14%
14.11.2013
RHNSession;
06
07 my ($client, $session) = RHNSession::Session;
08
09 my $channels = $client->call('channel.listSoftwareChannels', $session);
10
11 foreach my $channel (@$channels) {
12 print $channel
14%
09.10.2017
rule phishing_pdf {
02
03 meta:
04 author = "James Stanger"
05 last_updated = "2017-09-12"
06 category = "phishing"
07 confidence = "high"
08 threat_type = "phishing exploit"
09 description
14%
10.04.2015
the patch for kernel versions 3.18 and 3.19.x [17]. If you are uncertain as to how to proceed, you can either look for help on the Internet or check out Julian Kirsch's [12] master's thesis. You will find
14%
30.11.2025
stream: ext://sys.stdout
08 loggers:
09 myLogger:
10 handlers: [myHandler]
11 root:
12 handlers: [rootHandler]
Conclusions
The logging module in Python is easy to use and sufficiently
14%
01.08.2019
and "closed" in line and "preauth" in line:
06 srcIP=line.split()[8]
07 print(srcIP)
08 raiseAlert(relay)
09 sendAlert(args.server, srcIP)
10
11 line=iptablesFile.readline()
12
14%
07.11.2011
compute(istart, iend):
06 isum = 0
07 for i in xrange(istart, iend+1):
08 isum += i**3 + 123456789*i**10 + i*23456789
09
10 return isum
11
12 if '__main__' == __name__:
13
14
14%
30.11.2025
if '__main__' == __name__:
09
10 p1 = Process(target = test, args = ('Rich',))
11 p2 = Process(target = test, args = ('Nus',))
12 p3 = Process(target = test, args = ('Geeks',))
13
14 p2.start
14%
07.06.2019
= 50ms;
07 .interval = 3s;
08 .window = 10;
09 .threshold = 8;
10 }
11 }
12
13 set beresp.grace = 12h;
Changes on the Fly
The reverse proxy not only delivers web pages
14%
30.11.2025
#auto eth0
06 #iface eth0 inet dhcp
07 auto br0
08 iface br0 inet dhcp
09 bridge_ports eth0
10 bridge_stp off
11 bridge_maxwait 5
12 post-up /usr/sbin/brctl setfd br0 0
Next, create a directory
14%
14.03.2013
=/opt/pjsua.conf
06 SOUNDFILE=/tmp/alert.wav
07 TEXT2WAVE=/usr/bin/text2wave
08 DURATION=20
09 NUMBER=01234567890
10 MESSAGE="Monitoring Alert"
11
12 # Setting a lock file
13 # We can't make more than one call
14