17%
18.02.2018
variable "site_author" {
07 type = "string"
08 default = "Jon Doe"
09 }
10 variable "site_container" {}
11 variable "do_token" {
12 type = "string"
13 }
14 variable "key_path" {}
15 variable "ssh
17%
14.03.2018
port 22/TCP). The same applies to the external gateway computer. Here, the VPN input can then be limited to the local VPN gateways' static IPs – if available. This does not offer very strong protection
17%
03.02.2022
class BlazeDemoV1 extends Simulation {
08
09 var qualifiedhost = "http://blazedemo.com"
10 var proxyport = 0
11 var proxyhost = "not set"
12
13 // headers for HTTP call
14 val headers = Map(
15
17%
07.11.2011
if '__main__' == __name__:
09
10 p1 = Process(target = test, args = ('Rich',))
11 p2 = Process(target = test, args = ('Nus',))
12 p3 = Process(target = test, args = ('Geeks',))
13
14 p2
17%
07.06.2019
-jdk-alpine
02
03 RUN apk add --no-cache git openssh-client curl bash # for Jenkins AWT
04 ttf-dejavu
05
06 ARG JENKINS_USER=jenkins
07 ARG UID=1000
08 ARG HTTP_PORT=8080
09 ARG JENKINS
17%
02.02.2021
.
As surely as night follows day, automated attacks will target the default Secure Shell port (TCP port 22), so I will use SSH as the guinea pig test case with the knowledge that I can move the real SSH service
17%
11.06.2014
_auth;
04
05 group server => "hercules", "sugar";
06
07 desc "Get the uptime of all servers";
08
09 task "uptime", group => "server", sub {
10 my $output = run "uptime";
11 say $output;
12 }
You might
17%
05.03.2014
3.5.0-44-generic (hercules) 03.12.2013 _x86_64_ (2 CPU)
09:46:03 runq-sz plist-sz ldavg-1 ldavg-5 ldavg-15 blocked
09:46:13
17%
20.03.2014
(hercules) 03.12.2013 _x86_64_ (2 CPU)
09:46:03 runq-sz plist-sz ldavg-1 ldavg-5 ldavg-15 blocked
09:46:13 1 468 0.02 0.06 0.14 0
9
17%
14.03.2013
=/opt/pjsua.conf
06 SOUNDFILE=/tmp/alert.wav
07 TEXT2WAVE=/usr/bin/text2wave
08 DURATION=20
09 NUMBER=01234567890
10 MESSAGE="Monitoring Alert"
11
12 # Setting a lock file
13 # We can't make more than one call
14