17%
17.03.2020
PROPERTY VALUE SOURCE
myvol type filesystem -
myvol creation Sat Feb 22 22:09 2020 -
myvol used 471K -
[ ... ]
ARC
Operating systems commonly
17%
02.06.2020
NAME PROPERTY VALUE SOURCE
myvol type filesystem -
myvol creation Sat Feb 22 22:09 2020 -
myvol used 471K
17%
06.10.2019
) VALUES('978-3836262477', 2018, 'Objektorientierte Programmierung', 'Rheinwerk', {1 :'Bernhard Lahres', 2 : 'Gregor Rayman', 3 : 'Stefan Strich'}, 4, '18/09');
16
17 # SELECT Title FROM titles WHERE authors
17%
30.11.2025
runs with root privileges. The exceptions are Mac OS X and Solaris, where the user only needs access privileges for the network interface card device file.
By default, Tcpdump reads all the data
17%
30.11.2025
/filter.d/sasl.conf:
failregex = (?i): warning: [-._\w]+\[\]: SASL (?:LOGIN|PLAIN|(?:CRAM|DIGEST)-MD5) authentication failed: authentication failure
A quick hunt through my /var/log/mail.log files reveals:
Dec 20 22
17%
09.04.2019
backend "s3" {
07 region = "eu-west-1"
08 bucket = "chrisbinnie-terraformstate"
09 key = "guardduty.tfstate"
10 encrypt = true
11 }
12 }
13
14 resource "aws
17%
17.10.2011
.6.24: 1.5-23
05 pve-kernel-2.6.24-11-pve: 2.6.24-23
06 qemu-server: 1.1-16
07 pve-firmware: 1.0-5
08 libpve-storage-perl: 1.0-13
09 vncterm: 0.9-2
10 vzctl: 3.0.23-1pve11
11 vzdump: 1.2-5
12 vzprocps: 2
17%
27.09.2021
The object ID (1c9c09d7-4b3c-4f37-b2cf-e3b8ad0a2ecf
in this example) can then be used to search for audit entries:
Get-AzureADAuditDirectoryLogs -Filter "targetResources/any (tr:tr/id eq '1c9c09d7-4b3c-4f37
17%
28.11.2021
) string {
16 var h hash.Hash
17
18 f, err := os.Open(file)
19 if err != nil {
20 log.Fatal(err)
21 }
22
23 defer f.Close()
24
25 switch hashfunc {
26 case "md5":
27 h = md5.New()
28
17%
30.05.2021
_ssl':
19 ensure => installed,
20 }
21 }
22
23 package { $package_name:
24 ensure => installed,
25 }
26 }
In the context of variables, Puppet also provides conditions such as if-else and case