32%
16.04.2015
the simple text file hpc_001.html
:
[laytonjb@home4 TEMP]$ ls -s
total 7288
196 hpc_001.html 7092 MFS2007.pdf
[laytonjb@home4 TEMP]$ 7z a -p hpc_001.html.7z hpc_001.html
7-Zip [64] 9.20 Copyright (c
32%
05.02.2019
. To compare how Kata Containers performs against a runC run time, the script in Listing 3 starts 100 containers from the nginx image and stores a short, individual and static file, each containing the number
32%
21.01.2021
This first article of a series looks at the forces that have driven desktop supercomputing, beginning with the history of PC and supercomputing processors through the 1990s into the early 2000s.
... processors running at 167MHz. It had options for 128, 256, or 512MB of SRAM main memory and was the first supercomputer to sustain greater than 1GFLOPS (10^9 floating point operations per second ...
This first article of a series looks at the forces that have driven desktop supercomputing, beginning with the history of PC and supercomputing processors through the 1990s into the early 2000s.
32%
08.05.2019
; ia[i] = i;
test(a,b,c, SIZE);
for (i=0; in", a[i], b[i], c[i]);
}
Listing 9: nowait Output
0
32%
25.03.2020
, according to the README file, requires "half the memory, all in a binary less than 40MB" to run. By design, it is authored with a healthy degree of foresight by the people at Rancher [3]. The GitHub page [4 ... The k3s lightweight and secure Kubernetes distribution can handle both unattended workloads in remote locations with minimal resources and clusters of IoT appliances. ... Kubernetes k3s lightweight distro
32%
04.12.2024
applications from creating child processes
No
d4f940ab-401b-4efc-aadc-ad5f3c50688a
Blocks credential theft from the local security authority subsystem (lsass.exe)
Yes
9e6c4e1f
32%
05.08.2011
DEjAhocW2hraXMIIEowIBAAKCAQEAhXo2cUYv
B8/P/BP0ges6i7VJ9Oj1bDHfILtu805syqwN5J6IBcgvesthq4Xpj4zuIVsCctU5SEIkx9texM+b
....
fuy3QFJdl3rM0w/ry1QDRy5WgfZsIpAQZUuCaZgZx2BavviuVcFGrd67RfP6gt2yBk7EhN0gQCN2
X5
32%
12.05.2014
The revelation of wide-spread government snooping has sparked a renewed interest in data storage security via encryption. In this article, we review some options for encrypting files, directories ... ]$ cd ~/encrypted
[laytonjb@test1 encrypted]$ ls -l
total 8
lrwxrwxrwx 1 laytonjb laytonjb 24 Sep 4 15:12 acS5u3K9TJ,9FWTDUq0yWqx6 -> XuD50Mah2kp2vukDeo04cOv,
-rw-rw-r-- 1 laytonjb laytonjb 18 Sep 4 15:12 WvPjlWtCaq5g9hE1 ...
The revelation of wide-spread government snooping has sparked a renewed interest in data storage security via encryption. In this article, we review some options for encrypting files, directories
32%
09.08.2015
-n
Show version
-v
Table 3
Editing Commands
Action
Command
Add lines above this one
i
Add lines below this one
32%
22.08.2011
:lanman passfile.txt
Loaded 2 passwords with 2 different salts (FreeBSD MD5 [32/64])
guesses: 0 time: 1:04:04:08 (3) c/s: 10927 trying: gmugoky - gmugok2
guesses: 0 time: 1:09:25:10 (3) c/s: 10929 trying