22%
09.08.2015
; replace any minus signs in dates with spaces; substitute any month written as a word with its numeric value followed by a slash; substitute any two-digit number at the beginning of a line (^), 0 through 3
22%
09.10.2017
and DHCP, among other things.
Listing 2
CNI Configuration
01 [...]
02 {
03 "cniVersion": "0.3.1",
04 "name": "dbnet",
05 "type": "bridge",
06 // type (plugin) specific
07 "bridge
22%
14.03.2013
enable TLS 1.2 – given OpenSSL 1.0.1 and a recent 2.2 or 2.4 version of the Apache web server – using the SSLProtocol configuration option. Listing 1 provides a potential server configuration.
Listing ... SHA-3 ... SHA-3 – The new hash standard
22%
15.04.2013
.)
The situation is even more difficult when it comes to transmission protocols. The legacy but still popular SSL standard version 3 only supports MD5 and SHA-1 signatures. And the successors of SSL, TLS 1.0 and 1 ... SHA-3 – The New Hash Standard
22%
04.12.2013
if (ierr > 0) then
21 write(*,*) "error in opening file! Stopping"
22 stop
23 else
24 do 10 counter=1,counter_limit
25 my_record%x = counter
26 my_record%y = counter
22%
27.09.2021
)
(None, 32, 32, 32)
9,248
max_pooling2d (MaxPooling2D)
(None, 16, 16, 32)
0
conv2d_2 (Conv2D)
(None, 16, 16, 64)
18,496
conv2d_3 (Conv2D
22%
12.09.2013
17 %description
18 Custom SELinux policy module.
19
20 %prep
21 if [ ! -d custom-selinux-policy ]; then
22 mkdir custom-selinux-policy
23 fi
24 cp -p %{SOURCE0} %{SOURCE1} %{SOURCE2} custom
22%
19.05.2014
output from the mux. Here’s is a simple text diagram from the SSHFS-MUX website that illustrates how this works:
host1: host2: host3:
directory1 directory2
22%
31.10.2025
.nmap.org (64.13.134.52):
Not shown: 994 filtered ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 4.3 (protocol 2.0)
25/tcp closed smtp
22%
28.11.2021
:/usr/sbin:/bin/sh
bin:x:2:2:bin:/bin:/bin/sh
sys:x:3:3:sys:/dev:/bin/sh
(...)
reboot;
Connection closed by foreign host.
Metasploitable runs many more insecure services that an Nmap scan brings to light (Listing 3