New on LowEndTalk? Please Register and read our Community Rules.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
Comments
Any port will do in a storm.
Packet storm anyone?
More seriously; this thread has ran it's course, let it die plzkthx.
Of course you are talking about penetration tests and SQL injection.
Lawl.
That's turning me on.
Have you tried turning it off and on?
No.
Less overhead.
OpenVZ containerization dying is bad, very bad.
OpenVZ dead + high ipv4 price = a whole hierarchy class of budget low end boxes will be no more
The end is... something.
Been looking at that link.
The list of commands is even more extensive than I thought.
Start hoarding them now then you can profit. The end is at some point in the future.
Yeah.
OVZ will get scarce and prices will skyrocket in the near future.
Technically they're called "applets" rather than "commands", but can we let this thread die plz?
Ok.
I will try.
It doesn't work that way.
Hosts just say:
"dear mister cheapass,
Look buddy, we know you love our low profit margin openvz, but it's time, Old Yeller had to go.
We'll migrate you to our somewhat expensive plan. Backup your data.
Thank you for understanding.
PS: Btw, how is life there in Dumbfuckistan? Do You people even know what hot water is?
Worst Regards,
Your lovely host"
You forgot one major point: It uses a 10-year-old kernel version (2.6.32), and the new OpenVZ version that people might migrate to is using a newer version (3.10) that's already EOL'd, so it's going to be obsolete as soon as it rolls out.
Please don't do this! There's lots of stuff in /proc that regular users should not be able to touch (like the environment of other user's processes, as passwords and access tokens are often passed as environment variables), so you shouldn't mess with the permissions of the entire thing.
suid/sgid does not work on scripts (anything starting with !# actually)
More info https://unix.stackexchange.com/questions/364/allow-setuid-on-shell-scripts
Correct and I mentioned it is questionable from a security standpoint.
Although it will do what the OP requested.
With a price though.
In general, files in /bin should not be replaceable by normal users anyway. If the malicious actor is able to change the file, they effectively have root, so the code posted should be fine, if your permissions are set correctly.