100%
01.06.2024
Rubén Llorente ... : [devuan]
10 donkey:
11 user: root
12 host: donkey.operationalsecurity.es
13 tags: [devuan]
14 zebra:
15 user: root
16 host: zebra.operationalsecurity.es
17 tags: [devuan]
18
19
97%
04.12.2024
Rubén Llorente ... " {
11 endpoint = "https://192.168.3.15:8006/"
12 username = "root@pam"
13 password = "proxmox"
14 insecure = true
15 tmp_dir = "/var/tmp"
16
17 ssh {
18 agent = true
19 }
20
97%
02.06.2020
Rubén Llorente ... , and
a Sender Policy Framework (SPF) entry in the DNS record of your domain.
Theoretically, it is possible to run an email service from a dynamic IP with dynamic DNS (Figure 12), but in practice it can
96%
30.01.2024
Rubén Llorente ...
8, 9
Debian
11, 12
Ubuntu
20.04, 22.04
FreeBSD
13.x
OpenBSD
7.3
I recommend the downloadable installer, but I will skip
96%
25.09.2023
Rubén Llorente ... a blacklist from the EasyList [12] or StevenBlack [13] host file and loading it to the DNS server or the proxy server for your clients to use. Personally, I use a separate device for this task for performance
39%
28.11.2021
can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection" [1], has been written up in a number of books. Linux Magazine
reported more than 12 years ago [2
38%
20.06.2022
_ADMIN=admin
10 - KEYCLOAK_ADMIN_PASSWORD=SOME_PASSWORD
11 - KC_DB=postgres
12 - KC_DB_URL=jdbc:postgresql://postgres:5432/keycloak
13 - KC_DB_USERNAME=postgres
14 - KC
38%
15.01.2014
1998, with some serious administration beginning around 2000, at a large aerospace company. The company had replaced some large SGI Origin systems with clusters, and the pressure was on to make them work
37%
04.08.2020
five-star reviews that look very similar. The problem is so evident on Amazon that customers rub their eyes in amazement wondering why the online giant doesn't intervene.
Graph databases can help
37%
12.09.2013
END LOOP;
10 RETURN clock_timestamp()-now()
11 END;
12 $CODE$ LANGUAGE plpgsql;
Figure 1: The burncpu() process at the top of the Top chart