29%
18.06.2014
( 0.05%) ( 0.05% cumulative)
[ 1- 2 days]: 0 ( 0.00%) ( 0.05% cumulative)
[ 2- 4 days]: 4675 ( 1.20%) ( 1.25% cumulative)
[ 4- 7 days]: 215 ( 0.06%) ( 1.31% cumulative)
[ 7- 14
28%
07.10.2014
in Sheepdog
# dog vdi list
Name Id Size Used Shared Creation time VDI id Copies Tag
s ntestvm1.img 4 8.0 GB 0.0 MB 2.7 GB 2014-02-05 15:04 982a39 2 feb
28%
05.08.2024
= [size][size]int {{0},{0},}
08
09 for i := 0; i < size; i++ {
10 for j := 0; j < size; j++ {
11 array[i][j]++
12 }
13 }
14
15
27%
11.04.2016
Access
Match _REQUEST(=|\[|\%[0-9A-Z]{0,2}) DenyAccess
Match ^/index\.php Return
RequestURI exists Return
Match .* Rewrite /index.php
}
VirtualHost {
Hostname = www.thisisagreatwebsite.com
26%
05.02.2019
.0), (2, 2017, 0.0), (3, 2017, 100.00);
12 SQL> INSERT INTO customer
13 VALUES (1, 2018, 400.0), (2, 2018, 0.0), (3, 2018, 0.0);
14
15 SQL> SELECT * FROM customer;
16 +---+------+---------+
17 | id| year
25%
20.02.2012
.57, 0.00, 12.76, 85, 0
2012-01-09 21:09:21, 84, 4.84, 0, 0.29, 17.36, 0.00, 5.09, 90, 0
2012-01-09 21:09:47, 80, 4
24%
02.12.2019
the target campaign was live, over 14.82 XMR was mined. That amount translates to roughly $800.00 USD.
Although that amount wasn’t enough to turn heads, what was significant in this vulnerability
24%
18.07.2013
idle, and it is a safer option in most cases.
Infos
Intel SSD 320 Series (80GB, 2.5in SATA 3Gb/s, 25nm, MLC): http://ark.intel.com/products/56571
TRIM: http
23%
06.10.2022
{
10 "UserName": "ferdinand",
11 "SerialNumber": "arn:aws:iam::123456789:mfa/ferdinand",
12 "EnableDate": "2021-04-25 09:00:38+00:00"
13 }
14 ],
15 "Groups
23%
09.01.2013
metadata tables...
08 Dumping metadata...
09 ..objects..
10 ..blocks..
11 ..inodes..
12 ..inode_blocks..
13 ..symlink_targets..
14 ..names..
15 ..contents..
16 ..ext_attributes..
17 Compressing and uploading