62%
30.11.2025
: tscherf@TUXGEEK.DE
15 SASL SSF: 56
16 SASL data security layer installed.
17 dn: uid=TScherf,ou=People,dc=tuxgeek, dc=de
18 givenName: Thorsten
19 sn: Scherf
20 loginShell: /bin/bash
21 uidNumber: 9999
22
62%
30.11.2025
MySQL-shared-compat-5.5.22-2.el6.x86_64.rpm
rpm -i MySQL-client-5.5.22-1.el6.x86_64.rpm
With CentOS 6, the following additional package is necessary:
yum install openssl098e.x86_64
The easiest way
62%
31.10.2025
's usually TCP port 22) to port 2222, for example, to keep port scans from filling up your logs. Without TCP Wrappers enabled, scans might run dictionary attacks on your server where password combinations
62%
30.11.2025
on */
17 port = 5556;
18
19 /* hub mask: the mask of servers that this server may hub. Multiple
20 * entries are permitted
21 */
22 hub_mask = "*";
23
24
62%
30.11.2025
}
20 \usepackage{ngerman}
21 \usepackage[official,right]{eurosym}
22 \\\begin{document}" > att1.tex
23 echo "\end{document}" > att3.tex
24
25 # Merge Latex file components
26
27 cat att1.tex searchkey
62%
30.11.2025
be in the database for a production web application
18 $result = $hasher->CheckPassword($password, $passwordfromdb);
19
20 if ($result) {
21 echo "Password match!";
22 }
23 else {
24 echo "Password
62%
30.11.2025
="walk" value="true"/>
22
23
24
25
62%
30.11.2025
, 378501 c/s virtual
18 Long: 1063K c/s real, 1063K c/s virtual
19
20 Benchmarking: LM DES [64/64 BS]... DONE
21 Raw: 8214K c/s real, 8214K c/s virtual
22
23 Benchmarking: NT MD4 [Generic 1x]... DONE
24
62%
30.11.2025
/**
16 * @param args
17 */
18 public static void main(String[] args) throws Exception {
19
20 if (args.length != 3 && args.length != 5)
21 {
22 System
62%
30.11.2025
of the stress test shown in Figure 2, shows that some 19,200 queries composed of 55 different commands were issued. The system, a server with 768MB of RAM and a Pentium 3 CPU, took a total of 22 seconds to answer