14%
18.06.2014
.59
64–128
12,083
3.11
90.70
128–256
8,623
2.22
92.93
256–512
13,437
3.46
96.39
512–1,024
5,456
1
14%
23.03.2022
laytonjb laytonjb 19946519 Nov 20 2020 Lmod-8.4.15.tar.gz
31988342 drwxrwxr-x 2 laytonjb laytonjb 4096 Oct 27 14:22 mpibzip2-0.6
31988329 -rw-rw-r-- 1 laytonjb laytonjb 92160 Oct 27 14:18 mpibzip
14%
30.11.2025
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple
14%
30.11.2020
"conditions": [
05 {
06 "type": "RuntimeReady",
07 "status": true,
08 "reason": "",
09 "message": ""
10 },
11 {
12 "type": "NetworkReady",
13
14%
30.11.2025
08 default:
09 $(MAKE) -C $(KDIR) M=$(PWD) modules
10 endif
11
12 clean:
13 rm -rf *.ko *.o *.mod.c *.mod.o modules.order
14 rm -rf Module.symvers .*.cmd .tmp
14%
07.06.2019
:
Estimate Std. Error t value Pr(>|t|)
(Intercept) 517.340 18.270 28.316 < 2e-16 ***
wdayThursday -31.046 16.119 -1.926 0.0545 .
wdayFriday -116.981 16.122 -7.256 1.08e-12 ***
wday
14%
20.11.2013
. Therefore, if I’m going to back up my data to cloud storage, I want to make sure the data is encrypted. S3QL encrypts all data using a 256-bit AES key. An additional SHA-256 HMAC checksum protects the data
14%
28.06.2011
/tmp/initrd.img- 2.6.28- 11- server.manifest.xml
08
09 $ euca- upload- bundle - b ramdisk - m /tmp/initrd.img- 2.6.28- 11- server.manifest.xml
10 Checking bucket: ramdisk
11 Creating bucket: ramdisk
12
13%
02.08.2021
%util
sda 10.91 6.97 768.20 584.64 4.87 18.20 30.85 72.31 13.16 20.40 0.26 70.44 83.89 1.97 3.52
nvme0n1 58.80 12.22 17720.47 48.71 230
13%
05.12.2016
. The holdingdisk section (lines 22 to 26) specifies the key data for such a holding disk. In Listing 1, Amanda is allowed to cache data in the /amanda/holding directory, where it can use a maximum of 50MB space; any