14%
20.06.2022
.config['OIDC_COOKIE_SECURE'] = False
10
11 # Instantiate a flask_oidc object that will be used to handle the authentication flow
12 oidc = OpenIDConnect(app)
13
14 # Function decorators to set the app route and the required login
15
14%
30.11.2025
;
12
13 /* sendq: servers need a higher sendq as they send more data */
14 sendq=2 megabytes;
15 };
Additionally, ircd.conf lacks a block that allows connections to other servers
14%
12.09.2013
=$dbh->prepare('select burncpu(?)');
12 $sth->execute((($ENV{QUERY_STRING}+0) || .5).'s');
13
14 while( my $row=$sth->fetchrow_arrayref ) {
15 print "@$row\n";
16 }
Workaround
The script is simple, but the attentive
14%
30.11.2025
dh_group modp1024;
09 }
10 generate_policy off;
11 }
12
13 sainfo address 192.168.2.0/24 any address 172.16.0.0/16 any {
14 pfs_group modp1024;
15 encryption_algorithm aes256;
16
14%
11.02.2016
+----------------------------------+---------+---------------------+
40 | 47e0142a3638fdc24fe40d4e4fbce3f1 | Row 1 | 2015-09-13 15:24:12 |
41 | b833c1e4c5bfc47d0dbe31c2e3f30837 | Row 3 | 2015-09-13 15:24:14 |
42 | c7d46523a316de4e1496c65c3cbdf358 | Row 2 | 2015
14%
30.11.2025
25-E SSD [9] courtesy of Intel is mounted as /dev/sdd
ext4 filesystem with the default options
Open MPI [10] v1.5.4
NAS Parallel Benchmarks 3.3.1-MPI [11]
Iozone [12]
Daemon
14%
30.11.2025
12 logfile="/var/log/cluster/rgmanager.log"/>
13
15
14%
04.04.2023
these images with the Trivy command-line interface (CLI), the current official Debian image tallies 81 vulnerabilities (61 low, 16 high, and four critical). Ubuntu does very well with only 17 (15 low and two
14%
28.11.2022
, 12
openSUSE Tumbleweed, Leap 15.3, Leap 15.2
Oracle Linux 8.5, 7.9
Mitigating such an attack would rely largely on system policies being enabled that prevent the features required
14%
20.10.2013
database [for details use: -P show]
ATA Version is: 8
ATA Standard is: ACS-2 (unknown minor revision code: 0x001f)
Local Time is: Sun Oct 13 09:12:15 2013 EDT
SMART support is: Available - device has SMART