Computist Quiz [questions for programmers, from CS, US Santa Barbara]]
Sunday, October 23rd, 2011The Subj. Try to solve the questions in your head, w/out using paper and pencil. [from AVVA http://avva.livejournal.com/ ]
The Subj. Try to solve the questions in your head, w/out using paper and pencil. [from AVVA http://avva.livejournal.com/ ]
Posted in binary, cs, fun, math, questions, quiz | Comments Off | permalink
The Subj. Try to solve the questions in your head, w/out using paper and pencil. [from AVVA http://avva.livejournal.com/ ]
Posted in binary, cs, fun, math, questions, quiz | Comments Off | permalink
Worm uses bug in jmx-console to execute shell code, then it installs perl-based control daemon that connects to IRS, and tries to discover other JBoss’es near by by using jgroups UDP multicast. Here is more details, including the source code http://pa…
Posted in bug, infosec, jboss, jbossas, jmx-console, update, virus, work, worm | Comments Off | permalink
Worm uses bug in jmx-console to execute shell code, then it installs perl-based control daemon that connects to IRS, and tries to discover other JBoss’es near by by using jgroups UDP multicast. Here is more details, including the source code http://pa…
Posted in bug, infosec, jboss, jbossas, jmx-console, update, virus, work, worm | Comments Off | permalink
Hewlett-Packard Technology brief, 2nd edition. APR/2011. This paper summarizes the technologies in the latest generation of AMD Opteron and Intel Xeon processors. These technologies include: Microarchitecture, I/O, Power management, Virtualization, Da…
Posted in 5600, 6100, 6500, 7500, amd, cpu, intel, Opteron, paper, processors, Proliant, Xeon | Comments Off | permalink
Hewlett-Packard Technology brief, 2nd edition. APR/2011. This paper summarizes the technologies in the latest generation of AMD Opteron and Intel Xeon processors. These technologies include: Microarchitecture, I/O, Power management, Virtualization, Da…
Posted in 5600, 6100, 6500, 7500, amd, cpu, intel, Opteron, paper, processors, Proliant, Xeon | Comments Off | permalink
RHEL 5.6 images on Amazon are broken, you need to install an additional RPM package to fix the repo setup
Posted in 5.6, aws, ec2, repository, rhel, rpm, yum | Comments Off | permalink
RHEL 5.6 images on Amazon are broken, you need to install an additional RPM package to fix the repo setup
Posted in 5.6, aws, ec2, repository, rhel, rpm, yum | Comments Off | permalink
It is possible for an attacker to reach internal resources in a DMZ if RewriteRule or ProxyPassMatch directives are used in mod_proxy config
Posted in apache, bug, mod_proxy, rewrite, Security, vulnerability, vulns | Comments Off | permalink
It is possible for an attacker to reach internal resources in a DMZ if RewriteRule or ProxyPassMatch directives are used in mod_proxy config
Posted in apache, bug, mod_proxy, rewrite, Security, vulnerability, vulns | Comments Off | permalink
You are currently browsing the Konstantin Antselovich weblog archives for October, 2011.
Konstantin Antselovich (c) 2004-2011
powered by WordPress
Entries (RSS)
and Comments (RSS).