14%
30.11.2025
dh_group modp1024;
09 }
10 generate_policy off;
11 }
12
13 sainfo address 192.168.2.0/24 any address 172.16.0.0/16 any {
14 pfs_group modp1024;
15 encryption_algorithm aes256;
16
14%
25.03.2020
/server/node-token
K10fc63f5c9923fc0b5b377cac1432ca2a4daa0b8ebb2ed1df6c2b63df13b092002::server:bf7e806276f76d4bc00fdbf1b27ab921
API Token
Make sure you note the API token correctly or you might see the error
13%
30.11.2025
the Buffer
01 [global]
02 ioengine=libaio
03 direct=1
04 filename=testfile
05 size=2g
06 bs=4m
07
08 refill_buffers=1
09
10 [write]
11 rw=write
12 write_bw_log
13
14 [read]
15 stonewall
16 rw=read
17 write
13%
25.10.2011
authentication_algorithm pre_shared_key;
08 dh_group modp1024;
09 }
10 generate_policy off;
11 }
12
13 sainfo address 192.168.2.0/24 any address 172.16.0.0/16 any {
14 pfs_group modp1024;
15
13%
09.01.2013
[12]. The Linux world also has tools for treating Amazon S3 as an rsync target. The best-known tool is probably boto_rsync [13], a Python tool that uses rsync to sync from a local directory to an S3
13%
28.11.2021
can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection" [1], has been written up in a number of books. Linux Magazine
reported more than 12 years ago [2
13%
04.08.2020
// (c) 2020 by Federico Lucifredi
04
05 #include
06 #include
07 #include
08 #include
09 #include
10 #include
11 #include
12
13
13%
17.06.2017
real :: diameter
08 real :: radius
09 real :: area
10 end type meta_data
11
12 contains
13 subroutine meta_comp(r, item)
14 type(meta_data) :: item
15 item%diameter = 2
13%
17.06.2017
-load = group_replication=group_replication.so
11 group_replication_group_name = "aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaabcdef"
12 group_replication_start_on_boot = on
13 group_replication_group_seeds = "192
13%
04.11.2011
width;
09 uint height;
10 float *data;
11 } convolutionKernel;
12
13
14 /**
15 * Clamp value to limits of uchar.
16 */
17 uchar clampuchar(int value)
18 {
19 return (uchar) std