본문 바로가기

전체 글

How to kill zombie process [closed] I launched my program in the foreground (a daemon program), and then I killed it withkill -9, but I get a zombie remaining and I m not able to kill it withkill -9. How to kill a zombie process?If the zombie is a dead process (already killed), how I remove it from the output ofps aux?root@OpenWrt:~# anyprogramd & root@OpenWrt:~# ps aux | grep anyprogram 1163 root 2552 S anyprogramd 1167 root 2552.. 더보기
Valuable business connections – a review for SMEs Valuable business connections – a review for SMEs Businesses of all sizes adopt technology to make them more productive, cost effective or flexible and help them compete. Over the years, the adoption of tools such as mobile phones, wireless laptops, the internet and email have all been driven by such expectations. Small and medium-sized businesses (SMBs) are often at the forefront as it can give.. 더보기
Security of Cisco CallManager-based IP Telephony against Malicious Hacker Attacks Independent Lab Test Report: Security of Cisco CallManager-based IP Telephony against Malicious Hacker Attacks Cisco Systems becomes the first, and to date the only, IP-Telephony vendor to earn Miercom's highest rating of Secure for its proven ability to defend an IP phone system against malicious attack. 더보기
Network Security Visibility and Flow Analysis Network Security Visibility and Flow Analysis A man in the middle attack is one in which the attacker intercepts messages in a public key exchange and then retransmits them, substituting his own public key for the requested one, so that the two original parties still appear to be communicating with each other. The attack gets its name from the ball game where two people try to throw a ball direc.. 더보기