16%
09.06.2018
. Accessed September 22, 2016: https://lwn.net/Articles/665602
Inline TLS performance: https://www.chelsio.com/wp-content/uploads/resources/t6-100g-inline-linux.pdf
Kernel documentation: https
16%
18.07.2013
of only 56 bits. The 1990s, when SSLv2 was being developed, were the hot phase of the "Crypto Wars." Strong encryption technologies were forbidden in the United States. Many states talked about only
16%
26.03.2025
password, and the need to remember it.
Unrealistic Rulesets
Bill Burr wrote the official password guide for the U.S. National Institute of Standards and Technology (NIST). According to the guide
16%
07.03.2019
relative to the data values. For example, if the difference between two numbers is 100.0, but you are working with values of 10^8, then the difference (0.001%) might not be important. It’s really up
16%
11.10.2016
) first defines an addition and then lists the additions. For an introduction to Clojure programming and its basic concepts, you can check out a previous article [6] and find educational materials online [7
16%
05.12.2014
Alchemy [5]. Phraseanet [1] has been available for download since 2010 under the GPLv3 via GitHub. We installed version 3.8. Before installing, admins should take a look at the documentation [6] to prepare
16%
30.11.2025
m0.008s
Line 8 of the backtrace in Listing 6 shows that the issue is caused by the file permissions: The Nagios user wants to write the webrat.log file but does not have the required permissions
16%
05.12.2019
and supports a number of development platforms, like GitHub and Gerrit Code Review [6].
Zuul originated as OpenStack CI testing. For years, OpenStack, the Infrastructure-as-a-Service (IaaS) cloud [7], got all
16%
17.11.2016
the trusted storage pool, you simply add additional servers to the existing federation.
The example here is based on Fedora 22 and is designed to provide back-end storage for virtual systems based on Qemu
16%
06.10.2019
rules still apply. The attacker cannot open port 22 to the outside by deleting the corresponding Netfilter rule to gain access to the system by SSH.
How security groups can be used in AWS is explained