14%
13.12.2018
_64 2/4
08 Installing : gdb-7.6.1-110.el7.x86_64 3/4
09 Installing : mssql-server-14.0.3026.27-2.x86
14%
09.01.2013
=/var/log/one/accounting.log
04
05 case "$1" in
06 "on"|"off")
07 mode=$1
08 shift
09 ;;
10 *)
11 echo "$0 error: wrong mode." >&2
12 exit 1
13 ;;
14 esac
15
16 if [ "$1
14%
25.03.2020
_DATA=$1
06
07 # This is the Event Data
08 echo $EVENT_DATA
09
10 # Example of command usage
11 EVENT_JSON=$(echo $EVENT_DATA | jq .)
12
13 # Example of AWS command that's output will show up
14%
05.02.2023
and select Create Instance
. MySQL versions 8.0, 5.7, and 5.8 and PostgreSQL versions 9.6, 10, 11, 12, 13, and 14 are now available for selection. Alternatively, a managed database instance with Microsoft SQL
14%
30.11.2025
clear
03 while true
04 do
05 echo "New record"
06 maxrecord=`ls -1 *.dat | sort | tail -1 | cut -d. -f 1`
07 newrecord=$(echo $maxrecord + 1 | bc )
08 width=`echo $newrecord | wc -c`
09
10 ...
11
12
14%
30.11.2025
stream: ext://sys.stdout
08 loggers:
09 myLogger:
10 handlers: [myHandler]
11 root:
12 handlers: [rootHandler]
Conclusions
The logging module in Python is easy to use and sufficiently
14%
10.06.2015
_STATUS_PROGRAM="cat $xrandr_output" \
XRANDR_SET_PROGRAM=echo AUTOMIRROR_NOTIFY_COMMAND=: \
./automirror.sh)"
08 if [[ "$res" == "$(< $script_output)" ]] ; then
09 return 0
10 else
14%
09.10.2017
rule phishing_pdf {
02
03 meta:
04 author = "James Stanger"
05 last_updated = "2017-09-12"
06 category = "phishing"
07 confidence = "high"
08 threat_type = "phishing exploit"
09 description
14%
17.06.2017
real :: diameter
08 real :: radius
09 real :: area
10 end type meta_data
11
12 contains
13 subroutine meta_comp(r, item)
14 type(meta_data) :: item
15 item%diameter = 2.0
14%
14.03.2013
=/opt/pjsua.conf
06 SOUNDFILE=/tmp/alert.wav
07 TEXT2WAVE=/usr/bin/text2wave
08 DURATION=20
09 NUMBER=01234567890
10 MESSAGE="Monitoring Alert"
11
12 # Setting a lock file
13 # We can't make more than one call
14