25%
07.10.2014
/test
[zk: localhost:2181(CONNECTED) 11] get /test
HelloWorld!
cZxid = 0xa1f54
ctime = Sun Jul 20 15:22:57 CEST 2014
mZxid = 0xa1f54
mtime = Sun Jul 20 15:22:57 CEST 2014
pZxid = 0xa1f54
cversion = 0
25%
11.06.2014
RewriteRule ^\.well-known/caldav / [R,L]
18 RewriteRule ^\.well-known/carddav / [R,L]
19
20 RewriteCond %{REQUEST_FILENAME} !-f
21 RewriteCond %{REQUEST_FILENAME} !-d
22 ... data available on iOS and Mac OS X and in Thunderbird and Evolution.
25%
10.06.2015
– Default; an improved and optimized version of the LZ77 algorithm.
LZMA2 – An improved version of LZMA.
PPMD – Dmitry Shkarin's PPMdH with small changes.
PCJ – A converter for 32-bit x86 executables
25%
11.02.2016
happens transparently for the user, who has no contact at all with the tools. Otto is released under Mozilla Public License Version 2.0, and development is an open process on GitHub [6].
Otto has one
25%
04.08.2020
"mprotect",
19 "capget",
20 "getuid",
21 "wait4",
22 "pread64",
23 "Capset",
24 [snip...]
Unfortunately, I can't go too deep into seccomp in this article ... DockerSlim minifies your Docker container images up to 30x and adds security, too.
25%
09.10.2023
1 loop /snap/core20/1974
loop2 7:2 0 63.5M 1 loop /snap/core20/2015
loop3 7:3 0 73.9M 1 loop /snap/core22/864
loop4 7:4 0 237.2M 1 loop /snap/firefox/3026
loop5
25%
17.06.2017
a complete loss of data is in the cards.
Distributed Storage
Distributed file storage, as provided by the Network File System (NFS) [19], GlusterFS [20], or Ceph [21], offers a remedy. In principle
25%
05.02.2019
in the container?
20 - name: "mysql client exists"
21 path: '/usr/bin/mysql'
22 shouldExist: true
23
24 # Does the MySQL configuration file exist at the right place?
25 - name: "my.cnf exists and has appropriate
25%
25.03.2021
sensible defaults (e.g., in version 2.2, RequestReadTimeout was still set to ).
LimitRequestBody also has a value of zero in the current Apache version, which means that a client is always allowed
25%
02.02.2021
Every ML system (Figure 1) has an input (x
) through which it (one hopes) receives relevant information and from which it typically makes a classification (y
). In the field of cybersecurity, for example