100%
10.04.2015
[...]$
The new system call setsockopt() can also be traced using analysis tools such as strace:
$ grep setsockopt tcp_stealth_server.strace
29392 setsockopt(3, SOL_TCP, 0x1a /* TCP_??? */, "This is mymagic ... Port scans for finding vulnerable services are nothing new, and port knocking as a defense has been around for a while, too. TCP Stealth tries to do something similar, but it takes a more ... TCP Stealth ... TCP Stealth hides open ports ... TCP Camouflage
96%
17.02.2015
_full_action = SUSPEND
disk_error_action = SUSPEND
tcp_listen_queue = 5
tcp_max_per_addr = 1
##tcp_client_ports = 1024-65535
tcp_client_max_idle = 0
enable_krb5 = no
krb5_principal = auditd
You can also spread
95%
11.04.2016
LANDEV=eth0
05
06 echo -n "flushing all chains"
07 /sbin/iptables -F -t filter
08 /sbin/iptables -F -t nat
09 /sbin/iptables -F -t mangle
10 /sbin/iptables -X -t filter
11 /sbin
94%
05.12.2019
TIME CMD
Root 1 0 0 19:05 ? 00:00:00 sleep 1000
Listing 2
Process on the Host
$ ps -ef|grep sleep
Cherf 30328 29757 0 20:44 ? 00:00:00 sleep 1000
Cherf 30396 3353
93%
05.12.2014
during a particular interval, the number of packets per second (kpps
x1000), the kilobytes seen during the interval (kbytes
), megabits per second (mbps
), libpcap's reported packets (nic
93%
21.08.2014
_interval);
04 use Net::Statsd;
05
06 $Net::Statsd::HOST = 'localhost'; # Default
07 $Net::Statsd::PORT = 8125; # Default
08
09 my $t0 = [gettimeofday];
10
11 my($one, $two, $three) = map { $_ x 4096
90%
25.03.2020
with the blockdev utility:
$ sudo blockdev --getsize64 /dev/sdb
7000259821568
Listing 1
Server Drives
01 $ cat /proc/partitions
02 major minor #blocks name
03
04 7 0 91228 loop0
05
89%
07.04.2022
,BROADCAST,RUNNING,MULTICAST> mtu 1460
inet 10.0.0.2 netmask 255.255.255.255 broadcast 0.0.0.0
inet6 fe80::bfd3:1a4b:f76b:872a prefixlen 64 scopeid 0x20
ether 42:01:0a:80:00:02 txqueuelen 1000
89%
16.10.2012
:1500 Metric:1
RX packets:495050 errors:0 dropped:0 overruns:0 frame:0
TX packets:26284 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX
89%
24.02.2022
.255.255.255 broadcast 0.0.0.0
inet6 fe80::bfd3:1a4b:f76b:872a prefixlen 64 scopeid 0x20
ether 42:01:0a:80:00:02 txqueuelen 1000 (Ethernet)
RX packets 11919 bytes 61663030 (58.8 Mi