18%
09.10.2017
rule phishing_pdf {
02
03 meta:
04 author = "James Stanger"
05 last_updated = "2017-09-12"
06 category = "phishing"
07 confidence = "high"
08 threat_type = "phishing exploit"
09 description
18%
09.01.2013
=/var/log/one/accounting.log
04
05 case "$1" in
06 "on"|"off")
07 mode=$1
08 shift
09 ;;
10 *)
11 echo "$0 error: wrong mode." >&2
12 exit 1
13 ;;
14 esac
15
16 if [ "$1
18%
09.10.2017
_consumer_secret>"
06 config.access_token = ""
07 config.access_token_secret = ""
08 end
09
10 user = client.user("23Cent")
11 puts user.name
12
13 def collect
18%
12.09.2013
. There are some new lines: 5 and 12 to 22. Line 22 installs the sig function as a signal handler for SIGTERM. When the signal arrives, line 13 opens a new connection to the database and calls the pg
18%
10.06.2015
_SET_PROGRAM=${XRANDR_SET_PROGRAM: -xrandr}
06
07 PRIMARY_DISPLAY=${AUTOMIRROR_PRIMARY_DISPLAY:-LVDS1}
08 NOTIFY_SEND=( ${AUTOMIRROR_NOTIFY_COMMAND: -notify-send -a automirror \
-i automirror "Automatic Mirror Configuration
18%
14.08.2017
/contactshelf
06 /contacts:
07 get:
08 description: Retrieve list of existing contacts
09 responses:
10 200:
11 body:
12 application/json:
13 example: |
14
18%
25.10.2011
authentication_algorithm pre_shared_key;
08 dh_group modp1024;
09 }
10 generate_policy off;
11 }
12
13 sainfo address 192.168.2.0/24 any address 172.16.0.0/16 any {
14 pfs_group modp1024;
15
18%
22.12.2017
": "glusterfs-cluster"
06 },
07 "subsets": [
08 {
09 "addresses": [
10 {
11 "ip": "192,168,121,101"
12 }
13 ],
14 "ports
18%
05.12.2014
-11-07
drwxr-xr-x. 2 root root 12288 Nov 8 23:07 2014-11-08
lrwxrwxrwx. 1 root root 22 Oct 19 21:22 current -> /var/opt/bro/spool/bro
The spool subdirectory not only contains the working directory
18%
16.03.2021
RAID Status
cat /proc/mdstat
Personalities : [linear] [multipath] [raid0] [raid1] [raid6] [raid5] [raid4] [raid10]
md0 : active raid1 sdd1[1] sdc1[0]
244065408 blocks super 1.2 [2/2] [UU