19%
06.10.2022
shows some function call examples.
Listing 1
Example Function Calls
# Rounding up
# 11
round(10.9)
# Generate an array of numbers
# [9, 8, 7, 6, 5, 4, 3, 2, 1]
numbers.range(9, 1
19%
22.08.2011
:lanman passfile.txt
Loaded 2 passwords with 2 different salts (FreeBSD MD5 [32/64])
guesses: 0 time: 1:04:04:08 (3) c/s: 10927 trying: gmugoky - gmugok2
guesses: 0 time: 1:09:25:10 (3) c/s: 10929 trying
19%
30.01.2013
, for a library that uses a specific compiler and MPI library, you would end up with a module names like atlas-3.10.0-opempi-1.6.2-open64-5.0
. The name is useful because it tells the user the library version
19%
10.04.2015
for changed files from the command line).
Listing 1
Configuration File
01 {
02 "version": "3.0.0",
03 "watched": [
04 {
05 "path": "/opt/repos",
06 "triggers": []
07 }
08
19%
06.10.2019
instructions but still provokes an explicit warning (Figure 3).
Listing 6
Too Many Characters
01 #include
02 #include
03 #define BUFSIZE 10
04
05 int main(/*@unused@*/ int
19%
05.03.2013
other values passed in end up in the rest
array. The three dots (splats) show that the caller can pass in an arbitrary number of values. The
a 1,2,3,4,5,6
statement thus would output 3,4,5,6
.
If you
19%
30.04.2012
, severity, name, and family of each plugin as it relates to the Metasploit Framework (see Figure 3). The Name
section tells you which Metasploit exploits have the best chance to be successfully against
19%
03.02.2022
class BlazeDemoV1 extends Simulation {
08
09 var qualifiedhost = "http://blazedemo.com"
10 var proxyport = 0
11 var proxyhost = "not set"
12
13 // headers for HTTP call
14 val headers = Map(
15
19%
07.06.2019
://misiu.pl:8080/";
04
05 JenkinsLocationConfiguration jlc = JenkinsLocationConfiguration.get()
06
07 jlc.setUrl(newRootURL);
08 jlc.save();
Listing 3 shows two sample YAML files used by JCasC to set up
19%
04.10.2018
active Fa0/1, Fa0/2, Fa0/3, Fa0/4,
Fa0/5, Fa0/6, Fa0/7, Fa0/8,
Fa0/9, Fa0/10, Fa0/11, Fa0/12
10