100%
31.10.2025
password 8 ZDF339a.20a3E
05 log file /var/log/quagga/zebra.log
06 service password-encryption
07 !
08 interface eth0
09 multicast
10 ipv6 nd suppress-ra
11 !
12 interface eth1
13 ip address 10 ... 12
99%
31.10.2025
in the cradles. In our lab, we used systems with 6 to 12 disk slots. All devices had USB interfaces to support extensions with external disks: Only QNAP, Thecus, and Iomega also had an eSATA interface ... 12
99%
31.10.2025
.019s
The process listing took about 3/100 of a second to execute in the real world and was allocated 5/1,000 of a second of CPU time in kernel mode (i.e., executing system calls) and about 2 ... 12
97%
31.10.2025
(MOD(iter,10)==0) WRITE(*,"('iter,diff:',i6,e12.4)") iter,diff
145
146 ! Update solution
147 DO j=2,m-1
148 DO i=2,m-1
149 u(i,j) = unew(i,j)
150 ENDDO
151 ENDDO
152 ENDDO
153
154 CALL ... 12
55%
30.11.2025
is adding these entries to the Cobbler database. A typical example looks something like Listing 1.
Listing 1
System Settings
01 # cobbler system add --name=foo --profile=ksprofile-devel-rhel6 ... 6
54%
30.11.2025
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple ... 6
46%
01.06.2024
Rubén Llorente ... : [devuan]
10 donkey:
11 user: root
12 host: donkey.operationalsecurity.es
13 tags: [devuan]
14 zebra:
15 user: root
16 host: zebra.operationalsecurity.es
17 tags: [devuan]
18
19
45%
25.09.2023
Rubén Llorente ... is easy enough (superuser privileges are required):
arp -s 192.168.90.55 00:0c:29:c1:91:b1
The last field of the command is the MAC address, which is the unique identifier of the network device to which
40%
19.08.2014
routing devices from other vendors) can hold a total of 512,000 IPv4 routes in high-performance TCAM memory. The devices actually allow for a total of 512,000 IPv6 routes also, but because of the slow ... The Internet Outgrows Itself on August 12
39%
30.11.2025
AdvAutonomous on;
10 AdvRouterAddr off;
11 };
12
13 };
IPv6 Attacks
IPv6 basically suffers from all the existing classes of attacks against IPv4 and also introduces some new weaknesses ... Transitioning from IPv4 to IPv6 will be messy; we describe IPv6 served three ways. ... IPv6 ... IPv6 and Linux