⇓⇓⇓⇓⇓

https://erlantheca.tk/question.htm 🙉

⇧⇧⇧⇧⇧

 

System requirements WINDOWS Microsoft Windows® 10, 8. 1, 8, 7 with SP1 and latest KB updates installed MAC macOS 10. 15 (Catalina), macOS 10. 14 (Mojave), macOS 10. 13 (High Sierra), macOS 10. 12. x (Sierra), OS X 10. 11. x (El Capitan), OS X 10. 10. x (Yosemite), OS X 10. 9. x (Mavericks) ANDROID Android 4. 0 and higher * (*ESTV AndroidTV 7. 0 and higher) LINUX Debian, RedHat, Ubuntu, OpenSuSe, Fedora, Mandriva and a majority of RPM and DEB distributions.

 

YouTube. TechTV's Leo Laporte and I spend somewhat shy of two hours each week to discuss important issues of personal computer security. Sometimes we'll discuss something that just happened. Sometimes we'll talk about long-standing problems, concerns, or solutions. Either way, every week we endeavor to produce something interesting and important for every personal computer user. (This was not our idea. It was created by a fan of the podcast using GIMP (similar to Photoshop). But as a work of extreme image manipulation, it came out surprisingly well. ) You may download and listen to selected episodes from this page (see below), or subscribe to the ongoing series as an RSS "podcast" to have them automatically downloaded to you as they are produced. To subscribe, use whichever service you prefer... Receive an automatic eMail reminder whenever a new episode is posted here (from). See the section at the bottom of this page.   Send us your feedback: Use the form at the bottom of the page to share your opinions, thoughts, ideas, and suggestions for future episodes.   Leo also produces " This Week in Tech " (TWiT) and a number of other very popular podcasts (TWiT is America's most listened to podcast! ) So if you are looking for more informed technology talk, be sure to check out Leo's other podcasts and mp3 files.   And a huge thanks to AOL Radio for hosting the high-quality MP3 files and providing the bandwidth to make this series possible. We use "local links" to count downloads, but all of the high-quality full-size MP3 files are being served by AOL Radio. Episode #754 | 18 Feb 2020 | 88 min. Episode #753 | 11 Feb 2020 | 101 min. Episode #752 | 04 Feb 2020 | 102 min. Episode #751 | 28 Jan 2020 | 107 min. Episode #750 | 21 Jan 2020 |??? min. Episode #749 | 14 Jan 2020 | 117 min. Episode #748 | 07 Jan 2020 | 118 min. 2019 Archive Below... Episode #747 | 31 Dec 2019 | 108 min. Episode #746 | 23 Dec 2019 | 103 min. Episode #745 | 17 Dec 2019 | 108 min. PlunderVolt This week we start with a reminder about Google's still operating SensorVault, we look inside Google's new "Verified SMS" Messages feature, examine another salvo in the end-to-end encryption war, a nice authentication feature added to iOS v13. 3, some patch Tuesday news, a startling discovery about the weaknesses of RSA at scale, a collection of quick bits about last Friday the 13th, Mozilla 2FA for add-on developers, the surprising hard out for Microsoft's Security Essentials, and two bits about Chrome 79. Then we have a clarification about last week's VPN-geddon Denied discussion, a significant announcement about my new focus, some SQRL news... and then we conclude with a look at yet another interesting new way of compromising Intel processors known as "PlunderVolt". 