13%
05.12.2016
Version: v1
02 kind: Pod
03 metadata:
04 name: nginx
05 spec:
06 containers:
07 - name: nginx
08 image: nginx
09 ports:
10 - containerPort: 80
A replication controller [12], however
13%
30.01.2020
| 12724500| 46.7333| 3.6727e-06| 3.09%| d = 0.0
155| 50898000| 195.426| 3.83956e-06| 12.94%| for k in range(0, d_num):
156| 38173500| 165.494| 4.33531e
13%
25.03.2020
_DATA=$1
06
07 # This is the Event Data
08 echo $EVENT_DATA
09
10 # Example of command usage
11 EVENT_JSON=$(echo $EVENT_DATA | jq .)
12
13 # Example of AWS command that's output will show up
13%
16.10.2012
($ssh, '/sbin/ifconfig');
07 stream_set_blocking($stream, true);
08
09 $response = '';
10 while($buffer = fread($stream, 4096)) {
11 $response .= $buffer;
12 }
13
14 fclose($stream);
15 echo $response;
16
17
13%
05.02.2019
Version: "2.0.0"
02
03 globalEnvVars:
04 - key: "MYSQL_USER"
05 value: "dev"
06 - key: "MYSQL_PASSWORD"
07 value: "123456"
08
09 commandTests:
10
11 # Is the MySQL package installed?
12 - name: "MySQL package
13%
03.12.2015
(msg.payload))
07
08 mqtt = paho.Client()
09 mqtt.on_message = on_message
10
11 mqtt.connect("localhost", 1883, 60)
12 mqtt.subscribe("linux/+", 0)
13
14 mqtt.loop_forever()
The client now connects
13%
29.09.2020
.168.2.17",
04 "visible": true,
05 "color": "green",
06 "user": "root"
07 },
08 "web server": {
09 "address": "192.168.2.4",
10 "visible": true,
11 "color": "rgb(100, 200, 0)",
12
13%
09.12.2019
| 0| 0| 0| 0.00%|
154| 12724500| 46.7333| 3.6727e-06| 3.09%| d = 0.0
155| 50898000| 195.426| 3.83956e-06| 12.94%| for k in range(0, d_num):
156
13%
30.11.2025
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple
13%
06.10.2019
# The only valid categories are: 'registries.search', 'registries.insecure',
09 # and 'registries.block'.
10
11 [registries.search]
12 registries = ['docker.io', 'registry.fedoraproject.org', 'quay