39%
09.01.2013
Helmle | PostgreSQL Administration
20 2 | Andreas Eschbach | One Trillion Dollars
21 3 | Mario Puzo | The Godfather
22 4 | Peter Eisentraut | PostgreSQL Administration
23 4 | Peter ... The new PostgreSQL 9.3 release introduces several speed and usability improvements, as well as SQL standards compliance. ... PostgreSQL 9.3 ... New in PostgreSQL 9.3
38%
26.01.2025
SC24 took place in Atlanta, GA, November 17-22. As I'm writing this, 17,959 attendees – that's 3,000+ more than last year – registered. More than 500 companies filled the exhibition floor, which
38%
18.12.2013
(One-by-One)
1 #include
2
3 /* Our structure */
4 struct rec
5 {
6 int x,y,z;
7 float value;
8 };
9
10 int main()
11 {
12 int counter;
13 struct rec my_record;
14 int counter_limit;
15
38%
28.11.2021
:/usr/sbin:/bin/sh
bin:x:2:2:bin:/bin:/bin/sh
sys:x:3:3:sys:/dev:/bin/sh
(...)
reboot;
Connection closed by foreign host.
Metasploitable runs many more insecure services that an Nmap scan brings to light (Listing 3
38%
12.02.2014
.py
CPU ALL: 1.0 %
CPU0 4.1%
CPU1 2.0%
CPU2 0.0%
CPU3 0.0%
CPU4 0.0%
CPU5 0.0%
CPU6 0.0%
CPU7 2.0%
CPU ALL:
user: 0.7% nice: 0.0%
system: 0.2% idle
38%
30.11.2025
) or even be booted in a virtual environment. This virtual boot function is perfect for smaller companies. It lets administrators boot a ShadowProtect image directly in the free VirtualBox [3] environment
38%
28.11.2023
.json files (Listings 1 and 2) [2] to launch a Monitoror stack and supply its configuration, respectively.
Listing 1
monitoror_stack.yml
01 version: '3.5'
02 services:
03 monitoror:
04
38%
03.08.2023
to Bitkom [1], Germany alone has more than 3,000 data centers with greater than 40kW of IT connection capacity and at least 10 server racks, as well as around 47,000 smaller IT installations, and the trend
38%
07.11.2023
can save some partitions or devices for later when the requests for more space arrive. You can also create PVs and just leave them for later.
Listing 1 is an example from an Ubuntu 22.04 system
38%
02.02.2021
. One well-known example comes from the field of networks, when securing a website with an application and database. A buffer zone, known as the demilitarized zone (DMZ) [3], has long been established