18%
02.02.2021
/lib/gcc/x86_64-pc-linux-gnu/9.3.0/lib* /lib64/
---> 6f7d7264921c
Step 4/6 : ADD gentoo-java.tar.gz /
---> afb2d5612109
Step 5/6 : ENV JAVA_HOME /opt/icedtea-bin-3.16.0
[...]
441dec54d0dd: Pushed
22bac475857f
18%
28.11.2021
:/usr/sbin:/bin/sh
bin:x:2:2:bin:/bin:/bin/sh
sys:x:3:3:sys:/dev:/bin/sh
(...)
reboot;
Connection closed by foreign host.
Metasploitable runs many more insecure services that an Nmap scan brings to light (Listing 3
18%
04.12.2024
Capacity": "883cc"
15 }
16 {
17 "type": "Bicycle",
18 "brand: "Canyon,
19 "model": "Ultimate CF SLX",
20 "year": 2022,
21 "frameMaterial": "Carbon",
22 "gears": 22
23 }
A vehicle of one type has
18%
21.04.2015
-r--r-- 2 root root 6 3. Feb 18:36 .glusterfs/0d/19/0d19fa3e-5413-4f6e-abfa-1f344b687ba7
#
# ls -alid dir1 .glusterfs/fe/9d/fe9d750b-c0e3-42ba-b2cb-22ff8de3edf0 .glusterfs
/00/00
18%
04.02.2014
The new PostgreSQL 9.3 release introduces several speed and usability improvements, as well as SQL standards compliance.
... ----------------------------------------------------------------------------------------------------
20 Seq Scan on mail (cost=0.00..5628.25 rows=4 width=961) (actual
21 time=2.401..1519.809 rows=672 loops=1)
22 Filter: (msg ~ '(updatable|views)'::text)
23 Rows Removed by Filter: 40148
24 ...
The new PostgreSQL 9.3 release introduces several speed and usability improvements, as well as SQL standards compliance.
... PostgreSQL 9.3
18%
09.01.2013
----------------------------------------------------------------------------------------------------
20 Seq Scan on mail (cost=0.00..5628.25 rows=4 width=961) (actual
21 time=2.401..1519.809 rows=672 loops=1)
22 Filter: (msg ~ '(updatable|views)'::text)
23 Rows Removed by Filter: 40148
24 ... The new PostgreSQL 9.3 release introduces several speed and usability improvements, as well as SQL standards compliance. ... PostgreSQL 9.3 ... New in PostgreSQL 9.3
18%
02.02.2021
interacts with the environment as an agent, much like a sentient being (Figure 3). The agent has to explore the environment and typically only learns after a certain number of actions whether
18%
18.07.2013
rq2 ra92
08 set rq3 cdrom
09
10 attach rq0 d0.dsk
11 attach rq1 d1.dsk
12 attach rq2 d2.dsk
13
14 attach -r rq3 cdrom.iso
15
16 set rl disable
17 set ts disable
18
19 set xq mac=08-00-2B-AA-BB-CC
20
18%
17.06.2017
-1) = 0.25 * (a(1:n-2,2:n) + a(3:n,2:n) + a(2:n,1:n-2) + a(2:n,3:n))
Using forall, the same can be written as:
forall (i=2:n-1, j=2:n-1) a(i,j) = 0.25*(a(i-1,j) + a(i+1,j) + a(i,j-1) + a(i,j+1
18%
03.12.2015
the output. For example:
nmap -sV --script exploit -d3 targethost
NSE scripts have a clear-cut structure. This becomes most clear when you take a look at an existing script. The scripts not only define