59%
10.10.2012
(Listing 9), built using the Open64 compiler and mpich2 (a previous article explains the environment I used).
Listing 9: Openlava Job Script for Running Sample MPI Code
#!/bin/bash
#
# Test 2 script
59%
20.06.2022
discontinued because a robust availability of independent OAuth2 and OIDC libraries has been reached.
As an example, I'll set up a Python app that uses Flask and the Flask-OIDC module. You'll need Python 3
59%
28.11.2021
:/usr/sbin:/bin/sh
bin:x:2:2:bin:/bin:/bin/sh
sys:x:3:3:sys:/dev:/bin/sh
(...)
reboot;
Connection closed by foreign host.
Metasploitable runs many more insecure services that an Nmap scan brings to light (Listing 3
59%
13.06.2022
Many HPC systems check the state of a node
b
efore
running a
n
application, but not very many check that the
performance
of the node is acceptable before running the job.
... made to the benchmarks of the latest version 3.4.2 of the NPB are:
added class F to the existing S, W, A, B, C, D, E
added dynamic memory allocation
added MPI and OpenMP programming models ...
Many HPC systems check the state of a node
b
efore
running a
n
application, but not very many check that the
performance
of the node is acceptable before running the job.
59%
14.03.2013
command:
# sockstat | grep "\*:[0-9]"
The description for rc.conf(5) lists the services that need to be bound to a fixed IP address via parameters. One example is the inetd service:
inetd_flags="-wW -a
59%
05.12.2014
/home/chris/.cache/software-center/piston-helper/software-center.ubuntu.\
com,api,2.0,applications,en,ubuntu,precise,\
amd64,,bbc2274d6e4a957eb7ea81cf902df9e0:
"description": "La revista
59%
08.10.2015
context
Step 0 : FROM fedora
---> 7d3f07f8de5f
Step 1 : MAINTAINER Thorsten Scherf
---> Running in e352dfc45eb9
---> f66d1467b2c2
Removing intermediate container e352dfc45eb9
Step 2 : RUN yum update -y
59%
01.08.2019
INPUT
iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -A INPUT -i eth0 -j DROP
iptables -A INPUT -i eth1 -p tcp --dport 22 -j ACCEPT
iptables -A INPUT -i eth1 -j DROP
59%
02.02.2021
is enabled on that Apache server), such as this entry:
[Directory Bruteforce] /s?p=8f0f9570a1e1fb28f829a361441ab&t=bfd6c7c4&h=645cd72507b5af9d66d3425
I also found a number of WordPress attacks, most commonly
59%
10.06.2024
number 2 using 38.698MW, resulting in a low performance/power ratio of 26.15. In comparison, Frontier at number 1 reached about 1.2 exaflops using 22.78MW, resulting in a performance/power ratio of 52