← All posts tagged Make-Armenia-Great-Again

Ilya-S-Zharskiy
пидорский_твиттор Дональд_Трамп social-mefia free-of-speech швабода_шлова права_еврейского_человека права_[еврейского]_человека Трампа зобанели в пидорском Твитторе пидорские каклы. Мудераторы-биороботы фильтруют ему контент.

Надо ему быстрей перекатываться в расово-верный православный жуйк

According to reports the White House has a drafted an executive order to address social media censorship by targeting Section 230 of the CDA. This is bad, very bad. It’s easy to get excited that action is finally being taken against the Silicon Valley oligarchs, but this isn’t the right solution.

Section 230 protects American companies from foreign authorities with far less liberal speech regimes than our own. Using executive power to water down Section 230 is a horrible idea and will inevitably harm alternative technology startups like Gab in the long run.

Removing immunity from a publishing platform, like Gab or Twitter, would result in worse outcomes for free speech than simply doing nothing and letting the market sort things out. In fact, it would only likely lead to regulatory capture for Big Tech making them even more powerful. As a philosophical matter: in the United States the government has no business patrolling anyone’s biases and thoughts, whether they be individuals at a protest or individuals working together as a corporation.

In a free country a corporation should be free to be biased. Apple censors music to comply with Chinese Communists. Twitter lets Pakistan tell it what users around the world, including Americans, can and can’t say.

reclaimthenet.org
Ilya-S-Zharskiy
DNS nslookup getent ahosts nsswitch.conf gethostbyname getaddrinfo resolvectl закрыть тему

а то с 2011 года поднадоела
читайте маны, у кого плохо с английским — читайте учебник английского

Resolve IP адресов в Linux: понятное и детальное описание
habr.com m.habr.com

wiki.archlinux.org

the traditional tool for doing host name lookups is nslookup from bind, but it is being replaced with dig. both tools are dns speciffic and don't use nsswitch. getent hosts uses nsswitch, but much less used superuser.com

man7.org
manpages.debian.org
unix.stackexchange.com
unix.stackexchange.com
superuser.com
unix.stackexchange.com
unix.stackexchange.com
unix.stackexchange.com
unix.stackexchange.com
unix.stackexchange.com
unix.stackexchange.com
unix.stackexchange.com

When one or more key arguments are provided, pass each key to gethostbyaddr(3) or gethostby‐name2(3), depending on whether a call to inet_pton(3) indicates that the key is an IPv6 or IPv4 address or not, and display the result.

ahosts
When no key is provided, use sethostent(3), gethostent(3), and endhostent(3) to enumerate the hosts database. This is identical to using hosts. When one or more key argu‐ ments are provided, pass each key in succession to getad‐ drinfo(3) with the address family AF_UNSPEC, enumerating each socket address structure returned

check /etc/nsswitch.conf to make sure the hosts line contains files when adding manual entries to /etc/hosts doesn't fix it
Ilya-S-Zharskiy
Cisco eBook детектив CCNP SECOPS gen.lib.rus.ec

ISBN-13: 978-1587052569
ISBN-10: 1587052563

LAN Switch Security: What Hackers Know About Your Switches — A practical guide to hardening Layer 2 devices and stopping campus network attacks


Contrary to popular belief, Ethernet switches are not inherently secure. Security vulnerabilities in Ethernet switches are multiple: from the switch implementation, to control plane protocols (Spanning Tree Protocol [STP], Cisco® Discovery Protocol [CDP], and so on) and data plane protocols, such as Address Routing Protocol (ARP) or Dynamic Host Configuration Protocol (DHCP). LAN Switch Security explains all the vulnerabilities in a network infrastructure related to Ethernet switches. Further, this book shows you how to configure a switch to prevent or to mitigate attacks based on those vulnerabilities. This book also includes a section on how to use an Ethernet switch to increase the security of a network and prevent future attacks.


Divided into four parts, LAN Switch Security provides you with steps you can take to ensure the integrity of both voice and data traffic traveling over Layer 2 devices. Part I covers vulnerabilities in Layer 2 protocols and how to configure switches to prevent attacks against those vulnerabilities. Part II addresses denial-of-service (DoS) attacks on an Ethernet switch and shows how those attacks can be mitigated. Part III shows how a switch can actually augment the security of a network through the utilization of wirespeed access control list (ACL) processing and IEEE 802.1x for user authentication and authorization. Part IV examines future developments from the LinkSec working group at the IEEE. For all parts, most of the content is vendor independent and is useful for all network architects deploying Ethernet switches.


