30%
18.06.2014
( 0.05%) ( 0.05% cumulative)
[ 1- 2 days]: 0 ( 0.00%) ( 0.05% cumulative)
[ 2- 4 days]: 4675 ( 1.20%) ( 1.25% cumulative)
[ 4- 7 days]: 215 ( 0.06%) ( 1.31% cumulative)
[ 7- 14
30%
09.04.2019
in mv
ubuntu@aws:~/slow-mv$ strace -t mv 3GB.copy 3GB
19:00:09 execve("/bin/mv", ["mv", "3GB.copy", "3GB"], 0x7ffd0e7dddf8 /* 21 vars */) = 0
19:00:09 brk(NULL) = 0x55cd7d1ce000
30%
25.02.2013
)
01/31/2013 _i686_ (1 CPU)01/31/2013 09:56:01 AM
avg-cpu: %user %nice %system %iowait %steal %idle
14.78 0.38 3.47 2.16 0.00 79.21
Device: rrqm/s wrqm
27%
04.12.2024
"],
08 "serviceHistory": [
09 {
10 "date": "2023-01-15",
11 "serviceType": "Oil change",
12 "dealer": "BMW Service Center"
13 },
14 {
15 "date": "2023-06-20",
16
27%
05.08.2024
= [size][size]int {{0},{0},}
08
09 for i := 0; i < size; i++ {
10 for j := 0; j < size; j++ {
11 array[i][j]++
12 }
13 }
14
15
26%
11.04.2016
Access
Match _REQUEST(=|\[|\%[0-9A-Z]{0,2}) DenyAccess
Match ^/index\.php Return
RequestURI exists Return
Match .* Rewrite /index.php
}
VirtualHost {
Hostname = www.thisisagreatwebsite.com
25%
05.02.2019
.0), (2, 2017, 0.0), (3, 2017, 100.00);
12 SQL> INSERT INTO customer
13 VALUES (1, 2018, 400.0), (2, 2018, 0.0), (3, 2018, 0.0);
14
15 SQL> SELECT * FROM customer;
16 +---+------+---------+
17 | id| year
24%
21.08.2014
} 'a'..'c';
12
13 $s .= $one;
14 $s .= $two;
15 $s .= $three;
16
17 my $temp;
18 for (my $i=0; $i<12288; $i++) {
19 $temp=substr($s,length($s)-1,1);
20 $s=$temp.$s;
21 $s = substr($s,0
24%
02.12.2019
the target campaign was live, over 14.82 XMR was mined. That amount translates to roughly $800.00 USD.
Although that amount wasn’t enough to turn heads, what was significant in this vulnerability
24%
07.10.2014
Sheepdog Server in Action
# ps -ef|egrep '([c]orosyn|[s]heep)'
root 491 1 0 13:04 ? 00:00:30 corosync
root 581 1 0 1:13 PM ? 00:00:03 sheep -p 7000 /var