20%
07.11.2011
compute(istart, iend):
06 isum = 0
07 for i in xrange(istart, iend+1):
08 isum += i**3 + 123456789*i**10 + i*23456789
09
10 return isum
11
12 if '__main__' == __name__:
13
14
20%
01.08.2019
whoami
ls -al /usr/share/nginx
root
total 12
drwxr-xr-x 3 root root 4096 Feb 6 08:11 .
drwxr-xr-x 1 root root 4096 Feb 18 13
20%
14.03.2013
well. Of the available clients, PJSUA [3] turns out to be the best choice. PJSUA is the PJSIP reference implementation, and it comprises a function library for SIP, RTP, STUN, and some other Vo
20%
07.06.2019
= 50ms;
07 .interval = 3s;
08 .window = 10;
09 .threshold = 8;
10 }
11 }
12
13 set beresp.grace = 12h;
Changes on the Fly
The reverse proxy not only delivers web pages
20%
23.02.2012
------------------------------------------- /opt/apps/intel11_1/modulefiles -------------------------------------------
fftw3/3.2.2 gotoblas2/1.08 hdf5/1.8.4 mkl/10.2.4.032 mvapich2/1.4 netcdf/4.0.1 openmpi/1
20%
22.12.2017
Press [1], Drupal [2], or Joomla [3], generally they only have to unpack the core on the server and then add other modules. Installing security updates conscientiously and in good time counteracts ubiquitous
20%
06.10.2022
find ready-made policy bundles online for many use cases, and they are likely to contain a useful, predefined set of rules. A freely accessible Playground [2] and a free Styra Academy [3] can help you
20%
30.04.2012
, severity, name, and family of each plugin as it relates to the Metasploit Framework (see Figure 3). The Name
section tells you which Metasploit exploits have the best chance to be successfully against
20%
05.03.2013
: "Red"
08 Model year: 1988
Listing 2: JavaScript Code for Listing 1
01 // JavaScript
02 var autos;
03
04 autos = {
05 bmw: {
06 color: "Blue",
07 Model year: 1990
08 },
09 vw: {
10
20%
07.10.2014
-RSA-AES256-GCM-SHA384
05 DHE-RSA-AES128-GCM-SHA256
06 DHE-RSA-AES256-GCM-SHA384
07 ECDHE-ECDSA-AES128-SHA
08 ECDHE-ECDSA-AES256-SHA
09 ECDHE-ECDSA-DES-CBC3-SHA
10 ECDHE-RSA-AES128-SHA
11 ECDHE-RSA-AES256-SHA