16%
09.01.2013
.
Infos
"Introducing Capsicum: Practical Capabilities for UNIX" by Robert N.M. Watson et al., ;login
, December 2010: https://www.usenix.org/publications/login/december-2010-volume-35-number-6
16%
16.05.2013
privileges. This means domain administrators must assign themselves this privilege. Listing 6 shows how a domain administrator would go about this.
Listing 6
Assigning Privileges
root
16%
21.08.2014
now easily and securely access your AWS resources with MFA enabled. Gemalto offers two supported devices.
The Ezio Time-based 6-Digit Token
16%
18.02.2018
.env.GITHUB_API_TOKEN
06
07 var port = process.env.PORT || 5000
08
09 app.get('/', function (req, res) {
10 // Implement GitHub API call
11 })
12
13 app.listen(port, function () {
14 console.log('App listening on port
16%
09.04.2019
replacement for top written in Node.js with scrolling charts at the top (CPU usage) and the bottom left (memory usage).
A good YouTube video [6] presents vtop.
iptraf
Provides network
16%
09.01.2013
://www.sleuthkit.org/autopsy
373
4
SIFT
https://computer-forensics2.sans.org/community/siftkit/#overview
328
5
BackTrack
http://www.backtrack-linux.org
298
6
16%
28.11.2022
engine, which is Elasticsearch in the ELK or in Elastic stack.
Installing and configuring Logstash is covered in an article from Elastic [6]. Each client system runs a small tool named Filebeat
16%
15.12.2017
08 action :install
09 end
10 service "apache2" do
11 action [ :enable, :start ]
12 end
13
14 directory node['main']['doc_root'] do
15 owner 'www1-data'
16 group 'www1-data'
17 mode '0744'
18 action
16%
05.02.2019
comes in the form of Kubernetes pods. You can find example files on GitHub [6] that start these pods. The operator namespace contains all the components required for Rook to control Ceph. The cluster
16%
05.08.2024
, start by enabling Azure Security Center for your subscription. Navigate to the Azure Portal, select Security Center
from the left-hand navigation pane and click Getting started
(Figure 6). Choosing