28%
04.11.2011
width;
09 uint height;
10 float *data;
11 } convolutionKernel;
12
13
14 /**
15 * Clamp value to limits of uchar.
16 */
17 uchar clampuchar(int value)
18 {
19 return (uchar) std
28%
05.12.2014
://www.github.com/hbons/SparkleShare
–
Current version (as of October 2014)
7.0.2 (Community)
1.0.25
1.1
5.20141013
2.2
5.2.3
3.1.7
1.4
7.0
Release date
August
28%
02.08.2021
_httpboot
03 local bifrost_ironic
04 local bifrost_mariadb
05 local bifrost_tftpboot
06
07 # ll -h /var/lib/docker/volumes/bifrost_httpboot/_data/
08 [...]
09 -rw-r--r-- 1 42422 42422 6.1G Mar 2 10
28%
15.08.2016
The echo server simply returns **every** value.
08 schemes:
09 - http
10 host: mazimi-prod.apigee.net
11 basePath: /echo
12 paths:
13 /test:
14 get:
15 responses:
16 200:
17
28%
02.08.2022
) NOT NULL,
06 master VARCHAR(128) DEFAULT NULL,
07 last_check INT DEFAULT NULL,
08 type VARCHAR(6) NOT NULL,
09 notified_serial INT UNSIGNED DEFAULT
28%
18.02.2018
.env.GITHUB_API_TOKEN
06
07 var port = process.env.PORT || 5000
08
09 app.get('/', function (req, res) {
10 // Implement GitHub API call
11 })
12
13 app.listen(port, function () {
14 console.log('App listening on port
28%
03.04.2024
credentials. the initializer can take up to 3 minutes to run
08 # use docker-compose logs -f initializer to track progress
09 docker-compose logs initializer ? grep "Admin password:"
First, run
28%
11.06.2014
/caldav.yourkolab.com-access_log combined
09
10
11 AllowOverride All
12 Order Allow,Deny
13 Allow from All
14
15 RewriteEngine On
16 RewriteBase /
17
28%
05.02.2019
(parent, name, props);
09
10 const maxZones = this.getContext('max_azs')[`${env}`]
11
12 const helloCdkVpc = new ec2.VpcNetwork(this, 'VPC', {
13 cidr: this.getContext('cidr_by_env')[`${env}`],
14
28%
07.04.2022
.
Magic?!
To create a new policy and escalate the privilege [6] inside the environment to the administrator, the attacker can use the command:
$ aws iam create-policy-version --policy-arn arn