1 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
2 |
DENIED
|
moderate
|
App\Entity\Entry {#2384
+user: App\Entity\User {#259 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1734 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2452 …}
+slug: "creating-an-alias-of-a-command-with-plenty-special-characters"
+title: "creating an alias of a command with plenty special characters"
+url: null
+body: """
Hello all, I wan to create an alias of this command: `alias dockps = “docker ps --format “table {{.ID}}t{{.Names}}t{{.Status}}t{{.Ports}}””`\n
\n
The syntax for creating an alias is: `alias $COMMAND = “docker ps --format “table {{.ID}}t{{.Names}}t{{.Status}}t{{.Ports}}””`\n
\n
However, since there are quote marks, I assume they neet to be escaped with ``. But in the case above, I’m getting the errors in fish and bash.\n
\n
Fish error: `$ alias dockps = “docker ps --format “table {{.ID}} {{.Names}} {{.Status}} {{.Ports}}””`\n
\n
`alias: expected <= 2 arguments; got 3`\n
\n
Bash error: `$ alias dockps = “docker ps --format “table {{.ID}} {{.Names}} {{.Status}} {{.Ports}}”” bash: alias: dockps: not found bash: alias: =: not found bash: alias: docker ps --format “table {{.ID}} {{.Names}} {{.Status}} {{.Ports}}”: not found`\n
\n
What am I doing wrong?\n
\n
Thanks in advance!\n
\n
Edit: For fish shell users out there, this can be accomplished by using `func`: `$ function dockerps docker ps --format “table {{.ID}}t{{.Names}}t{{.Status}}t{{.Ports}}” end $ funcsave dockerps `\n
\n
I’m leaving the question up as the question with escape characters is still relevant and can be a learning resouce.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 9
+favouriteCount: 24
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1727302106 {#2386
date: 2024-09-26 00:08:26.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2378 …}
+votes: Doctrine\ORM\PersistentCollection {#2381 …}
+reports: Doctrine\ORM\PersistentCollection {#1910 …}
+favourites: Doctrine\ORM\PersistentCollection {#1909 …}
+notifications: Doctrine\ORM\PersistentCollection {#1926 …}
+badges: Doctrine\ORM\PersistentCollection {#1874 …}
+children: []
-id: 31883
-titleTs: "'alia':3 'charact':10 'command':6 'creat':1 'plenti':8 'special':9"
-bodyTs: "'2':87 '3':90 'accomplish':142 'advanc':131 'alia':8,12,30,32,75,85,93,104,109,113 'argument':88 'assum':52 'bash':72,91,103,108,112 'case':62 'charact':173 'command':11,33 'creat':6,28 'docker':14,34,77,95,114,148 'dockerp':147,161 'dockp':13,76,94,105 'edit':132 'end':159 'error':68,74,92 'escap':57,172 'expect':86 'fish':70,73,134 'format':16,36,79,97,116,150 'found':107,111,123 'func':145 'funcsav':160 'function':146 'get':66 'got':89 'hello':1 'howev':45 'id':18,38,81,99,118,152 'learn':181 'leav':164 'm':65,163 'mark':50 'name':20,40,82,100,119,154 'neet':54 'port':24,44,84,102,121,158 'ps':15,35,78,96,115,149 'question':166,170 'quot':49 'relev':176 'resouc':182 'shell':135 'sinc':46 'status':22,42,83,101,120,156 'still':175 'syntax':26 'tabl':17,37,80,98,117,151 'thank':129 'use':144 'user':136 'wan':4 'wrong':128"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705820891
+visibility: "visible "
+apId: "https://lemmy.ml/post/10790028"
+editedAt: DateTimeImmutable @1727023176 {#2382
date: 2024-09-22 18:39:36.0 +02:00
}
+createdAt: DateTimeImmutable @1705734491 {#2385
date: 2024-01-20 08:08:11.0 +01:00
}
} |
|
Show voter details
|
3 |
DENIED
|
edit
|
App\Entity\Entry {#2384
+user: App\Entity\User {#259 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1734 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2452 …}
+slug: "creating-an-alias-of-a-command-with-plenty-special-characters"
+title: "creating an alias of a command with plenty special characters"
+url: null
+body: """
Hello all, I wan to create an alias of this command: `alias dockps = “docker ps --format “table {{.ID}}t{{.Names}}t{{.Status}}t{{.Ports}}””`\n
\n
The syntax for creating an alias is: `alias $COMMAND = “docker ps --format “table {{.ID}}t{{.Names}}t{{.Status}}t{{.Ports}}””`\n
\n
However, since there are quote marks, I assume they neet to be escaped with ``. But in the case above, I’m getting the errors in fish and bash.\n
\n
Fish error: `$ alias dockps = “docker ps --format “table {{.ID}} {{.Names}} {{.Status}} {{.Ports}}””`\n
