35%
18.07.2013
at the database level and meaningfully supplement other security measures in the enterprise.
Infos
GreenSQL: http://www.greensql.com
Open Source GreenSQL: http
35%
14.03.2013
important data to speed up the process. Add --dbs to the command and you will see the available databases.
available databases [5]:
[*] cdcol
[*] dvwa
[*] information_schema
[*] mysql
[*] test
35%
14.03.2013
Schneier's blog entry: http://www.schneier.com/blog/archives/2012/09/sha-3_will_be_a.html
Talk at 25C3 about spoofed MD5 signatures: http://media.ccc.de/browse/congress/2008/25c3-3023-en
35%
17.04.2017
Armed with a checksum, users can determine whether a package has passed through the Internet without error. The MD5, SHA1, and SHA256 hash methods are popular ways to calculate a checksum for a package
35%
17.04.2017
in Figure 5 outputs the data to a MySQL database. If the database table does not exist, it can be generated on the fly.
Figure 5: In this Excel import
35%
17.06.2017
Qemu, Kernel Samepage Merging (KSM) [5] is activated automatically. This well-meant technique is intended to deduplicate memory pages with identical content and promises efficiency on a virtualization
35%
03.02.2022
writes hands-on books and papers on Windows and other Microsoft topics. You can meet him online at http://thomasjoos.spaces.live.com.
35%
27.09.2024
of simultaneous transfers with the --transfers= parameter (Figure 5).
Figure 5: Rclone synchronizes large databases by transferring several files in parallel
35%
27.09.2024
-required
$ ssh-keygen -t ed25519-sk -O resident -O application=ssh: -O verify-required
You need firmware version 5.2.3 or later on the YubiKey.
The is simply text that describes where
35%
26.01.2025
inventory management, order management, and financial accounting. Level 5 represents the highest level of corporate planning, where strategic decisions are made and analyses are carried out on the basis