p -E 'expr'</td><td>Search 'expr' in this dir and below. See also <a href="scripts/findrepo">findrepo</a>... h all regular files for 'example' in this dir and below</td></tr>
<tr><td> </td><td class="nw">fin... ar.bz2</td><td>Make archive of subset of dir/ and below</td></tr>
<tr><td> </td><td class="nw">fin... --parents</td><td>Make copy of subset of dir/ and below</td></tr>
<tr><td> </td><td class="nw">( t
in the list that blocks a similar allow statement below it. The final http_access statement denies everyt... ort the Squid Transparent Proxy ===
The examples below are based on the discussion of Linux iptables in ... r you particular network topology.
In both cases below, the firewall is connected to the Internet on int
HELP or ? will display the list of commands shown below.
Most XINA commands are common between RFM and ... n is not obvious in what it performs, the listing below will say "(function unknown)" to indicate that I
ick the AP into broadcasting.
* Covered below in WEP Attacks
=== MAC Address filtering ===
... e to create one with another WEP attack explained below: Fake Authentication Attack.
With airodump liste
battery percentage
# (as reported by the UPS) is below or equal to BATTERYLEVEL,
# apcupsd will initiate... inutes
# (as calculated internally by the UPS) is below or equal to MINUTES,
# apcupsd, will initiate a s... ies until either the % charge remaing drops to or below BATTERYLEVEL,
# or the remaining battery runtime drops to or below MINUTES. Of course,
# if you are testing, set