15%
21.08.2012
-------------------- ----------- -------- ---------------- ------ ----- ------ ------ ----- - -----
10.test1 laytonjb batch mpi_pi_fortran90 -- 1 3 -- 00:10 Q --
The qstat
command gets the status of the queues in Torque, and the -a
option tells it to check all
15%
10.09.2012
from /etc/password
and /etc/groups
. The time is computed in number of seconds since 1970-01-01 00:00:00 UTC. The script
entry records the name of the wrapper script that was used, because you might
15%
05.12.2016
that the top left of the screen is (0,0)
tput cup 3 15
# Set the foreground color using an ASCII escape
tput setaf 3
# Write a "title" to the screen
echo "Title of the company"
tput sgr0
# Write a menu title
15%
21.11.2012
directions)
085
086 ALLOCATE ( unew(1:m,1:m), u(1:m,1:m) ) ! mem for unew, u
087
088 !
089 ! Boundary Conditions
090 ! ===================
091 !
092 pi = DACOS(0.0d0)
093
094 ! Top of unit square: (N)
095
15%
10.06.2015
Tunneling";
content:"|01 00|"; offset:2; w
ithin:4; content:"cT";
offset:12; depth:3; content:"|00 10 00 01|"; within:255; class
type:bad
-
unknown; sid:1000 2;
The preceding rule inspects the DNS traffic
15%
17.06.2017
One important reason for the success of MySQL [1] is asynchronous replication, introduced in the 2001 release 3.23, which allows admins to set up replica instances (slaves) that receive all data
15%
07.04.2022
security misconfigurations. I'll showcase how it would be possible for an attacker to use those IAM misconfigurations and create serious hassles.
Big Deal?
AWS IAM [3] lets you manage access to AWS
15%
18.12.2013
(One-by-One)
1 #include
2
3 /* Our structure */
4 struct rec
5 {
6 int x,y,z;
7 float value;
8 };
9
10 int main()
11 {
12 int counter;
13 struct rec my_record;
14 int counter_limit;
15
15%
27.09.2021
Among the number of burgeoning Kubernetes distributions available today is the excellent production-ready K3s [1], which squeezes into a tiny footprint and is suitable for Internet of Things (Io
15%
13.02.2017
at level 3. To do this, each VLAN must have a connection to a router.
VLANs do not protect networks against spying or sniffing, although they can be monitored like switched networks using data analyzers (e