14%
21.04.2015
-r--r-- 2 root root 6 3. Feb 18:36 .glusterfs/0d/19/0d19fa3e-5413-4f6e-abfa-1f344b687ba7
#
# ls -alid dir1 .glusterfs/fe/9d/fe9d750b-c0e3-42ba-b2cb-22ff8de3edf0 .glusterfs
/00/00
14%
27.09.2021
/.acme.sh/www.example.com/www.example.com.cer -noout -issuer -subject -dates -serial
issuer= /C=US/O=Let's Encrypt/CN=R3
subject= /CN=www.example.com
notBefore=Feb 21 13:00:28 2021 GMT
notAfter=May 22 13:00:28 2021 GMT
serial=03B46ADF0F26B94C19443669
14%
04.10.2018
:/
1 -rw- 4414921 Aug 22 2017 00:00:02 c2960-lanbase-mz.122-25.FX.bin
2 -rw- 736 Aug 22 2017 10:53:02 vlan.dat
64016384 bytes total (59600727 bytes free)
If you
14%
05.12.2014
://www.github.com/hbons/SparkleShare
–
Current version (as of October 2014)
7.0.2 (Community)
1.0.25
1.1
5.20141013
2.2
5.2.3
3.1.7
1.4
7.0
Release date
August
14%
08.10.2015
.2 224984 49332 pts/30 S+ 12:20 0:16 /usr/bin/python /usr/bin/magnum-api
stack 19844 0.0 1.4 228088 57308 pts/31 S+ 12:20 0:03 /usr/bin/python /usr/bin/magnum-conductor
$ which magnum
/bin
14%
04.08.2020
33 enum { probes = 10, loops = 1, };
34 uint64_t iterations = strtoull(argv[1], 0, 0);
35 uint64_t upper = iterations*iterations;
36
37 double pi = M_PI;
38 double r = 0.0;
39
40 stats
14%
18.10.2017
)
libpgmp.so => /opt/pgi/linux86-64/16.10/lib/libpgmp.so (0x00007f5bc5694000)
libnuma.so.1 => /lib64/libnuma.so.1 (0x00007f5bc5467000)
libpthread.so.0 => /lib64/libpthread.so.0 (0x00007f5bc524
14%
20.11.2013
_blocks..
..symlink_targets..
..names..
..contents..
..ext_attributes..
Compressing and uploading metadata...
Wrote 0.00 MiB of compressed metadata.
First, notice that I created the file as root. Second, the prefix
14%
01.08.2019
. The takeaway is the -j LOG option (line 12), which logs port scanning behavior to a logfile with the iptables:
prefix.
Listing 1
iptable Rules
01 *filter
02 *filter
03 :INPUT ACCEPT [0:0]
04
14%
23.07.2012
.13.134.52):
Not shown: 994 filtered ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 4.3 (protocol 2.0)
25/tcp closed smtp
53/tcp open domain ISC BIND 9