What attacks can a Unix box get through Javascript?
Is the Web Client secure against Javascript attacks if any?
Do we have a Trojan horse made in JavaScript? (3 Replies)
Hi,
Please advise how can we clear the following javascript content from a file commandline, probably using awk or sed
File before removing the content.
################################
root@server1 # cat index.html
This is a test page
<script language=JavaScript>function d(x){var... (6 Replies)
Hello,
I looking to use grep to return a string with exactly n matches.
I'm building off this:
ls -aLl /bin | grep '^.\{9\}x' | tr -s ' '
-rwxr-xr-x 1 root root 632816 Nov 25 2008 vi
-rwxr-xr-x 1 root root 632816 Nov 25 2008 view
-rwxr-xr-x 1 root root 16008 May 25 2008... (7 Replies)
Hello,
I'm working on unix with grep (GNU grep) 2.5.1. I'm going through some of the newer regex syntax using Regular Expression Reference - Advanced Syntax a guide.
ls -aLl /bin | grep "\(x\)"
Which works, just highlights 'x' where ever, when ever.
I'm trying to to get (?:) to work but... (4 Replies)
1. The problem statement, all variables and given/known data:
Prepare a report discussing from an administration and security perspective, role and function of a JavaScript within a UNIX network. You should illustrate your answer with practical examples. In particular attention should me paid to... (1 Reply)
Hi
Need help...I have wrritten one code for html through shell scripting in that i am using java scripts to validate some condition and open the html page without clicking the button....
Code Details
echo "<script type="text/javascript">"
echo "function exec_refresh()"
echo "{"
... (4 Replies)
I want to navigate through a webpage and save that page in my system local automatically. How can I do that by using JavaScript in a Unix shell script. Any suggestions are welcome! (3 Replies)
Where should I put my javascript source code in order to run it "locally" by file not by http?---not sure this "locally" is the appropriate word here.
My test is when my javascript code (test.js) is put in the site default folder as the test.html in /var/www/html both worked as expected with... (2 Replies)
Discussion started by: yifangt
2 Replies
LEARN ABOUT DEBIAN
psensor-server
PSENSOR-SERVER(1) User Commands PSENSOR-SERVER(1)NAME
psensor-server - Temperature and system monitoring Web server
SYNOPSIS
psensor-server [OPTION]...
DESCRIPTION
psensor-server is an HTTP server for monitoring hardware sensors remotely.
It provides a JSON Web service which can be used by psensor(1) to monitor remotely the hardware sensors of a computer.
It can provide information about:
* the temperature of the motherboard and CPU sensors (using lm-sensors).
* the temperature of the Hard Disk Drives (using hddtemp).
* the rotation speed of the fans (using lm-sensors).
It is also possible to connect to the psensor-server with a browser, a simple Web page is displaying the sensors information and the CPU
usage.
The URL http://hostname:3131/api/1.0/sensors/[id] returns a JSON object containing all information about a sensor. [id] is the uniq identi-
fier of the sensor.
Here is an example of the JSON object of type 'sensor':
{ "id": "lmsensor acpitz-virtual-0 temp1",
"name": "temp1",
"type": 257,
"min": 47.800000,
"max": 60.800000,
"measures": [ { "value": 47.800000, "time": 1311374873 },
{ "value": 49.800000, "time": 1311374878 },
{ "value": 49.800000, "time": 1311374883 } ],
"last_measure": { "value": 49.800000, "time": 1311374883 } }
Fields of the type 'sensor':
* id: the uniq identifier of the sensor.
* name: a humean readable name of the sensor (might not be uniq).
* type: the type of sensor. Look at src/lib/psensor.h for the
different types.
* min: the minimal value of the sensor.
* max: the maximal value of the sensor.
* measures: all measures of the sensor.
* last_measure: the last value of the sensor.
* time: the time of a measure as the number of seconds since
1970/01/01.
The URL http://hostname:3131/api/1.0/sensors returns a JSON array containing all JSON objects of type 'sensor'.
If run in debug mode, psensor-server can be stopped by sending an HTTP request with the URL 'http://hostname:port/api/1.0/server/stop'.
OPTIONS -h, --help
display this help and exit
-v, --version
display version information and exit
-d,--debug
run in debug mode
-p,--port=PORT
webserver port
-w,--wdir=DIR
directory containing webserver pages
WARNING
psensor-server does not provide any way to restrict the connection to the HTTP server, worst, no effort has been made against malicious
HTTP attacks. You should make the psensor-server port available only to a network or computer you trust by using the usual network secu-
rity tools of the system (for example, iptables(8) ).
REPORTING BUGS
Report bugs to: jeanfi@gmail.com
psensor home page: <http://wpitchoune.net/psensor>
COPYRIGHT
Copyright (C) 2010-2012 jeanfi@gmail.com License GPLv2: GNU GPL version 2 or later <http://www.gnu.org/licenses/old-licenses/gpl-2.0.html>
This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law.
SEE ALSO psensor(1), sensors(1), sensors-detect(8)psensor-server 0.6.2.17 March 2012 PSENSOR-SERVER(1)