17%
21.07.2011
address = 192.168.1.250 eth0:0
17 vip_nmask = 255.255.255.0
18 port = 80
19 send = "GET / HTTP/1.0\r\n\r\n"
20 expect = "HTTP"
21 use_regex = 0
22 load_monitor = rup
23
17%
30.01.2020
Id: 4e90b424-95d9-4453-a2f4-8f5259f5f263 Duration: 70.72 ms Billed Duration: 100 ms Memory Size: 128 MB Max Memory Used: 55 MB Init Duration: 129.20 ms
More or Less
17%
25.03.2021
.1) are basically based on the idea of the original HTTP protocol (HTTP/0.9), which assumes that a web browser establishes a dedicated TCP connection to the web server for each request (i.e., for an HTML file
17%
11.10.2016
-server"}))
06
07 ; Enable all interfaces for TCP, UDP and websockets:
08 (let [host "0.0.0.0"]
09 (tcp-server {:host host})
10 (udp-server {:host host})
11 (ws-server {:host host}))
12
13 ; Clean up events
17%
28.11.2023
://www.cncf.io/blog/2023/09/18/announcing-linkerd-2-14-improved-enterprise-multi-cluster-gateway-api-conformance-and-more/), and it "allows pods in different clusters to establish TCP connections with each other ... ; CloudBees Updates Jenkins and Offers New DevSecOps Platform; Linkerd 2.14 Released with Improved Multi-Cluster Support; NIST Releases Draft of Cybersecurity Framework v2.0; CISA and MITRE Announce Open
16%
27.09.2021
Types "Unified" -MailEnabled $true -SecurityEnabled $true -LabelId f460a5b0-8d8e-4ac1-bb92-afb9ea22f9da
If you followed the steps and created the LabelActions as shown in the example, the labeled team
16%
04.08.2020
similarity value of 1.0
to the two rascals. Of course, this is not yet hard evidence of unfair practices, but the result at least shows where you could drill down further to reveal more evidence
16%
02.08.2022
and enable the Run As Administrator
action. In the text box, enter the code from Listing 1.
Listing 1
toggle_powermode.sh
POWERMODE=$(pmset -g | grep lowpowermode | tr -dc ,0-9
16%
14.03.2013
enable TLS 1.2 – given OpenSSL 1.0.1 and a recent 2.2 or 2.4 version of the Apache web server – using the SSLProtocol configuration option. Listing 1 provides a potential server configuration.
Listing
16%
13.06.2016
to allow the no_root_squash option. A line for this purpose in /etc/exports would look like this:
/nfs 192.168.1.0/ 24(rw,no_root_squash)
It allows all the computers on the 192.168.1.0 network to mount