21%
    
    
    04.11.2011
        
    
    	
         with more advanced management techniques.
Set the disabled option in /etc/xinetd.d/tftp
 to no
 (as shown in Listing 12).
Listing 12: /etc/xinetd.d/tftp
service tftp
service tftp
{
socket
    
 
		    
				        
    21%
    
    
    05.08.2024
        
    
    	
        
COPY --from=dockerize /usr/local/bin/dockerize /usr/local/bin/
COPY gcpemu_csptst.sh /usr/local/bin/run.sh
ENTRYPOINT ["run.sh"]
Finally, create the YAML file in Listing 12 and launch the local
    
 
		    
				        
    21%
    
    
    05.03.2014
        
    
    	
         no longer than five hours. Registering for the test can take some time; applications for the test must be vetted manually. The Linux Magazine
 editorial team was granted access about 12 hours after applying
    
 
		    
				        
    21%
    
    
    08.04.2014
        
    
    	
         | elapsed:    0.0s remaining:    4.5s
[Parallel(n_jobs=2)]: Done  198 out of 1000 | elapsed:    1.2s remaining:    4.8s
[Parallel(n_jobs=2)]: Done  399 out of 1000 | elapsed:    2.3s remaining:    3.5s
    
 
		    
				    
    21%
    
    
    18.03.2013
        
    
    	 
         is a classic bug in a web application: an SQL injection vulnerability. SQL injection, which has been known for around 12 years, is still one of the hacker’s most popular tools.
This article presents real
    
 
		    
				        
    21%
    
    
    05.12.2011
        
    
    	
        ’s Supercomputing Conference (SC12) in Salt Lake City. We will be at the International Supercomputing Conference in Hamburg, Germany, at the RWTH Aachen booth.
Readers can get involved by petitioning their companies
    
 
		    
				    
    21%
    
    
    10.07.2012
        
    
    	 
                  firstname=v
12       elseif k=='lastname' then
13          lastname=v
14       end
15    end
16 
17    r:puts(string.format("Hello %s %s!", firstname, lastname))
18 
19    r:puts("