Networking & Cloud Computing
azw3, epub, pdf |eng | 2015-07-15 | Author:Piyush Verma

OS fingerprinting attempts OS fingerprinting is the technique where an attacker tries to identify the operating system running on the target machine(s). An attacker can perform either passive or active ...
( Category: Network Security April 4,2019 )
epub |eng | 2018-07-24 | Author:Mark Van Rijmenam,Philippa Ryan & Philippa Ryan

5.12 Conclusion Corruption corrodes public trust, undermines the rule of law, and ultimately delegitimises the state [182]. Rules and regulations are circumvented by bribes, public budget control is undermined by ...
( Category: Network Administration April 1,2019 )
epub, pdf |eng | 2014-01-13 | Author:Ed Wilson [Ed Wilson]

Note Keep in mind that you want to convert the contents of the passwordHash.txt file to a secure string and not the path to the passwordHash.txt file. The first time ...
( Category: Enterprise Applications April 1,2019 )
epub, pdf |eng | 2009-11-12 | Author:Dan Zarrella [Dan Zarrella]

Figure 6-11. StumbleUpon has more mainstream appeal than Digg. StumbleUpon Perhaps the most mainstream social bookmarking site, StumbleUpon also differs from the standard voting site interface. Rather than a front ...
( Category: E-Commerce April 1,2019 )
epub |eng | 2013-05-28 | Author:Brian Svidergol & Robbie Allen

Using a command-line interface The following command creates an AD integrated reverse zone: > dnscmd <DNSServerName> /zoneadd <ZoneName> /DsPrimary Using PowerShell The following PowerShell command will create an Active Directory−integrated ...
( Category: Networks April 1,2019 )
epub |eng | 2010-03-04 | Author:Iljitsch van Beijnum [Iljitsch van Beijnum]

Smurf directed broadcast amplification “Smurf” attacks use misconfigured intermediate networks to multiply traffic, allowing attackers to easily muster up large amounts of traffic without the need to hack any systems. ...
( Category: Networks, Protocols & APIs April 1,2019 )
epub, azw3 |eng | 2015-06-14 | Author:Craig Sebenik & Thomas Hatch

[vagrant@master ~]$ cat /srv/salt/file/base/jinja/simple_var.sls {% set simple_var = 'a simple variable' %} jinja_var: cmd.run: - name: echo "Simple var is {{ simple_var }}" Then we can run that and see ...
( Category: Linux & UNIX Administration April 1,2019 )
mobi, epub |eng | 2009-07-15 | Author:Harry Reynolds and Doug Marschke

Enter the Routed VLAN Interface While lollipop routing has a certain aesthetic appeal, it was not long before a sharp engineer realized that by adding some primitive Layer 3 functionality ...
( Category: Networks, Protocols & APIs April 1,2019 )
mobi, epub |eng | 2015-03-16 | Author:Chris Barbour

Variable Qualifiecation Local variables should be unqualified, global variables should be fully qualified, and fully qualified out-of-scope variable references should be avoided if possible. Fully qualifying variable names accomplishes two ...
( Category: Linux & UNIX Administration April 1,2019 )
mobi, epub |eng | | Author:Jo Rhett

Logger By default Hiera logs warning and debug messages to STDOUT. You can change this using the :logger configuration value. Valid values are Console: emit warnings and debug on STDERR ...
( Category: Tools April 1,2019 )
mobi, epub |eng | 2011-07-25 | Author:Tiago Macedo & Fred Oliveira

Discussion For this recipe, we’ll assume that you have a recent installation of Node.js, as well as npm in order to install the necessary node libraries to support the chat ...
( Category: Network Administration April 1,2019 )
mobi |eng | 2015-06-14 | Author:Craig Sebenik and Thomas Hatch

[vagrant@master ~]$ cat /srv/salt/file/base/jinja/list_item.sls {% set list1 = ['one', 'two', 'three'] %} jinja_list_item: cmd.run: - name: echo "List item 2 is {{ list1[2] }}" [vagrant@master ~]$ sudo salt master.example state.show_sls ...
( Category: Linux & UNIX Administration April 1,2019 )
mobi, epub |eng | 2015-06-16 | Author:Dawn Griffiths and David Griffiths

Note We’re using a blank fragment for all of our fragments as we’re going to replace all the code Android Studio generates for us. Here’s the code for TopFragment.java: Add ...
mobi, epub |eng | 2010-08-15 | Author:Rob Cameron, Brad Woodberg, Patricio Giecco, Timothy Eberhard, and James Quinn

Drop-Packet Drop-Packet will drop an individual offending packet, but not the rest of the session. Typically, you want to use the Drop-Connection action when malicious activity is detected on a ...
( Category: Network Security April 1,2019 )
mobi |eng | 2015-01-27 | Author:Holden Karau & Andy Konwinski & Patrick Wendell & Matei Zaharia

Apart from these, you will most likely be accessing data from Amazon S3, which you can do using the s3n:// URI scheme in Spark. Refer to “Amazon S3” for details. ...
( Category: Software Development April 1,2019 )