10%
30.11.2025
problems that occur at the protocol level. You can record the packets yourself with Wireshark or save the sngrep output and open the file directly in Wireshark for further analysis (Figure 5), which helps
10%
26.03.2025
. It's OK. We've all been there. If your paranoia level moves from DEFCON 5 to DEFCON 2 at the mere hint of an insider threat, congratulations, you've joined the ranks of those who have met
10%
28.07.2025
restructure the code for other approaches.
Loop interchange
Swapping inner and outer loops, a typical use is to improve cache data locality [5].
Loop reversal
Running the loop
10%
21.09.2012
, there is no requirement to ship source code. The latest official released source code from Sun was version 6.2 Update 5.
One of the more interesting aspects of HPC is the use of open source for much of the cluster
10%
01.03.2012
interested in the development tools that Fedora 16 includes, such as Perl 5.14, the GCC Python plugins, the Haskell platform, and D2 – the latest version of the D programming language – or the SELinux access
10%
25.10.2011
192.168.60.0/24 raddr 192.168.2.0/24 } IPsec {encr_algs aes encr_auth_algs sha1 sa shared}
and finally, the definition of the shared secret from /etc/inet/ike/secret/ike.preshared
(Listing 5
10%
31.05.2012
.77
4.11
mandel
5.55
31.15
65.44
824.68
156.68
5.67
pi_sum
0.74
18.03
1.08
328.33
164.69
0.75
rand
10%
16.07.2012
these alternative systems do not support the new instructions or offer “Bulldozer”-specific optimizations.
For compilers, the Tuning Guide recommends GCC 4.6.2, GCC 4.7, Open64 4.5, or PGI 11.9. As noted previously
10%
09.01.2012
_ga_nai
. The payload is combined with the sysinternal tool pslist.exe
and renamed pslist2.exe
. Unfortunately (for the attacker), the score at Virus Total improves only slightly (see Figure 5
10%
16.11.2017
5). This is not the same as listing all mounted filesystems, which is accomplished with the mount
command, which lists all network filesystems, as well