search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcode"5432 000 Llorente 13
?
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(4)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
100%
Automating command execution across servers
01.06.2024
Home
»
Archive
»
2024
»
Issue 81: Load...
»
Rubén
Llorente
... : [devuan] 10 donkey: 11 user: root 12 host: donkey.operationalsecurity.es
13
tags: [devuan] 14 zebra: 15 user: root 16 host: zebra.operationalsecurity.es 17 tags: [devuan] 18 19
99%
Discover the power of RouterBOARDS
25.09.2023
Home
»
Archive
»
2023
»
Issue 77: Secur...
»
Rubén
Llorente
... is easy enough (superuser privileges are required): arp -s 192.168.90.55
00:0
c:29:c1:91:b1 The last field of the command is the MAC address, which is the unique identifier of the network device to which
22%
Asynchronous PostgreSQL
12.09.2013
Home
»
Archive
»
2013
»
Issue 16: Docker
»
=$dbh->prepare('select burncpu(?)'); 12 $sth->execute((($ENV{QUERY_STRING}+0) || .5).'s');
13
14 while( my $row=$sth->fetchrow_arrayref ) { 15 print "@$row\n"; 16 } Workaround The script is simple, but the attentive
22%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home
»
Archive
»
2021
»
Issue 66: Inci...
»
, the number of exploits contained in Metasploit has exploded to more than 2,
000
. Additionally, countless new targets have been added, including software from Adobe and Oracle and new databases. The framework