15%
30.11.2020
cri-o-${CRIO_VERSION}
The following NEW packages will be installed
cri-o-1.17
0 to upgrade, 1 to newly install, 0 to remove and 0 not to upgrade.
Need to get 17.3 MB of archives.
After this operation
15%
30.01.2020
.22253e-06| 12.67%| for k in range(0, d_num):
239| 37425000| 177.055| 4.73093e-06| 10.65%| rij[k] = pos[k,i] - pos[k,j]
240| 0| 0
15%
03.02.2022
class BlazeDemoV1 extends Simulation {
08
09 var qualifiedhost = "http://blazedemo.com"
10 var proxyport = 0
11 var proxyhost = "not set"
12
13 // headers for HTTP call
14 val headers = Map(
15
15%
02.06.2020
= sol.copy()
10
11 for j in range(0,ny-1):
12 sol[0,j] = 10.0
13 sol[nx-1,j] = 1.0
14 # end for
15
16 for i in range(0,nx-1):
17 sol[i,0] = 0.0
18 sol[i,ny-1] = 0.0
19 # end for
20
21 # Iterate
22
15%
18.07.2013
rq2 ra92
08 set rq3 cdrom
09
10 attach rq0 d0.dsk
11 attach rq1 d1.dsk
12 attach rq2 d2.dsk
13
14 attach -r rq3 cdrom.iso
15
16 set rl disable
17 set ts disable
18
19 set xq mac=08-00-2B-AA-BB-CC
20
15%
12.09.2013
;
05
06 print "Status: 200\nContent-Type: text/plain\n\n";
07 $|=1; $|=0; # flush
08
09 my $dbh=DBI->connect('dbi:Pg:dbname=r2', 'ipp', undef, {RaiseError=>1});
10
11 my $sth
14%
04.10.2018
"data_dir": "/var/consul",
08 "datacenter": "Datacenter-A",
09 "disable_update_check": true,
10 "enable_script_checks": true,
11 "enable_syslog": true,
12 "encrypt": "xxxxxxxxxxxxxx
14%
30.01.2020
region: eu-west-3
08 licensefile: license.lic
09 wholenet: 10.100.0.0/16
10 frontnet: 10.100.254.0/28
11 netmaskback: 17
12 backnet: "10.100.0.0/{{ netmaskback }}"
13 lnet: 10.0.2.0
14%
14.11.2013
use strict;
04 use Exporter;
05 use vars qw($VERSION @ISA @EXPORT @EXPORT_OK %EXPORT_TAGS);
06
07 $VERSION = 1.0;
08 @ISA = qw(Exporter);
09 @EXPORT = ();
10 @EXPORT_OK = qw
14%
01.08.2019
. The takeaway is the -j LOG option (line 12), which logs port scanning behavior to a logfile with the iptables:
prefix.
Listing 1
iptable Rules
01 *filter
02 *filter
03 :INPUT ACCEPT [0:0]
04