Search results

Jump to navigation Jump to search

Page title matches

Page text matches

  • ...(AIDE) is a host-based intrusion detection system (HIDS) for checking the integrity of files. It does this by creating a baseline database of files on an initi AIDE only does file integrity checks. It does not check for rootkits or parse logfiles for suspicious act
    3 KB (487 words) - 07:16, 29 June 2021
  • === Integrity constraint violation: 1062 Duplicate entry '1' for key 'ttrss_feeds_feed_ur
    5 KB (746 words) - 13:51, 23 August 2021
  • In the early days where no integrity check was done on link level these files proved useful since one could sele ...eating {{ic|par2}} files you have a much more convenient way to verify the integrity of your data and restore the data than running application programs over th
    6 KB (1,060 words) - 17:14, 5 May 2021
  • ...different repositories and architectures will be updated at once. A simple integrity check is run before any repository is touched.
    2 KB (298 words) - 11:07, 5 July 2021
  • Check integrity of the archive:
    2 KB (342 words) - 04:06, 11 August 2021
  • ...e the '''integrity''' of packages, make sure that the [[PKGBUILD#Integrity|integrity variables]] contain correct values. These can be updated using the {{man|8| # '''Checks the integrity''' of source files
    12 KB (1,825 words) - 18:14, 16 September 2021
  • * {{App|Osiris|Tool for monitoring system integrity and changes across a network.|https://launchpad.net/osiris|{{AUR|osiris}}}} ...rce Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and acti
    15 KB (2,051 words) - 08:05, 11 September 2021
  • * {{App|[[AIDE]]|File and directory integrity checker.|http://aide.sourceforge.net/|{{AUR|aide}}}}
    4 KB (511 words) - 11:08, 8 May 2021
  • ...erve the integrity of the blockchain, each block in the chain confirms the integrity of the previous one, all the way back to the first one, using hashing. .... It is called a full node because it obviously verifies the cryptographic integrity of the UTXO set itself. A full node client may or may not also participate
    14 KB (2,230 words) - 15:39, 25 June 2021
  • ...in authentication of DNS data, authenticated denial of existence, and data integrity, but not availability or confidentiality.
    4 KB (572 words) - 10:30, 8 May 2021
  • * 请确保软件包的'''完整性''',确保 [[PKGBUILD#Integrity|校验变量]] 包含正确的数值,可以通过 {ic|updpkgsums}} 工具
    8 KB (463 words) - 05:22, 29 August 2021
  • ...sation and derivation of Arch Linux, we must balance that freedom with the integrity of the Trademarks and the quality which they represent. To help reach that ...os are presented in multiple colours and it is important that their visual integrity be maintained. It is therefore preferable that the logos only be used in th
    11 KB (1,900 words) - 21:45, 18 April 2021
  • ...''makepkg'' as PGP signatures and will be automatically used to verify the integrity of the corresponding source file. ...ecture name, e.g. {{ic|1=source_x86_64=()}}. There must be a corresponding integrity array with checksums, e.g. {{ic|1=sha256sums_x86_64=()}}.
    27 KB (4,128 words) - 12:32, 19 October 2021
  • ...ot the content). While this mode is not widely used/audited yet, it offers integrity protection for the data, a feature not available for direct alternative enc
    5 KB (712 words) - 14:07, 24 August 2021
  • To seed an already downloaded torrent, use the {{ic|--check-integrity}} option: $ aria2c --check-integrity=true --seed-ratio=0.0 --dir="/path/to/iso" "/path/to/torrent/archlinux-2020
    13 KB (1,891 words) - 08:05, 11 September 2021
  • The ''pwck'' command can be used to verify the integrity of the user database. It can sort the user list by GID at the same time, wh == Automatic integrity checks ==
    30 KB (4,738 words) - 18:43, 16 June 2021
  • ...such as a USB stick, external hard drive, or CD-R. Occasionally verify the integrity of the backup process by comparing original files and directories with thei
    6 KB (967 words) - 11:56, 7 October 2020
  • The ''pwck'' command can be used to verify the integrity of the user database. It can sort the user list by GID at the same time, wh The ''grpck'' command can be used to verify the integrity of the system's group files.
    22 KB (1,652 words) - 20:18, 1 August 2021
  • Then, copy the kernel image to the new root, in order to keep the integrity of the new system:
    6 KB (986 words) - 17:58, 19 September 2021
  • ...igned] [[kernel modules]] provide a mechanism for the kernel to verify the integrity of a module.
    8 KB (1,291 words) - 14:34, 6 September 2021

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)