\n
`alias: expected <= 2 arguments; got 3`\n
\n
Bash error: `$ alias dockps = “docker ps --format “table {{.ID}} {{.Names}} {{.Status}} {{.Ports}}”” bash: alias: dockps: not found bash: alias: =: not found bash: alias: docker ps --format “table {{.ID}} {{.Names}} {{.Status}} {{.Ports}}”: not found`\n
\n
What am I doing wrong?\n
\n
Thanks in advance!\n
\n
Edit: For fish shell users out there, this can be accomplished by using `func`: `$ function dockerps docker ps --format “table {{.ID}}t{{.Names}}t{{.Status}}t{{.Ports}}” end $ funcsave dockerps `\n
\n
I’m leaving the question up as the question with escape characters is still relevant and can be a learning resouce.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 9
+favouriteCount: 24
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1727302106 {#2386
date: 2024-09-26 00:08:26.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2378 …}
+votes: Doctrine\ORM\PersistentCollection {#2381 …}
+reports: Doctrine\ORM\PersistentCollection {#1910 …}
+favourites: Doctrine\ORM\PersistentCollection {#1909 …}
+notifications: Doctrine\ORM\PersistentCollection {#1926 …}
+badges: Doctrine\ORM\PersistentCollection {#1874 …}
+children: []
-id: 31883
-titleTs: "'alia':3 'charact':10 'command':6 'creat':1 'plenti':8 'special':9"
-bodyTs: "'2':87 '3':90 'accomplish':142 'advanc':131 'alia':8,12,30,32,75,85,93,104,109,113 'argument':88 'assum':52 'bash':72,91,103,108,112 'case':62 'charact':173 'command':11,33 'creat':6,28 'docker':14,34,77,95,114,148 'dockerp':147,161 'dockp':13,76,94,105 'edit':132 'end':159 'error':68,74,92 'escap':57,172 'expect':86 'fish':70,73,134 'format':16,36,79,97,116,150 'found':107,111,123 'func':145 'funcsav':160 'function':146 'get':66 'got':89 'hello':1 'howev':45 'id':18,38,81,99,118,152 'learn':181 'leav':164 'm':65,163 'mark':50 'name':20,40,82,100,119,154 'neet':54 'port':24,44,84,102,121,158 'ps':15,35,78,96,115,149 'question':166,170 'quot':49 'relev':176 'resouc':182 'shell':135 'sinc':46 'status':22,42,83,101,120,156 'still':175 'syntax':26 'tabl':17,37,80,98,117,151 'thank':129 'use':144 'user':136 'wan':4 'wrong':128"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705820891
+visibility: "visible "
+apId: "https://lemmy.ml/post/10790028"
+editedAt: DateTimeImmutable @1727023176 {#2382
date: 2024-09-22 18:39:36.0 +02:00
}
+createdAt: DateTimeImmutable @1705734491 {#2385
date: 2024-01-20 08:08:11.0 +01:00
}
} |
|
Show voter details
|
4 |
DENIED
|
moderate
|
App\Entity\Entry {#2384
+user: App\Entity\User {#259 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1734 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2452 …}
+slug: "creating-an-alias-of-a-command-with-plenty-special-characters"
+title: "creating an alias of a command with plenty special characters"
+url: null
+body: """
Hello all, I wan to create an alias of this command: `alias dockps = “docker ps --format “table {{.ID}}t{{.Names}}t{{.Status}}t{{.Ports}}””`\n
\n
The syntax for creating an alias is: `alias $COMMAND = “docker ps --format “table {{.ID}}t{{.Names}}t{{.Status}}t{{.Ports}}””`\n
\n
However, since there are quote marks, I assume they neet to be escaped with ``. But in the case above, I’m getting the errors in fish and bash.\n
\n
Fish error: `$ alias dockps = “docker ps --format “table {{.ID}} {{.Names}} {{.Status}} {{.Ports}}””`\n
\n
`alias: expected <= 2 arguments; got 3`\n
\n
Bash error: `$ alias dockps = “docker ps --format “table {{.ID}} {{.Names}} {{.Status}} {{.Ports}}”” bash: alias: dockps: not found bash: alias: =: not found bash: alias: docker ps --format “table {{.ID}} {{.Names}} {{.Status}} {{.Ports}}”: not found`\n
\n
What am I doing wrong?\n
\n
Thanks in advance!\n
\n
Edit: For fish shell users out there, this can be accomplished by using `func`: `$ function dockerps docker ps --format “table {{.ID}}t{{.Names}}t{{.Status}}t{{.Ports}}” end $ funcsave dockerps `\n
\n
I’m leaving the question up as the question with escape characters is still relevant and can be a learning resouce.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 9
+favouriteCount: 24
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1727302106 {#2386
date: 2024-09-26 00:08:26.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2378 …}
