Help for this page

Select Code to Download


  1. or download this
    ######################################################################
    +########\r\n# This system is a restricted access system.             
    +                  #\r\n# If collected security information reveals po
    +ssible criminal activity that  #\r\n# exceeds privileges, evidence of
    + such activity may be provided to the rele- #\r\n# vantauthorities fo
    +r further action. By continuing past this point, you #\r\n# expressly
    + consent to this security monitoring.              #\r\n#############
    +#################################################################\r\n
    +\r\nhostname: ~#
    
  2. or download this
    use strict;
    use Expect;
    ...
    );
    
    close $test;
    
  3. or download this
    hans@hans-desktop  ~  perl -v
    This is perl 5, version 30, subversion 0 (v5.30.0) built for x86_64-li
    +nux-gnu-thread-multi
    ...
    Match before : #######################################################
    +#######################\r\n# This system is a restricted access syste
    +m.                               #\r\n# If collected security informa
    +tion reveals possible criminal activity that  #\r\n# exceeds privileg
    +es, evidence of such activity may be provided to the rele- #\r\n# van
    +tauthorities for further action. By continuing past this point, you #
    +\r\n# expressly consent to this security monitoring.              #\r
    +\n###################################################################
    +###########\r\n\r\nhostname
    Match        : : ~#
    Match after  :
    
  4. or download this
    [hans@fedora ~]$ perl -v
    This is perl 5, version 34, subversion 0 (v5.34.0) built for x86_64-li
    +nux-thread-multi
    ...
    Match before : #######################################################
    +#######################\r\n# This system is a restricted access syste
    +m.                             
    Match        :   #
    Match after  : \r\n# If collected security information reveals possibl
    +e criminal activity that  #\r\n# exceeds privileges, evidence of such
    + activity may be provided to the rele- #\r\n# vantauthorities for fur
    +ther action. By continuing past this point, you #\r\n# expressly cons
    +ent to this security monitoring.              #\r\n##################
    +############################################################\r\n\r\nh
    +ostname: ~#