DOCUMENT RESOURCES FOR EVERYONE
Documents tagged
Technology Git for beginners

1. ɪ 2. –––––– 3. → git config --global user.name "Your Name“→ git config --global user.email "[email protected]" 4. → git config…

Documents Hour #2 Crypto and Privacy Protecting Technologies.

Hour #2 Crypto and Privacy Protecting Technologies Message Digests reduce a file to a âfingerprint.â Input: 1-264 bytes Output: 128, 160, 256 or more bits The same digest…

Documents Openssl Onno W. Purbo [email protected]. Reference .

openssl Onno W. Purbo [email protected] Reference http://www.openssl.org http://www.linuxdoc.org http://www.redhat.com OpenSSL OpenSSL is a cryptography toolkit implementing…

Documents Let’s look at an example I want to write an application that reports the course scores to you....

Letâs look at an example Letâs look at an example I want to write an application that reports the course scores to you. Requirements: Every student can only get his/her…

Documents Operating Systems 8 – virtual memory

Operating Systems Operating Systems 8 â virtual memory PIETER HARTEL 1 Principle of locality: memory references tend to cluster Only resident set of pages in memory Page…

Documents Solaris 10

* Solaris 10 * Users and Groups Management * User and Group User คือ ผู้ใช้งาน Group คือ กลุ่มที่ใช้แบ่งแยกประเภทผู้ใช้งานตามลักษณะการทำงาน…

Documents UNIX Files and Security

UNIX Files and Security Software Tools Slide * File Systems What is a file system? A means of organizing information on the computer. A file system is a logical view, not…

Documents File System in UNIX

Files and Directories in UNIX The first file in UNIX file system is ârootâ or â/â Files and Directories in UNIX (continue.) Home directory (could be named differently)…

Documents SMP, 64bit Unix and Kernel Compilation

SMP, 64bit Unix and Kernel Compilation Guntis Barzdins Girts Folkmanis Kā palaist MPI [guntisb@zars mpi]$ ls -l total 392 -rw-rw-r-- 1 guntisb guntisb 122 Apr 28 07:08 Makefile…

Documents Entropy of Keys and Password Generation

Entropy of Keys and Password Generation Introduction to entropy Entropy and data compression Predictability of random number generation Entropy and system security A weak…