29%
25.03.2021
(Listing 1), which indicates a push.
Listing 1
Server Push in Log
2020-11-22T12:01:10+01:00 1606042870.567 200 605 h2 "GET /index.html HTTP/2.0"
2020-11-22T12:01:10+01:00 1606042870.567 200
29%
02.02.2021
.sin(periods * 2 * np.pi * t)
12 return max(value, 0.0)
13 else:
14 value = np.sin(periods * 2 * np.pi * t)
15 return max(value, 0.0)
16
17 # building the data vector
18 my_data = []
19 i = 0
20 while
29%
18.07.2013
: 156301488
20 Logical Sector size: 512 bytes
21 Physical Sector size: 512 bytes
22 device size with M = 1024*1024: 76319 MBytes
23
29%
26.11.2013
: "RSASSA-PKCS1-v1_5",
03 params: {
04 modulusLength: 512,
05 publicExponent: new Uint8Array([0x01, 0x00, 0x01])
06 }
07 };
08 var sigAlg = {
09 name: "RSASSA-PKCS1-v1_5",
10 params: { hash: "SHA-1
29%
18.12.2013
FILE *ptr_myfile;
16
17 counter_limit = 100;
18
19 ptr_myfile=fopen("test.bin","wb");
20 if (!ptr_myfile)
21 {
22 printf("Unable to open file!");
23 return 1;
24 }
25 for ( counter=1; counter <= counter
29%
02.08.2022
docker-compose.yaml
version: '3'
services:
target1:
build: .
ports:
- '3000:80'
- '2000:22'
container_name: target1
target2:
build
29%
03.12.2015
, it outputs the message Hello World!
.
To test the script on a local web server, run the following command:
# nmap --script /path/http-vuln-check local targetlhost -p 22,80,443
The output should look
29%
05.02.2019
', 'makecache'] with allowed return codes [0] (shell=False, capture=False)
...
2018-10-17 22:00:06,125 - util.py[DEBUG]: Running command ['yum', '-t', '-y', 'upgrade'] with allowed return codes [0] (shell
28%
31.05.2012
_mat_stat
3.37
39.34
11.64
54.54
22.07
8.12
rand_mat_mul
1.00
1.18
0.70
1.65
8.64
41.79
Table 1: Benchmark Times
28%
29.09.2020
and doubles the cache size (from 3 to 6MB), in exchange for a small drop in baseline clock speed – 2.3 to 2.2GHz (peak drops from 3.2 to 3.1GHz).
Major Surgery
Legend has it that no one has ever
opened