28%
18.02.2018
containers (I'll use the popular Docker as an example) all share the same Linux kernel. Without some jiggery-pokery your superuser root inside one container or more is effectively the root user on your host
28%
27.12.2017
. Without some jiggery-pokery, your superuser root inside one container or more is effectively the root user on your host, which, from a security perspective, is unwelcome for a myriad of reasons
28%
05.12.2019
are started under a different ID. For example, the following command calls the file as root, but the user's login UID does not change:
sudo cat /proc/self/loginuid
1000
All processes the user starts now
28%
16.01.2013
(nsamples):
12 x = random.random()
13 y = random.random()
14 if (x*x)+(y*y)<1:
15 inside += 1
16
17 mypi = (4.0 * inside)/nsamples
18 pi = comm.reduce(mypi, op=MPI.SUM, root=0)
19
20 if rank
28%
28.08.2013
potential of GPUs and other recent HPC innovations. HSA is a consortium of companies (including AMD, ARM, and others) committed to "building a heterogeneous compute software ecosystem which is rooted on open
28%
06.08.2013
. In an effort to meet stockholder expectations, LinkedIn has been attempting to grow beyond its roots as an Internet business card service to encompass new revenue sources and new tools for business.
The APIs
28%
01.08.2012
Installing glibc-devel.x86_64 into the VNFS
[root@test1 ~]# yum --tolerant --installroot /var/chroots/sl6.2 -y install glibc-devel.x86_64
Loaded plugins: fastestmirror, refresh-packagekit, security
28%
29.12.2011
/TLS certificates.
The CA/Browser Forum has requested that Internet browsers and operating systems adopt the requirements among their conditions to distribute CA root certificates in their software. Major CAs
28%
16.01.2018
/MaMi isn't particular advanced - but does alter infected systems in rather nasty and persistent ways. By installing a new root certificate and hijacking the DNS servers, the attackers can perform a variety
28%
10.09.2018
to the situation. For weeks prior, however, individuals' sensitive personal information was available on the public-facing database unbeknownst to them or the government.”
The root of the problem was the site