13%
14.08.2017
('request_processing_seconds', 'Time spent processing request')
07
08 # Decorate function with metric.
09 @REQUEST_TIME.time()
10 def process_request(t):
11 """A dummy function that takes some time."""
12 time.sleep(t)
13
14
13%
11.02.2016
.com/hashicorp/otto/examples/mongodb"
06 }
07 }
08
09 project {
10 name = "my-project"
11 infrastructure = "my-infrastructure"
12 }
13
14 infrastructure "my-infrastructure" {
15 type = "aws"
16
13%
07.10.2014
seq_timeout = 10
08 tcpflags = syn
09 command = /usr/sbin/iptables -A INPUT -s \
%IP% -p tcp --dport 22 -j ACCEPT
10
11 [closeSSH]
12 sequence = 9000
13%
05.02.2019
": "node bin/hello-cdk.js",
03 "context": {
04 "cidr_by_env": {
05 "dev": "10.100.0.0/16",
06 "qa": "10.200.0.0/16",
07 "prod": "10.300.0.0/16"
08 },
09 "max_azs": {
10
13%
29.09.2020
.168.2.17",
04 "visible": true,
05 "color": "green",
06 "user": "root"
07 },
08 "web server": {
09 "address": "192.168.2.4",
10 "visible": true,
11 "color": "rgb(100, 200, 0)",
12
13%
26.02.2014
total packets: sent: 12,243,355 recv: 1,467,914
bytes sent: total: 16.90 G per-sec: 3.22 M/s
bytes recv: total: 114.04 M
13%
06.10.2019
used the example configuration file from the installation help page [6] (Listing 1). As you can see in line 12, the following container image registries are to be searched:
docker.io
registry
13%
28.11.2021
"
06 "fyne.io/fyne/v2/widget"
07 )
08
09 func main() {
10 a := app.New()
11 w := a.NewWindow("
")
12 w.Resize(fyne.NewSize(200, 200))
13 w.SetContent(widget.NewLabel("Hello World!"))
14
13%
05.02.2019
Version: "2.0.0"
02
03 globalEnvVars:
04 - key: "MYSQL_USER"
05 value: "dev"
06 - key: "MYSQL_PASSWORD"
07 value: "123456"
08
09 commandTests:
10
11 # Is the MySQL package installed?
12 - name: "MySQL package
13%
30.11.2025
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple