Programming
epub |eng | 2009-08-19 | Author:Michael Rash [Michael Rash]

SYN Scan Response We'll open our scan examples with a standard Nmap SYN scan from the attacker against the iptables firewall. Here, we'll let Nmap choose the set of ports ...
( Category: Programming May 24,2022 )
epub |eng | 2022-04-22 | Author:Michael Hausenblas [Michael Hausenblas]

device For udev or sysfs filesystems automount Configures automatic mountpoints swap Describes swap space path For path-based activation snapshot Allows for reconstructing the current state of the system after changes ...
( Category: Programming April 19,2022 )
epub |eng | 2022-07-08 | Author:Kaiwan N Billimoria [Billimoria, Kaiwan N]

On my x86_64 Ubuntu 20.04 LTS guest VM (running our custom 5.10.60-prod01 kernel), I find there are 112 *-bpfcc utilities installed (they’re actually Python scripts). In the section just prior ...
( Category: Programming March 27,2022 )
pdf | | 2007-03-11 | Author:The Linux Programmer's Toolbox (2007)

( Category: Programming February 25,2022 )
mobi, epub |eng | 2016-05-31 | Author:Derek Molloy

I2C AND WIRINGPi The wiringPi library that is installed in Chapter 6 has a library of C functions for interacting with I2C bus devices. This short code example reads the ...
( Category: Programming June 27,2016 )
epub |eng | 2015-10-18 | Author:Benjamin Cane [Cane, Benjamin]

It seems, in fact, that the same error is showing yet again; now to figure out why. Troubleshooting from historic issues The first instinct for a Data Collector would be ...
( Category: Networking & System Administration May 17,2016 )
mobi, azw3, epub |eng | 2013-09-25 | Author:Joseph Muniz

Chapter 5 Select View Cookie Information, and you will see stored cookies. You can click on Edit Cookie to bring up the cookie editor and replace the current cookie with ...
( Category: Testing April 11,2016 )
mobi, azw3, epub, pdf |eng | 2016-02-05 | Author:Steve Will

Redirects Linux, like any Unix-like system, has mechanisms to redirect the standard input-output to files. Thus, the use of the character ">" redirectsthe standard of a command to the left ...
( Category: Operating Systems Theory March 31,2016 )
epub, pdf |eng | | Author:Chris Binnie

Summary Having covered a few different tools, it is my hope that you are now armed with enough information to tune your disks to your preference. There are many other ...
( Category: Networking & System Administration February 7,2016 )
epub |eng | 2013-12-27 | Author:Mark G. Sobell [Sobell, Mark G.]

More Information Web Router operating systems: www.smoothwall.org, www.pfsense.com, m0n0.ch/wall NetworkManager: projects.gnome.org/NetworkManager Wireless NIC drivers: wireless.kernel.org/en/users/Drivers PCI vendors, devices, and ID numbers: pciids.sourceforge.net/pci.ids and www.pcidatabase.com/reports.php?type=tab-delimeted. NdisWrapper: sourceforge.net/projects/ndiswrapper Cacti: cacti.net, cacti.net/additional_scripts.php Cacti ...
( Category: Programming October 10,2015 )
epub |eng | 2014-12-25 | Author:Ramon, Manoel Carlos [Ramon, Manoel Carlos]

1 Intel Centrino Wireless-N 135 2 Dual band antennas 350mm cable 2118060-1 TE connectivity 1 1 2 3V coin battery Coin battery holder case Wires jumper 10cm long 1/4w female-male ...
( Category: Programming August 24,2015 )
epub, mobi, pdf |eng | 2015-05-04 | Author:Christopher Negus

Configuring a Default Runlevel or Target Unit Whereas a persistent service is one that is started at server boot time, a persistent (default) runlevel or target unit is a group ...
( Category: Programming August 1,2015 )
epub |eng | 2009-02-08 | Author:Karim Yaghmour & Jon Masters & Gilad Ben-Yossef & Philippe Gerum [Karim Yaghmour]

Writing and reading Whereas flash filesystems such as JFFS2 take advantage of their capability to continue clearing bits to 0 in an erase block to allow transparent read and write ...
( Category: Programming June 13,2015 )