After reading this book, you will have an in-depth understanding of LAN security and be prepared to plug the security holes that exist in a great number of campus networks.



Use port security to protect against CAM attacks

Prevent spanning-tree attacks

Isolate VLANs with proper configuration techniques

Protect against rogue DHCP servers

Block ARP snooping

Prevent IPv6 neighbor discovery and router solicitation exploitation

Identify Power over Ethernet vulnerabilities

Mitigate risks from HSRP and VRPP

Stop information leaks with CDP, PaGP, VTP, CGMP and other Cisco ancillary protocols

Understand and prevent DoS attacks against switches

Enforce simple wirespeed security policies with ACLs

Implement user authentication on a port base with IEEE 802.1x

Use new IEEE protocols to encrypt all Ethernet frames at wirespeed.


This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

i.imgur.com

Ilya-S-Zharskiy
Python code pip3
The following NEW packages will be installed:
  binutils binutils-common binutils-x86-64-linux-gnu build-essential cpp cpp-7 dpkg-dev fakeroot g++ g++-7
  gcc gcc-7 libalgorithm-diff-perl libalgorithm-diff-xs-perl libalgorithm-merge-perl libasan4 libatomic1
  libbinutils libc-dev-bin libc6-dev libcc1-0 libcilkrts5 libdpkg-perl libexpat1-dev libfakeroot
  libfile-fcntllock-perl libgcc-7-dev libgomp1 libisl19 libitm1 liblsan0 libmpc3 libmpx2 libpython-all-dev
  libpython-dev libpython2.7-dev libquadmath0 libstdc++-7-dev libtsan0 libubsan0 linux-libc-dev make
  manpages-dev python-all python-all-dev python-dbus python-dev python-gi python-keyring
  python-keyrings.alt python-pip python-pip-whl python-secretstorage python-wheel python-xdg python2.7-dev
0 upgraded, 56 newly installed, 0 to remove and 55 not upgraded.
Need to get 68.0 MB of archives.
After this operation, 208 MB of additional disk space will be used.

/хороший пакетный менеджер
/и  зависимости интересные
Ilya-S-Zharskiy
дерьмократия швабода цЫвилизованные_сраны armed-law-enforcement-agencies authorized-to-make-arrests ну что, давно не постил мою любимую картинку

со сравнением швабоды-дерьмократии с тоталитаризьмом


In September 2008, federal agencies employed approximately 120,000
full-time law enforcement officers who were
authorized to make arrests and carry firearms in the United States.
The four largest agencies, two in the Department of Homeland Security (DHS)
and two in the Department of Justice (DOJ), employed 4 in 5 federal officers.

bjs.gov
Full-Time Employees in Law Enforcement Agencies, 1997-2016

pp.userapi.com

Ilya-S-Zharskiy
макоёбы хипсторы гейбуки twitter.com

<blockquote class="twitter-video" data-lang="en"><p lang="en" dir="ltr">Side note, as ridiculous (ly amazing) as Doom is running on the Touch Bar is… the HUD is equally great <a href="https://t.co/RFwq7nJ7ae">pic.twitter.com/RFwq7nJ7ae</a></p>&mdash; Adam Bell (@b3ll) <a href="https://twitter.com/b3ll/status/800472338496036864">November 20, 2016</a></blockquote>
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

twitter.com

Ilya-S-Zharskiy
Chromium Firefox говно Opera-Presto нормальный_браузер msdn.microsoft.com

Unable to complete secure transaction

You tried to access the address
msdn.microsoft.com which is currently
unavailable. Please make sure that the web address (URL) is correctly spelled
and punctuated, then try reloading the page.

Secure connection: fatal error (51) from server.

msdn.microsoft.com

Transmission failure.

Похоже, что убили окончательно :-(

З.Ы. Я на Линупсе, есличё

Ilya-S-Zharskiy
google_заебал долбоёбы-в-google Ребята реально ожидают, что я помню ответ на секретный вопрос из 2004 г.

А я помню только логин с паролем и "захожу из необычного места"


The information provided does not match our records. Try signing in from a location where you usually sign in (e.g., home or work) and fill out the account information again.