13%
05.02.2023
Map
18 metadata:
19 name: mariadb
20 labels:
21 app: mariadb
22 data:
23 MYSQL_ROOT_PASSWORD: mysqlroot
24 MYSQL_DATABASE: db1
25 MYSQL_USER: mysqluser
26 MYSQL_PASSWORD: mysqlpwd
13%
05.12.2019
# return data to MySQL (empty key here 'mysql:')
16 mysql:
17 failure:
18 gerrit:
19 Verified: -1
20 mysql:
21 require:
22 gerrit:
23 # prevents waste runs on %submit usage
24
13%
25.03.2020
"TracingConfig": {
17 "Mode": "PassThrough"
18 },
19 "CodeSha256": "37n/rzJz4o2lyvh4s2aet2aBlY=adc",
20 "Description": "",
21 "CodeSize": 432,
22 "FunctionArn": "arn
13%
22.12.2017
Message FormApp FormMessage where
18 renderMessage _ _ = defaultFormMessage
19 - the "FormApp" web application only provides one route
20 mkYesod "FormApp" [parseRoutes|
21 /contact ContactR GET |]
22
13%
18.02.2018
. The required modifications are explained in the Huginn wiki [3].
The software is based on Ruby on Rails [4] and therefore requires an installed Ruby environment; in fact, it needs version 2.2 or 2
13%
10.06.2015
that at an online MCrypt man page [22]. Using mcrypt is very similar to the other Crypt replacement tools (Listing 11).
Listing 11
Using MCrypt
$ ls -s
total 7288
196 hpc_001.html 7092 MFS2007.pdf
13%
04.08.2020
"mprotect",
19 "capget",
20 "getuid",
21 "wait4",
22 "pread64",
23 "Capset",
24 [snip...]
Unfortunately, I can't go too deep into seccomp in this article
13%
04.08.2020
grants permissions to enable GuardDuty.
If some instances expose ports like 22 or 3389 to the world (0.0.0.0/0), you should soon see some findings of malicious IPs trying to get into your systems
13%
06.10.2019
.get('mail')
22 if not useremail:
23 print "User " + username + " has no Email address in LDAP"
24 # Import smtplib for the actual sending function
25
13%
11.10.2016
(streams
22 (default :ttl 60
23 ; immediate indexing of all incoming events:
24 index
25
26 ; Forward errors, sorted by tags:
27 (where (state "error")
28 (where (tagged