13%
03.04.2024
are collected:
# Hadolint
# template: docker
hadolint_nb_reports=0
for file in ${DEFECTDOJO_HADOLINT_REPORTS}
do
if [[ $(expr "$file" : '.*\*.*') == 0 ]] && [[ -f "$file
13%
20.06.2022
$MailboxesTotal++
32
33 [...]
34
35 $nTimeout = 0
36 while ((Get-MailboxExportRequest -Mailbox $Mailbox).Status -ne "Completed") {
37 Start-Sleep -s 2
38 $nTimeout += 2
39 if ($nTimeout % 60
13%
03.12.2024
(pool_size=(2,2)))
model.add(layers.Dropout(0.3))
The next size layers of the model (Listing 4) are the same except for some small changes:
input_shape
does not need to be specified in the first 2D
13%
14.03.2013
will be using the Mongo shell to create a document (Listing 1).
Listing 1
Test
01 # mongo
02 MongoDB shell version: 2.2.0
03 connecting to: test
04 > use football
05 switched to db football
06 > db
13%
30.11.2020
Service.Credentials = New-Object Microsoft.Exchange.WebServices.Data.WebCredentials($Mailbox,$Password,$Domain)
11 $ExchangeService.Url = $EwsURL
12 $offset = 0
13 Do {
14 $ItemView = New-Object Microsoft
13%
13.02.2017
of around 250MB to Amazon's S3 storage very effectively. A number of successful container technologies have been used extensively in the past, including LXC, Solaris Zones, and FreeBSD jails, to name
13%
05.02.2019
. To evaluate a memory image, Volatility requires information about the memory layout. A profile must therefore always precisely match the kernel version. The Volatility wiki [12] links to ready-made Linux
13%
09.01.2013
0
22 243056
23
12
24
1
25
26
27 16
28
29
13%
01.08.2019
. The takeaway is the -j LOG option (line 12), which logs port scanning behavior to a logfile with the iptables:
prefix.
Listing 1
iptable Rules
01 *filter
02 *filter
03 :INPUT ACCEPT [0:0]
04
13%
03.12.2015
something like Listing 2.
Listing 2
Sample Output
Starting Nmap 6.47 (http://nmap.org) at 2015-03-12:00:00 CET
Nmap scan report for targethost (192.168.1.100)
Host is up (0.023s latency).
r