Security
- Liberte/Securite
- Be brave even if your not
- TLS HTTPS - Explained
- Nmap port 22
nmap --script ssh* -p 22 192.168.0.1
- Fixing CVE's and packaging with upstream
- Crowdstrike null point
- Decentralized system
- IT Security videos
- Selinux alow rsyslog port
semanage port -l
semanage port -a -t syslogd_port_t -p tcp 9514
- Crowdstrike
7/18/24 10:20PM PT - Hello everyone - We have widespread reports of BSODs on windows hosts, occurring on multiple sensor versions. Investigating cause. TA will be published shortly. Pinned thread.
SCOPE: EU-1, US-1, US-2 and US-GOV-1
Edit 10:36PM PT - TA posted: https://supportportal.crowdstrike.com/s/article/Tech-Alert-Windows-crashes-related-to-Falcon-Sensor-2024-07-19
Edit 11:27 PM PT:
CrowdStrike Engineering has identified a content deployment related to this issue and reverted those changes.
Workaround Steps:
Boot Windows into Safe Mode or the Windows Recovery Environment
Navigate to the C:\Windows\System32\drivers\CrowdStrike directory
Locate the file matching “C-00000291*.sys”, and delete it.
Boot the host normally.
- Linux get semaphores of processes:
ipcs -s|awk '/java/{ print $2 }'ipcs -s|awk '/java/{ print $2 }'|wc -l15
-





Comentarii
Trimiteți un comentariu