27%
09.08.2015
release to the encryption toolkit to address a "certificate forgery" issue. The problem affects OpenSSL versions 1.0.2c, 1.0.2b, 1.0.1n, and 1.0.1o. According to the security advisory (CVE-2015
27%
13.06.2016
has successfully found 9 of 10 test 'victims' in the office."
The algorithm powering the facial recognition is developed by Russia-based N-Tech.Lab, which beat Google's face recognition software
27%
07.10.2025
://launchpad.net/~linbit/+archive/ubuntu/linbit-drbd9-stack
LVM: https://sourceware.org/lvm2
Attribution-ShareAlike 3.0 Unported: https://creativecommons.org/licenses/by-sa/3.0/deed.en
virter: https://github.com/LINBIT/virter
Linstor: https ... DRBD9 and DRBD Reactor create a Linux high-availability stack for virtual instances with replicated storage comparable to the classic Corosync and Pacemaker solution. ... DRBD9 and DRBD Reactor ... Create a high availability VM with DRBD9 and Reactor
27%
07.07.2025
myscript "A second test"
The entry in the system log would look like:
$ sudo tail -n 10 /var/log/syslog
...
Jun 28 14:28:55 laytonjb-Nitro-AN515-55 myscript: A second test
...
Notice that rather than
27%
30.01.2020
introduced Rook in detail some time ago [2], looking into its advantages and disadvantages. Since then, much has happened. For example, if you work with OpenStack, Rook will be available automatically
27%
03.08.2023
: "routers",
"value": "192.168.2.254"
}],
"reservations": [{
"hw-address": "00:11:22:33:44:55",
"ip-address": "192.168.2.60",
hostname: "host-2-60"
}, {
"hw-address": "00
27%
31.10.2025
) ! Delta (x and y directions)
...
117 ! Solution Initialization
118 !
+++ !$OMP PARALLEL DO SHARED(m,n,u)
119 DO j=2,m-1
120 DO i=2,m-1
121 u(i,j)=0.0d0
122 ENDDO
123 ENDDO
+++ !$OMP END
27%
30.01.2020
of code.
Listing 1
Time to Execute
import time
start_time = time.time()
# Code to check follows
a, b = 1,2
c = a + b
# Code to check ends
end_time = time.time()
time_taken = (end_time- start
27%
30.11.2025
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days.
Brute force is a single-character-at-a
27%
25.05.2012
, which doesn’t involve human interaction. You can write two iterations of iotop to a file like this:
# iotop --batch -n 2 > filename
It’s Nice To Be Nice
On a very busy server, you might look back