19%
09.10.2017
_string3= {9E 68 2B C2 99 6A 59 F7 F9 8D 30}
07 Conditions:
08 $test_string1 or $test_string2 or $test_string3
09 }
In Listing 2, I tell Yara to look for the strings that my
19%
07.06.2019
= 50ms;
07 .interval = 3s;
08 .window = 10;
09 .threshold = 8;
10 }
11 }
12
13 set beresp.grace = 12h;
Changes on the Fly
The reverse proxy not only delivers web pages
19%
22.12.2017
with Gluster containers …
Figure 2: … or an external storage cluster, in which the individual Gluster nodes run [3].
A new service in Gluster 3.1.3
19%
03.02.2022
class BlazeDemoV1 extends Simulation {
08
09 var qualifiedhost = "http://blazedemo.com"
10 var proxyport = 0
11 var proxyhost = "not set"
12
13 // headers for HTTP call
14 val headers = Map(
15
19%
14.03.2013
well. Of the available clients, PJSUA [3] turns out to be the best choice. PJSUA is the PJSIP reference implementation, and it comprises a function library for SIP, RTP, STUN, and some other Vo
19%
06.10.2019
illustrates the differences.
Listing 1
Two Ways to Indent Code
01 if (x == y) then
02 {
03 do something;
04 }
05
06 while ( x < y) {
07 x = x+1;
08 }
The indentation depth
18%
06.10.2019
such as WordPress, Drupal, and TYPO3" (https://thehackernews.com/2019/09/php-programming-language.html).
Out of all these vulnerabilities, the most critical one was found in the Oniguruma library that comes
18%
05.03.2013
: "Red"
08 Model year: 1988
Listing 2: JavaScript Code for Listing 1
01 // JavaScript
02 var autos;
03
04 autos = {
05 bmw: {
06 color: "Blue",
07 Model year: 1990
08 },
09 vw: {
10
18%
17.02.2015
rreport import reporter
04 import rpy2.robjects as ro
05
06 devs = importr('grDevices')
07
08 main = "3. Kepler's Law"
09 path = "tmp/Kepler3.png"
10
11 rep = reporter("galaxy", "comets", ["semaj
18%
25.10.2011
-algorithm sha1;
07 encryption-algorithm 3des-cbc;
08 }
09 policy test123 {
10 mode main;
11 proposals Phase1-3des-sha;
12 pre-shared-key ascii-text "$9$dQVgJiHmTF/.PO1Ehrlgoa