18%
09.10.2017
rule phishing_pdf {
02
03 meta:
04 author = "James Stanger"
05 last_updated = "2017-09-12"
06 category = "phishing"
07 confidence = "high"
08 threat_type = "phishing exploit"
09 description
18%
10.04.2015
]
09 }
The next step is to define what action to trigger. The syntax is:
watchman -- trigger /opt/repos 'repos-sync' \
-- /usr/local/sbin/sync.sh /opt/repos
Where 'repos
18%
14.03.2018
key_material: "{{ item }}"
09 state: present
10 region: "{{ region }}"
11 with_file: /home/user/.ssh/id_rsa.pub
12 register: sshkey
13 tags: sshkey
14
15 - name: Create VPC INT
16 ec2
18%
30.01.2020
VPC:
04 Type: AWS::EC2::VPC
05 Properties:
06 CidrBlock:
07 Ref: VPCNet
08 Tags:
09 - Key: Name
10 Value:
11 Ref: VPCName
12
13 Forti
18%
02.06.2020
= sol.copy()
10
11 for j in range(0,ny-1):
12 sol[0,j] = 10.0
13 sol[nx-1,j] = 1.0
14 # end for
15
16 for i in range(0,nx-1):
17 sol[i,0] = 0.0
18 sol[i,ny-1] = 0.0
19 # end for
20
21 # Iterate
22
18%
21.08.2014
/origin/HEAD -> origin/master
09 remotes/origin/android-goldfish-2.6.29
10 remotes/origin/android-goldfish-3.4
11 remotes/origin/linux-goldfish-3.0-wip
12 remotes/origin/master
13 [...]
14 [root@pc]# git checkout ... 22
18%
12.09.2013
. There are some new lines: 5 and 12 to 22. Line 22 installs the sig function as a signal handler for SIGTERM. When the signal arrives, line 13 opens a new connection to the database and calls the pg
18%
02.06.2020
": "83d60b98-5864-45c6-94ad-4d02f5f4216a",
11 "url": "/v2/routes/83d60b98-5864-45c6-94ad-4d02f5f4216a",
12 "created_at": "2019-11-09T10:40:04Z",
13 "updated_at": "2019-11-09T10
18%
10.04.2015
Enter the server hostname: |openshift.redhat.com|
08
09 You can add more servers later using 'rhc server'.
10
11 Login to openshift.redhat.com: mfeilner@linux-magazin.de
12 Password: **********
13
14 Open
18%
05.11.2018
# for your environment.
05 #
06 #
07 # slurm.conf file generated by configurator.html.
08 #
09 # See the slurm.conf man page for more information.
10 #
11 ClusterName=compute-cluster
12 Control