16%
28.11.2021
). The import statement brings in the required packages. To create an executable program, line 9 defines the main() function as the entry point. The app.New() method creates a new Fyne instance, and the a
16%
20.06.2022
_domains = "*"
# Keycloak configuration
oidc_issuer_url = "http://localhost:8080/realms/testrealm"
provider = "keycloak-oidc"
client_id = "proxy"
client_secret = "t1BmFL4HHk7xC6nPYJEMfiprMfw1QK7b"
# Cookie settings
cookie
16%
11.10.2016
for i in range(N):
61 A = column(cpu_percent, i);
62 plt.plot(epoch_list, A);
63 # end if
64 plt.xlabel('Time (seconds)');
65 plt.ylabel('CPU Percentage');
66 plt
16%
02.02.2021
is enabled on that Apache server), such as this entry:
[Directory Bruteforce] /s?p=8f0f9570a1e1fb28f829a361441ab&t=bfd6c7c4&h=645cd72507b5af9d66d3425
I also found a number of WordPress attacks, most commonly
16%
10.11.2021
worked on a project for which I had to access 20–25-year-old compressed data. Some of the specific compressed formats were not used any more or even documented, and I could find no obvious clues as to what
16%
15.02.2012
.81776285
8.426562
(0.25%)
file_18594.pickle
3376.81351113
9.711714
(0.29%)
file_18595.pickle
3376.81144404
9.132170
(0.27%)
file_18596.pickle
16%
26.01.2012
.81776285
8.426562
(0.25%)
file_18594.pickle
3376.81351113
9.711714
(0.29%)
file_18595.pickle
3376.81144404
9.132170
(0.27%)
file_18596.pickle
16%
05.02.2019
Configuration: [
20 {
21 cidrMask: 24,
22 name: 'Web',
23 subnetType: ec2.SubnetType.Public,
24 },
25 {
26 cidrMask: 24,
27 name: 'App',
28
16%
04.11.2011
it to your $LD_LIBRARY_PATH
. Unfortunately, the current toolkit (3.2) only contains the OpenCL 1.0 libraries, not the C++ bindings that I referred to previously. Registered developers can download the pre
16%
30.11.2020
kopano-server-packages
# exit
Listing 2
Community Kopano on Ubuntu 18.04
$ wget https://download.kopano.io/community/core%3A/core-10.0.6.349.8669778-Ubuntu_18.04-amd64.tar.gz
$ tar xfz