14%
10.04.2015
2 ]
12 then
13 # Clamscan error
14 echo "Scan error: ${WATCHMAN_ROOT}/$file" | \
mailx -s "Scan error" mail@example.com
15 fi
16 # Else no virus found
17 done
However
14%
11.02.2016
text
06 );
07
08 INSERT INTO HR VALUES
09 ('DE', 'Berlin', 'Sales', 'Christian'),
10 ('DE', 'Berlin', 'Marketing', 'Sandra'),
11 ('DE', 'Frankfurt', 'Sales', 'Stefan'),
12 ('AT', 'Innsbruck', 'HR
14%
21.08.2014
_wait_timeout": "30s",
08 "shutdown_command": "echo 'Done' | sudo -S shutdown -h now"
09 }],
10 "provisioners": [{
11 "type": "shell",
12 "inline": [
13 "sleep 30",
14 "sudo apt-get update",
15
14%
17.10.2011
.6.24: 1.5-23
05 pve-kernel-2.6.24-11-pve: 2.6.24-23
06 qemu-server: 1.1-16
07 pve-firmware: 1.0-5
08 libpve-storage-perl: 1.0-13
09 vncterm: 0.9-2
10 vzctl: 3.0.23-1pve11
11 vzdump: 1.2-5
12 vzprocps: 2
14%
14.03.2013
to jail>;
10 j.hostname = ;
11 j.ip_number = ;
12 /* call system call */
13 i = jail(&j);
14 [...]
15 execv(, ...);
16 [...]
17 exit(0);
18
14%
09.10.2017
rule phishing_pdf {
02
03 meta:
04 author = "James Stanger"
05 last_updated = "2017-09-12"
06 category = "phishing"
07 confidence = "high"
08 threat_type = "phishing exploit"
09 description
14%
09.04.2019
"guardduty:*"
08 ],
09 "Resource": "*"
10 },
11 {
12 "Effect": "Allow",
13 "Action": [
14 "iam:CreateServiceLinkedRole"
15 ],
16 "Resource": "arn:aws:iam
14%
25.03.2021
9 16:32:43 2021
Continue creating array? (y/n) y
mdadm: Defaulting to version 1.2 metadata
mdadm: array /dev/md0 started.
Listing 17
Verify 2GB Details
$ sudo mdadm --detail /dev
14%
18.07.2013
=> installed
04 }
05 file { "/etc/update-motd.d/10-mymotd":
06 ensure => "present",
07 source => "puppet:///modules/mypuppets/misc/10-mymotd",
08 owner => 'root',
09 group => 'root',
10
14%
03.02.2022
class BlazeDemoV1 extends Simulation {
08
09 var qualifiedhost = "http://blazedemo.com"
10 var proxyport = 0
11 var proxyhost = "not set"
12
13 // headers for HTTP call
14 val headers = Map(
15