52 MB 13 MB 227 KB   <-- Show Notes 131 KB 83 KB 323 KB Episode #744 | 10 Dec 2019 | 97 min. Episode #743 | 03 Dec 2019 | 108 min. Android “StandHogg” This week we revisit free upgrades from Win7 or 8 to 10 (which can still be done, a alert for users of HP SSDs, the complications which arise with international privacy treaties when end-to-end encryption might be threatened, the US government's formal permission to hack, a quick look at a particularly devastating Ransomware attack, more anti-tracking privacy happiness coming soon, by default, to Firefox, the never-ending headaches caused by Windows DLLs, an update on my "Joy of Sync" determinations, and a look at the way some Android multitasking features can and are being actively abused -- with Google's knowledge. 326 KB   <-- Show Notes 139 KB 87 KB 355 KB Episode #742 | 26 Nov 2019 | 101 min. Episode #741 | 19 Nov 2019 | 114 min. Episode #740 | 12 Nov 2019 | 118 min. Episode #739 | 05 Nov 2019 | 109 min. Episode #738 | 29 Oct 2019 | 115 min. Episode #737 | 22 Oct 2019 | 121 min. Episode #736 | 15 Oct 2019 | 101 min. Episode #735 | 08 Oct 2019 | 111 min. Episode #734 | 01 Oct 2019 | 108 min. Episode #733 | 24 Sep 2019 | 102 min. Episode #732 | 17 Sep 2019 | 87 min. Episode #731 | 10 Sep 2019 | 101 min. Episode #730 | 03 Sep 2019 | 114 min. Episode #729 | 27 Aug 2019 | 114 min. Episode #728 | 20 Aug 2019 | 114 min. Episode #727 | 13 Aug 2019 | 118 min. Episode #726 | 06 Aug 2019 | 116 min. Episode #725 | 30 Jul 2019 | 103 min. Episode #724 | 23 Jul 2019 | 105 min. Episode #723 | 16 Jul 2019 | 117 min. Episode #722 | 09 Jul 2019 | 110 min. Episode #721 | 02 Jul 2019 | 110 min. Episode #720 | 25 Jun 2019 | 101 min. Episode #719 | 18 Jun 2019 | 117 min. Episode #718 | 11 Jun 2019 | 110 min. Episode #717 | 04 Jun 2019 | 111 min. Episode #716 | 28 May 2019 | 107 min. Episode #715 | 21 May 2019 | 114 min. Episode #714 | 14 May 2019 | 95 min. Episode #713 | 07 May 2019 | 104 min. Episode #712 | 30 Apr 2019 | 100 min. Episode #711 | 23 Apr 2019 | 126 min. Episode #710 | 16 Apr 2019 | 116 min. Episode #709 | 09 Apr 2019 | 129 min. Episode #708 | 02 Apr 2019 | 126 min. Android Security This week we are primarily going to share Google's well-deserved, self-congratulatory, but also very honest update on the status of Android Security at its 10th birthday. But before that we're going to share some of the continuing news of the WinRAR vulnerability, some really interesting data on Russian GPS hacking, Android's April Fools' Day patches, Tesla autopilot spoofing, some follow-up on the ASUS "ShadowHammer" attack and the targeted MAC addresses, the final release of the Windows 10 (last) October 2018 update, a VMware update, a SQRL question, two bits of listener feedback, and a SpinRite development question. Then we take a look at the state of Android 10 years in. 60 MB 15 MB 283 KB   <-- Show Notes 125 KB 93 KB 164 KB Episode #707 | 26 Mar 2019 | 115 min. Episode #706 | 19 Mar 2019 | 115 min. Episode #705 | 12 Mar 2019 | 134 min. Spoiler This week we look at the zero-day exploit bidding war that's underway, the NSA's release of Ghidra, Firefox's addition of privacy enhancements which were first developed for the Tor version of Firefox, a pair of zero-days that were biting people in the wild, news of a worrisome breach at Citrix, the risk of claiming to be an unhackable aftermarket car alarm, a new and interesting "windows developers chatting with users" idea at Microsoft, a semi-solution to Windows updates crashing systems, detailed news of the Marriott/Starwood breach, a bit of miscellany from Elaine, a SpinRite question answered, and then we finish with SPOILER - the latest research exploiting yet another new and different consequence of speculation on Intel machines. 