(Apr 28) It has been discovered that Tor, a connection-based low-latency anonymous communication system, contains a protocol-list handling bug that could be used to remotely crash directory authorities with a null-pointer exception (TROVE-2018-001).
(Apr 28) Multiple vulnerabilities have been discovered in the image loading library for Simple DirectMedia Layer 1.2, which could result in denial of service or the execution of arbitrary code if malformed image files are opened.
(Apr 29) An update is now available for Red Hat OpenShift Container Platform 3.2. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from
(Apr 29) An update is now available for Red Hat OpenShift Container Platform 3.1. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from
The ls command is used to list the contents of a directory. Using the flags you can change the format of the output to show the information that you need. If you use just the ls command you get a normal list of files in the directory that you are in. If you add the -lah flags, it now shows you not only the name of the files, but the permissions, the ownership, the group ownership, file size, last modified date and time. This is one of the most common commands I use on a daily basis.
Synopsis
ls [OPTION]… [FILE]…
Examples
ls /root
ls -lah /root
ls tempdir/
Common Flags
-l use a long listing format
-h, –human-readable with -l, print sizes in human readable format (e.g., 1K 234M 2G)
-C list entries by columns
-a, –all do not ignore entries starting with .
-i, –inode print the index number of each file
Check out the full man page for ls