20%
03.02.2022
class BlazeDemoV1 extends Simulation {
08
09 var qualifiedhost = "http://blazedemo.com"
10 var proxyport = 0
11 var proxyhost = "not set"
12
13 // headers for HTTP call
14 val headers = Map(
15
20%
25.10.2011
authentication_algorithm pre_shared_key;
08 dh_group modp1024;
09 }
10 generate_policy off;
11 }
12
13 sainfo address 192.168.2.0/24 any address 172.16.0.0/16 any {
14 pfs_group modp1024;
15
20%
09.12.2019
.00%|
154| 12724500| 46.7333| 3.6727e-06| 3.09%| d = 0.0
155| 50898000| 195.426| 3.83956e-06| 12.94%| for k in range(0, d_num):
156
20%
01.08.2019
:FORWARD ACCEPT [0:0]
05 :OUTPUT ACCEPT [125:13440]
06 -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
07 -A INPUT -p icmp -j ACCEPT
08 -A INPUT -i lo -j ACCEPT
09 -A INPUT -p tcp -m state --state
20%
09.10.2017
rule phishing_pdf {
02
03 meta:
04 author = "James Stanger"
05 last_updated = "2017-09-12"
06 category = "phishing"
07 confidence = "high"
08 threat_type = "phishing exploit"
09 description
20%
22.12.2017
MySettings(..)
04 , newSettings
05 )where
06 import [...]
07 -- type synonym
08 type Max = Int
09 --Datentyp MySettings
10 data MySettings = MySettings
11 { myMax :: Max }
12
20%
06.10.2019
* argv [])
06 /*@requires maxRead(argv) >= 1 @*/
07 /*@-modfilesys@*/
08 {
09 /*@-initallelements@*/
10 char buffer [BUFSIZE] = {'\0'};
11 /*@+initallelements@*/
12 if ( ( argc
20%
14.03.2018
vpc-id: "{{ myvpcint.vpc.id }}"
06 register: inttables
07 tags: gatherroutes
08
09 - name: Set Route out
10 ec2_vpc_route_table:
11 vpc_id: "{{ myvpcint.vpc.id }}"
12 region: "{{ region
20%
09.01.2013
metadata tables...
08 Dumping metadata...
09 ..objects..
10 ..blocks..
11 ..inodes..
12 ..inode_blocks..
13 ..symlink_targets..
14 ..names..
15 ..contents..
16 ..ext_attributes..
17 Compressing and uploading
20%
16.02.2012
[OOOOOOOOOOOOOOO] 15/15
09
10 Files: 1
11 Directories: 0
12 Touched Pages: 15 (60K)
13 Elapsed: 0.001102 seconds
14 $
The -t
option “touches” the pages of the file, causing it to be loaded into the page