15%
30.11.2025
to perform the check before Icinga notifies
09 check_interval 5
10 retry_interval 1
11 check_period 24x7
12
15%
30.11.2025
+++++++++++++++++++++++--------
05 src/notification_proxy.c | 4 +++-
06 tools/idevicebackup2.c | 18 +++++++++++++-----
07 tools/ideviceimagemounter.c | 1 -
08 tools/ideviceinfo.c | 12 ++++++++----
09 7
15%
17.02.2015
return float(val)
08 except:
09 return None
10
11 with open(sys.argv[1]) as csvfile:
12 collec = MongoClient()["galaxy"]["comets"]
13 for row in csv.reader(csvfile, delimiter="\t"):
14 try
15%
10.04.2015
2 ]
12 then
13 # Clamscan error
14 echo "Scan error: ${WATCHMAN_ROOT}/$file" | \
mailx -s "Scan error" mail@example.com
15 fi
16 # Else no virus found
17 done
However
15%
11.06.2014
_auth;
04
05 group server => "hercules", "sugar";
06
07 desc "Get the uptime of all servers";
08
09 task "uptime", group => "server", sub {
10 my $output = run "uptime";
11 say $output;
12 }
You might
15%
13.12.2018
$ sqlcmd -S . -Usa -PXxXxXx
06 1> select @@version
07 2> go
08
09 -------------------------------------------------------------------
10
11 Microsoft SQL Server 2017 (RTM-CU7) (KB4229789) - 14.0.3026.27 (X64
15%
30.11.2025
application space: spaceuploader
09 Contacting https://openshift.redhat.com
10
11 RESULT:
12 Successfully created application: spaceuploader
13
14 Checking ~/.ssh/config
15 Contacting https://openshift.redhat.com
15%
29.09.2020
",
04 "visible": true,
05 "color": "green",
06 "user": "root"
07 },
08 "web server": {
09 "address": "192.168.2.4",
10 "visible": true,
11 "color": "rgb(100, 200, 0)",
12
15%
09.10.2017
rule phishing_pdf {
02
03 meta:
04 author = "James Stanger"
05 last_updated = "2017-09-12"
06 category = "phishing"
07 confidence = "high"
08 threat_type = "phishing exploit"
09 description
15%
30.11.2025
an Asterisk PBX as an HA resource
07 #
08 # Authors: Martin Gerhard Loschwitz
09 # Florian Haas
10 #
11 # Support: linux-ha@lists.linux-ha.org
12 # License: GNU General Public