14%
13.04.2023
/apps/apps/conda/pkgs
[sudo] password for laytonjb:
[laytonjb@warewulf ~]$ ls -lstar /opt/apps/apps
total 12
4 drwxrwxrwx 5 root root 4096 Mar 12 11:15 ..
4 drwxrwxrwx 3 root root 4096 Mar 12 11:15 .
4 drwxrwxrwx 4 root root
14%
05.12.2019
THISREADHANDLE->autoflush(1);
07
08 if ($processed = fork) {
09 close THISWRITEHANDLE;
10 while (defined($text = )) {
11 print $text;
12 }
13 close THISREADHANDLE;
14 waitpid
14%
09.01.2013
metadata tables...
08 Dumping metadata...
09 ..objects..
10 ..blocks..
11 ..inodes..
12 ..inode_blocks..
13 ..symlink_targets..
14 ..names..
15 ..contents..
16 ..ext_attributes..
17 Compressing and uploading
14%
28.11.2023
image: monitoror/monitoror:${MTRRTAG:-latest}
05 ports:
06 - "38080:8080"
07 environment:
08 - "MO_CONFIG=/etc/config.json"
09 restart: unless-stopped
10
11 networks:
12 default
14%
04.10.2018
"data_dir": "/var/consul",
08 "datacenter": "Datacenter-A",
09 "disable_update_check": true,
10 "enable_script_checks": true,
11 "enable_syslog": true,
12 "encrypt": "xxxxxxxxxxxxxx
14%
17.06.2017
04 real :: var2
05 integer :: int1
06 end type other_struct
07
08 type my_struct ! Declaration of a Derived Type
09 integer :: i
10 real :: r
11 real*8 :: r8
12 real, dimension(100
14%
30.01.2020
VPC:
04 Type: AWS::EC2::VPC
05 Properties:
06 CidrBlock:
07 Ref: VPCNet
08 Tags:
09 - Key: Name
10 Value:
11 Ref: VPCName
12
13 Forti
14%
30.11.2020
== 0:
08 data = { 'key1' : [10,10.1,10+11j],
09 'key2' : ('mpi4py' , 'python'),
10 'key3' : array([1, 2, 3]) }
11 else:
12 data = None
13 # end if
14
15 data = comm
14%
09.10.2017
rule phishing_pdf {
02
03 meta:
04 author = "James Stanger"
05 last_updated = "2017-09-12"
06 category = "phishing"
07 confidence = "high"
08 threat_type = "phishing exploit"
09 description
14%
09.01.2013
=/var/log/one/accounting.log
04
05 case "$1" in
06 "on"|"off")
07 mode=$1
08 shift
09 ;;
10 *)
11 echo "$0 error: wrong mode." >&2
12 exit 1
13 ;;
14 esac
15
16 if [ "$1