31%
30.01.2024
, and a user type (admin or normal). The hash is a SHA-256 hash of the password. Listing 1 shows an example configuration.
Listing 1
Example auth Element
appConfig:
auth:
users
31%
26.03.2025
. If needed, you can create more users. The settings for this can be found in the USERS subsection. Each user entry consists of the following data:
Username:sha256(Password):UID:filter_netmask
The UID value
31%
31.10.2025
Yes, Blowfish
Yes, AES256
No
Searching
By file name
In browser and in client via OS
In browser and in client via OS
In client via OS
For metadata
31%
28.07.2025
, the server should have enough RAM to process large volumes of data quickly. In many cases, 256GB or more RAM makes sense, especially when it comes to large neural networks or processing big data. The storage
31%
20.11.2013
. Therefore, if I’m going to back up my data to cloud storage, I want to make sure the data is encrypted. S3QL encrypts all data using a 256-bit AES key. An additional SHA-256 HMAC checksum protects the data
31%
12.05.2014
Typically the encryption keys are 128- or 256-bit Advanced Encryption Standard (AES) keys, which evidently is fairly strong encryption. (My apologies, but I’m not in a position to judge the quality
31%
05.12.2014
AES 256 Bit, Volume Based
Folder Based
Yes
AES 256 Bit, Drive Based
Compression
No
No
No
Yes
Deduplication
31%
04.10.2018
.2.
Weak hash functions, namely SHA-1 and MD5, are disallowed in favor of SHA-256 and SHA-384, with a few notable exceptions. The use of SHA-1 is permitted with respect to client and server certificates (but
31%
25.09.2023
.168.90.211 max-limit=0/0
/queue simple> add name=students target=192.168.90.0/24 max-limit=256K/512K
A rule called doctor sets unlimited available bandwidth for the computer at address 192.168.90.211 (0
31%
30.11.2025
the passphrase as the real key; don't use a hash algorithm. For example:
losetup -e aes -k 256 -N /dev/loop0 partition.img
If your distribution uses a special derivate of losetup
from the loop-aes
package