19%
05.03.2013
other values passed in end up in the rest
array. The three dots (splats) show that the caller can pass in an arbitrary number of values. The
a 1,2,3,4,5,6
statement thus would output 3,4,5,6
.
If you
19%
30.04.2012
, severity, name, and family of each plugin as it relates to the Metasploit Framework (see Figure 3). The Name
section tells you which Metasploit exploits have the best chance to be successfully against
18%
03.02.2022
class BlazeDemoV1 extends Simulation {
08
09 var qualifiedhost = "http://blazedemo.com"
10 var proxyport = 0
11 var proxyhost = "not set"
12
13 // headers for HTTP call
14 val headers = Map(
15
18%
07.06.2019
://misiu.pl:8080/";
04
05 JenkinsLocationConfiguration jlc = JenkinsLocationConfiguration.get()
06
07 jlc.setUrl(newRootURL);
08 jlc.save();
Listing 3 shows two sample YAML files used by JCasC to set up
18%
31.10.2025
-- "PASSWORD\r"
49 expect -exact "\r
50 Linux aspen 2.6.32-43-server #97-Ubuntu SMP Wed Sep 5 16:56:41 UTC 2012 x86_64 GNU/Linux\r
51 Ubuntu 10.04.4 LTS\r
52 \r
53 Welcome to the Ubuntu Server!\r
54
18%
04.10.2018
active Fa0/1, Fa0/2, Fa0/3, Fa0/4,
Fa0/5, Fa0/6, Fa0/7, Fa0/8,
Fa0/9, Fa0/10, Fa0/11, Fa0/12
10
18%
07.11.2011
compute(istart, iend):
06 isum = 0
07 for i in xrange(istart, iend+1):
08 isum += i**3 + 123456789*i**10 + i*23456789
09
10 return isum
11
12 if '__main__' == __name__:
13
14
18%
23.01.2012
fingerprint is 87:17:c3:92:44:ba:1a:df:d7:9c:44:b2:5b:73:52:09.
Are you sure you want to continue connecting (yes/no)?
This prompt wants to establish a permanent secure key between the two hosts for future
18%
25.10.2011
-algorithm sha1;
07 encryption-algorithm 3des-cbc;
08 }
09 policy test123 {
10 mode main;
11 proposals Phase1-3des-sha;
12 pre-shared-key ascii-text "$9$dQVgJiHmTF/.PO1Ehrlgoa
18%
05.02.2023
are especially popular. A simple call to create a MySQL database would be:
gcloud sql instances create myinstance --database -version=MYSQL_8_0 --cpu=2 --memory=7680MB --region=europe-west3
The corresponding