64 MB 16 MB 321 KB   <-- Show Notes 146 KB 100 KB 181 KB Episode #704 | 05 Mar 2019 | 132 min. Careers in Bug Hunting This week we look at a newly available improvement in Spectre mitigation performance being rolled out by Microsoft and who can try it right now, Adobe's ColdFusion emergency and patch, more problems with AV and self-signed certs, a Docker vulnerability being exploited in the wild, the end of Coinhive, a new major Wireshark release, a nifty web browser website screenshot hack, continuing troubles with the over-privileged Thunderbolt interface, bot-based credential stuffing attacks, some SQRL, miscellany, SpinRite, and listener feedback. Then we examine the increasing feasibility of making a sustainable career out of hunting for software bugs. 63 MB 324 KB   <-- Show Notes 138 KB 95 KB 173 KB Episode #703 | 26 Feb 2019 | 96 min. Episode #702 | 19 Feb 2019 | 115 min. Episode #701 | 12 Feb 2019 | 123 min. Episode #700 | 05 Feb 2019 | 110 min. Episode #699 | 29 Jan 2019 | 119 min. Episode #698 | 22 Jan 2019 | 114 min. Episode #697 | 15 Jan 2019 | 93 min. Zerodium This week we examine the intended and unintended consequences of last week's Windows Patch Tuesday; and, speaking of unintended consequences, the U. S. government shutdown has had some, too. We also examine a significant privacy failure in WhatsApp, another ransomware decryptor (with a twist), movement on the DNS over TLS front, an expectation of the cyberthreat landscape for 2019, a cloudy forecast for The Weather Channel App, a successful 51% attack against the Ethereum Classic cryptocurrency, another court reversing compelled biometric authentication, and an update on the lingering death of Flash, now in hospice care. We then look at a bit of miscellany and errata and finish by examining the implications of the recent increase in bounty for the purchase of zero-day vulnerabilities. 434 KB   <-- Show Notes 133 KB 91 KB 170 KB Episode #696 | 08 Jan 2019 | 93 min. •  Current Podcast Page •  Security Now 2017 •  Security Now 2016 •  Security Now 2015 •  Security Now 2014 •  Security Now 2013 •  Security Now 2012 •  Security Now 2011 •  Security Now 2010 •  Security Now 2009 •  Security Now 2008 •  Security Now 2007 •  Security Now 2006 •  Security Now 2005 You can receive an eMail reminder whenever this page is updated with a new Security Now! episode. Click the "Monitor Changes" button to have the highly-regarded "Change Detection" web site monitor this page and send you a note when it changes. Security Now!, SpinRite Testimonials, and other Feedback: Please use GRC's Visitor & Listener FEEDBACK Page where you may easily submit any feedback for Security Now, SpinRite testimonials, suggestions for future Security Now topics or questions & comments for future Listener Feedback episodes. Thank you! Gibson Research Corporation is owned and operated by Steve Gibson.  The contents of this page are Copyright (c) 2016 Gibson Research Corporation. SpinRite, ShieldsUP, NanoProbe, and any other indicated trademarks are registered trademarks of Gibson Research Corporation, Laguna Hills, CA, USA. GRC's web and customer privacy policy. Last Edit: Feb 21, 2020 at 15:44 (2. 94 days ago) Viewed 1, 749 times per day.

