15%
05.12.2016
'^$' | sort -n | uniq -c | awk '$1 >= '${BLOCK_PREFIX_THRESHOLD}' {print $2" "$3}'`
174
175 # echo "${PREFIXES}"
176 for P in $( echo "${PREFIXES}" | awk '{print $2}' ); do
177 DEL_IPS=`echo "${QUERY
15%
02.08.2022
.
The primary changes made to the benchmarks of the latest version 3.4.2 of the NPB are:
added class F to the existing S, W, A, B, C, D, E
added dynamic memory allocation
added MPI and Open
15%
01.08.2019
INPUT
iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -A INPUT -i eth0 -j DROP
iptables -A INPUT -i eth1 -p tcp --dport 22 -j ACCEPT
iptables -A INPUT -i eth1 -j DROP
15%
10.04.2015
Number: 00282-30340-00000-AB9A5
Version: 6.3.9600
The information you read from the operating system can also be formatted and customized. For example, normally only the operating system's most
15%
13.06.2022
Many HPC systems check the state of a node
b
efore
running a
n
application, but not very many check that the
performance
of the node is acceptable before running the job.
... made to the benchmarks of the latest version 3.4.2 of the NPB are:
added class F to the existing S, W, A, B, C, D, E
added dynamic memory allocation
added MPI and OpenMP programming models ...
Many HPC systems check the state of a node
b
efore
running a
n
application, but not very many check that the
performance
of the node is acceptable before running the job.
15%
03.04.2024
64ae120c27e504088d8c2ce29a0fa7f85c
The example code in Listing 2 uses Python to demonstrate how to use the API to retrieve user information. To begin, import the Python Requests API and define the URL
15%
30.11.2025
: " . $password . "\n
";
13 echo "Hash: " . $hashvalue . "\n
";
14
15 // Compare $password with the store has:
16 $passwordfromdb = '$P$9IQRaTwmfeRo7ud9Fh4E2PdI0S3r.L0';
17 // stored hash, would
15%
05.12.2014
of this attack, including a description, walk-through, and exploit is available at Exploit-DB [11].
Over the years, I've made use of a Perl script that reduces very long W3C Apache log entries down to just
15%
18.02.2018
. The required modifications are explained in the Huginn wiki [3].
The software is based on Ruby on Rails [4] and therefore requires an installed Ruby environment; in fact, it needs version 2.2 or 2.3
15%
05.12.2016
as the user name.
Amanda versions before 3.3.9 have a vulnerability that lets this user execute arbitrary code with root privileges. A (manual) upgrade to version 3.3.9 is only necessary if you don't trust