28%
05.12.2014
instances in that file, as shown in Figure 3.
Figure 3: Grep says the five-line text file has four lines of the pattern "one."
Many extensions exist
28%
07.04.2022
starwars.py
#!/usr/bin/env python3
**
import yaml
from yaml.loader import SafeLoader
**
with open('starwars.yaml') as f: sw = yaml.load(f, Loader=SafeLoader) print(yaml.dump(sw, indent=4, default
28%
03.04.2024
: https://ciq.com/.
Apple's PQ3 Brings Post-Quantum Security to iMessage
The Apple security team has announced PQ3, a cryptographic security upgrade in iMessage. According to the announcement (https ... In the news: CIQ Offers Long-Term Support for Rocky Linux on AWS; Apple's PQ3 Brings Post-Quantum Security to iMessage; Google Open Sources Magika File-Type Detection System; Microsoft Announces Sudo
28%
31.10.2025
-switched voluntarily
x
Exit status of the command
Listing 3
Page Faults
$ /usr/bin/time gcc test.c -o test
0.03user 0.01system 0:00.07elapsed 70%CPU (0avgtext+0avgdata 25088
28%
30.11.2025
_notification_period weekend
06 }
Because this references the time period weekend
, I also need to set that up in timeperiods_nagios2.cfg
(Listing 3). The timeperiod
definition can also handle references to other
28%
30.11.2025
01 $ ar -tv Adaptec_Inc_bootbank_scsi-aacraid_5.0.5.1.7.28700-1OEM.500.0.0.406165.vib
02 --------- 0/0 1356 Jan 1 01:00 1970 descriptor.xml
03 --------- 0/0 2122 Jan 1 01:00 1970 sig.pkcs7
04
28%
06.10.2022
find ready-made policy bundles online for many use cases, and they are likely to contain a useful, predefined set of rules. A freely accessible Playground [2] and a free Styra Academy [3] can help you
28%
28.03.2012
/log/collectl -r00:00,7 -m -F60 -s+YZCD --iosize
################################################################################
# Collectl: V3.6.1-4 HiRes: 1 Options: -p localhost-20120310-133840.raw.gz -P -f
28%
30.11.2025
YZCD
03 # DaemonOpts: -f /var/log/collectl -r00:00,7 -m -F60 -s+YZCD --iosize
04 ################################################################################
05 # Collectl: V3.6.1-4 HiRes: 1 Options
28%
30.11.2025
crack attempt using the supplied password list file, password.lst. This list contains more than 3,000 commonly used passwords (Listing 2).
Listing 2
Cracking with the Password List File
01