20%
14.03.2018
key_material: "{{ item }}"
09 state: present
10 region: "{{ region }}"
11 with_file: /home/user/.ssh/id_rsa.pub
12 register: sshkey
13 tags: sshkey
14
15 - name: Create VPC INT
16 ec2
20%
05.12.2019
THISREADHANDLE->autoflush(1);
07
08 if ($processed = fork) {
09 close THISWRITEHANDLE;
10 while (defined($text = )) {
11 print $text;
12 }
13 close THISREADHANDLE;
14 waitpid
20%
14.11.2013
Controller
login2$ ls -s /sys/devices/system/edac/mc/mc0
total 0
0 ce_count 0 csrow1 0 csrow4 0 csrow7 0 reset_counters 0 size_mb
0 ce_noinfo_count 0 csrow2 0 csrow5 0 device 0 sdram
20%
04.12.2013
3 type rec
4 integer :: x, y, z
5 real :: value
6 end type rec
7
8 integer :: counter
9 integer :: counter_limit
10 integer :: ierr
11
12 type (rec) :: my
20%
09.10.2017
rule phishing_pdf {
02
03 meta:
04 author = "James Stanger"
05 last_updated = "2017-09-12"
06 category = "phishing"
07 confidence = "high"
08 threat_type = "phishing exploit"
09 description
20%
25.09.2013
)
8 (4)
7.2
0.9
Nehalem-EP (2009)
8 (4)
32
4
Westmere-EP (2010)
12 (6)
42
3.5
Westmere-EP (2010)
8 (4)
42
20%
05.12.2016
. The holdingdisk section (lines 22 to 26) specifies the key data for such a holding disk. In Listing 1, Amanda is allowed to cache data in the /amanda/holding directory, where it can use a maximum of 50MB space; any
20%
10.04.2015
]
09 }
The next step is to define what action to trigger. The syntax is:
watchman -- trigger /opt/repos 'repos-sync' \
-- /usr/local/sbin/sync.sh /opt/repos
Where 'repos
20%
25.03.2020
/share/doc/stunnel*/. The example in Listing 1 shows a very simple configuration that uses stunnel as a plain vanilla TLS client.
Listing 1
Stunnel as a TLS Client
; global settings
sslVersion = TLSv1.2
chroot = /var
20%
28.11.2023
image: monitoror/monitoror:${MTRRTAG:-latest}
05 ports:
06 - "38080:8080"
07 environment:
08 - "MO_CONFIG=/etc/config.json"
09 restart: unless-stopped
10
11 networks:
12 default