24%
23.03.2022
laytonjb laytonjb 19946519 Nov 20 2020 Lmod-8.4.15.tar.gz
31988342 drwxrwxr-x 2 laytonjb laytonjb 4096 Oct 27 14:22 mpibzip2-0.6
31988329 -rw-rw-r-- 1 laytonjb laytonjb 92160 Oct 27 14:18 mpibzip
24%
30.11.2020
"conditions": [
05 {
06 "type": "RuntimeReady",
07 "status": true,
08 "reason": "",
09 "message": ""
10 },
11 {
12 "type": "NetworkReady",
13
24%
07.10.2014
as reliably as the rest of the PKI world.
4. Protocols
A public website must support the TLS 1.0, TLS 1.1, and TLS 1.2 protocols. SSL 2 is obsolete and insecure. SSL 3 is also deprecated and, although
24%
02.02.2021
.
As surely as night follows day, automated attacks will target the default Secure Shell port (TCP port 22), so I will use SSH as the guinea pig test case with the knowledge that I can move the real SSH service
24%
03.02.2022
,32
1,33
2,34
3,35
4,36
5,37
6,38
7,39
8,40
9,41
10,42
11,43
12,44
13,45
14,46
15,47
16,48
17,49
18,50
19,51
20,52
21,53
22,54
23,55
24,56
25,57
26,58
27,59
28,60
29,61
30,62
31,63
The lstopo tool
24%
04.02.2014
^
08 HINT: There is an entry for table "a", but it cannot be referenced from this part of the query.
09
10
11 # But LATERAL makes this join correct:
12
13
14 SELECT
15 a.id, a.name, t
24%
09.01.2013
OR REPLACE FUNCTION public.deny_alter_table()
02 RETURNS event_trigger
03 LANGUAGE plpgsql
04 AS $function$
05 BEGIN
06
07 RAISE EXCEPTION '% is disabled', TG_TAG;
08
09 END;
10 $function$
11
12
24%
21.03.2017
# ===================
09 #
10 if __name__ == '__main__':
11
12 f = h5py.File("mytestfile.hdf5", "w")
13
14 dset = f.create_dataset("mydataset", (100,), dtype='i')
15
16 dset[...] = np.arange(100)
17
24%
17.02.2015
}
07 define service{
08 use generic-service
09 host_name w2k12srv
10 service_description Uptime
11 check_command check_nt!UPTIME
12 }
13 define service
24%
20.10.2013
database [for details use: -P show]
ATA Version is: 8
ATA Standard is: ACS-2 (unknown minor revision code: 0x001f)
Local Time is: Sun Oct 13 09:12:15 2013 EDT
SMART support is: Available - device has SMART