21%
17.02.2015
use generic-service
21 host_name w2k12srv
22 service_description Memory Usage
23 check_command check_nt!MEMUSE!-w 80 -c 90
24 }
25 define service{
26
21%
29.09.2020
-system svclb-traefik-p46m5 2/2 Running 0 11m
kube-system coredns-d798c9dd-kjhjv 1/1 Running 0 12m
kube-system traefik-6787cddb4b-594
21%
07.03.2019
Loops
Fortran
C
!$acc parallel loop
do i=1,n
A(i) = B(i) + C(i)
enddo
!$acc parallel loop
do j=1,m
B(i) = B(i) * D(i)
enddo
#pragma
21%
11.04.2016
toolkit for joomla
UrlToolkit {
ToolkitID = joomla
Match base64_encode[^(]*\([^)]*\) DenyAccess
Match (<|%3C)([^s]*s)+cript.*(>|%3E) DenyAccess
Match GLOBALS(=|\[|\%[0-9A-Z]{0,2}) Deny
21%
13.07.2022
.
Figure 5: Terminal after creating a new tmux window.
To cycle through windows, press Ctrl+B-n (next), Ctrl+B-p (previous), or Ctrl+B-x
(where x
=0-9) to go to a specific window. If you type Ctrl
20%
05.12.2014
(HostCt, ServerOwner, Date) %>%
106 arrange(desc(HostCt))
107 head12 <- head(top12, 25)
108
109 mergedTop25 <- rbind(head1,head2,head3,head4,head5,
head6,head7,head8,head9,head10,head11,head12)
110
111
20%
05.09.2011
can see how the arp cache poisoning works:
$ sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 \
-D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2:78:9E \
-H 00:22:6E:71:04:BB -M 00:0C:29:B2:78:9E
20%
28.11.2021
can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection" [1], has been written up in a number of books. Linux Magazine
reported more than 12 years ago [2
20%
28.11.2023
://google.com"}},
10c7
< "label": "localhost PING/PORT/HTTP Tests",
---
> "label": "opensearch PING/PORT/HTTP Tests",
12,30c9,28
< {
< "type": "PING",
< "params": {
< "hostname": "129
20%
01.08.2019
INPUT
iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -A INPUT -i eth0 -j DROP
iptables -A INPUT -i eth1 -p tcp --dport 22 -j ACCEPT
iptables -A INPUT -i eth1 -j DROP