, took a total of 22 seconds to answer them, the longest response took 32 milliseconds, the shortest
9%
31.10.2025
's usually TCP port 22) to port 2222, for example, to keep port scans from filling up your logs. Without TCP Wrappers enabled, scans might run dictionary attacks on your server where password combinations
9%
30.11.2025
on */
17 port = 5556;
18
19 /* hub mask: the mask of servers that this server may hub. Multiple
20 * entries are permitted
21 */
22 hub_mask = "*";
23
24
9%
30.11.2025
be in the database for a production web application
18 $result = $hasher->CheckPassword($password, $passwordfromdb);
19
20 if ($result) {
21 echo "Password match!";
22 }
23 else {
24 echo "Password
9%
30.11.2025
of the stress test shown in Figure 2, shows that some 19,200 queries composed of 55 different commands were issued. The system, a server with 768MB of RAM and a Pentium 3 CPU, took a total of 22 seconds to answer
9%
27.05.2025
# Backup
15 raspi06:
16 ansible_ssh_private_key_file: /home/treuss/.ssh/raspi06
17 ansible_user: thomas
18 dns_servers:
19 hosts:
20 # Pi-hole
21 pihole
9%
27.05.2025
).
Figure 1: The ss command output on Linux.
If you need more specific information, you can use the -t, -u, and -x options to filter by protocol. The -t flag restricts the output to TCP connections
9%
26.02.2014
_names.sort(key=lambda x: sum(pnic_after[x]), reverse=True)
print "Interface:"
for name in nic_names:
stats_before = pnic_before[name]
stats_after = pnic_after[name]
print
9%
09.10.2017
client.get_all_tweets(user)
20 collect_with_max_id do |max_id|
21 options = {count: 200, include_rts: true}
22 options[:max_id] = max_id unless max_id.nil?
23 user_timeline(user, options)
24