Search

Help

Page 1 of 1. Showing 10 results (0.122 seconds)

  1. xargs

    Here is a really straightforward nondestructive example of using xargs http://www.linuxmanpages.com/man1/xargs.1.php to calculate a MD5 hash on every file … whatever variable name you want instead of {}. For example, changing {} to varX also works, ls xargs t IvarX md5 varX md5 file1.txt MD5 (file1.txt
    www.bonsaiframework.comOct 08, 2016
  2. Allowing Remote Administration in PostgreSQL

    are saying to allow any computer on the local network (in this case subnet 192.168.x.x) to connect to any database. The md5 indicates that the user must also supply a password. Allow local connections from local network host all all 192.168.0.0/16 md5 Restart the postgres service, sudo service postgresql restart Updated
    www.bonsaiframework.comAug 08, 2015
  3. 4.0 Unix & Linux Tools with Common Recipes

    of both files together Integrity Checking MD5 Check if a file is corrupt, On Ubuntu md5sum /path/to/file On Solaris digest a md5 v /path/to/file linux commands
    www.bonsaiframework.comOct 09, 2016
  4. md5sum

    , ensure you use brew to instal md5sum first. Usage Verify directory copy by md5 summing each file and then creating a single md5sum from the list. If you see … f xargs I{} md5sum {} > target.md5.txt diff source.md5.txt target.md5.txt References md5 entire folder
    www.bonsaiframework.comSep 30, 2021
  5. Setup a Real SSL Certificate for Tomcat

    keystore contains 1 entry mywebservices, Oct 8, 2009, keyEntry, Certificate fingerprint (MD5): 02:70:28:DE:A6:BC:0B:5E:3C:FB:BF:B3:68:8F:0F:32 The results show 1 … .  keytool keystore mywebservices.bin list entrustl1b, Oct 9, 2009, trustedCertEntry, Certificate fingerprint (MD5): C2:DF:86:BD:E4:8B:FF:26:4D:AE:6A:26:1D:7A
    www.bonsaiframework.comAug 23, 2011
  6. CIS_Apache_HTTP_Server_Benchmark_v3.0.0.pdf

    Security Configuration Benchmark For Version 3.0.0 May 18th, 2010 Apache HTTP Server 2.2 Copyright 20012010, The Center for Internet Security http://cisecurity.org feedback@cisecurity.org 2 P a g e Background. CIS provides benchmarks, scoring tools, software, data, information, suggestions, ideas, and other services an
  7. 4.0 Setup 0FS Apache

    =xxxxx Apache also provides MD5 hashes to verify your downloads, so you could do the following to generate a local MD5 hash to compare wget O
    www.bonsaiframework.comMar 07, 2019
  8. Microsoft_Security_Intelligence_Report_Volume_13_English.pdf

    www.microsoft.com/sir Microsoft Security Intelligence Report Volume 13 January through June, 2012 JANUARY–JUNE 2012 i Microsoft Security Intelligence Report This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. This docum
  9. OpenDJ 2.6.0 Primary

    High Level Diagrams OpenDJ Architecture.jpg opendjanintroduction19638.jpg DNS OpenDJ replication requires that you use fully qualified domain names, such as opendj.example.com so we'll use, opendj1.krypton.com and www.opendj1.krypton.com Subsequent server instances with replication will increment the number for example
    www.bonsaiframework.comAug 26, 2015
  10. 9.0 Software Picks - Windows 7

    https://gofullpage.com/ Chrome Browser extension to capture entire webpage Quick SFV 64bit http://www.quicksfv.org/ use md5 or sfv files to ensure integrity
    www.bonsaiframework.comMay 14, 2023