+votes: Doctrine\ORM\PersistentCollection {#2381 …}
+reports: Doctrine\ORM\PersistentCollection {#1910 …}
+favourites: Doctrine\ORM\PersistentCollection {#1909 …}
+notifications: Doctrine\ORM\PersistentCollection {#1926 …}
+badges: Doctrine\ORM\PersistentCollection {#1874 …}
+children: []
-id: 31883
-titleTs: "'alia':3 'charact':10 'command':6 'creat':1 'plenti':8 'special':9"
-bodyTs: "'2':87 '3':90 'accomplish':142 'advanc':131 'alia':8,12,30,32,75,85,93,104,109,113 'argument':88 'assum':52 'bash':72,91,103,108,112 'case':62 'charact':173 'command':11,33 'creat':6,28 'docker':14,34,77,95,114,148 'dockerp':147,161 'dockp':13,76,94,105 'edit':132 'end':159 'error':68,74,92 'escap':57,172 'expect':86 'fish':70,73,134 'format':16,36,79,97,116,150 'found':107,111,123 'func':145 'funcsav':160 'function':146 'get':66 'got':89 'hello':1 'howev':45 'id':18,38,81,99,118,152 'learn':181 'leav':164 'm':65,163 'mark':50 'name':20,40,82,100,119,154 'neet':54 'port':24,44,84,102,121,158 'ps':15,35,78,96,115,149 'question':166,170 'quot':49 'relev':176 'resouc':182 'shell':135 'sinc':46 'status':22,42,83,101,120,156 'still':175 'syntax':26 'tabl':17,37,80,98,117,151 'thank':129 'use':144 'user':136 'wan':4 'wrong':128"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705820891
+visibility: "visible "
+apId: "https://lemmy.ml/post/10790028"
+editedAt: DateTimeImmutable @1727023176 {#2382
date: 2024-09-22 18:39:36.0 +02:00
}
+createdAt: DateTimeImmutable @1705734491 {#2385
date: 2024-01-20 08:08:11.0 +01:00
}
} |
|
Show voter details
|
5 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
6 |
DENIED
|
moderate
|
App\Entity\Entry {#2470
+user: App\Entity\User {#259 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2468 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2452 …}
+slug: "How-do-you-monitor-your-servers-VPS-es"
+title: "How do you monitor your servers / VPS:es?"
+url: null
+body: """
Hello selfhosters.\n
\n
We all have bare-metal servres, VPS:es, containers and other things running. Some of them may be exposed openly to the internet, which is populated by autonomous malicious actors, and some may reside on a closed-off network since they contain sensitive data.\n
\n
And there is a lot of solutions to monitor your servers, since none of us want our resources to be part of a botnet, or mine bitcoins for APTs, or simply have confidential data fall into the wrong hands.\n
\n
Some of the tools I’ve looked at for this task are check_mk, netmonitor, monit: all of there monitor metrics such as CPU, RAM and network activity. Other tools such as Snort or Falco are designed to particularly detect suspicious activity. And there also are solutions that are hobbled together, like fail2ban actions together with pushover to get notified of intrusion attempts.\n
\n
So my question to you is - how do you monitor your servers and with what tools? I need some inspiration to know what tooling to settle on to be able that detect unwanted external activity on my resources.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 29
+favouriteCount: 61
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1722017375 {#2458
date: 2024-07-26 20:09:35.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2455 …}
+votes: Doctrine\ORM\PersistentCollection {#2371 …}
+reports: Doctrine\ORM\PersistentCollection {#2370 …}
+favourites: Doctrine\ORM\PersistentCollection {#2360 …}
+notifications: Doctrine\ORM\PersistentCollection {#2361 …}
+badges: Doctrine\ORM\PersistentCollection {#2372 …}
+children: []
-id: 28627
-titleTs: "'es':8 'monitor':4 'server':6 'vps':7"
-bodyTs: "'abl':180 'action':141 'activ':115,129,185 'actor':33 'also':132 'apt':77 'attempt':150 'autonom':31 'bare':7 'bare-met':6 'bitcoin':75 'botnet':72 'check':100 'close':41 'closed-off':40 'confidenti':81 'contain':12,46 'cpu':111 'data':48,82 'design':124 'detect':127,182 'es':11 'expos':22 'extern':184 'fail2ban':140 'falco':122 'fall':83 'get':146 'hand':87 'hello':1 'hobbl':137 'inspir':170 'internet':26 'intrus':149 'know':172 'like':139 'look':94 'lot':53 'malici':32 'may':20,36 'metal':8 'metric':108 'mine':74 'mk':101 'monit':103 'monitor':57,107,160 'need':168 'netmonitor':102 'network':43,114 'none':61 'notifi':147 'open':23 'part':69 'particular':126 'popul':29 'pushov':144 'question':153 'ram':112 'resid':37 'resourc':66,188 'run':16 'selfhost':2 'sensit':47 'server':59,162 'servr':9 'settl':176 'simpli':79 'sinc':44,60 'snort':120 'solut':55,134 'suspici':128 'task':98 'thing':15 'togeth':138,142 'tool':91,117,166,174 'unwant':183 'us':63 've':93 'vps':10 'want':64 'wrong':86"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704982428
