48%
05.12.2014
/home/chris/.cache/software-center/piston-helper/software-center.ubuntu.\
com,api,2.0,applications,en,ubuntu,precise,\
amd64,,bbc2274d6e4a957eb7ea81cf902df9e0:
"description": "La revista
48%
04.08.2020
LINSTOR open source software manages block storage in large Linux clusters and simplifies the deployment of high availability with distributed replicated block device version 9 (DRBD 9), dynamically
48%
04.08.2020
Manipulation
The ntopng Edge (nEdge) [2] version of ntopng actively manipulates network traffic. nEdge lets you analyze network traffic at the protocol level (Layer 7) and block or restrict application
48%
09.01.2013
source project, smartmontools [2], allows you to interact with the S.M.A.R.T. data in drives on your systems. Using this tool, you can query the drives to gather information about them, or you can test ... Modern drives use S.M.A.R.T. (self-monitoring, analysis, and reporting technology) to gather information and run self-tests. Smartmontools is a Linux tool for interacting with the S.M.A.R.T. features ... S.M.A.R.T., smartmontools, and drive monitoring
48%
29.09.2020
-system svclb-traefik-p46m5 2/2 Running 0 11m
kube-system coredns-d798c9dd-kjhjv 1/1 Running 0 12m
kube-system traefik-6787cddb4b-594
48%
09.04.2019
).
Listing 2
Arrays
julia> a = [1 2];
1x2 Array{Int64,2}:
1 2
julia> b = [3 4];
1x2 Array{Int64,2}:
3 4
julia> [a b]
1x4 Array{Int64,2}:
1 2 3 4
julia> [a; b]
2x2 Array{Int64,2}:
1 2
3 4
48%
17.02.2015
application. The web server copies the script from the listing (with root privileges) to the /etc/apache2/site-available/rconf path. The command sudo a2ensite binds it into the web server's configuration; sudo ... The statistical programming language R dissects its database in a masterful way, and you can embed your R in Python using the Rpy2 interface.
48%
14.03.2013
use what are known as national language data types (NCHAR, NVARCHAR2, or NCLOB).
Converting the database to Unicode removes this need and the "N" data types can be converted back to "normal" data types
48%
14.03.2013
and password, are added to the database query. This approach works in theory, but imagine an attacker changing the query like this:
Password = ' OR 'a' = 'a'
The query to the database is now:
SELECT * FROM
48%
06.05.2024
module with an Intel N100, 8GB of low-power double data rate (LPDDR) memory, up to 64GB of eMMC flash storage, up to nine PCIe 3.0 lanes, up to four USB 3.2 ports, eight USB 2.0 ports, 64 GPIO pins