12%
25.09.2023
-rf /var/lib/apt/lists/*
09
10 RUN >/etc/machine-id
11 RUN >/var/lib/dbus/machine-id
12
13 EXPOSE 22
14
15 RUN systemctl set-default multi-user.target
16 RUN systemctl mask dev-hugepages.mount sys
12%
04.10.2018
active Fa0/1, Fa0/2, Fa0/3, Fa0/4,
Fa0/5, Fa0/6, Fa0/7, Fa0/8,
Fa0/9, Fa0/10, Fa0/11, Fa0/12
10
12%
12.09.2013
/home/en/services
Downloads: http://www.ulteo.com/home/en/ovdi/openvirtualdesktop/3.0
Ulteo OVD HTML5 web client: http://www.ulteo.com/home/en/news/2012/09/12
iOS client no longer in AppStore: http://www.ulteo.com
12%
30.11.2025
: {$Ticket->OwnerObj->Name}
09 Requestor: {$Ticket->Requestors->EmailsAsString()}
10 Ticket URL: {$RT::WebURL}Ticket/Display.html?id={$Ticket->id}
11
12 Please check the content. If everything turns out
12%
04.11.2011
width;
09 uint height;
10 float *data;
11 } convolutionKernel;
12
13
14 /**
15 * Clamp value to limits of uchar.
16 */
17 uchar clampuchar(int value)
18 {
19 return (uchar) std
12%
01.06.2024
, and almost 80 for larger images.
Leaks of long-lived credentials are a common cause of data breaches (https://securitylabs.datadoghq.com/articles/public-cloud-breaches-2022-mccarthy-hopkins/), making
12%
21.08.2014
, no network calls
06 #source = ocs.computers.replay
07 #file = computers.xml
08
09 ## OCS SOURCE PARAMETERS ##
10 source.url = http://ocs-server.mydomain.com
11 source.username = SOAP_USER
12 source
12%
06.10.2022
_init_remote(&unw_cursor, g_unw_as, unw_ctx));
05
06 /* - Search - */
07 bool found_stack_entry = false;
08 do {
09 unw_word_t ip = 0;
10 unw_get_reg(&unw_cursor, UNW_REG_IP, &ip);
11
12 Dwfl_Module* module = dwfl
12%
12.05.2020
:18.04
In this case, /etc
is obviously being created read-write (rw
), with no set UID (nosuid
), no execution (noexec
), and a fixed size of 2GB (2g
). For more options, check out the tmpfs
docs
12%
20.03.2014
": 2048,
07 "resolvers": ["192.168.111.254"],
08 "disks": [
09 {
10 "image_uuid": "1fc068b0-13b0-11e2-9f4e-2f3f6a96d9bc",
11 "boot": true,
12 "model": "virtio"
13 }
14 ],
15