27%
30.04.2012
The powerful Metasploit framework helps you see your network as an intruder would see it. You might discover it is all too easy to get past your own defenses.
... environment. This article will walk you through how to use the latest version of the Nessus pre-built plugin filter Metasploit Framework
in your penetration testing. You will get a glimpse at how pen testers ...
The powerful Metasploit framework helps you see your network as an intruder would see it. You might discover it is all too easy to get past your own defenses.
26%
22.05.2023
to the various service containers according to the name of the services. Packets for service1.domain.com
go to a different container than requests to service5.domain.com
. Additionally, the NGINX server handles ... The Matrix open standard implements secure, decentralized communication and comes with bridges to popular chat apps.
26%
14.03.2013
to a function. The complete minimalist web application is given in Listing 1. The typical Python idiom ensures that app.run() only runs if the script is called by the interpreter and not imported by another ... Django is often used for creating Python web applications, but a lesser known option called Flask can offer more flexibility. In this article, we will take a closer look at Flask.
26%
05.02.2023
is the best choice.
Infos
Chocolatey: https://chocolatey.org
WinGet in Docs: https://learn.microsoft.com/en-US/windows/package-manager/
AppGet announcement: https ... Chocolatey and WinGet offer full-fledged package management on Windows, but which is best for your environment?
26%
21.03.2017
Using the popular HDF5 I/O library with Python and Fortran.
... CALL h5open_f(error)
058 ! Create a new file
059 CALL h5fcreate_f(filename, H5F_ACC_TRUNC_F, file_id, error)
060
061 ! Create dataspace 1 (the ...
Using the popular HDF5 I/O library with Python and Fortran.
... HDF5 with Python and Fortran ... Simple HDF5 in Python and Fortran
25%
05.02.2023
the Azure AD application with:
Register-PnPAzureADApp -ApplicationName DSCAuthApp -Tenant .microsoft.com-OutPath c:\DSC-CertificatePassword (ConvertTo-SecureString -String "365 Desired State Configuration. ... Microsoft 365 DSC
25%
05.12.2019
://docs.scipy.org/doc/numpy/f2py/
Wrapping fortran functions: https://docs.scipy.org/doc/numpy/f2py/getting-started.html#the-quick-and-smart-way
"Multicore Processing with Fortran and OpenMP" by Jeff Layton: http://www.admin-magazine.com ... Fortran functions called from Python bring complex computations to a scriptable language.
25%
07.04.2022
light than it deserves.
In this article, I go into detail about Helm: introducing the architecture of the solution; describing how Helm defines, deploys, and upgrades Kubernetes apps; and presenting ... A Helm chart is a template of several parts that defines, deploys, and upgrades Kubernetes apps and can be considered the standard package manager in the Kubernetes world.
25%
04.08.2020
breach.
Infos
Introducing Stethoscope: https://netflixtechblog.com/introducing-netflix-stethoscope-5f3c392368e3
Jamf: https://www.jamf.com
LANDESK: https ... Intruders slip in when end users get sloppy. Check the health of your endpoint devices with Stethoscope.
24%
22.02.2017
HDF5 is a data model, library, and file format used primarily for scientific computing to store and manage data.
... parts of a compound datatype are called members and may be of any datatype, including another compound datatype. One of the fancy features of HDF5 is that it is possible to read members from a compound ...
HDF5 is a data model, library, and file format used primarily for scientific computing to store and manage data.
... Introduction to HDF5