6 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
In bash, you can do something like this:
echo -n "What is your name? " > /dev/tty
read thename < /dev/tty
How can I do the same in python?
I have a python script that has the following content:
import... (2 Replies)
Discussion started by: SkySmart
2. Post Here to Contact Site Administrators and Moderators
Plz help me to hack computer games that is paid ty (1 Reply)
Discussion started by: 09287501067
3. Red Hat
I have a Centos linux box and there is interface connect to internet.
I stop the iptables in this box .
After a few day , I find the linux box have been hacked and install some perl script into the box .
Could anyone tell me how the hacker can login into the centos box without knowing... (1 Reply)
Discussion started by: chuikingman
I have a debian linux VPS and i am wondering how would someone be able to hack into it , in what ways ?
I've asked a more knowledgeable friend and he said the only way someone would be able to get into my VPS is via FTP or SSH, are there some other ways someone can enter my machine ?
I... (18 Replies)
Discussion started by: ParanoiaUser
I'm looking for anti hack software. I want a few types.
1. User monitoring. If anyone tries to login 3 or more times with the wrong info.. that user should be cut off for 15 minutes
2. Permanent IP Blocking - it would be great to have a user friendly/faster method of Permanent IP... (3 Replies)
Discussion started by: patlee
6. UNIX for Dummies Questions & Answers
I am currently working on an issue where i should write a program which utilizes Cpu as specified by the user. The function should be provided with an argument ( how much percentage of CPU has to be utilized by the process ) for example CPU(75) should utilize 75% of CPU. The function... (11 Replies)
Discussion started by: nerdychandru