100%
21.08.2014
_name 24x7
03 alias 24x7
04 sunday 00:00-24:00
05 monday 00:00-24:00
06 tuesday ... 22
97%
21.08.2014
't connect to $remote_host:$remote_port: $@ \n";
17
18
19 while() {
20 my @lavg = Sys::CpuLoad::load();
21 my $ts=time();
22 print $socket "system.loadavg_1min $lavg[0] $ts\n";
23 print $socket "system ... 22
97%
21.08.2014
now easily and securely access your AWS resources with MFA enabled. Gemalto offers two supported devices.
The Ezio Time-based 6-Digit Token ... 22
59%
25.09.2023
Rubén Llorente ... is easy enough (superuser privileges are required):
arp -s 192.168.90.55 00:0c:29:c1:91:b1
The last field of the command is the MAC address, which is the unique identifier of the network device to which
59%
04.12.2024
Rubén Llorente ... them in an orderly manner. Proxmox VE has been covered before in other articles [5][6], so I suggest you check them out if you want an in-depth review
59%
01.06.2024
Rubén Llorente ... # A single task is defined, which by default will
20 # run only against "devuan" hosts.
21 tasks:
22 upgradeall:
23 desc: Upgrade all packages
24 target:
25 tags: [devuan]
26 cmd: |
27
59%
30.01.2024
Rubén Llorente ...
8, 9
Debian
11, 12
Ubuntu
20.04, 22.04
FreeBSD
13.x
OpenBSD
7.3
I recommend the downloadable installer, but I will skip
55%
30.11.2025
Destination MAC address
Listing 1
Nemesis arp Packets
01 $ while true
02 > do
03 > sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 -D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2 ... 6
54%
30.11.2025
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple ... 6
53%
30.11.2025
is adding these entries to the Cobbler database. A typical example looks something like Listing 1.
Listing 1
System Settings
01 # cobbler system add --name=foo --profile=ksprofile-devel-rhel6 ... 6