11%
07.11.2011
core : ' + str(icore)
07
08 if '__main__' == __name__:
09
10 osrvr = Server()
11 ncpus = osrvr.get_ncpus()
12
13 djobs = {}
14 for i in xrange(0, ncpus):
15 djobs[i] = osrvr
11%
07.11.2011
#include
03 #endif
04 #include
05 int main() {
06 double a[1000000];
07 int i;
08 #pragma omp parallel for
09 for (i=0; i<1000000; i++) a[i]=i;
10 double sum = 0;
11
11%
07.06.2019
-jdk-alpine
02
03 RUN apk add --no-cache git openssh-client curl bash # for Jenkins AWT
04 ttf-dejavu
05
06 ARG JENKINS_USER=jenkins
07 ARG UID=1000
08 ARG HTTP_PORT=8080
09 ARG JENKINS
11%
04.10.2018
"data_dir": "/var/consul",
08 "datacenter": "Datacenter-A",
09 "disable_update_check": true,
10 "enable_script_checks": true,
11 "enable_syslog": true,
12 "encrypt": "xxxxxxxxxxxxxx
11%
22.05.2012
dhcp.x86_64 12:4.1.1-25.P1.el6_2.1 will be installed
---> Package mod_perl.x86_64 0:2.0.4-10.el6 will be installed
--> Processing Dependency: perl(BSD::Resource) for package: mod_perl-2.0.4-10.el6.x86
11%
01.08.2019
. The takeaway is the -j LOG option (line 12), which logs port scanning behavior to a logfile with the iptables:
prefix.
Listing 1
iptable Rules
01 *filter
02 *filter
03 :INPUT ACCEPT [0:0]
04
11%
10.04.2015
for changed files from the command line).
Listing 1
Configuration File
01 {
02 "version": "3.0.0",
03 "watched": [
04 {
05 "path": "/opt/repos",
06 "triggers": []
07 }
08
11%
14.03.2018
vpc-id: "{{ myvpcint.vpc.id }}"
06 register: inttables
07 tags: gatherroutes
08
09 - name: Set Route out
10 ec2_vpc_route_table:
11 vpc_id: "{{ myvpcint.vpc.id }}"
12 region: "{{ region
11%
03.02.2022
class BlazeDemoV1 extends Simulation {
08
09 var qualifiedhost = "http://blazedemo.com"
10 var proxyport = 0
11 var proxyhost = "not set"
12
13 // headers for HTTP call
14 val headers = Map(
15
11%
21.08.2014
hv = [ "tiffy.tuxgeek.de", "ernie.tuxgeek.de" ]
07
08 for hv_host in hv:
09
10 uri = "qemu+ssh://virtuser@" + hv_host + "/system"
11 conn = libvirt.openReadOnly(uri)
12
13 hypervisor_name = conn