28%
02.08.2021
_httpboot
03 local bifrost_ironic
04 local bifrost_mariadb
05 local bifrost_tftpboot
06
07 # ll -h /var/lib/docker/volumes/bifrost_httpboot/_data/
08 [...]
09 -rw-r--r-- 1 42422 42422 6.1G Mar 2 10
28%
15.08.2016
The echo server simply returns **every** value.
08 schemes:
09 - http
10 host: mazimi-prod.apigee.net
11 basePath: /echo
12 paths:
13 /test:
14 get:
15 responses:
16 200:
17
28%
02.08.2022
) NOT NULL,
06 master VARCHAR(128) DEFAULT NULL,
07 last_check INT DEFAULT NULL,
08 type VARCHAR(6) NOT NULL,
09 notified_serial INT UNSIGNED DEFAULT
28%
18.02.2018
.env.GITHUB_API_TOKEN
06
07 var port = process.env.PORT || 5000
08
09 app.get('/', function (req, res) {
10 // Implement GitHub API call
11 })
12
13 app.listen(port, function () {
14 console.log('App listening on port
28%
03.04.2024
credentials. the initializer can take up to 3 minutes to run
08 # use docker-compose logs -f initializer to track progress
09 docker-compose logs initializer ? grep "Admin password:"
First, run
28%
11.06.2014
/caldav.yourkolab.com-access_log combined
09
10
11 AllowOverride All
12 Order Allow,Deny
13 Allow from All
14
15 RewriteEngine On
16 RewriteBase /
17
28%
05.02.2019
(parent, name, props);
09
10 const maxZones = this.getContext('max_azs')[`${env}`]
11
12 const helloCdkVpc = new ec2.VpcNetwork(this, 'VPC', {
13 cidr: this.getContext('cidr_by_env')[`${env}`],
14
28%
07.04.2022
.
Magic?!
To create a new policy and escalate the privilege [6] inside the environment to the administrator, the attacker can use the command:
$ aws iam create-policy-version --policy-arn arn
28%
25.03.2020
.
Listing 1
kube-system Namespace Pods
$ kubectl get pods -n kube-system
NAME READY STATUS RESTARTS AGE
coredns-5644d7b6d9-7n5qq 1/1 Running 1
28%
04.10.2018
active Fa0/1, Fa0/2, Fa0/3, Fa0/4,
Fa0/5, Fa0/6, Fa0/7, Fa0/8,
Fa0/9, Fa0/10, Fa0/11, Fa0/12
10