15%
30.11.2025
(number, label):
07 for i in xrange(number):
08 print ' ' + str(i) + ' ' + label
09 sleep((number - 15)/10.0)
10
11 if '__main__' == __name__:
12
13 p1 = Process(target = count, args = (20
15%
30.11.2025
dh_group modp1024;
09 }
10 generate_policy off;
11 }
12
13 sainfo address 192.168.2.0/24 any address 172.16.0.0/16 any {
14 pfs_group modp1024;
15 encryption_algorithm aes256;
16
15%
05.12.2016
_Master_Log_Pos: 140927111
09 Relay_Log_File: mysqld-relay-bin.000002
10 Relay_Log_Pos: 11109399
11 Relay_Master_Log_File: mariadb-bin.000008
12 Slave_IO_Running: Yes
13
15%
30.11.2025
check) or as RC scripts.
Listing 2
CUPS Monitoring
01 #! /bin/sh
02
03 while true
04 do
05
06 lpq -Plp | grep -q "lp is ready"
07
08 if [ $? -gt 0 ]
09 then
10 cupsenable lp
11 fi
12
15%
18.06.2014
- 112 days]: 8101 ( 2.09%) ( 25.12% cumulative)
[ 112- 168 days]: 47729 ( 12.30%) ( 37.42% cumulative)
[ 168- 252 days]: 3578 ( 0.92%) ( 38.34% cumulative)
[ 252- 365 days]: 4970
15%
15.08.2016
,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000
09 inet 192.168.1.123/24 scope global eth1
10 valid_lft forever preferred_lft forever
11
12 $ ip netns exec ns1 ip route add default
15%
21.08.2014
hv = [ "tiffy.tuxgeek.de", "ernie.tuxgeek.de" ]
07
08 for hv_host in hv:
09
10 uri = "qemu+ssh://virtuser@" + hv_host + "/system"
11 conn = libvirt.openReadOnly(uri)
12
13 hypervisor_name = conn ... 22
15%
30.11.2025
is as follows:
tc filter add dev $DEV protocol ip parent 1:0 prio 100 u32 match ip $DIR 12.34.56.78 flowid 1:12
You'll be glad to know the filter's config is much simpler than the classes or the qdisc
15%
01.08.2019
. The takeaway is the -j LOG option (line 12), which logs port scanning behavior to a logfile with the iptables:
prefix.
Listing 1
iptable Rules
01 *filter
02 *filter
03 :INPUT ACCEPT [0:0]
04
15%
01.08.2019
CREATED SIZE
nginx f09fe80eb0e7 12 days ago 109MB
nginx latest 35640fed495c 12 days ago 109MB
Backdoor Access
Considering how well Docker Scan handled