15%
30.01.2020
region: eu-west-3
08 licensefile: license.lic
09 wholenet: 10.100.0.0/16
10 frontnet: 10.100.254.0/28
11 netmaskback: 17
12 backnet: "10.100.0.0/{{ netmaskback }}"
13 lnet: 10.0.2.0
15%
30.11.2025
endpoint1=192.168.80.0/24
07 endpoint2=192.168.2.0/24
08 action=requireinrequireout
09 auth1=computerpsk
10 auth1psk="test123"
11 qmsecmethods=esp:sha1-3des
12 qmpfs=dhgroup2
If you need
15%
05.11.2018
# for your environment.
05 #
06 #
07 # slurm.conf file generated by configurator.html.
08 #
09 # See the slurm.conf man page for more information.
10 #
11 ClusterName=compute-cluster
12 Control
15%
13.12.2018
.conf file generated by configurator.html.
08 #
09 # See the slurm.conf man page for more information.
10 #
11 ClusterName=compute-cluster
12 ControlMachine=slurm-ctrl
13 #
14 SlurmUser=slurm
15 Slurmctld
15%
05.12.2016
Version: v1
02 kind: Pod
03 metadata:
04 name: nginx
05 spec:
06 containers:
07 - name: nginx
08 image: nginx
09 ports:
10 - containerPort: 80
A replication controller [12], however
15%
01.08.2019
. The takeaway is the -j LOG option (line 12), which logs port scanning behavior to a logfile with the iptables:
prefix.
Listing 1
iptable Rules
01 *filter
02 *filter
03 :INPUT ACCEPT [0:0]
04
15%
30.11.2025
:
09 Content-Type: application/sdp
10 Content-Length: 142
11
12 v=0
13 o=alice 53655765 2353687637 IN IP4 pc33.atlanta.com
14 s=-
15 t=0 0
16 c=IN IP4 pc33.atlanta.com
17 ... 0
15%
14.11.2013
use strict;
04 use Exporter;
05 use vars qw($VERSION @ISA @EXPORT @EXPORT_OK %EXPORT_TAGS);
06
07 $VERSION = 1.0;
08 @ISA = qw(Exporter);
09 @EXPORT = ();
10 @EXPORT_OK = qw
15%
15.08.2016
: lo:
mtu 65536 qdisc noqueue state UNKNOWN group default
06 inet 127.0.0.1/8 scope host lo
07 valid_lft forever preferred_lft forever
08 3: eth1:
15%
30.11.2025
passphrase again:
08 Your identification has been saved in /home/UserName/.ssh/libra_id_rsa.
09 Your public key has been saved in /home/UserName/.ssh/libra_id_rsa.pub.
10 Creation successful
11
12 You may now