18%
15.04.2013
be no question of disabling the legacy algorithm for the time being. However, disabling MD5 signatures is something that you can (and should) do today.
You can enable TLS 1.2 – given OpenSSL 1.0.1 and a recent 2.2
18%
10.06.2015
key
RSA
EIGamal
DSA
Cipher
IDEA
3DES
CAST5
Blowfish
AES-128/-192/-256
Twofish
Camellia-128/-192/-256
Hash
MD5
18%
09.10.2017
"SubnetMax": "10.99.0.0",
07 "Backend": {
08 "Type": "udp",
09 "Port": 7890
10 }
11 }
12 [...]
At first glance, this concept looks robust and simple
18%
14.03.2013
enable TLS 1.2 – given OpenSSL 1.0.1 and a recent 2.2 or 2.4 version of the Apache web server – using the SSLProtocol configuration option. Listing 1 provides a potential server configuration.
Listing
18%
04.11.2011
on enterprise-grade rack hardware, there is no reason one cannot follow along at home with a few beige boxes and an 10Mb hub, as long as the servers are capable of booting from the network with PXE [6]. PXE
18%
30.01.2020
]
test: (groupid=0, jobs=1): err= 0: pid=1225: Sat Oct 12 19:20:18 2019
write: IOPS=168k, BW=655MiB/s (687MB/s)(10.0GiB/15634msec); 0 zone resets
[ ... ]
Run status group 0 (all jobs):
WRITE: bw=655Mi
18%
25.03.2020
"TracingConfig": {
17 "Mode": "PassThrough"
18 },
19 "CodeSha256": "37n/rzJz4o2lyvh4s2aet2aBlY=adc",
20 "Description": "",
21 "CodeSize": 432,
22 "FunctionArn": "arn
18%
07.10.2014
/lib/sheepdog
root 582 581 0 13:13 ? 12:00:00 AM sheep -p 7000 /var/lib/sheepdog
# grep sheep /proc/mounts
/dev/sdb1 /var/lib/sheepdog ext4 rw,relatime,data=ordered 0 0
# grep sheep /etc/fstab
/dev
18%
25.10.2011
-256-cbc;
07 }
08 policy pfs2-aes256-sha1 {
09 perfect-forward-secrecy {
10 keys group2;
11 }
12 proposals aes256-sha1;
13 }
14 vpn racoonvpn {
15 bind
17%
18.12.2013
(One-by-One)
1 #include
2
3 /* Our structure */
4 struct rec
5 {
6 int x,y,z;
7 float value;
8 };
9
10 int main()
11 {
12 int counter;
13 struct rec my_record;
14 int counter_limit;
15