13%
04.08.2011
.pm.xenserver.utils.Server;
12
13 public class TestAPI {
14
15 /**
16 * @param args
17 */
18 public static void main(String[] args) throws Exception {
19
20 if (args.length != 3 && args.length != 5)
21
13%
30.11.2025
.Xensource.xenapi.Connection;
07 import com.Xensource.xenapi.Host;
08 import com.Xensource.xenapi.Session;
09 import com.Xensource.xenapi.Task;
10
11 import de.pm.xenserver.utils.Server;
12
13 public class TestAPI {
14
15
13%
02.06.2020
this article.
TensorFlow provides stable Python (for version 3.7) and C APIs. However, other programming languages supported without guaranteed API backward compatibility are C++, Go, Java, Java
13%
14.08.2017
('request_processing_seconds', 'Time spent processing request')
07
08 # Decorate function with metric.
09 @REQUEST_TIME.time()
10 def process_request(t):
11 """A dummy function that takes some time."""
12 time.sleep(t)
13
14
13%
30.11.2025
.have_ssl() then
11 return false
12 end
13 return true
14 end
The portrule in Listing 2 creates the variables svc.std and svc.ssl as associative arrays (lines 2 and 3) and then checks to see
13%
26.01.2025
=%h/containers/caddy/data/caddy:/data/caddy:Z
09 Volume=%h/containers/certificates:/data/certificates:z,ro
10 Volume=%h/containers/caddy/etc:/etc/caddy:Z
11 PublishPort=443:443
12 Network=reverse-proxy.network
13
14 [Service]
15 Restart=always
16
13%
07.04.2022
security misconfigurations. I'll showcase how it would be possible for an attacker to use those IAM misconfigurations and create serious hassles.
Big Deal?
AWS IAM [3] lets you manage access to AWS
13%
29.09.2020
.168.2.17",
04 "visible": true,
05 "color": "green",
06 "user": "root"
07 },
08 "web server": {
09 "address": "192.168.2.4",
10 "visible": true,
11 "color": "rgb(100, 200, 0)",
12
13%
04.04.2023
_type = "simple-zonal"
03 }
04 provider "google" {
05 ...
06 }
07 data "google_client_config" "default" {}
08 provider "kubernetes" {
09 ...
10 }
11 /*******************************************
12
13%
10.06.2015
exploits like the OpenSSH bug CVE-2002-0083 [2] show that sometimes changing just one bit is sufficient to install a backdoor [3]. For sophisticated attacks, attackers could dump a kernel rootkit