13%
17.02.2015
int idparticle;
05 double pos[D];
06 double vel[D];
07 double force0[D];
08 double force[D];
09 double mass;
10 char bf[BFSIZE];
11 void *nxtParticle;
12 };
13 PARTICLE
13%
14.11.2013
in /sys/devices/system/edac/mc/* ; do
11 ue_total_count=0
12 ce_total_count=0
13 for csrow in $mc/csrow* ; do
14 ue_count=`more $csrow/ue_count`
15 ce_count=`more $csrow
13%
10.04.2015
Hub: https://github.com/tutao/tutanota
Tutanota and Outlook: http://blog.tutanota.de/email-encryption-outlook-tutanota-starter/2014/08/12/
ProtonMail: https://protonmail.ch
Funding ProtonMail: https
13%
25.03.2021
(Listing 1), which indicates a push.
Listing 1
Server Push in Log
2020-11-22T12:01:10+01:00 1606042870.567 200 605 h2 "GET /index.html HTTP/2.0"
2020-11-22T12:01:10+01:00 1606042870.567 200
13%
30.04.2013
several suspicious entries: The log entry in Listing 1, for example, shows the attacker attempting to send email-containing shell commands to the exim4
service.
Listing 1: Log Entry
2011-02-06 15:08:13 H
13%
07.10.2014
seq_timeout = 10
08 tcpflags = syn
09 command = /usr/sbin/iptables -A INPUT -s \
%IP% -p tcp --dport 22 -j ACCEPT
10
11 [closeSSH]
12 sequence = 9000
12%
22.08.2011
[inst.id] = inst.state
08 summary[inst.state] += 1
09 state
10 end
11 total = summary.values.inject(0) { |sum, i| sum += i }
12 puts "Found #{total} instances in the following states:"
13 summary
12%
30.11.2025
total = summary.values.inject(0) { |sum, i| sum += i }
12 puts "Found #{total} instances in the following states:"
13 summary.keys.sort.each do |s|
14 printf "%20s %d\n", s, summary[s]
15 end
16 puts
12%
06.10.2019
response = urllib.urlopen(url);
06 data = json.loads(response.read())
07
08 for userentry in data:
09 if userentry.get('active'):
10 username = userentry.get('username')
11
12 if os
12%
15.12.2017
08 action :install
09 end
10 service "apache2" do
11 action [ :enable, :start ]
12 end
13
14 directory node['main']['doc_root'] do
15 owner 'www1-data'
16 group 'www1-data'
17 mode '0744'
18 action