Monday, September 11, 2017
Hi everybody! welcome back to war !!!! so we want to writerun a code that uploads an image to docker...
// start all services required for the build
// that will get linked to the container.
for _, service := range b.Build.Services {
// Parse the name of the Docker image
// And then construct a fully qualified image name
owner, name, tag := parseImageName(service)
cname := fmt.Sprintf("%s/%s:%s", owner, name, tag)
// Get the image info
img, err := b.dockerClient.Images.Inspect(cname)
if err != nil {
// Get the image if it doesn't exist
if err := b.dockerClient.Images.Pull(cname); err != nil {
return fmt.Errorf("Error: Unable to pull image %s", cname)
}
img, err = b.dockerClient.Images.Inspect(cname)
if err != nil {
return fmt.Errorf("Error: Invalid or unknown image %s", cname)
}
}
// debugging
log.Infof("starting service container %s", cname)
// Run the contianer
run, err := b.dockerClient.Containers.RunDaemonPorts(cname, img.Config.ExposedPorts)
if err != nil {
return err
}
// Get the container info
info, err := b.dockerClient.Containers.Inspect(run.ID)
if err != nil {
// on error kill the container since it hasn't yet been
// added to the array and would therefore not get
// removed in the defer statement.
b.dockerClient.Containers.Stop(run.ID, 10)
b.dockerClient.Containers.Remove(run.ID)
return err
}
// Add the running service to the list
b.services = append(b.services, info)
}
https://searchcode.com/codesearch/view/86051745/
Sunday, September 10, 2017
Address: 79.169.234.130 01001111.10101001.11101010 .10000010 Netmask: 255.255.255.0 = 24 11111111.11111111.11111111 .00000000 Wildcard: 0.0.0.255 00000000.00000000.00000000 .11111111 => Network: 79.169.234.0/24 01001111.10101001.11101010 .00000000 (Class A) Broadcast: 79.169.234.255 01001111.10101001.11101010 .11111111 HostMin: 79.169.234.1 01001111.10101001.11101010 .00000001 HostMax: 79.169.234.254 01001111.10101001.11101010 .11111110 Hosts/Net: 254
3vilTwinAttacker - Create Rogue Wi-Fi Access Point and Snooping on the Traffic
This tool create an rogue Wi-Fi access point , purporting to provide wireless Internet services, but snooping on the traffic.
Software dependencies:
- Recommended to use Kali linux.
- Ettercap.
- Sslstrip.
- Airbase-ng include in aircrack-ng.
- DHCP.
- Nmap.
Saturday, September 9, 2017
the islamic state is problem for us boolean. the more they are "given" the opportunity of striking, the more powerfull the "system" gets. the stupid good cop, shoots them down, and the secret service leaks an information about another plan, convinetly, and then bingo...another political victory! the "system" is obedient. courts, police, entiry armies. obdient. they have the "constitucion"! we don't own the media, they do. . Any email with the CIA's vice with number 2 ISIS man at Beirute, is ignored. armament dealers, do their business, Tancos robbering, one of both, or Greek confusion, or Iran target! ISIS quit Mossul, the "system" decided to go to Iran. Maybe striking Saudi Arabia computation...to get advantage over them. Russia plays along, even warns the US for litle assassination plots against american ambassadors; they do it, right here, at Lisbon. Cicada . Who are they?
How to cause kernel panic with a single command?
compile the following code into a module and insmod it, sure you should get a panic:
static int crash_module_init(void)
{
printf("crash module starting\n");
int *p = 0;
printk("%d\n", *p);
return 0;
}
static void crash_module_exit(void)
{
printf("crash module exiting\n");
}
module_init(crash_module_init);
module_exit(crash_module_exit);
"FORK" the opening exit of notes
electronic forceps to pull the roll carpet
this is a laraoscopy surgery instrument...as you see has the forceps, and the cable is flexible plastic.
complement the idea may be with some air spray gear...endoscopy spray probe...this one is good for accessing the ATM, by the card entrancy , and electric cut circuit
Subscribe to:
Posts (Atom)