20%
13.06.2022
Many HPC systems check the state of a node
b
efore
running a
n
application, but not very many check that the
performance
of the node is acceptable before running the job.
... made to the benchmarks of the latest version 3.4.2 of the NPB are:
added class F to the existing S, W, A, B, C, D, E
added dynamic memory allocation
added MPI and OpenMP programming models ...
Many HPC systems check the state of a node
b
efore
running a
n
application, but not very many check that the
performance
of the node is acceptable before running the job.
20%
17.02.2015
/json;charset=utf-8\n\r\n\r%s" %json.dumps(obj)
Lines 9 through 18 iterate against all entries of a database cursor, which the call to the find() method in line 9, generates from the queried data collection
20%
03.04.2024
64ae120c27e504088d8c2ce29a0fa7f85c
The example code in Listing 2 uses Python to demonstrate how to use the API to retrieve user information. To begin, import the Python Requests API and define the URL
20%
18.02.2018
. The required modifications are explained in the Huginn wiki [3].
The software is based on Ruby on Rails [4] and therefore requires an installed Ruby environment; in fact, it needs version 2.2 or 2.3
20%
01.08.2019
INPUT
iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -A INPUT -i eth0 -j DROP
iptables -A INPUT -i eth1 -p tcp --dport 22 -j ACCEPT
iptables -A INPUT -i eth1 -j DROP
20%
05.12.2014
of this attack, including a description, walk-through, and exploit is available at Exploit-DB [11].
Over the years, I've made use of a Perl script that reduces very long W3C Apache log entries down to just
20%
14.03.2013
command:
# sockstat | grep "\*:[0-9]"
The description for rc.conf(5) lists the services that need to be bound to a fixed IP address via parameters. One example is the inetd service:
inetd_flags="-wW -a
20%
05.12.2016
as the user name.
Amanda versions before 3.3.9 have a vulnerability that lets this user execute arbitrary code with root privileges. A (manual) upgrade to version 3.3.9 is only necessary if you don't trust
20%
17.02.2015
use generic-service
21 host_name w2k12srv
22 service_description Memory Usage
23 check_command check_nt!MEMUSE!-w 80 -c 90
24 }
25 define service{
26
20%
14.08.2017
to manage them disappeared.
Container Linux ruthlessly replaces the entire /usr directory instead of individual files (Figure 3). The main work is handled by Linux containers à la Docker [20], or Rkt [21