26%
11.06.2014
=manager,dc=acme-services,dc=org
21
22 dn: olcDatabase={1}monitor,cn=config
23 changetype: modify
24 replace: olcAccess
25 olcAccess: {0}to * by dn.base="gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth" read by dn
26%
03.02.2022
,32
1,33
2,34
3,35
4,36
5,37
6,38
7,39
8,40
9,41
10,42
11,43
12,44
13,45
14,46
15,47
16,48
17,49
18,50
19,51
20,52
21,53
22,54
23,55
24,56
25,57
26,58
27,59
28,60
29,61
30,62
31,63
The lstopo tool
26%
12.11.2013
brute force attacks on WordPress sites in the cloud. A botnet with about 90,000 IP addresses bombards the popular CMS system with username-password combinations, giving the perpetrators time to gain
26%
15.10.2013
for companies to rewrite their applications.
This property is called VMware “application neutrality.” The vCloud Hybrid Service supports thousands of applications and more than 90 operating systems certified
26%
07.11.2011
cores.
you can easily see the load on the individual cores: One CPU is working hard (90 percent load), while the other is twiddling its thumbs (0.3 percent load).
Linux introduced support
26%
12.08.2015
for directives is pretty simple. For Fortran, the directive looks like:
!$acc directive [clause [, clause] ...]
In Fortran (from free-format Fortran90 onward), !
is a comment. For C, the directive looks like
26%
21.04.2016
in the mid-90s, after I obtained my degree in biochemistry and focused early on genomics and bioinformatics. Along this path I became enamored with the idea of open source software and changed my focus from
26%
19.06.2023
-xr-x 56 laytonjb laytonjb 4096 Jun 7 15:34 ..
4 -rw-rw-r-- 1 laytonjb laytonjb 731 Jun 7 15:40 fortran_test1.f90
20 -rwxrwxr-x 1 laytonjb laytonjb 17280 Jun 7 15:40 fortran_test1
40 -rw-rw-r-- 1 laytonjb
26%
17.07.2023
made a list of all packages I needed (Table 1). This list, although long, is not everything I wanted to install over time, but it captures more than 90%. These packages will serve as my base Python
26%
10.06.2015
this type of long-term attacker, you need a different, more methodical approach.
Dwell Time
Most organizations are already at the 80% threshold in regard to security. Getting to 90% and above