並び順

ブックマーク数

期間指定

  • から
  • まで

1 - 15 件 / 15件

新着順 人気順

stealの検索結果1 - 15 件 / 15件

タグ検索の該当結果が少ないため、タイトル検索結果を表示しています。

stealに関するエントリは15件あります。 securityセキュリティlinux などが関連タグです。 人気エントリには 『CPU Steal Time 入門 - Qiita』などがあります。
  • CPU Steal Time 入門 - Qiita

    Register as a new user and use Qiita more conveniently You get articles that match your needsYou can efficiently read back useful informationYou can use dark themeWhat you can do with signing up

      CPU Steal Time 入門 - Qiita
    • Hackers Steal Wealth of Data from Game Giant EA

      Hacking. Disinformation. Surveillance. CYBER is Motherboard's podcast and reporting on the dark underbelly of the internet. Hackers have broken into gaming giant Electronic Arts, the publisher of Battlefield, FIFA, and The Sims, and stole a wealth of game source code and related internal tools, Motherboard has learned. "You have full capability of exploiting on all EA services," the hackers claime

        Hackers Steal Wealth of Data from Game Giant EA
      • Zoom Lets Attackers Steal Windows Credentials, Run Programs via UNC Links

        HomeNewsSecurityZoom Lets Attackers Steal Windows Credentials, Run Programs via UNC Links Zoom Lets Attackers Steal Windows Credentials, Run Programs via UNC Links The Zoom Windows client is vulnerable to UNC path injection in the client's chat feature that could allow attackers to steal the Windows credentials of users who click on the link. When using the Zoom client, meeting participants can co

          Zoom Lets Attackers Steal Windows Credentials, Run Programs via UNC Links
        • Popular Python and PHP libraries hijacked to steal AWS keys

          PyPI module 'ctx' that gets downloaded over 20,000 times a week has been compromised in a software supply chain attack with malicious versions stealing the developer's environment variables. The threat actor even replaced the older, safe versions of 'ctx' with code that exfiltrates the developer's environment variables, to collect secrets like Amazon AWS keys and credentials. Additionally, version

            Popular Python and PHP libraries hijacked to steal AWS keys
          • Malicious Microsoft VSCode extensions steal passwords, open remote shells

            HomeNewsSecurityMalicious Microsoft VSCode extensions steal passwords, open remote shells Malicious Microsoft VSCode extensions steal passwords, open remote shells Cybercriminals are starting to target Microsoft's VSCode Marketplace, uploading three malicious Visual Studio extensions that Windows developers downloaded 46,600 times. According to Check Point, whose analysts discovered the malicious

              Malicious Microsoft VSCode extensions steal passwords, open remote shells
            • LastPass: DevOps engineer hacked to steal password vault data in 2022 breach

              HomeNewsSecurityLastPass: DevOps engineer hacked to steal password vault data in 2022 breach LastPass revealed more information on a "coordinated second attack," where a threat actor accessed and stole data from the Amazon AWS cloud storage servers for over two months. LastPass disclosed a breach in December where threat actors stole partially encrypted password vault data and customer information

                LastPass: DevOps engineer hacked to steal password vault data in 2022 breach
              • Russia says its businesses can steal patents from anyone in ‘unfriendly’ countries

                Russia has effectively legalized patent theft from anyone affiliated with countries “unfriendly” to it, declaring that unauthorized use will not be compensated. The decree, issued this week, illustrates the economic war waged around Russia’s invasion of Ukraine, as the West levies sanctions and pulls away from Russia’s huge oil and gas industry. Russian officials have also raised the possibility o

                  Russia says its businesses can steal patents from anyone in ‘unfriendly’ countries
                • Popular 'coa' NPM library hijacked to steal user passwords

                  Popular npm library 'coa' was hijacked today with malicious code injected into it, ephemerally impacting React pipelines around the world. The 'coa' library, short for Command-Option-Argument, receives about 9 million weekly downloads on npm, and is used by almost 5 million open source repositories on GitHub. Hours after this discovery, another commonly used npm component 'rc' was also found to ha

                    Popular 'coa' NPM library hijacked to steal user passwords
                  • CPU Steal Time 入門

