9%
    
    
    09.10.2017
        
    
    	
        _consumer_secret>"
06   config.access_token        = ""
07   config.access_token_secret = ""
08 end
09
10 user = client.user("23Cent")
11 puts user.name
12
13 def collect
    
 
		    
				        
    9%
    
    
    10.04.2015
        
    
    	
                  |       Destination Port        |
07    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
08    |                        Sequence Number                        |
09
    
 
		    
				        
    9%
    
    
    28.11.2021
        
    
    	
         2
01 global:
02  scrape_interval: 15s
03  evaluation_interval: 15s
04
05 ########## ALERTING CONFIGURATION ##########
06
07 alerting:
08  alertmanagers:
09  - static_configs:
10    - targets:
11
    
 
		    
				        
    9%
    
    
    07.10.2014
        
    
    	
        _string;
08
09 static int prochello_show( struct seq_file *m, void *v )
10 {
11     int error = 0;
12
13     error = seq_printf( m, "%s\n", output_string);
14     return error;
15 }
16
17 static int prochello
    
 
		    
				        
    9%
    
    
    14.08.2017
        
    
    	
           ANNOTATIONS {
07     summary = "Instance {{ $labels.instance }} down",
08     description = "{{ $labels.instance }} of job {{ $labels.job }} has been down for more than 5 minutes.",
09   }
If an alert
    
 
		    
				        
    9%
    
    
    09.01.2013
        
    
    	
        /one/oned.conf
01 VM_HOOK = [
02     name      = "vm_switchon",
03     on        = "RUNNING",
04     command   = "account.sh",
05     arguments = "on $ID" ]
06
07 VM_HOOK = [
08     name      = "vm_switchoff",
09
    
 
		    
				        
    9%
    
    
    30.11.2020
        
    
    	
         == 0:
08   data = { 'key1' : [10,10.1,10+11j],
09            'key2' : ('mpi4py' , 'python'),
10            'key3' : array([1, 2, 3]) }
11 else:
12   data = None
13 # end if
14
15 data = comm
    
 
		    
				        
    9%
    
    
    09.10.2017
        
    
    	
         rule phishing_pdf {
02
03 meta:
04   author = "James Stanger"
05   last_updated = "2017-09-12"
06   category = "phishing"
07   confidence = "high"
08   threat_type = "phishing exploit"
09   description
    
 
		    
				        
    9%
    
    
    22.12.2017
        
    
    	
        ": "glusterfs-cluster"
06     },
07     "subsets": [
08        {
09           "addresses": [
10              {
11                 "ip": "192,168,121,101"
12              }
13           ],
14           "ports
    
 
		    
				    
    9%
    
    
    25.10.2011
        
    
    	 
             authentication_algorithm pre_shared_key;
08     dh_group modp1024;
09   }
10   generate_policy off;
11 }
12 
13 sainfo address 192.168.2.0/24 any address 172.16.0.0/16 any {
14   pfs_group modp1024;
15