10%
04.11.2011
with more advanced management techniques.
Set the disabled option in /etc/xinetd.d/tftp
to no
(as shown in Listing 12).
Listing 12: /etc/xinetd.d/tftp
service tftp
service tftp
{
socket
10%
05.08.2024
COPY --from=dockerize /usr/local/bin/dockerize /usr/local/bin/
COPY gcpemu_csptst.sh /usr/local/bin/run.sh
ENTRYPOINT ["run.sh"]
Finally, create the YAML file in Listing 12 and launch the local
10%
05.03.2014
no longer than five hours. Registering for the test can take some time; applications for the test must be vetted manually. The Linux Magazine
editorial team was granted access about 12 hours after applying
10%
08.04.2014
| elapsed: 0.0s remaining: 4.5s
[Parallel(n_jobs=2)]: Done 198 out of 1000 | elapsed: 1.2s remaining: 4.8s
[Parallel(n_jobs=2)]: Done 399 out of 1000 | elapsed: 2.3s remaining: 3.5s
10%
18.03.2013
is a classic bug in a web application: an SQL injection vulnerability. SQL injection, which has been known for around 12 years, is still one of the hacker’s most popular tools.
This article presents real
10%
05.12.2011
’s Supercomputing Conference (SC12) in Salt Lake City. We will be at the International Supercomputing Conference in Hamburg, Germany, at the RWTH Aachen booth.
Readers can get involved by petitioning their companies
10%
10.07.2012
firstname=v
12 elseif k=='lastname' then
13 lastname=v
14 end
15 end
16
17 r:puts(string.format("Hello %s %s!", firstname, lastname))
18
19 r:puts("