Create a checksum on filesystem
Annotated link http://www.diigo.com/bookmark/http%3A%2F%2Fwww.securityfocus.com%2Fprint%2Finfocus%2F1773
Annotated link http://www.diigo.com/bookmark/http%3A%2F%2Fwww.securityfocus.com%2Fprint%2Finfocus%2F1769
(remote host)# nc -l -p 8888 > date_compromised
(compromised host)# /mnt/cdrom/date | /mnt/cdrom/nc 192.168.1.100 8888 -w 3
Run-time performance monitoring is critical to achieving and maintaining a well-performing system. In this article, the first in a three-part series, Nicholas Whitehead explains how to do low-level granular monitoring of Java performance efficiently.
The Object Oriented Programming Web publishes FREE programming and computer science tutorials, lecture notes, course slides and e-books. OOPWeb.com is a great resource for all programmers and computer science students, but it's especially popular among th
Designed to reduce the inefficiencies in fast growing datacenters, Sun XVM is the first web scale virtualization solution.
Montage of Presentations,whitepapers on Linux Security.The publications on this page represent contributions by members of the IBM Linux® Technology Center to the development community on the topic of Linux security.
A compilation of sources and examples that will help you learn about GRUB.
The interesting point about pfexec. You don´t have to type in a password. You can think about it as a passwordless su or sudo