13%
04.11.2011
ACCEPT
-A RH-Firewall-1-INPUT -p tcp --dport 22 --syn -s 192.168.1.0/255.255.255.0 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp --dport 22 --syn -m limit --limit 6/m --limit-burst 5 -j ACCEPT
### end ssh
13%
11.10.2016
jQuery distribution: https://w3techs.com/technologies/overview/javascript_library/all
jQuery 3.0: https://blog.jquery.com/2016/06/09/jquery-3-0-final-released/
jQuery 3.1: https://blog.jquery.com
13%
26.11.2013
method, for instance, is suitable for protecting application data in a cloud. Listing 1 shows how to use AES together with the Web Cryptography API.
Listing 1: Encrypting Application Data
01 var enc
13%
04.12.2024
algorithms for the search. For example, a stored three-dimensional vector could be assigned the values [1.4, 3.8, -0.8]. Each query to the database is also translated into a vector (e.g., [1.3, 3.5, -0
13%
26.01.2025
is an excellent Bicep-based reference and starting point that helps you get up and running quickly [3].
Table 1
BICEP Resource Definitions
Resources Versioned w/@yyyy-mm-dd-state
Common
13%
21.04.2015
-r--r-- 2 root root 6 3. Feb 18:36 .glusterfs/0d/19/0d19fa3e-5413-4f6e-abfa-1f344b687ba7
#
# ls -alid dir1 .glusterfs/fe/9d/fe9d750b-c0e3-42ba-b2cb-22ff8de3edf0 .glusterfs
/00
13%
30.11.2025
.33
164.69
0.75
rand_mat_stat
3.37
39.34
11.64
54.54
22.07
8.12
rand_mat_mul
1.00
1.18
0.70
1.65
8
13%
30.11.2025
on hand; it is available on the web [2]. You will also find it useful to have the current version 1.0.2 [3] of the OCF Resource Agent Developer's Guide
, created by Hastexo's Florian Haas. The Developer
12%
06.10.2019
the infrastructure. If a Kali Linux instance falls into the wrong hands, it can be combined with the power of virtual instances to cause trouble in the cloud.
For this reason, all major public cloud providers
12%
08.01.2013
_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManWorkstation\Parameters]
DWORD DomainCompatibilityMode 1
DWORD DNSNameResolutionRequired 0
The preceding code tells the registry to add two DWORD