11%
16.10.2012
($ssh, '/sbin/ifconfig');
07 stream_set_blocking($stream, true);
08
09 $response = '';
10 while($buffer = fread($stream, 4096)) {
11 $response .= $buffer;
12 }
13
14 fclose($stream);
15 echo $response;
16
17
11%
30.11.2025
Finding I/O-Intensive Apps
01 #!/usr/bin/stap
02
03 global totals;
04 probe vfs.read
05
06 {
07 totals[execname(), pid()]++
08 }
09
10 probe end
11 {
12 printf("** Summary ** \n")
13 foreach
11%
30.01.2020
VPC:
04 Type: AWS::EC2::VPC
05 Properties:
06 CidrBlock:
07 Ref: VPCNet
08 Tags:
09 - Key: Name
10 Value:
11 Ref: VPCName
12
13 Forti
11%
10.04.2015
submitted his master's thesis on the subject of TCP Stealth in 2014 [12].
If you have been following the port knocking scenario for a few years, you might remember SilentKnock [13]. The project uses the same
11%
04.10.2018
"data_dir": "/var/consul",
08 "datacenter": "Datacenter-A",
09 "disable_update_check": true,
10 "enable_script_checks": true,
11 "enable_syslog": true,
12 "encrypt": "xxxxxxxxxxxxxx
11%
30.11.2025
Rate;
08 $ServerName = "Cashier";
09 $Workload = "Customers";
10 #------------ PDQ Model ------------
11 # Initialize internal PDQ variable
12 pdq::Init("Grocery Store Checkout");
13 # Modify the units used
11%
12.09.2013
. There are some new lines: 5 and 12 to 22. Line 22 installs the sig function as a signal handler for SIGTERM. When the signal arrives, line 13 opens a new connection to the database and calls the pg
11%
17.06.2017
04 real :: var2
05 integer :: int1
06 end type other_struct
07
08 type my_struct ! Declaration of a Derived Type
09 integer :: i
10 real :: r
11 real*8 :: r8
12 real, dimension(100
11%
10.04.2015
for changed files from the command line).
Listing 1
Configuration File
01 {
02 "version": "3.0.0",
03 "watched": [
04 {
05 "path": "/opt/repos",
06 "triggers": []
07 }
08
11%
20.06.2022
.4'
02 services:
03 keycloak:
04 container_name: keycloak
05 image: quay.io/keycloak/keycloak:17.0.1
06 ports:
07 - 8080:8080
08 environment:
09 - KEYCLOAK