28%
04.04.2023
(NIST) National Vulnerability [2] or the Aqua Vulnerability [3] database.
Figure 1: An image scan with Trivy generates a long list of vulnerabilities
28%
14.03.2013
details as well [3]. The files in the Linux /proc directory also have a pleasingly hackable penchant for being directly readable as plain text, as opposed to more binary-centric proc implementations
28%
05.12.2016
/state/log"
05 dumpuser "amanda"
06 labelstr "MyData[0-9][0-9]"
07 autolabel "MyData%%" EMPTY VOLUME_ERROR
08 tpchanger "chg-disk:/amanda/vtapes"
09 tapecycle 4
10 dumpcycle 3 days
11 amrecover_changer "changer
28%
02.08.2022
A quick edit of your pristine MariaDB server's configuration file /etc/my.cnf.d/server.cnf (1) binds the MariaDB service to the localhost and (2) connects and (3) creates the database:
Bind-address = 127
28%
25.03.2021
/var/www/html;
18
19 # Required for server push:
20 location /css/ {
21 expires 3h;
22 }
23
24 location /js/ {
25 expires 3h;
26 }
27
28 location /index-2.html {
29
28%
12.05.2020
.04"
],
"RepoDigests": [
"nvidia/cuda@sha256:3cb86d1437161ef6998c4a681f2ca4150368946cc8e09c5e5178e3598110539f"
],
"Parent": "",
"Comment": "",
"Created": "2019-11-27T20
28%
05.12.2014
inspirational is by Jay Jacobs and Bob Rudis [3] [4]. These few months later, my R skill level has improved just enough to share some insight with you. Imagine me as somewhere between total noob R script kiddie
28%
07.10.2014
seq_timeout = 10
08 tcpflags = syn
09 command = /usr/sbin/iptables -A INPUT -s \
%IP% -p tcp --dport 22 -j ACCEPT
10
11 [closeSSH]
12 sequence = 9000
28%
16.05.2013
,1000);
06
07 // Set host data on the Device (GPU)
08 dA = gpuSetData(A);
09 dC = gpuSetData(C);
10
11 d1 = gpuMult(A,B);
12 d2 = gpuMult(dA,dC);
13 d3 = gpuMult(d1,d2);
14 result = gpuGetData(d3); // Get
28%
18.07.2013
=> installed
04 }
05 file { "/etc/update-motd.d/10-mymotd":
06 ensure => "present",
07 source => "puppet:///modules/mypuppets/misc/10-mymotd",
08 owner => 'root',
09 group => 'root',
10