20%
07.06.2019
-jdk-alpine
02
03 RUN apk add --no-cache git openssh-client curl bash # for Jenkins AWT
04 ttf-dejavu
05
06 ARG JENKINS_USER=jenkins
07 ARG UID=1000
08 ARG HTTP_PORT=8080
09 ARG JENKINS
20%
17.02.2015
return float(val)
08 except:
09 return None
10
11 with open(sys.argv[1]) as csvfile:
12 collec = MongoClient()["galaxy"]["comets"]
13 for row in csv.reader(csvfile, delimiter="\t"):
14 try
20%
07.11.2011
print str(id) + ' Total waste of CPU cycles!'
08
09 if '__main__' == __name__:
10
11 for i in xrange(20):
12 Process(target = waste, args = (i,)).start()
The counting.py
program delays
20%
10.06.2015
"} )
09
10 # force called programs to english output
11 LANG=C LC_ALL=C
12
13 function die {
14 echo 1>&2 "$*"
15 exit 10
16 }
17
18 function get_display_resolution {
19 local find_display="$1
20%
10.04.2015
"version": "3.0.0",
03 "watched": [
04 {
05 "path": "/opt/repos",
06 "triggers": [
07 {
08 "name": "repos-sync",
09 "command": [
10 "/usr
20%
01.08.2019
and "closed" in line and "preauth" in line:
06 srcIP=line.split()[8]
07 print(srcIP)
08 raiseAlert(relay)
09 sendAlert(args.server, srcIP)
10
11 line=iptablesFile.readline()
12
20%
22.12.2017
MySettings(..)
04 , newSettings
05 )where
06 import [...]
07 -- type synonym
08 type Max = Int
09 --Datentyp MySettings
10 data MySettings = MySettings
11 { myMax :: Max }
12
20%
14.03.2013
=/opt/pjsua.conf
06 SOUNDFILE=/tmp/alert.wav
07 TEXT2WAVE=/usr/bin/text2wave
08 DURATION=20
09 NUMBER=01234567890
10 MESSAGE="Monitoring Alert"
11
12 # Setting a lock file
13 # We can't make more than one call
14
20%
03.02.2022
class BlazeDemoV1 extends Simulation {
08
09 var qualifiedhost = "http://blazedemo.com"
10 var proxyport = 0
11 var proxyhost = "not set"
12
13 // headers for HTTP call
14 val headers = Map(
15
19%
09.10.2017
rule phishing_pdf {
02
03 meta:
04 author = "James Stanger"
05 last_updated = "2017-09-12"
06 category = "phishing"
07 confidence = "high"
08 threat_type = "phishing exploit"
09 description