15%
07.06.2019
check_args "$@"
13
14 local image=$1
15 local token=$(get_token $image)
16 local tags=$(get_tags $image $token)
17 echo "tags reported are:"
18 echo $tags
19 }
20
21 get_token() {
22 local
15%
15.08.2016
via 192.168.1.1 dev eth1
13 $ ip netns exec ns1 ping -c2 8.8.8.8
14 PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.
15 64 bytes from 8.8.8.8: icmp_seq=1 ttl=51 time=22.1 ms
16 64 bytes from 8.8.8.8: icmp
15%
12.09.2013
=$dbh->prepare('select burncpu(?)');
12 $sth->execute((($ENV{QUERY_STRING}+0) || .5).'s');
13
14 while( my $row=$sth->fetchrow_arrayref ) {
15 print "@$row\n";
16 }
Workaround
The script is simple, but the attentive
15%
06.08.2012
> Contacts
07/28/2012 02:38 PM
Desktop
07/27/2010 08:15 AM Diskeeper
07/11/2012 03:17 PM Documents
07/29/2012 03:51 PM Downloads
07
15%
04.04.2023
these images with the Trivy command-line interface (CLI), the current official Debian image tallies 81 vulnerabilities (61 low, 16 high, and four critical). Ubuntu does very well with only 17 (15 low and two
15%
28.11.2022
].
Distributions in the Microsoft Store
Debian GNU/Linux
Fedora Remix for WSL
Kali Linux
Ubuntu 22.04 LTS, 20.04, 20.04 ARM, 18.04, 18.04 ARM, 16.04
SUSE Linux Enterprise Server 15 SP3, 15 SP2
15%
10.06.2015
"} )
09
10 # force called programs to english output
11 LANG=C LC_ALL=C
12
13 function die {
14 echo 1>&2 "$*"
15 exit 10
16 }
17
18 function get_display_resolution {
19 local find_display="$1
15%
27.09.2021
ssh ubuntu@52.90.56.122; do sleep 1; done
ssh: connect to host 52.90.56.122 port 22: Connection refused
ssh: connect to host 52.90.56.122 port 22: Connection refused
[ output truncated ]
Welcome
15%
28.11.2022
.
action: Replace the device using 'zpool replace'.
see: https://openzfs.github.io/openzfs-docs/msg/ZFS-8000-4J
scan: scrub in progress since Mon Oct 24 17:11:22 2022
80.7M scanned at 80.7M
15%
05.03.2014
3.5.0-44-generic (hercules) 03.12.2013 _x86_64_ (2 CPU)
09:46:03 runq-sz plist-sz ldavg-1 ldavg-5 ldavg-15 blocked
09:46:13