Jupyter Notebook 4.x Documentationnotebooks, such as those shared with you, or those that you have written yourself prior to IPython 2.0, at the command-line with: $ jupyter trust mynotebook.ipynb [other notebooks.ipynb] This just generates malicious people to attempt to exploit the notebook for their nefarious purposes increases. IPython 2.0 introduced a security model to prevent execution of untrusted code without explicit user input. The public key. Affected use cases Some use cases that work in Jupyter 1.0 became less convenient in 2.0 as a result of the security changes. We do our best to minimize these annoyances, but security is always0 码力 | 128 页 | 1.86 MB | 1 年前3
Jupyter Notebook 5.1.0 Documentationnotebooks, such as those shared with you, or those that you have written yourself prior to IPython 2.0, at the command-line with: $ jupyter trust mynotebook.ipynb [other notebooks.ipynb] This just generates malicious people to attempt to exploit the notebook for their nefarious purposes increases. IPython 2.0 introduced a security model to prevent execution of untrusted code without explicit user input. 8 public key. 8.5 Affected use cases Some use cases that work in Jupyter 1.0 became less convenient in 2.0 as a result of the security changes. We do our best to minimize these annoyances, but security is always0 码力 | 128 页 | 1.72 MB | 1 年前3
Jupyter Notebook 5.0.0 Documentationnotebooks, such as those shared with you, or those that you have written yourself prior to IPython 2.0, at the command-line with: $ jupyter trust mynotebook.ipynb [other notebooks.ipynb] This just generates malicious people to attempt to exploit the notebook for their nefarious purposes increases. IPython 2.0 introduced a security model to prevent execution of untrusted code without explicit user input. 8 public key. 8.5 Affected use cases Some use cases that work in Jupyter 1.0 became less convenient in 2.0 as a result of the security changes. We do our best to minimize these annoyances, but security is always0 码力 | 129 页 | 1.76 MB | 1 年前3
Jupyter Notebook 5.2.2 Documentationnotebooks, such as those shared with you, or those that you have written yourself prior to IPython 2.0, at the command-line with: $ jupyter trust mynotebook.ipynb [other notebooks.ipynb] This just generates malicious people to attempt to exploit the notebook for their nefarious purposes increases. IPython 2.0 introduced a security model to prevent execution of untrusted code without explicit user input. 8 public key. 8.5 Affected use cases Some use cases that work in Jupyter 1.0 became less convenient in 2.0 as a result of the security changes. We do our best to minimize these annoyances, but security is always0 码力 | 129 页 | 1.73 MB | 1 年前3
Jupyter Notebook 5.0.0 Documentationnotebooks, such as those shared with you, or those that you have written yourself prior to IPython 2.0, at the command-line with: $ jupyter trust mynotebook.ipynb [other notebooks.ipynb] This just generates malicious people to attempt to exploit the notebook for their nefarious purposes increases. IPython 2.0 introduced a security model to prevent execution of untrusted code without explicit user input. The public key. Affected use cases Some use cases that work in Jupyter 1.0 became less convenient in 2.0 as a result of the security changes. We do our best to minimize these annoyances, but security is always0 码力 | 184 页 | 4.40 MB | 1 年前3
Jupyter Notebook 5.1.0 Documentationnotebooks, such as those shared with you, or those that you have written yourself prior to IPython 2.0, at the command-line with: $ jupyter trust mynotebook.ipynb [other notebooks.ipynb] This just generates malicious people to attempt to exploit the notebook for their nefarious purposes increases. IPython 2.0 introduced a security model to prevent execution of untrusted code without explicit user input. The public key. Affected use cases Some use cases that work in Jupyter 1.0 became less convenient in 2.0 as a result of the security changes. We do our best to minimize these annoyances, but security is always0 码力 | 184 页 | 4.36 MB | 1 年前3
Jupyter Notebook 5.2.2 Documentationnotebooks, such as those shared with you, or those that you have written yourself prior to IPython 2.0, at the command-line with: $ jupyter trust mynotebook.ipynb [other notebooks.ipynb] This just generates malicious people to attempt to exploit the notebook for their nefarious purposes increases. IPython 2.0 introduced a security model to prevent execution of untrusted code without explicit user input. The public key. Affected use cases Some use cases that work in Jupyter 1.0 became less convenient in 2.0 as a result of the security changes. We do our best to minimize these annoyances, but security is always0 码力 | 183 页 | 4.36 MB | 1 年前3
Jupyter Notebook 5.4.1 Documentationnotebooks, such as those shared with you, or those that you have written yourself prior to IPython 2.0, at the command-line with: $ jupyter trust mynotebook.ipynb [other notebooks.ipynb] This just generates malicious people to attempt to exploit the notebook for their nefarious purposes increases. IPython 2.0 introduced a security model to prevent execution of untrusted code without explicit user input. 8 public key. 8.5 Affected use cases Some use cases that work in Jupyter 1.0 became less convenient in 2.0 as a result of the security changes. We do our best to minimize these annoyances, but security is always0 码力 | 134 页 | 1.77 MB | 1 年前3
Jupyter Notebook 5.4.0 Documentationnotebooks, such as those shared with you, or those that you have written yourself prior to IPython 2.0, at the command-line with: $ jupyter trust mynotebook.ipynb [other notebooks.ipynb] This just generates malicious people to attempt to exploit the notebook for their nefarious purposes increases. IPython 2.0 introduced a security model to prevent execution of untrusted code without explicit user input. 8 public key. 8.5 Affected use cases Some use cases that work in Jupyter 1.0 became less convenient in 2.0 as a result of the security changes. We do our best to minimize these annoyances, but security is always0 码力 | 134 页 | 1.77 MB | 1 年前3
Jupyter Notebook 5.3.1 Documentationnotebooks, such as those shared with you, or those that you have written yourself prior to IPython 2.0, at the command-line with: $ jupyter trust mynotebook.ipynb [other notebooks.ipynb] This just generates malicious people to attempt to exploit the notebook for their nefarious purposes increases. IPython 2.0 introduced a security model to prevent execution of untrusted code without explicit user input. 8 public key. 8.5 Affected use cases Some use cases that work in Jupyter 1.0 became less convenient in 2.0 as a result of the security changes. We do our best to minimize these annoyances, but security is always0 码力 | 133 页 | 1.77 MB | 1 年前3
共 62 条
- 1
- 2
- 3
- 4
- 5
- 6
- 7













