18%
17.02.2015
168
(gdb) p j
$3 = 144
(gdb) c
Breakpoint 2, Calc_vacf () at MD.o.c:671
671 vacf[j-i]=0;
(gdb) p &j
$6 = (int *) 0xffffc168
(gdb) p j
$7 = 144
On the other hand, when dealing with the ELF
18%
29.09.2020
between failure and SMART values. The disks were a combination of consumer-grade drives (SATA and PATA) with speeds from 5,400 to 7,200rpm and capacities ranging from 80 to 400GB. Several drive
18%
01.06.2024
is, the fewer vulnerabilities it is likely to have. According to the report, container images smaller than 100MB had 4.4 high or critical vulnerabilities, versus 42.2 for images between 250 and 500MB ... and Management Software; LPI Launches Open Source Essentials Program; Apache Software Foundation Celebrates 25 Years; SUSE Announces Rancher Prime 3.0; NSA Issues Zero Trust Guidelines for Network Security
18%
09.01.2013
root root 556 Nov 10 10:07 s3ql_metadata
07 4 drwxr-xr-x. 4 root root 4096 Nov 10 10:08 ..
08 4 -rw-r--r-- 1 root root 262 Nov 10 10:10 s3ql_seq_no_2
09 4 drwxr-xr-x 3 root root 4096 Nov 10 10 ... advantages: S3QL. ... S3QL filesystem for cloud backups
18%
23.03.2022
17495 17495 0 100% /snap/gnome-3-38-2004/99
/dev/sda1 183144448 38466772 144677676 22% /home2
/dev/loop9 64986 64986 0 100% /snap/gtk-common-themes/1515
/dev/loop11
18%
06.10.2022
find ready-made policy bundles online for many use cases, and they are likely to contain a useful, predefined set of rules. A freely accessible Playground [2] and a free Styra Academy [3] can help you
18%
05.02.2019
:
$ curl http://169.254.169.254/openstack
2012-08-10
2013-04-04
2013-10-17
2015-10-15
2016-06-30
2016-10-06
2017-02-22
To retrieve a list of supported versions for the EC2-compatible metadata API, enter
18%
07.06.2019
possibilities have opened up as to how a build pipeline can be orchestrated. Docker [3] is also a powerful tool that lets you implement customizations that otherwise require considerable maintenance
18%
31.10.2025
certain things. Two reasons a script
08 # might fail are:
09 #
10 # 1) timing - A surprising number of programs (rn, ksh, zsh, telnet,
11 # etc.) and devices discard or ignore keystrokes that arrive "too
18%
22.12.2017
Press [1], Drupal [2], or Joomla [3], generally they only have to unpack the core on the server and then add other modules. Installing security updates conscientiously and in good time counteracts ubiquitous