34%
14.03.2013
Schneier's blog entry: http://www.schneier.com/blog/archives/2012/09/sha-3_will_be_a.html
Talk at 25C3 about spoofed MD5 signatures: http://media.ccc.de/browse/congress/2008/25c3-3023-en
34%
17.04.2017
Armed with a checksum, users can determine whether a package has passed through the Internet without error. The MD5, SHA1, and SHA256 hash methods are popular ways to calculate a checksum for a package
34%
17.04.2017
in Figure 5 outputs the data to a MySQL database. If the database table does not exist, it can be generated on the fly.
Figure 5: In this Excel import
34%
17.06.2017
Qemu, Kernel Samepage Merging (KSM) [5] is activated automatically. This well-meant technique is intended to deduplicate memory pages with identical content and promises efficiency on a virtualization
34%
03.02.2022
writes hands-on books and papers on Windows and other Microsoft topics. You can meet him online at http://thomasjoos.spaces.live.com.
34%
27.09.2024
of simultaneous transfers with the --transfers= parameter (Figure 5).
Figure 5: Rclone synchronizes large databases by transferring several files in parallel
34%
27.09.2024
-required
$ ssh-keygen -t ed25519-sk -O resident -O application=ssh: -O verify-required
You need firmware version 5.2.3 or later on the YubiKey.
The is simply text that describes where
34%
26.01.2025
inventory management, order management, and financial accounting. Level 5 represents the highest level of corporate planning, where strategic decisions are made and analyses are carried out on the basis
34%
31.10.2025
by any means from the outside.
Alternatively, you can select a suitable rule from a list of predefined rules (Figure 5), which makes sense, for example, if you are enabling the branch cache feature. You
34%
31.10.2025
closed auth
Device type: general purpose
Running: Linux 2.6.X
OS details: Linux 2.6.20-1 (Fedora Core 5)
TRACEROUTE (using port 80/tcp)
HOP RTT