7%
30.11.2020
"conditions": [
05 {
06 "type": "RuntimeReady",
07 "status": true,
08 "reason": "",
09 "message": ""
10 },
11 {
12 "type": "NetworkReady",
13
7%
30.11.2025
an Asterisk PBX as an HA resource
07 #
08 # Authors: Martin Gerhard Loschwitz
09 # Florian Haas
10 #
11 # Support: linux-ha@lists.linux-ha.org
12 # License: GNU General Public
7%
12.05.2021
.
Listing 6: iostat
Output
$ iostat -x -d 2 -c
Linux 5.4.12-050412-generic (dev-machine) 03/14/2021 _x86_64_ (4 CPU)
avg-cpu: %user %nice %system %iowait %steal %idle
0.79 0
7%
02.08.2021
at two-second intervals.
Listing 6
iostat Output
$ iostat -x -d 2 -c
Linux 5.4.12-050412-generic (dev-machine) 03/14/2021 _x86_64_ (4 CPU)
avg-cpu: %user %nice %system %iowait
7%
30.11.2020
== 0:
08 data = { 'key1' : [10,10.1,10+11j],
09 'key2' : ('mpi4py' , 'python'),
10 'key3' : array([1, 2, 3]) }
11 else:
12 data = None
13 # end if
14
15 data = comm
7%
11.02.2016
prompts you for your access and secret key (Figure 6). As an Amazon user, you are given both on registering with the service [12]. Next, click on your own name in the top right corner, select Security
7%
30.11.2025
endpoint1=192.168.80.0/24
07 endpoint2=192.168.2.0/24
08 action=requireinrequireout
09 auth1=computerpsk
10 auth1psk="test123"
11 qmsecmethods=esp:sha1-3des
12 qmpfs=dhgroup2
If you need
7%
09.10.2017
rule phishing_pdf {
02
03 meta:
04 author = "James Stanger"
05 last_updated = "2017-09-12"
06 category = "phishing"
07 confidence = "high"
08 threat_type = "phishing exploit"
09 description
7%
06.10.2019
used the example configuration file from the installation help page [6] (Listing 1). As you can see in line 12, the following container image registries are to be searched:
docker.io
registry
7%
25.03.2020
_DATA=$1
06
07 # This is the Event Data
08 echo $EVENT_DATA
09
10 # Example of command usage
11 EVENT_JSON=$(echo $EVENT_DATA | jq .)
12
13 # Example of AWS command that's output will show up