14%
31.10.2025
computers running the Linux distributions CentOS 5 and 6, Debian 5 and 6, Fedora, Gentoo, Mageia, openSUSE, RHEL 5 and 6, Scientific Linux, and Ubuntu 10.04, 11.04, and 12.04. Additionally, it can handle
14%
17.02.2015
, but the performance isn't anything to call home about. A quick run of Linpack [3] shows that a Raspberry Pi Model B achieved about 0.065 giga-floating point operations per second (GFLOPS) for single-precision and 0
14%
12.09.2013
Server
For this portion of the article, I'll assume you've installed Ubuntu Server 12.04 LTS and updated and patched fully with:
sudo aptitude update && aptitude dist-upgrade
Moving forward, I want
14%
30.05.2021
this instance type is equipped with an NVidia Tesla V100 [5] datacenter accelerator (Figure 1). Built on the basis of the Volta microarchitecture [6], the V100 supports CUDA 7.0, and it was the first to ship
14%
09.04.2019
Shell command:
> Get-Process | Select-Object -Property name, ID
PowerSploit expects a list of bytes in the form 0xXX,0xXX,0xXX,0xXX. To generate the correct format, the Backtrack tools collection [2] is helpful
14%
14.11.2013
with the IP addresses 192.168.100.11 and 192.168.100.12. In the boot menu, select Install CentOS 6 with Eucalyptus Node Controller
. You can decline the offer to check the installation medium by pressing Skip
14%
05.08.2024
ENTRYPOINT ["gcloud","beta","emulators","pubsub","start","--project=demo"]
CMD ["--host-port=0.0.0.0:8085"]
Now, create the script in Listing 2 for the Pub/Sub service to create a topic
14%
18.03.2013
is a classic bug in a web application: an SQL injection vulnerability. SQL injection, which has been known for around 12 years, is still one of the hacker’s most popular tools.
This article presents real
14%
07.10.2014
and the other on all IPv6 IP addresses.
Listing 1
Checking Open Ports
chris@DebianBox:~# lsof -i :22
COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME
sshd 3328 root 3r IPv4 33323 0t0 TCP *:ssh
14%
14.03.2013
is a classic bug in a web application: an SQL injection vulnerability. SQL injection, which has been known for around 12 years, is still one of the hacker's most popular tools.
This article presents real