13%
05.12.2014
_mac_spoofing": true
20 }
21 ]
22 }
Listing 2
ucarptest2.json
01 {
02 ...
03 "alias": "zoneB",
04 "hostname": "zoneB",
05 ...
06 "nics": [
07 {
08 ...
09 "ip": "10
13%
13.06.2016
for $i"
19
20 #If certs do not exist yet
21 FILE="$LECROOT/$i/cert.pem"
22 if [ ! -f "$FILE" ]
23 then
24 echo "$FILE does not exists, so lets get certificates"
25 cd /root/letsencrypt
26
13%
03.02.2022
,32
1,33
2,34
3,35
4,36
5,37
6,38
7,39
8,40
9,41
10,42
11,43
12,44
13,45
14,46
15,47
16,48
17,49
18,50
19,51
20,52
21,53
22,54
23,55
24,56
25,57
26,58
27,59
28,60
29,61
30,62
31,63
The lstopo tool
13%
30.11.2025
, most likely, (3/2) x 15 seconds.
Finally, -s defines the number of seconds to wait before sshguard "forgets" the attacker's IP address. The line
sshguard -l /var/log/auth.log -s 20
instructs sshguard
13%
03.12.2015
_config = file
05 store_file_config = ./client.conf
06
07 store_volatile = sqlite
08 store_sqlite_volatile = ./volatile.sqlite
09
10 log = on
11 log_file = ./dhcpy6d.log
12
13 really_do_it = yes
14
15 dns
13%
09.10.2017
more. One interesting Kubernetes subproject named kube-state-metrics [22] retrieves information relating to existing objects from the Kubernetes API and generates new metrics:
kubectl create -f 08-kube
13%
11.04.2016
hiawatha running
www-data 4766 0.1 0.3 118232 4016 ? Ssl 20:13 0:00 /usr/sbin/hiawatha
You can use netstat to check the bindings:
netstat -tulpn
See the output in Listing 2.
Listing 2
13%
02.02.2021
.sin(periods * 2 * np.pi * t)
12 return max(value, 0.0)
13 else:
14 value = np.sin(periods * 2 * np.pi * t)
15 return max(value, 0.0)
16
17 # building the data vector
18 my_data = []
19 i = 0
20 while
13%
25.03.2020
_DATA=$1
06
07 # This is the Event Data
08 echo $EVENT_DATA
09
10 # Example of command usage
11 EVENT_JSON=$(echo $EVENT_DATA | jq .)
12
13 # Example of AWS command that's output will show up
13%
17.02.2015
service_description PING
11 check_command check_ping!100.0,20%!500.0,60%
12 }
13 define service{
14 use generic-service ; Name of service template to use
15