Robot | Path | Permission |
GoogleBot | / | ✔ |
BingBot | / | ✔ |
BaiduSpider | / | ✔ |
YandexBot | / | ✔ |
# www.robotstxt.org/ # www.google.com/support/webmasters/bin/answer.py?hl=en&answer=156449 User-agent: * |
Title | Sysa.tech The gates of shell another sysadmin |
Description | Fortinet Check HA Some useful commands and articles for sysadmins, it cover linux mysql mongodb ssh archlinux |
Keywords | sysadmin linux mysql ssh bash archlinux |
WebSite | sysa.tech |
Host IP | 195.154.242.41 |
Location | France |
Site | Rank |
US$344,206
Last updated: 2023-05-14 10:37:04
sysa.tech has Semrush global rank of 30,749,915. sysa.tech has an estimated worth of US$ 344,206, based on its estimated Ads revenue. sysa.tech receives approximately 39,717 unique visitors each day. Its web server is located in France, with IP address 195.154.242.41. According to SiteAdvisor, sysa.tech is safe to visit. |
Purchase/Sale Value | US$344,206 |
Daily Ads Revenue | US$318 |
Monthly Ads Revenue | US$9,532 |
Yearly Ads Revenue | US$114,383 |
Daily Unique Visitors | 2,648 |
Note: All traffic and earnings values are estimates. |
Host | Type | TTL | Data |
sysa.tech. | A | 298 | IP: 195.154.242.41 |
sysa.tech. | NS | 3600 | NS Record: dns200.anycast.me. |
sysa.tech. | NS | 3600 | NS Record: ns200.anycast.me. |
sysa.tech. | MX | 3600 | MX Record: 10 mail.c0re.me. |
sysa.tech. | MX | 3600 | MX Record: 200 mail2.c0re.me. |
sysa.tech. | TXT | 3600 | TXT Record: v=spf1 a mx ip4:51.158.146.216 ip4:195.154.233.74 ip4:195.154.242.41 ip4:195.154.225.66 ip4:51.159.67.159 -all |
sysa.tech. | TXT | 3600 | TXT Record: google-site-verification=x6ms5cjb3zzsUQ5_eUJcaIjmQmM_na2UV4LBQIeFJhw |
Toggle navigation Sysa.tech : The Gates Of Shell Links Online private office tools Online Drawing Application Whats my IP ? Anonymous Login Register Fortinet Check HA Status config global get sys ha status Auteur : Harlok 2022-08-09 11:36:58 How to dump the memory of a process linux #!/bin/bash grep rw-p /proc/$1/maps \ | sed -n ’s/^\([0-9a-f]*\)-\([0-9a-f]*\) .*$/\1 \2/p’ \ | while read start stop; do \ gdb --batch --pid $1 -ex \ "dump memory $1-$start-$stop.dump 0x$start 0x$stop"; \ done put this in a file (eg. "dump-all-memory-of-pid.sh") and make it executable usage: ./dump-all-memory-of-pid.sh [pid] The output is printed to files with the names: pid-startaddress-stopaddress.dump Dependencies: gdb get the pid of your process pgrep -uroot process dump the process’s memory mkdir /tmp/process_dump && cd /tmp/process_dump sh /path/to/dump-all-memory-of-pid.sh [pid] Done Auteur : Harlok 2020-11-18 10:37:19 Some bash programming helpers how to and expressions if z var e var : |
google.com, pub-7936815167150478, DIRECT, |
HTTP/1.1 301 Moved Permanently Content-Type: text/html; charset=utf-8 Location: https://sysa.tech/ Date: Thu, 23 Dec 2021 06:55:08 GMT HTTP/2 200 cache-control: no-cache, private content-type: text/html; charset=UTF-8 date: Thu, 23 Dec 2021 06:55:08 GMT server: Apache/2.4.46 (Unix) strict-transport-security: max-age=315360000; includeSubDomains; preload x-content-type-options: nosniff x-frame-options: DENY x-xss-protection: 1; mode=block |
Domain Name: SYSA.TECH Registry Domain ID: D99357974-CNIC Registrar WHOIS Server: whois.ovh.com Registrar URL: http://www.ovh.com Updated Date: 2021-12-22T01:33:22.0Z Creation Date: 2019-04-09T12:22:26.0Z Registry Expiry Date: 2022-04-09T23:59:59.0Z Registrar: OVH Registrar IANA ID: 433 Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited Registrant Organization: Harloksystem Registrant Country: FR Name Server: DNS200.ANYCAST.ME Name Server: NS200.ANYCAST.ME DNSSEC: signedDelegation Registrar Abuse Contact Email: registry.default.admin@domain.ovh.net Registrar Abuse Contact Phone: +33.974530814 >>> Last update of WHOIS database: 2021-12-26T15:29:48.0Z <<< |