search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%220mb"5432 000 Llorente 12
?
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(4)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
100%
Automating command execution across servers
01.06.2024
Home
»
Archive
»
2024
»
Issue 81: Load...
»
Rubén
Llorente
... : [devuan] 10 donkey: 11 user: root
12
host: donkey.operationalsecurity.es 13 tags: [devuan] 14 zebra: 15 user: root 16 host: zebra.operationalsecurity.es 17 tags: [devuan] 18 19
99%
Discover the power of RouterBOARDS
25.09.2023
Home
»
Archive
»
2023
»
Issue 77: Secur...
»
Rubén
Llorente
... is easy enough (superuser privileges are required): arp -s 192.168.90.55
00:0
c:29:c1:91:b1 The last field of the command is the MAC address, which is the unique identifier of the network device to which
23%
Asynchronous PostgreSQL
12.09.2013
Home
»
Archive
»
2013
»
Issue 16: Docker
»
. There are some new lines: 5 and
12
to
22
. Line
22
installs the sig function as a signal handler for SIGTERM. When the signal arrives, line 13 opens a new connection to the database and calls the pg
23%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home
»
Archive
»
2021
»
Issue 66: Inci...
»
can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection" [1], has been written up in a number of books. Linux Magazine reported more than
12
years ago [2