Script
#!/bin/bash
### BEGIN INIT INFO
# Provides: hostname.sh
# Required-Start:
# Required-Stop:
# Default-Start: 2 3 4 5
# Default-Stop: 0 6
#!/bin/bash
### BEGIN INIT INFO
# Provides: hostname.sh
# Required-Start:
# Required-Stop:
# Default-Start: 2 3 4 5
# Default-Stop: 0 6
A remote code execution exploit for Fortigate firewalls that exploits a HTTP cookie overflow vulnerability. It affects models 60, 60M, 80C, 200A, 300A, 400A, 500A, 620B, 800, 5000, 1000A, 3600, and 3600A. The model of the firewall is detected by examining the ETag in the HTTP headers of the firewall. This is not CVE-2006-6493 as detected by Avast.
Test the nginx config
$ sudo nginx -t
$ sudo nginx -t -c /etc/nginx/nginx.conf
nginx: the configuration file /etc/nginx/nginx.conf syntax is ok
nginx: configuration file /etc/nginx/nginx.conf test is successful
git config --global alias.lg "log --color --graph --pretty=format:'%Cred%h%Creset -%C(yellow)%d%Creset %s %Cgreen(%cr) %C(bold blue)<%an>%Creset' --abbrev-commit --"
git lg
"zip","city","state","citizen" | |
"01067","Dresden","Sachsen","11957" | |
"01069","Dresden","Sachsen","25484" | |
"01097","Dresden","Sachsen","14924" | |
"01099","Dresden","Sachsen","27974" | |
"01108","Dresden","Sachsen","5876" | |
"01109","Dresden","Sachsen","20010" | |
"01127","Dresden","Sachsen","14991" | |
"01129","Dresden","Sachsen","18915" | |
"01139","Dresden","Sachsen","17555" |
#!/usr/bin/env python | |
from dns import resolver | |
from dns.name import EmptyLabel | |
from dns.resolver import NoAnswer | |
from dns.resolver import NXDOMAIN | |
from pymongo import MongoClient | |
from pymongo.errors import DuplicateKeyError | |
With these rules you are able to protect yourself a tiny bit
#!/usr/bin/env python | |
# -*- coding: utf-8 -*- | |
import sys | |
import json | |
import requests | |
from lxml import html | |
from urlparse import urlparse | |
from fake_useragent import UserAgent |
You need to add the following entry in /etc/apt/sources.list
or a new file in /etc/apt/sources.list.d/
:
deb http://deb.torproject.org/torproject.org xenial main
deb-src http://deb.torproject.org/torproject.org xenial main
Then add the gpg key used to sign the packages by running the following commands at your command prompt:
#!/usr/bin/env python | |
# -*- coding: utf-8 -*- | |
import requests | |
def download_stream(video_url, video_name): | |
with open(video_name, 'wb') as handle: | |
response = requests.get(video_url, stream=True) |