16%
20.03.2014
+ (in Tools | Cookie Manager+
) to locate a cookie and see its details. Figure 6 shows an example of a JSESSION cookie (from a Fortune 500 firm) issued from the web server without a Secure flag
16%
01.06.2024
Date = $today.AddMonths(6)
$notAfter = $today.AddMonths(6)
$pass = "Pa$$ToProt3ctThePFX!"
$thumbprint = (New-SelfSignedCertificate -CertStoreLocation cert:\Currentuser\My -DnsName powershell.contoso.com -Key
16%
14.03.2013
(Accelerated Processing Unit) [4].
This processor combines a CPU with a GPU on a single chip. For example, the recently announced AMD A10-5800K has the following specifications:
4 cores at 3.8GHz (turbo
16%
17.06.2017
to be a developer, however, and this is ultimately also a matter of time.
For a simpler approach, you can turn to the Codeless Provisioning Framework [6]. The setup consists of only two files: a DLL, which you need
16%
17.06.2011
community needs more closely and to integrate patches more quickly. The first stable version, 1.0, was released in December 2009, and the version counter has risen every couple of months ever since.
Icinga
16%
26.03.2025
(e.g., which you can use to read passwords in the scope of a pentest) are available for download from GitHub [5] [6].
Flipper Zero is designed for interaction with a smartphone. During the initial
16%
08.05.2012
a few slides that described a low-cost cluster built from i486 processors and 10BT Ethernet. The project had a strange name, “Beowulf,” and was using something called Linux for an operating system
16%
28.11.2022
integrated in Kolla Ansible, and to document best practices [5] for connecting to external alerting systems. The open source Alerta [6] software provides an alternative for aggregating alert occurrences
16%
09.04.2019
-provisioned, and network-based
, as delivered by the Elastic Block Storage service (EBS). EBS volumes are highly available and come with a multitude of options too large to detail here [6]. In broad strokes, EBS volumes
16%
10.06.2015
that the build process always produces identical packages. This is not the case in general. Instead, two binaries built from the same source code may often differ for several reasons [6].
For example, the packets