29%
26.11.2013
: "RSASSA-PKCS1-v1_5",
03 params: {
04 modulusLength: 512,
05 publicExponent: new Uint8Array([0x01, 0x00, 0x01])
06 }
07 };
08 var sigAlg = {
09 name: "RSASSA-PKCS1-v1_5",
10 params: { hash: "SHA-1
29%
18.12.2013
FILE *ptr_myfile;
16
17 counter_limit = 100;
18
19 ptr_myfile=fopen("test.bin","wb");
20 if (!ptr_myfile)
21 {
22 printf("Unable to open file!");
23 return 1;
24 }
25 for ( counter=1; counter <= counter
29%
02.08.2022
docker-compose.yaml
version: '3'
services:
target1:
build: .
ports:
- '3000:80'
- '2000:22'
container_name: target1
target2:
build
29%
03.12.2015
, it outputs the message Hello World!
.
To test the script on a local web server, run the following command:
# nmap --script /path/http-vuln-check local targetlhost -p 22,80,443
The output should look
29%
05.02.2019
', 'makecache'] with allowed return codes [0] (shell=False, capture=False)
...
2018-10-17 22:00:06,125 - util.py[DEBUG]: Running command ['yum', '-t', '-y', 'upgrade'] with allowed return codes [0] (shell
29%
31.05.2012
_mat_stat
3.37
39.34
11.64
54.54
22.07
8.12
rand_mat_mul
1.00
1.18
0.70
1.65
8.64
41.79
Table 1: Benchmark Times
29%
29.09.2020
and doubles the cache size (from 3 to 6MB), in exchange for a small drop in baseline clock speed – 2.3 to 2.2GHz (peak drops from 3.2 to 3.1GHz).
Major Surgery
Legend has it that no one has ever
opened
29%
04.08.2020
return -timespec_diff(sooner, later);
19 else
20 return
21 (later->tv_sec - sooner->tv_sec)
22 /* tv_nsec is known to be a signed type. */
23 + (later->tv_nsec - sooner
29%
14.03.2013
: 0
16 initial apicid : 0
17 fdiv_bug : no
18 hlt_bug : no
19 f00f_bug : no
20 coma_bug : no
21 fpu : yes
22 fpu_exception : yes
23 cpuid level : 10
24 wp
28%
05.12.2016
, in which you create one or more rules of this type for each logfile with relevant information.
Listing 2
Log Entry Examples
# Feb 22 08:00:00 hostname sshd[1234]: Failed keyboard