16%
30.11.2025
14
15 v=0
16 o=alice 53655765 2353687637 IN IP4
20.22.24.27
17 s=-
18 t=0 0
19 c=IN IP4 20.22.24.27
20 m=audio 20333 RTP/AVP 0 1 3 99
21 a=rtpmap:0 PCMvU/8000
The RTP port causes the next issue
16%
25.09.2023
instructions below
18 env:
19 - name: REDIS_HOST
20 value: "redis"
21 ports:
22 - containerPort: 5000
Listing 11
my-k8s-app/redis-deployment.yaml
01
16%
27.09.2021
ssh ubuntu@52.90.56.122; do sleep 1; done
ssh: connect to host 52.90.56.122 port 22: Connection refused
ssh: connect to host 52.90.56.122 port 22: Connection refused
[ output truncated ]
Welcome
16%
15.04.2013
researchers were not content just to attack MD5. In 2005, Wang’s team improved known attacks on the SHA-1 standard, which was regarded as secure at the time. Although these attacks remain theoretical – nobody
16%
30.11.2025
"------------------------------------------------------"
18 echo -n "Replace stored data line (y)? ";read we
19 if [ "$we" = "y" ];
20 then
21
22 # Delete line and write to
23 # temporary file
24
25 # Build sed instruction
26
16%
25.03.2021
(Listing 1), which indicates a push.
Listing 1
Server Push in Log
2020-11-22T12:01:10+01:00 1606042870.567 200 605 h2 "GET /index.html HTTP/2.0"
2020-11-22T12:01:10+01:00 1606042870.567 200
16%
02.02.2021
.sin(periods * 2 * np.pi * t)
12 return max(value, 0.0)
13 else:
14 value = np.sin(periods * 2 * np.pi * t)
15 return max(value, 0.0)
16
17 # building the data vector
18 my_data = []
19 i = 0
20 while
16%
03.02.2022
is turned on, which means 32 "real" cores and 32 SMT cores.
Listing 1
lscpu
$ lscpu
Architecture: x86_64
CPU op-mode(s): 32-bit, 64-bit
Byte Order
16%
30.11.2025
that belong to $ASTRUNDIR,
22 # kill them.
23 if [ "$astcanary_pid" ]; then
24 for i in $astcanary_pid; do ocf_run kill -s KILL $astcanary_pid; done
25 fi
26
27 for dir in $ASTRUNDIR
16%
28.11.2022
Containers, Kubernetes, Rancher, OpenShift, Docker, Podman – if you have not yet worked in depth with containers and Kubernetes (aka K8s), you might sometimes get the impression that you have