Well this year i decided to enter the International Obfuscated C Code Contest. This was my first attempt at writing obfuscated C (at least purposely), so I am sure that this is kids-stuff for the real obfuscation gurus. Anyway, the results are out, and I am not a finalist (I wasn't expecting to... (5 Replies)
Appreciate your thoughts....I m very new to this. Anyone here have the similar experience and work around. Thanks.
Use scp to send a file from HP-UX to SUN box successfully but return code randomly being generated. The majority of time reports 1 (meaning not ok) and sometime 0 (OK).
When scp... (0 Replies)
Hi, wondering if anyone can suggest a tool to me that will let me either cut & paste hex or type it in for packet decoding.
I want to be able to decode a packet as done with tcpdump or wireshark, but I want to be able to manually input the hex myself. (2 Replies)
Hi
I am new to expect. Please if any one can help on my issue its really appreciable. here is my issue:
I want expect script for random passwords and random commands generation.
please can anyone help me?
Many Thanks in advance (0 Replies)
ello, I am trying to remove obfuscated code in multiple files on a server, the malicious code is surronded by
/*km0ae9gr6m*//*qhk6sa6g1c*/
I had success removing from some files using this command
sed -i ':strt;s|/\*km0ae9gr6m\*/*/\*qhk6sa6g1c\*/||g;/\/\*km0ae9gr6m\*\//{N;b strt}'... (5 Replies)
Need to use dd to generate a large file from a sample file of random data. This is because I don't have /dev/urandom.
I create a named pipe then:
dd if=mynamed.fifo do=myfile.fifo bs=1024 count=1024
but when I cat a file to the fifo that's 1024 random bytes:
cat randomfile.txt >... (7 Replies)
I am trying to understand a UNIX script which FTPs certain files from a remote location to the local machine. I understand the basic FTP command but the UNIX script uses the following command:
ftp -n -i -v > $logftp_trg 2>&1 <<!
open $MFX_FTP_SERVER
user $MFX_FTP_LOGIN $MFX_FTP_PWD
Can anyone... (5 Replies)
Discussion started by: Bhavesh Sharma
5 Replies
LEARN ABOUT DEBIAN
crypt::random::source::base
Crypt::Random::Source::Base(3pm) User Contributed Perl Documentation Crypt::Random::Source::Base(3pm)NAME
Crypt::Random::Source::Base - Abstract base class for Crypt::Random::Source classes
SYNOPSIS
use Moose;
extends qw(Crypt::Random::Source::Base);
DESCRIPTION
This is an abstract base class.
In the future it will be a role.
METHODS
get $n, %args
Gets $n random bytes and returns them as a string.
This method may produce fatal errors if the source was unable to provide enough data.
read $buf, $n, [ $off ]
This method is cannibalized from IO::Scalar. It provides an IO::Handle work-alike.
Note that subclasses override this to operate on a real handle directly if available.
seed @stuff
On supporting sources this method will add @stuff, whatever it may be, to the random seed.
Some sources may not support this, so be careful.
available
This is a class method, such that when it returns true calling "new" without arguments on the class should provide a working source of
random data.
This is use by Crypt::Random::Source::Factory.
rank
This is a class method, with some futz value for a ranking, to help known good sources be tried before known bad (slower, less available)
sources.
get_data %Params
Provided for compatibility with Crypt::Random
AUTHOR
Yuval Kogman <nothingmuch@woobling.org>
COPYRIGHT AND LICENSE
This software is copyright (c) 2011 by Yuval Kogman.
This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself.
perl v5.14.2 2011-01-05 Crypt::Random::Source::Base(3pm)