11%
12.09.2013
: 1.0
05 Release: 1%{?dist}
06 License: GPL v2 or later
07 Source0: local.te
08 Source1: local.fc
09 Source2: local.if
10 Group: Development/Tools
11 Summary
11%
05.12.2019
THISREADHANDLE->autoflush(1);
07
08 if ($processed = fork) {
09 close THISWRITEHANDLE;
10 while (defined($text = )) {
11 print $text;
12 }
13 close THISREADHANDLE;
14 waitpid
11%
28.11.2023
image: monitoror/monitoror:${MTRRTAG:-latest}
05 ports:
06 - "38080:8080"
07 environment:
08 - "MO_CONFIG=/etc/config.json"
09 restart: unless-stopped
10
11 networks:
12 default
11%
02.06.2020
= sol.copy()
10
11 for j in range(0,ny-1):
12 sol[0,j] = 10.0
13 sol[nx-1,j] = 1.0
14 # end for
15
16 for i in range(0,nx-1):
17 sol[i,0] = 0.0
18 sol[i,ny-1] = 0.0
19 # end for
20
21 # Iterate
22
11%
10.04.2015
]
09 }
The next step is to define what action to trigger. The syntax is:
watchman -- trigger /opt/repos 'repos-sync' \
-- /usr/local/sbin/sync.sh /opt/repos
Where 'repos
11%
09.01.2013
=/var/log/one/accounting.log
04
05 case "$1" in
06 "on"|"off")
07 mode=$1
08 shift
09 ;;
10 *)
11 echo "$0 error: wrong mode." >&2
12 exit 1
13 ;;
14 esac
15
16 if [ "$1
11%
16.10.2012
($ssh, '/sbin/ifconfig');
07 stream_set_blocking($stream, true);
08
09 $response = '';
10 while($buffer = fread($stream, 4096)) {
11 $response .= $buffer;
12 }
13
14 fclose($stream);
15 echo $response;
16
17
11%
30.11.2020
since version 2007, which is the basic prerequisite for using the corresponding API. In addition, you need the Exchange Web Services Managed API 2.2 [1].
If you only use Exchange locally, the EWS API
11%
09.10.2017
rule phishing_pdf {
02
03 meta:
04 author = "James Stanger"
05 last_updated = "2017-09-12"
06 category = "phishing"
07 confidence = "high"
08 threat_type = "phishing exploit"
09 description
11%
11.10.2016
.then(
08 function() {console.log(
"second callback function"); },
09 function(e) {console.log(e.message);}
10 );
11
12 deferred.resolve();
If Listing 1 has registered