+visibility: "visible "
+apId: "https://lemmy.ml/post/10355256"
+editedAt: DateTimeImmutable @1720020881 {#2447
date: 2024-07-03 17:34:41.0 +02:00
}
+createdAt: DateTimeImmutable @1704896028 {#2459
date: 2024-01-10 15:13:48.0 +01:00
}
} |
|
Show voter details
|
7 |
DENIED
|
edit
|
App\Entity\Entry {#2470
+user: App\Entity\User {#259 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2468 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2452 …}
+slug: "How-do-you-monitor-your-servers-VPS-es"
+title: "How do you monitor your servers / VPS:es?"
+url: null
+body: """
Hello selfhosters.\n
\n
We all have bare-metal servres, VPS:es, containers and other things running. Some of them may be exposed openly to the internet, which is populated by autonomous malicious actors, and some may reside on a closed-off network since they contain sensitive data.\n
\n
And there is a lot of solutions to monitor your servers, since none of us want our resources to be part of a botnet, or mine bitcoins for APTs, or simply have confidential data fall into the wrong hands.\n
\n
Some of the tools I’ve looked at for this task are check_mk, netmonitor, monit: all of there monitor metrics such as CPU, RAM and network activity. Other tools such as Snort or Falco are designed to particularly detect suspicious activity. And there also are solutions that are hobbled together, like fail2ban actions together with pushover to get notified of intrusion attempts.\n
\n
So my question to you is - how do you monitor your servers and with what tools? I need some inspiration to know what tooling to settle on to be able that detect unwanted external activity on my resources.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 29
+favouriteCount: 61
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1722017375 {#2458
date: 2024-07-26 20:09:35.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2455 …}
+votes: Doctrine\ORM\PersistentCollection {#2371 …}
+reports: Doctrine\ORM\PersistentCollection {#2370 …}
+favourites: Doctrine\ORM\PersistentCollection {#2360 …}
+notifications: Doctrine\ORM\PersistentCollection {#2361 …}
+badges: Doctrine\ORM\PersistentCollection {#2372 …}
+children: []
-id: 28627
-titleTs: "'es':8 'monitor':4 'server':6 'vps':7"
-bodyTs: "'abl':180 'action':141 'activ':115,129,185 'actor':33 'also':132 'apt':77 'attempt':150 'autonom':31 'bare':7 'bare-met':6 'bitcoin':75 'botnet':72 'check':100 'close':41 'closed-off':40 'confidenti':81 'contain':12,46 'cpu':111 'data':48,82 'design':124 'detect':127,182 'es':11 'expos':22 'extern':184 'fail2ban':140 'falco':122 'fall':83 'get':146 'hand':87 'hello':1 'hobbl':137 'inspir':170 'internet':26 'intrus':149 'know':172 'like':139 'look':94 'lot':53 'malici':32 'may':20,36 'metal':8 'metric':108 'mine':74 'mk':101 'monit':103 'monitor':57,107,160 'need':168 'netmonitor':102 'network':43,114 'none':61 'notifi':147 'open':23 'part':69 'particular':126 'popul':29 'pushov':144 'question':153 'ram':112 'resid':37 'resourc':66,188 'run':16 'selfhost':2 'sensit':47 'server':59,162 'servr':9 'settl':176 'simpli':79 'sinc':44,60 'snort':120 'solut':55,134 'suspici':128 'task':98 'thing':15 'togeth':138,142 'tool':91,117,166,174 'unwant':183 'us':63 've':93 'vps':10 'want':64 'wrong':86"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704982428
+visibility: "visible "
+apId: "https://lemmy.ml/post/10355256"
+editedAt: DateTimeImmutable @1720020881 {#2447
date: 2024-07-03 17:34:41.0 +02:00
}
+createdAt: DateTimeImmutable @1704896028 {#2459
date: 2024-01-10 15:13:48.0 +01:00
}
} |
|
Show voter details
|
8 |
DENIED
|
moderate
|
App\Entity\Entry {#2470
+user: App\Entity\User {#259 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2468 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2452 …}
+slug: "How-do-you-monitor-your-servers-VPS-es"
+title: "How do you monitor your servers / VPS:es?"