                    CPU Steal Time に関しては、多くの誤解が広がっているように思えます。例えば、同一ホスト上で稼働する他の VM が、本来自分に割り当てられるべきCPUリソースを盗んだ量を示すメトリクスだとか、CPUリソースの取り合いが発生していることを示すメトリクスだとか、など。設定などによっては、仮想環境側が CPU リソースを過剰に割り当ててしまう傾向にあるのは事実なのですが、CPU Steal Time を見るだけでは端的に "盗まれた" などという結論にいたることはできません。 CPU Steal Time とは、仮想マシンが割り当てられる CPU リソース以上のパフォーマンスを発揮しようとしている分を 計上したメトリクスであると言えます。本来であれば、Steal Timeという名前ではなくて、kernel/sched/cputime.cにのコメントにあるように、involuntary

                      CPU Steal Time 入門
                    • Google's 3-Word Plan to Help Employees Avoid Burnout Is So Simple You Should Steal It

                      Google's 3-Word Plan to Help Employees Avoid Burnout Is So Simple You Should Steal ItSometimes the easiest way to help your team get more done is to stop interrupting them with meetings. Working remotely has been a challenge, to say the least. It has forced companies, individuals, and families to change the way they work--and more importantly, how they balance that work with everything else. Right

                        Google's 3-Word Plan to Help Employees Avoid Burnout Is So Simple You Should Steal It
                      • Android malware can steal Google Authenticator 2FA codes

                        Security researchers say that an Android malware strain can now extract and steal one-time passcodes (OTP) generated through Google Authenticator, a mobile app that's used as a two-factor authentication (2FA) layer for many online accounts. Google launched the Authenticator mobile app in 2010. The app works by generating six to eight-digits-long unique codes that users must enter in login forms wh

                          Android malware can steal Google Authenticator 2FA codes
                        • Joaquin Phoenix's Oscars speech in full: 'We feel entitled to artificially inseminate a cow and steal her baby'

                          This video has been removed. This could be because it launched early, our rights have expired, there was a legal issue, or for another reason.

                            Joaquin Phoenix's Oscars speech in full: 'We feel entitled to artificially inseminate a cow and steal her baby'
                          • Linux での CPU 使用率の steal (st) 値 - 元RX-7乗りの適当な日々

                            ※ このエントリは、はてなグループ終了に伴う、サブブログからの引越エントリ(2009/09)です。 ※ 情報が古い可能性もありますので、ご留意ください。 top とか vmstat で眺めていると st (steal) という項目がある。 これは、kernel 2.6.16.21 以降で新しく加わった項目で、ゲスト OS がリソース要求を行ったにもかかわらず、CPU リソースを割り当ててもらえなかった時間の割合らしい。 ●steal値で把握できるCPUリソースの状況 この状態は、vmstatコマンドを使えば容易に確認できます。usr列、sys列の値が合計で50%までしか上昇せず、代わりにsteal列に残りの50%近い値が表示されると思います。 steal列には、ゲストOSがリソース要求を行ったにもかかわらずCPUリソースを割り当ててもらえなかった時間の割合が表示されます。steal列に 0

                              Linux での CPU 使用率の steal (st) 値 - 元RX-7乗りの適当な日々
                            • Fortinet confirms data breach after hacker claims to steal 440GB of files

                              HomeNewsSecurityFortinet confirms data breach after hacker claims to steal 440GB of files Cybersecurity giant Fortinet has confirmed it suffered a data breach after a threat actor claimed to steal 440GB of files from the company's Microsoft Sharepoint server. Fortinet is one of the largest cybersecurity companies in the world, selling secure networking products like firewalls, routers, and VPN dev

                                Fortinet confirms data breach after hacker claims to steal 440GB of files
                              • New TPM 2.0 flaws could let hackers steal cryptographic keys

                                The Trusted Platform Module (TPM) 2.0 specification is affected by two buffer overflow vulnerabilities that could allow attackers to access or overwrite sensitive data, such as cryptographic keys. TPM is a hardware-based technology that provides operating systems with tamper-resistant secure cryptographic functions. It can be used to store cryptographic keys, passwords, and other critical data, ma

                                  New TPM 2.0 flaws could let hackers steal cryptographic keys
                                1

                                新着記事