47%
18.03.2013
and password
, are added to the database query. This approach works in theory, but imagine an attacker changing the query like this:
Password = ' OR 'a' = 'a'
The query to the database is now:
SELECT * FROM
47%
02.02.2021
cached. When the PHP code is restarted, PHP 8 simply accesses the precompiled binary code from the cache.
As the first benchmarks by PHP developer Brent Roose show [2], scripts with repetitive
47%
30.01.2020
-06f4dce9c3ae2c504" # for eu-west-3 paris
07 InstanceType: t2.small
08 AvailabilityZone: !GetAtt FortiVPCFrontNet.AvailabilityZone
09 KeyName:
10 Ref: KeyName
11 Network
47%
25.11.2012
/cmdline
root=/dev/disk/by-uuid/10a83ffe-5a9f-48a2-b8cb-551c2cc6b42d resume=/dev/sda3 \
splash=silent text showopts crashkernel=128
sles:~ # /etc/init.d/boot.kdump status
kdump kernel loaded
47%
05.08.2024
/bin/ksh'
user_gecos: 'AIX guest user'
user_pgrp: 'staff'
user_groups: 'staff'
user_fsize: '-1'
user_passwd: "{ssha256}06$FkFHd0q1hxVonC2a$sa1WA0G3mPNWtz2GAhUkfcQ7BkD/mNngBu0Tn2.N.cl"
collections
47%
22.12.2017
in cs us sy id wa st
04 1 0 0 5279852 2256 668972 0 0 1724 25 965 1042 17 9 71 2 0
05 1 0 0 5269008 2256 669004 0 0 0 0 2667 1679 28 3 69 0 0
06 1 0
47%
03.01.2013
data on the Device (GPU)
dA = gpuSetData(A);
dC = gpuSetData(C);
d1 = gpuMult(A,B);
d2 = gpuMult(dA,dC);
d3 = gpuMult(d1,d2);
result = gpuGetData(d3); // Get result on host
// Free device memory
dA
47%
16.05.2013
,1000);
06
07 // Set host data on the Device (GPU)
08 dA = gpuSetData(A);
09 dC = gpuSetData(C);
10
11 d1 = gpuMult(A,B);
12 d2 = gpuMult(dA,dC);
13 d3 = gpuMult(d1,d2);
14 result = gpuGetData(d3); // Get
47%
07.10.2014
.0.0.0
-c
Clusterware to use
corosync, zookeeper:
-D
Use direct I/O on the back end
n/a
-g
Work as a gateway (server without back
47%
12.05.2021
scan results [bsr]
0x18 Protocol specific port [psp]
0x1a Power condition transitions [pct]
0x2f Informational exceptions [ie]
0x37 Cache (seagate) [c_se]
0x38
0x3e