+url: null
+body: """
Hello selfhosters.\n
\n
We all have bare-metal servres, VPS:es, containers and other things running. Some of them may be exposed openly to the internet, which is populated by autonomous malicious actors, and some may reside on a closed-off network since they contain sensitive data.\n
\n
And there is a lot of solutions to monitor your servers, since none of us want our resources to be part of a botnet, or mine bitcoins for APTs, or simply have confidential data fall into the wrong hands.\n
\n
Some of the tools I’ve looked at for this task are check_mk, netmonitor, monit: all of there monitor metrics such as CPU, RAM and network activity. Other tools such as Snort or Falco are designed to particularly detect suspicious activity. And there also are solutions that are hobbled together, like fail2ban actions together with pushover to get notified of intrusion attempts.\n
\n
So my question to you is - how do you monitor your servers and with what tools? I need some inspiration to know what tooling to settle on to be able that detect unwanted external activity on my resources.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 29
+favouriteCount: 61
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1722017375 {#2458
date: 2024-07-26 20:09:35.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2455 …}
+votes: Doctrine\ORM\PersistentCollection {#2371 …}
+reports: Doctrine\ORM\PersistentCollection {#2370 …}
+favourites: Doctrine\ORM\PersistentCollection {#2360 …}
+notifications: Doctrine\ORM\PersistentCollection {#2361 …}
+badges: Doctrine\ORM\PersistentCollection {#2372 …}
+children: []
-id: 28627
-titleTs: "'es':8 'monitor':4 'server':6 'vps':7"
-bodyTs: "'abl':180 'action':141 'activ':115,129,185 'actor':33 'also':132 'apt':77 'attempt':150 'autonom':31 'bare':7 'bare-met':6 'bitcoin':75 'botnet':72 'check':100 'close':41 'closed-off':40 'confidenti':81 'contain':12,46 'cpu':111 'data':48,82 'design':124 'detect':127,182 'es':11 'expos':22 'extern':184 'fail2ban':140 'falco':122 'fall':83 'get':146 'hand':87 'hello':1 'hobbl':137 'inspir':170 'internet':26 'intrus':149 'know':172 'like':139 'look':94 'lot':53 'malici':32 'may':20,36 'metal':8 'metric':108 'mine':74 'mk':101 'monit':103 'monitor':57,107,160 'need':168 'netmonitor':102 'network':43,114 'none':61 'notifi':147 'open':23 'part':69 'particular':126 'popul':29 'pushov':144 'question':153 'ram':112 'resid':37 'resourc':66,188 'run':16 'selfhost':2 'sensit':47 'server':59,162 'servr':9 'settl':176 'simpli':79 'sinc':44,60 'snort':120 'solut':55,134 'suspici':128 'task':98 'thing':15 'togeth':138,142 'tool':91,117,166,174 'unwant':183 'us':63 've':93 'vps':10 'want':64 'wrong':86"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704982428
+visibility: "visible "
+apId: "https://lemmy.ml/post/10355256"
+editedAt: DateTimeImmutable @1720020881 {#2447
date: 2024-07-03 17:34:41.0 +02:00
}
+createdAt: DateTimeImmutable @1704896028 {#2459
date: 2024-01-10 15:13:48.0 +01:00
}
} |
|
Show voter details
|