13%
27.09.2021
Types "Unified" -MailEnabled $true -SecurityEnabled $true -LabelId f460a5b0-8d8e-4ac1-bb92-afb9ea22f9da
If you followed the steps and created the LabelActions as shown in the example, the labeled team
13%
04.08.2020
similarity value of 1.0
to the two rascals. Of course, this is not yet hard evidence of unfair practices, but the result at least shows where you could drill down further to reveal more evidence
13%
14.03.2013
://192.168.122.111:35357/v2.0"
09 -S 192.168.122.113
10 -T secret
The individual parameters are far less cryptic than it might seem. The -m option specifies the address on which MySQL can
13%
14.03.2013
enable TLS 1.2 – given OpenSSL 1.0.1 and a recent 2.2 or 2.4 version of the Apache web server – using the SSLProtocol configuration option. Listing 1 provides a potential server configuration.
Listing
13%
09.04.2019
"guardduty:*"
08 ],
09 "Resource": "*"
10 },
11 {
12 "Effect": "Allow",
13 "Action": [
14 "iam:CreateServiceLinkedRole"
15 ],
16 "Resource": "arn:aws:iam
13%
18.03.2012
Name
------- ------ ----- ----- ----- ------ -- -----------
81 9 2392 3076 76 0.12 3996 AmIcoSinglun64
74 9 1464 2568 42 0.09 2172 armsvc
195 10 2380 2984 62
13%
21.07.2011
address = 192.168.1.250 eth0:0
17 vip_nmask = 255.255.255.0
18 port = 80
19 send = "GET / HTTP/1.0\r\n\r\n"
20 expect = "HTTP"
21 use_regex = 0
22 load_monitor = rup
23
13%
11.04.2016
_options=synced
08 servers=backend1, [...]
09 user=maxscale
10 passwd=secret
11
12 [Galera Listener]
13 type=listener
14 service=Galera Router
15 protocol=MySQLClient
16 address=10.42.0.1
17 port=3306
18
19 [Galera
13%
07.10.2014
seq_timeout = 10
08 tcpflags = syn
09 command = /usr/sbin/iptables -A INPUT -s \
%IP% -p tcp --dport 22 -j ACCEPT
10
11 [closeSSH]
12 sequence = 9000
13%
14.11.2013
01 {
02 "name": "ONE-SCALE",
03 "deployment": "none",
04 "roles": [
05 {
06 "name": "appserver",
07 "cardinality": 2,
08 "vm_template": 0,
09
10 "min_vms" : 5,
11