19%
30.11.2025
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days.
Brute force is a single-character-at-a
19%
27.09.2021
)
(None, 32, 32, 32)
9,248
max_pooling2d (MaxPooling2D)
(None, 16, 16, 32)
0
conv2d_2 (Conv2D)
(None, 16, 16, 64)
18,496
conv2d_3 (Conv2D
19%
30.11.2025
:add-symbol-file module.ko text_address -s .data data_address -s .bss bss_address
9. Debug: Set breakpoints and so on.
In Toolchain
, enable the Build gdb
for the Host
option; in Kernel | Kernel version
, type 3
19%
12.02.2014
B hald-addon-input
...
22.9 MiB + 4.0 MiB = 26.9 MiB plasma-desktop
26.0 MiB + 5.7 MiB = 31.7 MiB konsole (3)
28.3 MiB + 4.4 MiB = 32.7 MiB kwin
41.0 MiB + 2.0 MiB = 43.0 MiB Xorg
146.9
19%
14.03.2013
command:
# sockstat | grep "\*:[0-9]"
The description for rc.conf(5) lists the services that need to be bound to a fixed IP address via parameters. One example is the inetd service:
inetd_flags="-wW -a
19%
21.08.2012
glib2.i686 0:2.22.5-6.el6
libX11.i686 0:1.3-2.el6 libXau.i686 0:1.0.5-1.el6 libXft.i686 0:2.1.13-4.1.el6
libXrender.i686 0:0.9.5-1.el6
19%
30.11.2025
# Header for user-specific report
19 printf("%2s\t%4s\t%4s\tD=%2d\n", "N", "Xdat", "Xpdq", MAXDUMMIES);
20
21 foreach $users (sort {$a <=> $b} @vusers) {
22 pdq::Init($model);
23 $pdq::streams = pdq
19%
30.01.2024
Dell Precision Workstation T7910
Power
1,300W
CPU
2x Intel Xeon Gold E5-2699 V4, 22 cores, 2.4GHz, 55MB of cache, LGA 2011-3
GPU, NPU
n/a*
Memory
19%
11.08.2025
it is a little bigger, at 31899301.
Listing 3: Files in the Compressed Archive
laytonjb@laytonjb:~/DATA_STORE$ ls -lstar
total 62316
31152 -rw-rw-r-- 1 laytonjb laytonjb 31897275 Aug 2 09:52 data1_08022025.tar
19%
12.11.2020
("Rank %d Message Received, data is: "%rank, data)
# end if
Listing 6: Point-to-Point Output
output:
Rank 0 data is: [0 1 2 3 4 5 6 7 8 9]
Rank 1 Message Received, data is: [0 1 2 3 4]
Rank 2 Message Received, data is: [5 6 7 8 9]
More Complex