24%
14.08.2017
: true, status: 200}
18 json @response_message
19 end
20
21 get '/contacts/:name' do
22 @name = params['name']
23 @contact = Contact.where(name: @name).first
24 @response_message = {data: [@contact
24%
21.08.2012
just two nodes: test1, which is the master node, and n0001, which is the first compute node):
[laytonjb@test1 ~]$ pdsh -w test1,n0001 uptime
test1: 18:57:17 up 2:40, 5 users, load average: 0.00, 0.00
24%
09.12.2021
-e package-list.txt
Enter passphrase:
Re-enter passphrase:
Output filename is: package-list.txt.lrz
package-list.txt - Compression Ratio: 2.537. Average Compression Speed: 0.000MB/s.
Total time: 00:00:05.11
Listing 11
24%
25.03.2021
(Listing 1), which indicates a push.
Listing 1
Server Push in Log
2020-11-22T12:01:10+01:00 1606042870.567 200 605 h2 "GET /index.html HTTP/2.0"
2020-11-22T12:01:10+01:00 1606042870.567 200
24%
02.02.2021
of their toolkits.
For example, you can install and use Splunk Enterprise and its Machine Learning Toolkit (Figure 6) with a trial license for up to 60 days and index up to 500MB of data per day. The software
24%
27.05.2025
meet some disk space requirements for installing DNF, as well: at least 512MB of free space available in /tmp, /opt, and /var. If necessary, increase the amount of free disk space in each filesystem
24%
02.02.2021
dockerrepo.matrix.dev/gentoo-glibc:latest-amd64 && touch pushtime
Sending build context to Docker daemon 21.12MB
Step 1/2 : FROM dockerrepo.matrix.dev/gentoo-base:latest
---> 22fe37b24ebe
Step 2/2 : ADD
24%
10.11.2021
package-list.txt
Output filename is: package-list.txt.lrz
package-list.txt - Compression Ratio: 2.604. Average Compression Speed: 0.000MB/s.
Total time: 00:00:00.04
By default, lrzip
does not overwrite the original file
24%
20.10.2013
: Z1F35P0G
LU WWN Device Id: 5 000c50 050b954c3
Firmware Version: CC27
User Capacity: 3,000,592,982,016 bytes [3.00 TB]
Sector Sizes: 512 bytes logical, 4096 bytes physical
Device is: In smartctl
24%
03.12.2015
, it outputs the message Hello World!
.
To test the script on a local web server, run the following command:
# nmap --script /path/http-vuln-check local targetlhost -p 22,80,443
The output should look