29%
05.08.2024
= [size][size]int {{0},{0},}
08
09 for i := 0; i < size; i++ {
10 for j := 0; j < size; j++ {
11 array[i][j]++
12 }
13 }
14
15
28%
11.04.2016
Access
Match _REQUEST(=|\[|\%[0-9A-Z]{0,2}) DenyAccess
Match ^/index\.php Return
RequestURI exists Return
Match .* Rewrite /index.php
}
VirtualHost {
Hostname = www.thisisagreatwebsite.com
26%
07.10.2014
in Sheepdog
# dog vdi list
Name Id Size Used Shared Creation time VDI id Copies Tag
s ntestvm1.img 4 8.0 GB 0.0 MB 2.7 GB 2014-02-05 15:04 982a39 2 feb
26%
05.02.2019
.0), (2, 2017, 0.0), (3, 2017, 100.00);
12 SQL> INSERT INTO customer
13 VALUES (1, 2018, 400.0), (2, 2018, 0.0), (3, 2018, 0.0);
14
15 SQL> SELECT * FROM customer;
16 +---+------+---------+
17 | id| year
25%
20.02.2012
.57, 0.00, 12.76, 85, 0
2012-01-09 21:09:21, 84, 4.84, 0, 0.29, 17.36, 0.00, 5.09, 90, 0
2012-01-09 21:09:47, 80, 4
24%
21.08.2014
} 'a'..'c';
12
13 $s .= $one;
14 $s .= $two;
15 $s .= $three;
16
17 my $temp;
18 for (my $i=0; $i<12288; $i++) {
19 $temp=substr($s,length($s)-1,1);
20 $s=$temp.$s;
21 $s = substr($s,0
24%
02.12.2019
the target campaign was live, over 14.82 XMR was mined. That amount translates to roughly $800.00 USD.
Although that amount wasn’t enough to turn heads, what was significant in this vulnerability
24%
16.10.2012
($ssh, '/sbin/ifconfig');
07 stream_set_blocking($stream, true);
08
09 $response = '';
10 while($buffer = fread($stream, 4096)) {
11 $response .= $buffer;
12 }
13
14 fclose($stream);
15 echo $response;
16
17
23%
06.10.2022
{
10 "UserName": "ferdinand",
11 "SerialNumber": "arn:aws:iam::123456789:mfa/ferdinand",
12 "EnableDate": "2021-04-25 09:00:38+00:00"
13 }
14 ],
15 "Groups
23%
09.01.2013
metadata tables...
08 Dumping metadata...
09 ..objects..
10 ..blocks..
11 ..inodes..
12 ..inode_blocks..
13 ..symlink_targets..
14 ..names..
15 ..contents..
16 ..ext_attributes..
17 Compressing and uploading