16%
22.12.2017
) win 512
98:15:eb:38:f3:c1 c8:d7:c1:61:be:a3 0.0.0.0.30693 > 0.0.0.0.57646: S 1759104040:1759104040(0) win 512
dc:6d:43:15:be:52 99:19:41:22:4e:36 0.0.0.0.29211 > 0.0.0.0.63665: S 481173385:481173385(0
16%
05.02.2019
manipulate it? One simple approach to spoofing can be found in the base.c file in the sources of older kernel versions:
res = access_process_vm(task, mm->arg_start, buffer, len, 0);
For each entry
16%
07.06.2019
something like:
/usr/lib/python2.7/dist-packages/ requests/__init__.py:80:
RequestsDependencyWarning: urllib3 (1.24.1) or chardet (3.0.4) doesn't match a supported version! Requests
16%
09.08.2015
('Guards! Guards!', {'de':'Wachen! Wachen!', 'fr' : 'Au Guet!'} );
20
21 create edge Relation from #11:0 to #11:1 set type='Married', from='1993-01-01';
22
23 create edge Appear from #11:0 to #13:0 set
16%
11.06.2014
/joe/.ssh/google_compute_engine -A -p 22 joe@1.2.3.4 --
11 Warning: Permanently added '1.2.3.4' (ECDSA) to the list of known hosts.
12 Enter passphrase for key '/home/joe/.ssh/google_compute_engine':
13 Linux gcerocks-instance-1 3.2.0
16%
04.08.2020
similarity value of 1.0
to the two rascals. Of course, this is not yet hard evidence of unfair practices, but the result at least shows where you could drill down further to reveal more evidence
16%
07.06.2019
# DHCP Server Configuration file.
# see /usr/share/doc/dhcp*/dhcpd.conf.example
# see dhcpd.conf(5) man page
#
subnet 10.14.2.0 netmask 255.255.255.0 {
option routers 10
16%
01.08.2019
no one would have ever dreamed would progress to preseeding and automatic installation. Anyone who managed to install Debian 2.2, alias Potato, or 3.0, alias Woody, on their hard drives were more likely
16%
01.08.2019
(Figure 1). Although it's important to donate to projects like BackBox Linux, if you can't then entering a 0
in the donation field will still allow you to download the ISO. Once downloaded, your disk space
16%
06.10.2019
rules still apply. The attacker cannot open port 22 to the outside by deleting the corresponding Netfilter rule to gain access to the system by SSH.
How security groups can be used in AWS is explained