前几段的时候,Zookeeper的安装是成功的,也启动成功,但是今天不知道就怎么了,另外一台装突然就一直启动不起来。在‘#’后面的是注释: # 目前所在的位置: [[email protected] bin]$ pwd /home/scidb/zookeeper/zookeeper-3. 4. 8/bin # 在bin的文件下有这些文件: [[email protected] bin]$ ls                  # 接下来启动 [[email protected] bin]$ sudo sh start ZooKeeper JMX enabled by default Using config: /home/scidb/zookeeper/zookeeper-3. 8/bin/.. /conf/ Starting zookeeper... STARTED # 看起来是启动成功了哦,然后我们再来看看是否真的启动成功了。 [[email protected] bin]$ sh status ZooKeeper JMX enabled by default Using config: /home/scidb/zookeeper/zookeeper-3. /conf/ Error contacting service. It is probably not running. # 呵呵,居然没有启动起来。然后我用 尝试启动客户端,结果。。 [[email protected] /alex/data/zoookeeper/zookeeper-3. 12/bin]$. / Connecting to localhost:2181 2018-06-30 18:38:54, 977 [myid:] - INFO [main:[email protected]] - Client rsion=3. 12-e5259e437540f349646870ea94dc2658c4e44b3b, built on 03/27/2018 03:55 GMT 2018-06-30 18:38:54, 985 [myid:] - INFO [main:[email protected]] - Client 2018-06-30 18:38:54, 985 [myid:] - INFO [main:[email protected]] - Client rsion=1. 8. 0_172 2018-06-30 18:38:54, 986 [myid:] - INFO [main:[email protected]] - Client Corporation 2018-06-30 18:38:54, 986 [myid:] - INFO [main:[email protected]] - Client 2018-06-30 18:38:54, 987 [myid:] - INFO [main:[email protected]] - Client ** 2018-06-30 18:38:54, 987 [myid:] - INFO [main:[email protected]] - Client 2018-06-30 18:38:54, 987 [myid:] - INFO [main:[email protected]] - Client mpiler= 2018-06-30 18:38:54, 987 [myid:] - INFO [main:[email protected]] - Client rsion=3. 10. 0-693. 2. el7. x86_64 2018-06-30 18:38:54, 988 [myid:] - INFO [main:[email protected]] - Initiating client connection, connectString=localhost:2181 sessionTimeout=30000 [email protected] 2018-06-30 18:38:55, 012 [myid:] - INFO [main-SendThread(localhost:2181):[email protected]] - Opening socket connection to server localhost/127. 0. 1:2181. Will not attempt to authenticate using SASL (unknown error) Welcome to ZooKeeper! JLine support is enabled 2018-06-30 18:38:55, 123 [myid:] - INFO [main-SendThread(localhost:2181):[email protected]] - Socket error occurred: localhost/127. 1:2181: Connection refused [zk: localhost:2181(CONNECTING) 0] 2018-06-30 18:38:56, 225 [myid:] - INFO [main-SendThread(localhost:2181):[email protected]] - Opening socket connection to server localhost/127. Will not attempt to authenticate using SASL (unknown error) 2018-06-30 18:38:56, 226 [myid:] - INFO [main-SendThread(localhost:2181):[email protected]] - Socket error occurred: localhost/127. 1:2181: Connection refused 2018-06-30 18:38:57, 327 [myid:] - INFO [main-SendThread(localhost:2181):[email protected]] - Opening socket connection to server localhost/127. Will not attempt to authenticate using SASL (unknown error) 2018-06-30 18:38:57, 327 [myid:] - INFO [main-SendThread(localhost:2181):[email protected]] - Socket error occurred: localhost/127. 1:2181: Connection refused 2018-06-30 18:38:58, 428 [myid:] - INFO [main-SendThread(localhost:2181):[email protected]] - Opening socket connection to server localhost/127. Will not attempt to authenticate using SASL (unknown error) 2018-06-30 18:38:58, 429 [myid:] - INFO [main-SendThread(localhost:2181):[email protected]] - Socket error occurred: localhost/127. 