16%
17.02.2015
$179.00/EUR119
http://www.hardkernel.com/
Gizmo 2
Linux, Windows Embedded 8
AMD G-series GX210HA
Dual x86 @1GHz (1MB shared L2) for 85GFLOPS
AMD Radeon HD 8210E
16%
30.11.2020
):
11
12 s = 0.0
13 s += h * f(a)
14 for i in range(1, n):
15 s += 2.0 * h * f(a + i*h)
16 # end for
17 s += h * f(b)
18 return (s/2.)
19 # end def
20
21
22 # Main section
23 comm = MPI
16%
11.06.2014
Version
CentOS
6.5
Ganglia
3.6.0
Ganglia web
3.5.12
Confuse
2.7
RRDtool
1.3.8
Before installing any binaries, I try
16%
10.04.2015
-way handshake for establishing a connection. A request for comment (RFC) [8] has already been submitted to the Internet Engineering Task Force (IETF) [9]. The method, also known as silent port knocking
16%
11.06.2014
_system_release = '12.04'
17 $eth0_mac = '08:00:27:c4:a1:d8'
18 $VirtInfo = {
19 virtualization_role => 'guest'
20 virtualization_type => 'virtualbox'
21 }
22 $memory_shared = '0'
23 $Network = {
24 networkdevices
16%
09.10.2017
|
+--------------------------------------+----------+--------+---------+-----------+------------+----+
| 36adtb1a-6371-521a-0fa4-a8c204a9e7df | pingtest | alpine | Stopped | None | 172.17.5.8
16%
09.10.2017
server with a compromised MySQL binary. A forensics professional informed me that the following strings belonged to a Trojan:
7A 50 15 00 40 00 67 30 15 02 11
9E 68 2B C2 99 6A 59 F7 F9 8D 30
16%
14.03.2013
list shows which processes are running in a jail. You can see this by the additional J in the status (STAT) column.
# ps -ax
708 ?? SsJ 0:00,42 /usr/sbin/syslogd ...
722 ?? SsJ 0:17,19 /usr
16%
13.02.2017
as adminuser
with the password specified during the setup.
As an example, I'll look at the installation of opsi on a Debian 8.0 system. Keep in mind that the opsi server requires at least 16GB of space
16%
26.11.2013
: "RSASSA-PKCS1-v1_5",
03 params: {
04 modulusLength: 512,
05 publicExponent: new Uint8Array([0x01, 0x00, 0x01])
06 }
07 };
08 var sigAlg = {
09 name: "RSASSA-PKCS1-v1_5",
10 params: { hash: "SHA-1