14%
30.11.2025
/07/10 15:41:50 krbtgt/TUXGEEK.DE@TUXGEEK.DE
10 renew until 08/06/10 15:41:50
11
12 # ldapsearch -LLL -h localhost -b "dc=tuxgeek,dc=de" uid=tscherf
13 SASL/GSSAPI authentication started
14 SASL username
14%
04.10.2018
"data_dir": "/var/consul",
08 "datacenter": "Datacenter-A",
09 "disable_update_check": true,
10 "enable_script_checks": true,
11 "enable_syslog": true,
12 "encrypt": "xxxxxxxxxxxxxx
14%
30.11.2025
endpoint1=192.168.80.0/24
07 endpoint2=192.168.2.0/24
08 action=requireinrequireout
09 auth1=computerpsk
10 auth1psk="test123"
11 qmsecmethods=esp:sha1-3des
12 qmpfs=dhgroup2
If you need
14%
17.06.2017
04 real :: var2
05 integer :: int1
06 end type other_struct
07
08 type my_struct ! Declaration of a Derived Type
09 integer :: i
10 real :: r
11 real*8 :: r8
12 real, dimension(100
14%
20.06.2022
.4'
02 services:
03 keycloak:
04 container_name: keycloak
05 image: quay.io/keycloak/keycloak:17.0.1
06 ports:
07 - 8080:8080
08 environment:
09 - KEYCLOAK
14%
30.11.2025
/nsswitch.conf (Konfigurieren der Namensauflösung)
08 ...
09 hosts files dns
10 ipnodes files dns
11 ...
12 # vi /etc/hosts
13 ::1 localhost
14 127.0.0.1 localhost
15 192.168.1.200 myiscsiserver myiscsiserver.local loghost
16
14%
30.01.2020
VPC:
04 Type: AWS::EC2::VPC
05 Properties:
06 CidrBlock:
07 Ref: VPCNet
08 Tags:
09 - Key: Name
10 Value:
11 Ref: VPCName
12
13 Forti
14%
30.11.2020
== 0:
08 data = { 'key1' : [10,10.1,10+11j],
09 'key2' : ('mpi4py' , 'python'),
10 'key3' : array([1, 2, 3]) }
11 else:
12 data = None
13 # end if
14
15 data = comm
14%
09.10.2017
rule phishing_pdf {
02
03 meta:
04 author = "James Stanger"
05 last_updated = "2017-09-12"
06 category = "phishing"
07 confidence = "high"
08 threat_type = "phishing exploit"
09 description
14%
09.01.2013
=/var/log/one/accounting.log
04
05 case "$1" in
06 "on"|"off")
07 mode=$1
08 shift
09 ;;
10 *)
11 echo "$0 error: wrong mode." >&2
12 exit 1
13 ;;
14 esac
15
16 if [ "$1