28%
01.06.2024
Dec 9 09:11 microsoft.gpg
which means only the root user can read and write to the file.
The next step sets up the correct Apt package repository entry, which is ideal for security updates, new
28%
07.04.2022
of 1KiB (in case really small payload sizes have some exceptional performance); 4KiB, 32KiB, or 64KiB; and maybe even 128KiB, 256KiB, or 1MiB. The reason I like to see a range of payload sizes
28%
14.01.2016
DRAM. At the extreme, you can pretty much buy systems with 1-2TB of memory, but you probably don't buy too many of them because of cost. Typical compute nodes are in the 64-256GB range. Persistent memory
28%
03.12.2015
than DRAM. At the extreme, you can pretty much buy systems with 1-2TB of memory, but you probably don't buy too many of them because of cost. Typical compute nodes are in the 64-256GB range. Persistent
28%
05.08.2024
:
curl git pkg-config
0 upgraded, 3 newly installed, 0 to remove and 1 not upgraded.
Need to get 3,409 kB of archives.
After this operation, 19.5 MB of additional disk space will be used.
Get:1 http
28%
05.12.2014
: chris@linux.tld
[->] Subject: Picture yourself, on a boat, on a river
[->] User-Agent: Heirloom mailx 12.5 6/20/10
[->] MIME-Version: 1.0
[->] Content-Type: multipart/mixed;
boundary="=_546791b1.cwvb6n4
28%
30.11.2025
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days.
Brute force is a single-character-at-a
28%
19.10.2012
12-core AMD processors ranging in speed from 2.2 to 2.9GHz with 24 to 128GB of RAM per server and up to 1TB of scratch local storage per node.
Getting applications running POD HPC clouds can be quite
28%
28.06.2011
When Canonical released Ubuntu 9.04 a couple or years ago, they took their first step into the rapidly growing business of cloud computing. As I write, Ubuntu's Natty Narwhal, release 11.04 is just
28%
10.04.2015
Number: 00282-30340-00000-AB9A5
Version: 6.3.9600
The information you read from the operating system can also be formatted and customized. For example, normally only the operating system's most