Added issue/issue.net to slack deployment
This commit is contained in:
parent
a83cd5031f
commit
28a13488a1
10
slack/prod/ovh/files/etc/issue
Normal file
10
slack/prod/ovh/files/etc/issue
Normal file
@ -0,0 +1,10 @@
|
|||||||
|
===============================================================================
|
||||||
|
|
||||||
|
This is a private computer system. These resources, including all
|
||||||
|
related equipment, networks, and devices, are provided for authorized
|
||||||
|
use only. The system may be monitored for all lawful purposes. Evidence
|
||||||
|
of unauthorized use collected during monitoring may be used for criminal
|
||||||
|
prosecution by staff, legal counsel, and law enforcement agencies.
|
||||||
|
|
||||||
|
===============================================================================
|
||||||
|
|
10
slack/prod/ovh/files/etc/issue.net
Normal file
10
slack/prod/ovh/files/etc/issue.net
Normal file
@ -0,0 +1,10 @@
|
|||||||
|
===============================================================================
|
||||||
|
|
||||||
|
This is a private computer system. These resources, including all
|
||||||
|
related equipment, networks, and devices, are provided for authorized
|
||||||
|
use only. The system may be monitored for all lawful purposes. Evidence
|
||||||
|
of unauthorized use collected during monitoring may be used for criminal
|
||||||
|
prosecution by staff, legal counsel, and law enforcement agencies.
|
||||||
|
|
||||||
|
===============================================================================
|
||||||
|
|
10
slack/prod/pfv/files/etc/issue
Normal file
10
slack/prod/pfv/files/etc/issue
Normal file
@ -0,0 +1,10 @@
|
|||||||
|
===============================================================================
|
||||||
|
|
||||||
|
This is a private computer system. These resources, including all
|
||||||
|
related equipment, networks, and devices, are provided for authorized
|
||||||
|
use only. The system may be monitored for all lawful purposes. Evidence
|
||||||
|
of unauthorized use collected during monitoring may be used for criminal
|
||||||
|
prosecution by staff, legal counsel, and law enforcement agencies.
|
||||||
|
|
||||||
|
===============================================================================
|
||||||
|
|
10
slack/prod/pfv/files/etc/issue.net
Normal file
10
slack/prod/pfv/files/etc/issue.net
Normal file
@ -0,0 +1,10 @@
|
|||||||
|
===============================================================================
|
||||||
|
|
||||||
|
This is a private computer system. These resources, including all
|
||||||
|
related equipment, networks, and devices, are provided for authorized
|
||||||
|
use only. The system may be monitored for all lawful purposes. Evidence
|
||||||
|
of unauthorized use collected during monitoring may be used for criminal
|
||||||
|
prosecution by staff, legal counsel, and law enforcement agencies.
|
||||||
|
|
||||||
|
===============================================================================
|
||||||
|
|
10
slack/prod/satx/files/etc/issue
Normal file
10
slack/prod/satx/files/etc/issue
Normal file
@ -0,0 +1,10 @@
|
|||||||
|
===============================================================================
|
||||||
|
|
||||||
|
This is a private computer system. These resources, including all
|
||||||
|
related equipment, networks, and devices, are provided for authorized
|
||||||
|
use only. The system may be monitored for all lawful purposes. Evidence
|
||||||
|
of unauthorized use collected during monitoring may be used for criminal
|
||||||
|
prosecution by staff, legal counsel, and law enforcement agencies.
|
||||||
|
|
||||||
|
===============================================================================
|
||||||
|
|
10
slack/prod/satx/files/etc/issue.net
Normal file
10
slack/prod/satx/files/etc/issue.net
Normal file
@ -0,0 +1,10 @@
|
|||||||
|
===============================================================================
|
||||||
|
|
||||||
|
This is a private computer system. These resources, including all
|
||||||
|
related equipment, networks, and devices, are provided for authorized
|
||||||
|
use only. The system may be monitored for all lawful purposes. Evidence
|
||||||
|
of unauthorized use collected during monitoring may be used for criminal
|
||||||
|
prosecution by staff, legal counsel, and law enforcement agencies.
|
||||||
|
|
||||||
|
===============================================================================
|
||||||
|
|
Loading…
Reference in New Issue
Block a user