11%
20.06.2022
.4'
02 services:
03 keycloak:
04 container_name: keycloak
05 image: quay.io/keycloak/keycloak:17.0.1
06 ports:
07 - 8080:8080
08 environment:
09 - KEYCLOAK
11%
30.11.2025
:sda]RKBytes [DSK:sda]Writes
21 [DSK:sda]WMerge [DSK:sda]WKBytes [DSK:sda]Request [DSK:sda]QueLen \[DSK:sda]Wait [DSK:sda]SvcTim [DSK:sda]Util
22 20120310 13:39:10 sdb 0 0 0 2 4 24 12 0 12 2 0 sda 0 0 0 0 0 0 0 0 0 0
11%
30.01.2020
VPC:
04 Type: AWS::EC2::VPC
05 Properties:
06 CidrBlock:
07 Ref: VPCNet
08 Tags:
09 - Key: Name
10 Value:
11 Ref: VPCName
12
13 Forti
11%
30.11.2020
== 0:
08 data = { 'key1' : [10,10.1,10+11j],
09 'key2' : ('mpi4py' , 'python'),
10 'key3' : array([1, 2, 3]) }
11 else:
12 data = None
13 # end if
14
15 data = comm
11%
09.10.2017
rule phishing_pdf {
02
03 meta:
04 author = "James Stanger"
05 last_updated = "2017-09-12"
06 category = "phishing"
07 confidence = "high"
08 threat_type = "phishing exploit"
09 description
11%
05.02.2019
Formation and Terraform in this article as points of comparison, the list of other tools that can provision infrastructure is long: Troposphere [12], Sceptre [13], Bash scripts, custom apps leveraging SDKs, Ansible [14
11%
10.04.2015
Hub: https://github.com/tutao/tutanota
Tutanota and Outlook: http://blog.tutanota.de/email-encryption-outlook-tutanota-starter/2014/08/12/
ProtonMail: https://protonmail.ch
Funding ProtonMail: https
11%
09.01.2013
=/var/log/one/accounting.log
04
05 case "$1" in
06 "on"|"off")
07 mode=$1
08 shift
09 ;;
10 *)
11 echo "$0 error: wrong mode." >&2
12 exit 1
13 ;;
14 esac
15
16 if [ "$1
11%
21.08.2012
| 119 kB 00:00
(6/19): glib2-2.22.5-6.el6.i686.rpm | 1.1 MB 00:00
(7/19): libX11-1.3-2.el6.i686.rpm
11%
09.10.2017
_consumer_secret>"
06 config.access_token = ""
07 config.access_token_secret = ""
08 end
09
10 user = client.user("23Cent")
11 puts user.name
12
13 def collect