Search results

Jump to navigation Jump to search

Page title matches

Page text matches

  • ...T-KIT-MARK-II.html Metrix Mark II] is a complete outdoor solution based on a [Soekris board]. 2 [http://www.wneweb.com/pdf/CM9.pdf Wistron CM9] 802.11 a/b/g mini-PCI modules<br/>
    390 bytes (58 words) - 04:58, 8 February 2007
  • ...view corresponding to the web service endpoint interface, as described by a WSDL document.
    767 bytes (130 words) - 08:59, 8 February 2005
  • '''A''': <ol><li>On newer busybox versions the command after a ''shutdown'' keyword from the ''/etc/inttab'' file will be executed, e.g.: So a ''halt'' action will be followed by a ''reboot'' and the node will only executes the '''''halt''''' action.</li>
    658 bytes (109 words) - 19:28, 15 September 2006
  • ...or this is a telephone Book. It’s very easy to find a telephone number for a given name, but it’s really hard to find a name for a given number if you have to do it all by yourself.
    438 bytes (85 words) - 09:28, 8 February 2005
  • '''A typical message-driven object has the following characteristics:''' *Executes upon receipt of a single client message.
    644 bytes (92 words) - 17:12, 19 November 2004
  • A Botnet is a collection of hosts (bots) under a common command and control infrastructure [Wikipedia: [http://en.wikipedia. A host has to be compromised in order to install a bot on it. That can be done by exploiting known bugs and using standard too
    821 bytes (139 words) - 19:16, 14 November 2004
  • '''A typical session object has the following characteristics:''' *Executes on behalf of a single client.
    742 bytes (109 words) - 17:20, 19 November 2004
  • ...add all technical terms that you encountered during the seminar, including a verbose description of their meaning. Please keep those terms in an alphabe ...enuation denotes the loss of intensity a signal expieriences on its way to a reciever.
    1 KB (194 words) - 17:53, 11 July 2007
  • '''A typical entity object has the following characteristics:''' ...ive an exception if it calls an entity in a container that has experienced a crash.
    797 bytes (134 words) - 17:09, 19 November 2004
  • 1. Attacking '' '''one''' '' account (The intruder tries to guess a specific password)<br> 2. Attempt to penetrate '' '''any''' '' account (on a system) used to steal a service directly<br>
    759 bytes (118 words) - 20:54, 8 November 2004
  • ...s are sent by the Anonymization Layer. All commands and responses end with a single newline (<code>"\n"</code> in C). ; <tt>newuser <var>n</var></tt> : A new user with index <tt><var>n</var></tt> has been added. <br />No response
    2 KB (393 words) - 18:46, 25 May 2006
  • ...essed a computer system and what operations he or she has performed during a given period of time.<br><br>
    431 bytes (68 words) - 23:04, 8 November 2004
  • ...tle says that this is a book for Win32 programmers but it also gives quite a lot of information on concepts of the operating systems that implement the
    282 bytes (45 words) - 14:12, 10 April 2005
  • ...this number is coded in the following scheme with a word, let's say ''c-r-a-p'' supposed to be an easy reminder. | A | | | | | | | | | |
    3 KB (170 words) - 20:50, 8 November 2004
  • ...e does not contain any theoretical discussions of web services. It is more a You should really careful think about design before you should start coding a web service.
    1 KB (189 words) - 07:35, 9 March 2007
  • = Install OpenWrt on a Netgear WGT634U = ...ant to restore the original state later): '''Backup Settings''' -> '''Save a Copy of Current Settings''' -> '''Backup'''
    494 bytes (73 words) - 10:49, 8 March 2007
  • A frequent source of severe design errors can be fast built systems, develope ...sheer number of applications for which the average person is asked to use a password exceeds the powers of human memory
    1 KB (178 words) - 20:59, 8 November 2004
  • ...cessary binaries to bootstrap the system until you get a login program and a shell.<br> ...embedded systems the [http://www.busybox.net/ busybox] collection provides a huge set of common UNIX tools in one binary. This method saves some space o
    952 bytes (145 words) - 21:01, 19 September 2006
  • [[Image:Ddos.png|thumb|right|scheme of a DDoS attack]] ...ems are used for a [[Denial of Service]] attack. This scheme is similar to a [[Botnet|botnet]]. In fact, botnets are often used for DDoS attacks, but po
    2 KB (261 words) - 19:22, 14 November 2004
  • $ iptables -t nat -A PREROUTING -p udp --dport 53 -j DNAT --to 192.168.3.1:53 $ iptables -t nat -A POSTROUTING -d 192.168.3.1 -p udp --dport 53 -j MASQUERADE
    888 bytes (134 words) - 11:18, 11 January 2007
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)