11%
11.10.2016
-server"}))
06
07 ; Enable all interfaces for TCP, UDP and websockets:
08 (let [host "0.0.0.0"]
09 (tcp-server {:host host})
10 (udp-server {:host host})
11 (ws-server {:host host}))
12
13 ; Clean up events
11%
05.02.2019
Configuration: [
20 {
21 cidrMask: 24,
22 name: 'Web',
23 subnetType: ec2.SubnetType.Public,
24 },
25 {
26 cidrMask: 24,
27 name: 'App',
28
11%
14.03.2013
(pr->pr_path), 0);
17 [...]
18 error = copyinstr(j.hostname,
19 &pr->pr_host, sizeof(pr->pr_host), 0);
20 [...]
21 pr->pr_ip = j.ip_number;
22 pr->pr_linux = NULL;
23 pr->pr_securelevel = securelevel
11%
25.09.2023
.getenv("REDIS_HOST", "localhost")
07 r = redis.Redis(host=redis_host, port=6379, decode_responses=True)
08
09 @app.route('/')
10 def hello():
11 count = r.incr('counter')
12 return f'Hello, you have visited {count} times.'
13
11%
09.10.2017
"SubnetMax": "10.99.0.0",
07 "Backend": {
08 "Type": "udp",
09 "Port": 7890
10 }
11 }
12 [...]
At first glance, this concept looks robust and simple
11%
05.12.2014
_mac_spoofing": true
20 }
21 ]
22 }
Listing 2
ucarptest2.json
01 {
02 ...
03 "alias": "zoneB",
04 "hostname": "zoneB",
05 ...
06 "nics": [
07 {
08 ...
09 "ip": "10
11%
05.03.2014
:15:01 all 2.08 0.00 0.96 0.02 0.00 96.94
12:25:01 all 1.96 0.00 0.82 0.06 0.00 97.16
12:35:01 PM all 1.22 0
11%
20.03.2014
(hercules) 03.12.2013 _x86_64_ (2 CPU)
09:46:03 runq-sz plist-sz ldavg-1 ldavg-5 ldavg-15 blocked
09:46:13 1 468 0.02 0.06 0.14 0
9
11%
16.05.2013
a9a6615fb5c045693 |
root@alice:~# quantum port-list
+--------------------------------------+------+-------------------+
| 0c478fa6-c12c-... | | fa:16:3e:29
11%
13.06.2016
for $i"
19
20 #If certs do not exist yet
21 FILE="$LECROOT/$i/cert.pem"
22 if [ ! -f "$FILE" ]
23 then
24 echo "$FILE does not exists, so lets get certificates"
25 cd /root/letsencrypt
26