15%
25.10.2011
authentication_algorithm pre_shared_key;
08 dh_group modp1024;
09 }
10 generate_policy off;
11 }
12
13 sainfo address 192.168.2.0/24 any address 172.16.0.0/16 any {
14 pfs_group modp1024;
15
15%
09.10.2017
_consumer_secret>"
06 config.access_token = ""
07 config.access_token_secret = ""
08 end
09
10 user = client.user("23Cent")
11 puts user.name
12
13 def collect
15%
10.04.2015
submitted his master's thesis on the subject of TCP Stealth in 2014 [12].
If you have been following the port knocking scenario for a few years, you might remember SilentKnock [13]. The project uses the same
15%
22.12.2017
": "glusterfs-cluster"
06 },
07 "subsets": [
08 {
09 "addresses": [
10 {
11 "ip": "192,168,121,101"
12 }
13 ],
14 "ports
15%
28.11.2023
image: monitoror/monitoror:${MTRRTAG:-latest}
05 ports:
06 - "38080:8080"
07 environment:
08 - "MO_CONFIG=/etc/config.json"
09 restart: unless-stopped
10
11 networks:
12 default
15%
30.01.2020
VPC:
04 Type: AWS::EC2::VPC
05 Properties:
06 CidrBlock:
07 Ref: VPCNet
08 Tags:
09 - Key: Name
10 Value:
11 Ref: VPCName
12
13 Forti
15%
02.06.2020
= sol.copy()
10
11 for j in range(0,ny-1):
12 sol[0,j] = 10.0
13 sol[nx-1,j] = 1.0
14 # end for
15
16 for i in range(0,nx-1):
17 sol[i,0] = 0.0
18 sol[i,ny-1] = 0.0
19 # end for
20
21 # Iterate
22
15%
17.06.2017
04 real :: var2
05 integer :: int1
06 end type other_struct
07
08 type my_struct ! Declaration of a Derived Type
09 integer :: i
10 real :: r
11 real*8 :: r8
12 real, dimension(100
15%
07.06.2019
.0 as build
03 MAINTAINER Yves Schumann
04
05 COPY /demo-app
06
07 RUN mkdir /demo-app/build \
08 && cd /demo-app/build \
09 && cmake .. \
10 && cmake --build .
11
12 RUN echo "Build
15%
13.12.2018
is the distribution must include systemd [3].
However, if you really want to stay safe, you might want to rely on one of the three distributions officially supported by Microsoft:
RHEL 7.3+
SELS v12 SP2