19%
10.06.2015
-from 1600x900
This command mirrors my laptop screen on the external display and scales the image from the native 1,600x900 resolution on my laptop to a native 1,900x1,200 resolution on the external display
19%
17.02.2015
use generic-service
21 host_name w2k12srv
22 service_description Memory Usage
23 check_command check_nt!MEMUSE!-w 80 -c 90
24 }
25 define service{
26
19%
17.06.2017
Code
11111111112222222222
12345678901234567890123456789
-----------------------------
SUM = 0.0
D0 100 I=1,10
SUM = SUM + REAL(I)
100 CONTINUE
...
Y = X1 + X2
19%
18.12.2013
__ == "__main__":
12
13 local_dict = {'x':0, 'y':0, 'z':0,'value':0.0};
14 my_record = []; # define list
15
16 counter_limit = 2000;
17
18 f = open('test.bin', 'r+')
19 for counter in range(1,counter
19%
02.02.2021
.
As surely as night follows day, automated attacks will target the default Secure Shell port (TCP port 22), so I will use SSH as the guinea pig test case with the knowledge that I can move the real SSH service
19%
13.06.2016
(Listing 4).
Listing 4
New Filesystem Tree
# rpm-ostree status
TIMESTAMP (UTC) VERSION ID OSNAME REFSPEC
* 2015-09-30 12:07:07 22 c4421f1bba
19%
04.08.2020
romulus 192.168.133.11
node create --node-type satellite remus 192.168.133.12
node create --node-type satellite vulcan 192.168.133.13
node create --node-type satellite kronos 192.168.133.14
In addition
19%
11.10.2016
Chef Client, version 12.4.0
[2015-06-29T11:17:24-07:00] INFO: *** Chef 12.4.0 ***
[2015-06-29T11:17:24-07:00] INFO: Chef-client pid: 3160
Chef Client finished, 0/2 resources updated in 18.855305 seconds
19%
04.12.2024
,
06 "mileage": 15000,
07 "features": ["Sunroof", "Leather seats"]
08 }
09 {
10 "type": "Motorcycle,
11 "brand: "Harley-Davidson,
12 "model": "Iron 883",
13 "year": 2019,
14 "engine
19%
28.11.2021
)]> select load_file('/etc/passwd');
+----------------------------------------------(...)
+
| load_file('/etc/passwd')
(...)
+
| root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/bin/sh
bin:x:2:2