trouvé sur http://tic-et-net.org/2013/02/14/partage-de-connexion-wifi-sous-windows/
à la main quand ça fonctionne http://tic-et-net.org/2011/08/24/windows-seven-en-point-daccs-wifi/
illustré http://tic-et-net.org/2011/08/24/windows-seven-en-point-daccs-wifi/
se sortir du merdier autour de la gare
salle Berlioz ::)
téléphone maison ...
via http://sebsauvage.net/links/?jJC4rA
By exporting variable SSLKEYLOGFILE
Powermate VL370
la brocante de mamie http://www.solidura.fr/
cartes wifi possibles?
PCI TP-LINK TL-WN851ND https://wikidevi.com/wiki/TP-LINK_TL-WN851ND Atheros AR9227
PCI-E TP-LINK TL-WN881ND PCI-E TL-WN881ND Atheros AR9287
install wine http://doc.ubuntu-fr.org/wine
la plus simple: paste -s -d+ infile|bc
plus cool: dc -f infile -e '[+z1<r]srz1<rp'
et pour améliorer ma solution usuelle: (cat infile tr '\n' '+'; echo 0) |bc -l
Flaws in the OpenSSLX509Certificate class in Android can be exploited by an app to compromise the system_server process – and gain powerful system-level access on the device.
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2015-3825
https://securityintelligence.com/one-class-to-rule-them-all-new-android-serialization-vulnerability-gives-underprivileged-apps-super-status/#.VcjWqp5VhBc
The new vuln glories in the name XSA-138, aka CVE-2015-5154 and means “An HVM guest which has access to an emulated IDE CDROM device (e.g. with a device with "devtype=cdrom", or the "cdrom" convenience alias, in the VBD configuration) can exploit this vulnerability to take over the qemu process elevating its privilege to that of the qemu process.”
nmap tn3270, cics, nje ...
Bash reads aliases from a file only; however, this file does not have to reside on the server you are connecting to. With OpenSSH, we have to ability to send environment variables that the server allows.
This post will capture some important links I discovered following the weekly Docker newsletter.