15%
06.10.2019
.path.isfile( "/opt/openvpn/ca/keys/" + username + ".crt"):
13 # print "Cert for " + username + " exists"
14 a=1
15 else:
16
17 # get user details
18 detailsurl
15%
05.12.2016
"
12 tapetype "EXAMPLE-TAPE"
13 define tapetype EXAMPLE-TAPE {
14 length 100 mbytes
15 filemark 4 kbytes
16 }
17 define dumptype simple-gnutar-tcp {
18 auth "bsdtcp"
19 program "GNUTAR
15%
13.02.2017
.g., with a centralized, alerting Syslog server).
Run through the Center For Internet Security (CIS) hardening document for your daemon [15].
Run Docker on a host by itself, and don't introduce further issues
15%
09.06.2018
access to files, the network, the graphical user interface (GUI), and various subsystems. Using predefined interfaces from the portal APIs [15], an application running in the sandbox can access resources
15%
16.08.2018
content type or a module like Juicebox [14], which was beta at the time of writing)
Comment Function
Yes
No (can be retrofit with extensions like JComments [15] or CComment Pro [16
15%
15.08.2016
Docker for two reasons, as articulated in an article by Nicole Hemsoth [15] and as alluded to by Gregory M. Kurtzer [16], the developer of Singularity:
HPC Security – no root escalation
"… 'simple
15%
26.01.2025
examples, as well as a nice section on generative examples [15] that go beyond the transformer examples.
Infos
Keras: https://kera.io/
MNIST: https
15%
14.11.2013
in /sys/devices/system/edac/mc/* ; do
11 ue_total_count=0
12 ce_total_count=0
13 for csrow in $mc/csrow* ; do
14 ue_count=`more $csrow/ue_count`
15 ce_count=`more $csrow
15%
05.08.2024
.yaml --version 1.15.2
watch kubectl get po -A
After the new Cilium agent pods are up and running, the pre-existing pods (e.g., the netshoot deployment's pod from the earlier test) will gradually return
15%
05.08.2024
verify these checksums:
import hashlib
def calculate_checksum(log_entry):
return hashlib.sha256(log_entry.encode('utf-8')).hexdigest()
# Example log entry
log_entry = "2024-06-15 12:00:00 Failed login