1:2181: Connection refused 2018-06-30 18:38:59, 536 [myid:] - INFO [main-SendThread(localhost:2181):[email protected]] - Opening socket connection to server localhost/127. Will not attempt to authenticate using SASL (unknown error) 2018-06-30 18:38:59, 537 [myid:] - INFO [main-SendThread(localhost:2181):[email protected]] - Socket error occurred: localhost/127. 1:2181: Connection refused 2018-06-30 18:39:00, 637 [myid:] - INFO [main-SendThread(localhost:2181):[email protected]] - Opening socket connection to server localhost/127. Will not attempt to authenticate using SASL (unknown error) 2018-06-30 18:39:00, 638 [myid:] - INFO [main-SendThread(localhost:2181):[email protected]] - Socket error occurred: localhost/127. 1:2181: Connection refused [[email protected] /alex/data/zoookeeper/zookeeper-3. 12/bin]$ sh status ZooKeeper JMX enabled by default Using config: /alex/data/zoookeeper/zookeeper-3. 12/bin/.. /conf/ Error contacting service. It is probably not running. [[email protected] /alex/data/zoookeeper/zookeeper-3. 12/bin]$ sudo netstat -anp | grep 2181 [[email protected] /alex/data/zoookeeper/zookeeper-3. 12/bin]$ netstat -ntlp Active Internet connections (only servers) Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name tcp 0 0 0. 0:6379 0. 0:* LISTEN 6136/. /redis-server tcp 0 0 127. 1:9100 0. 0:* LISTEN 31614/node_exporter tcp 0 0 127. 1:9229 0. 0:* LISTEN 31593/gitlab-workho tcp 0 0 127. 1:9168 0. 0:* LISTEN 31582/ruby tcp 0 0 0. 0:8080 0. 0:* LISTEN 1321/java tcp 0 0 127. 1:8082 0. 0:* LISTEN 4440/sidekiq 5. 1. 3 tcp 0 0 127. 1:9236 0. 0:* LISTEN 31570/gitaly tcp 0 0 0. 0:22 0. 0:* LISTEN 15241/sshd tcp 0 0 0. 0:8060 0. 0:* LISTEN 31608/nginx: master tcp 0 0 0. 0:6783 0. 0:* LISTEN 31562/alertmanager tcp 0 0 0. 0:8800 0. 0:* LISTEN 31608/nginx: master tcp 0 0 127. 1:32000 0. 0:* LISTEN 1095/java tcp 0 0 127. 1:8801 0. 0:* LISTEN 31275/unicorn worke tcp 0 0 127. 1:9121 0. 0:* LISTEN 31752/redis_exporte tcp 0 0 127. 1:9090 0. 0:* LISTEN 31704/prometheus tcp 0 0 127. 1:9187 0. 0:* LISTEN 31618/postgres_expo tcp 0 0 127. 1:9093 0. 0:* LISTEN 31562/alertmanager tcp 0 0 127. 1:8005 0. 0:* LISTEN 1321/java tcp 0 0 0. 0:8009 0. 0:* LISTEN 1321/java tcp6 0 0:::6379:::* LISTEN 6136/. /redis-server # 乍一看配置没错啊,我想看看到底2181端口是否被占用。 [[email protected] bin]$ sudo netstat -anp | grep 2181 # 命令没有问题,程序是真的没有启动起来。 # 接下来我在google和百度里看了搜索了许多有关于这个错误的信息。 分别搜索了‘at $()’、 ‘at () ’、‘INFO  [main-SendThread(localhost:2181):[email protected]] - Opening socket connection to server localhost/0:0:0:0:0:0:0:1:2181. Will not attempt to authenticate using SASL (unknown error)’…… 看了很多在 上的回答。。。 我靠,居然都没有用啊,多数都在强调你的配置文件的问题。但是配置都已经看烂了,没有什么问题啊!!! # 好吧,最后我快绝望的我切换成root用户,然后象征性的启动,然后查看状态。 [[email protected] bin]# sh start ZooKeeper JMX enabled by default Using config: /home/scidb/zookeeper/zookeeper-3. STARTED [[email protected] bin]# sh status ZooKeeper JMX enabled by default Using config: /home/scidb/zookeeper/zookeeper-3. /conf/ Mode: standalone # md,你敢信。。。居然好了。。。  操作流程 [[email protected] /alex/data/zoookeeper/zookeeper-3. 12/bin]$ sudo -i [[email protected] ~]$ cd /alex/data/zoookeeper/zookeeper-3. 12/bin/ [[email protected] /alex/data/zoookeeper/zookeeper-3. 12/bin]$ sh start Starting zookeeper... STARTED Mode: standalone tcp 0 0 0. 0:34861 0. 0:* LISTEN 9306/java tcp 0 0 0. 0:2181 0. 0:* LISTEN 9306/java # 然后查看端口占用 [[email protected] /alex/data/zoookeeper/zookeeper-3. 12/bin]$ sudo netstat -anp | grep 2181 tcp 0 0 172. 19. 16. 12:2181 180. 167. 57. 46:1568 ESTABLISHED 9306/java 事情在sudo -i的强大能力下解决了~~.

 

wild, the end an RSS
8 29
8 660