18%
07.10.2014
as reliably as the rest of the PKI world.
4. Protocols
A public website must support the TLS 1.0, TLS 1.1, and TLS 1.2 protocols. SSL 2 is obsolete and insecure. SSL 3 is also deprecated and, although
18%
07.11.2011
GB)
03 Socket P#0
04 Core L#0 + PU L#0 (P#0)
05 Core L#1 + PU L#1 (P#2)
06 Core L#2 + PU L#2 (P#4)
07 Core L#3 + PU L#3 (P#6)
08 NUMANode P#1 (12GB)
09 Socket P#1
10
18%
16.05.2013
,1000);
06
07 // Set host data on the Device (GPU)
08 dA = gpuSetData(A);
09 dC = gpuSetData(C);
10
11 d1 = gpuMult(A,B);
12 d2 = gpuMult(dA,dC);
13 d3 = gpuMult(d1,d2);
14 result = gpuGetData(d3); // Get
18%
23.03.2022
2-0.6.tar
31872452 -rw-rw-r-- 1 laytonjb laytonjb 27311775 Nov 20 2020 mpich-3.3.2.tar.gz
31870282 -rw-rw-r-- 1 laytonjb laytonjb 18473572 Nov 20 2020 mvapich2-2.3.4.tar.gz
31984799 drwxrwxr
18%
17.04.2017
access the weather station in a browser using the URL http://localhost:3000 or a local IP address.
Quick Launch
First, install version 6 of the Node.js [3] server-side JavaScript implementation
18%
16.01.2013
instances of 64-bit Scientific Linux 6. Use the text editor of your choice to add the lines in Listing 3 to your ~/.starcluster/config
file.
Listing 3: Adding Config Settings
$ nano ~/.starcluster
18%
20.06.2022
a Flask app and set the OpenID connect config params
06 app = Flask(__name__)
07 app.secret_key = 'hu5t82LXfYKtr3XFcPeAYaCBWFK8DcI1'
08 app.config['OIDC_CLIENT_SECRETS'] = 'oidc-config.json'
09 app
18%
14.03.2013
/sbin/named ...
774 ?? SsJ 0:00,12 /usr/sbin/sshd ...
781 ?? IsJ 0:00,87 /usr/sbin/cron -s
...
The jls command lets you view all the currently active jails, as shown in Listing 6.
Listing 6
Active Jails
18%
11.10.2016
=/mnt/test.dat oflag=direct bs=4k count=$((1024*1024))
1048576+0 records in
1048576+0 records out
4294967296 bytes (4.3 GB, 4.0 GiB) copied, 4.55899 s, 942 MB/s
Availability
NVDIMMs will probably go on sale
18%
30.04.2012
, severity, name, and family of each plugin as it relates to the Metasploit Framework (see Figure 3). The Name
section tells you which Metasploit exploits have the best chance to be successfully against