16%
17.02.2015
return float(val)
08 except:
09 return None
10
11 with open(sys.argv[1]) as csvfile:
12 collec = MongoClient()["galaxy"]["comets"]
13 for row in csv.reader(csvfile, delimiter="\t"):
14 try
16%
12.09.2013
see that the base module is by far the largest, weighing in at more than 200KB.
When a module is loaded, it is copied to /etc/selinux/targeted/modules/active/modules/. When the system is rebooted
16%
11.06.2014
_auth;
04
05 group server => "hercules", "sugar";
06
07 desc "Get the uptime of all servers";
08
09 task "uptime", group => "server", sub {
10 my $output = run "uptime";
11 say $output;
12 }
You might
16%
10.04.2015
2 ]
12 then
13 # Clamscan error
14 echo "Scan error: ${WATCHMAN_ROOT}/$file" | \
mailx -s "Scan error" mail@example.com
15 fi
16 # Else no virus found
17 done
However
16%
04.08.2011
.net.URL;
04 import java.util.Map;
05
06 import com.Xensource.xenapi.Connection;
07 import com.Xensource.xenapi.Host;
08 import com.Xensource.xenapi.Session;
09 import com.Xensource.xenapi.Task;
10
11 import de
16%
11.02.2016
text
06 );
07
08 INSERT INTO HR VALUES
09 ('DE', 'Berlin', 'Sales', 'Christian'),
10 ('DE', 'Berlin', 'Marketing', 'Sandra'),
11 ('DE', 'Frankfurt', 'Sales', 'Stefan'),
12 ('AT', 'Innsbruck', 'HR
16%
11.04.2016
Access
Match _REQUEST(=|\[|\%[0-9A-Z]{0,2}) DenyAccess
Match ^/index\.php Return
RequestURI exists Return
Match .* Rewrite /index.php
}
VirtualHost {
Hostname = www.thisisagreatwebsite.com
16%
09.10.2017
rule phishing_pdf {
02
03 meta:
04 author = "James Stanger"
05 last_updated = "2017-09-12"
06 category = "phishing"
07 confidence = "high"
08 threat_type = "phishing exploit"
09 description
16%
09.04.2019
"guardduty:*"
08 ],
09 "Resource": "*"
10 },
11 {
12 "Effect": "Allow",
13 "Action": [
14 "iam:CreateServiceLinkedRole"
15 ],
16 "Resource": "arn:aws:iam
16%
26.01.2025
contributorGalleryRole
11 ]
12 }
13
14 resource networkConnection 'Microsoft.DevCenter/networkConnections@2024-02-01' = {
15 name: networkConnectionName .. .. }
16
17 resource attachedNetworks 'Microsoft