I hereby claim:
- I am babywyrm on github.
- I am feanor (https://keybase.io/feanor) on keybase.
- I have a public key ASAOY8UafEZYZFWQBA0zm_ajyWYzd0zMRyNeEXUABxs-pgo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
The easiest way to get the ClamAV package is using Homebrew
$ brew install clamav
Before trying to start the clamd
process, you'll need a copy of the ClamAV databases.
Create a freshclam.conf
file and configure as so
Raymii.org | |
ClamAV installation and daily scan + report on Ubuntu | |
Table of Contents | |
Do you need a virus scanner on Linux/Unix? | |
Install ClamAV | |
Update the database | |
The daily scan | |
Extra: the targeted scan |
Hosts File | |
While using HTB I have found it easier to add hostnames to /etc/hosts for machines such as machinename.htb. This makes it easier to define a machine when going back through commands rather than trying to remember which IP address is associated with a certain machine. You can checkout this gist for a ready-made hosts file or copy the contents below: | |
Copy | |
127.0.0.1 localhost | |
127.0.1.1 htb | |
# The following lines are desirable for IPv6 capable hosts | |
::1 localhost ip6-localhost ip6-loopback | |
ff02::1 ip6-allnodes |
++++++++++++++++++++++++++++++++++++++++++++++++++++++ | |
++++++++++++++++++++++++++++++++++++++++++++++++++++++ | |
~~( March/April, 2019 )~~ | |
The mod_evasive Apache module takes evasive action at the time of a DDoS attack or a BruteForce attack and protect Apache from these types of attacks. It gives reports by email or logging facility. This module restrict the concurrent connections from an IP and blacklist if necessary. To configure mod_evasive on centos 7 server, Please follow the below steps. | |
1. Install EPEL yum repository packages. EPEL (Extra Packages for Enterprise Linux) is an open source and free community based repository project from Fedora team which provides 100% high quality add-on software packages for Linux distribution including RHEL (Red Hat Enterprise Linux), CentOS and Scientific Linux. To activate EPEL on server, execute the below commands in the terminal. |
############################### | |
Continuous Delivery Pipeline for Amazon ECS Using Jenkins, GitHub, and Amazon ECR | |
############################### | |
This getting started guide is intended to help you set up and configure a continuous delivery pipeline for Amazon EC2 Container Service (Amazon ECS) using Jenkins, GitHub, and the Amazon EC2 Container Registry (Amazon ECR). The pipeline builds Docker images from a GitHub repository, pushes those images to an ECR registry, creates an ECS task definition, and then uses that task definition to create a service on the ECS cluster. We use Jenkins to orchestrate the different steps in the workflow. | |
Prerequisites |
#!/usr/bin/env python | |
import base64 | |
from Crypto import Random | |
from Crypto.Cipher import AES | |
BS = 16 | |
pad = lambda s: s + (BS - len(s) % BS) * chr(BS - len(s) % BS) | |
unpad = lambda s : s[0:-ord(s[-1])] |
Press minus + shift + s
and return
to chop/fold long lines!