Since Mavericks stopped using the deprecated ipfw
(as of Mountain Lion), we'll be using pf
to allow port forwarding.
####1. anchor file
Create an anchor file under /etc/pf.anchors/<anchor file>
with your redirection rule like:
#!/usr/bin/env ruby | |
# Commands: | |
# sl2pm add PACKAGE_NAME # add one of the available packages | |
# sl2pm add_all STRING N_PAGES # add all packages that matches string | |
# sl2pm add_popular FROM_PAGE N_PAGES MASK # add popular packages | |
# sl2pm clear_cache # clear cache | |
# sl2pm help [COMMAND] # Describe available commands or one spec... | |
# sl2pm list MASK # list all of the available packages | |
# sl2pm open PACKAGE_NAME # open in browser package description |
class ClassA | |
@@class_var1 = 1 | |
@var1 = -1 | |
class << self | |
attr_accessor :attr_var1 | |
def class_method1 | |
puts "\t#{self.class}.class_method1" | |
puts "\t\t@var1: #{@var1}" |
PATH=$(echo "$PATH" | awk -v RS=':' -v ORS=":" '!a[$1]++') |
vboxmanage clonehd image.vdi image.img --format RAW | |
qemu-img convert -f vdi -O raw image.vdi image.img | |
vbox-img convert --srcfilename image.vdi --stdout --srcformat VDI --dstformat RAW image.img |
To remove Nessus, delete the following directories (including subdirectories) and files: | |
/Library/Receipts/Nessus* | |
/Library/LaunchDaemons/com.tenablesecurity.nessusd.plist | |
/Library/Nessus | |
/Library/PreferencePanes/Nessus Preferences.prefPane | |
/Applications/Nessus |
We need to hash passwords as a second line of defence. A server which can authenticate users necessarily contains, somewhere in its entrails, some data which can be used to validate a password. A very simple system would just store the passwords themselves, and validation would be a simple comparison. But if an hostile outsider gains a simple glimpse at the contents of the file or database table which contains the passwords, then that attacker learns a lot. Unfortunately, such partial, read-only breaches do occur in practice (a mislaid backup tape, a decommissioned but not wiped out hard disk, as an aftermath of a SQL injection attack... the possibilities are numerous). See this blog post for a detailed discussion.
Since the overall contents of a server which can validate passwords are necessarily sufficient to, indeed, validate passwords, an attacker who got a read-only snapshot of the server is in position to ma
#!/bin/bash | |
INSTALLPATH="/usr/local/bin" | |
if [ "$1" = "install" ]; then | |
chmod +x $0 | |
cp $0 $INSTALLPATH/$(basename "$0" ".sh") | |
echo "Installed into $INSTALLPATH" | |
exit 0 | |
elif [ "$1" = "createapp" -o "$1" = "installapp" ]; then |
function fnValidCreditCardNumber( objFormField ) | |
{ | |
var nSum = 0; | |
var nMultiplier = 1; | |
var nIndex; | |
var sDigit; | |
var nProduct; | |
var sCreditCardAccountNumber = objFormField.value; | |
var nLength = objFormField.value.length; | |
#!/bin/bash | |
# Script to convert PDF file to JPG images | |
# | |
# Dependencies: | |
# * pdftk | |
# * imagemagick | |
PDF=$1 |