Skip to main content

Questions tagged [algorithms]

3 votes
2 answers
5k views

I am using Rocky Linux 8 and 9 and they use the crypto-policy framework from Red Hat. Now I want to adjust some settings in the policy to forbid sshd to use some specific algorithms. But I can not ...
Lucas's user avatar
  • 2,955
2 votes
1 answer
5k views

I have this lines in my /etc/ssh/sshd_config file: MACs hmac-sha2-256,hmac-sha2-512,[email protected],[email protected] MACs [email protected],[email protected],-hmac-...
Shrm's user avatar
  • 178
-2 votes
1 answer
923 views

i have this task to do, but im actually stuck with this round-robin algorithm, here's the details input file there are 3 process A, B and C second column is the arrival time third column is nut value ...
peter louis's user avatar
0 votes
0 answers
500 views

I've got a program with some compiled sorting algorithms, and I'm trying to use top to monitor its cpu and ram usage. Normally this would be fine, given that the process runs for a few minutes, ...
Jordan Renaud's user avatar
2 votes
1 answer
2k views

I want to re-position elements of an array (change index of array elements) based on a condition. I don't know how to translate this to jq which is more of a functional language. Basically I want to ...
Zeta.Investigator's user avatar
0 votes
0 answers
56 views

In Kali Linux, I found an unknown hash algorithm used to encrypt the Kali Linux password. root:$y$j9T$J3nInhusIQkrmvCnX8tlo.$KduXmrDY7wv3o2P/k9t35adUH5XWUBYngo1Wxypy2X.:18749:0:99999:7::: My ...
Md. Zidan Khan's user avatar
9 votes
1 answer
3k views

It seems that the even the most recent version of GRUB2 doesn't support LUKS2 with the PBKDF Argon2ID (source). The Raspberry Pi bootloader for instance fully supports this new hashing function. Is ...
Polizi8's user avatar
  • 305
1 vote
1 answer
99 views

I've been studying programming for like 3 years or so but my teachers never taught me algorithms. Are there any online courses for beginners? with tasks.
Nib Bba's user avatar
  • 13
-2 votes
1 answer
724 views

why it is not possible to use SJF as the scheduling algorithm for Linux?
user422990's user avatar
2 votes
1 answer
2k views

I have looked in several places such as here but none explain in detail the structs used for implementing the stack itself (the place where "tasks" (processes/threads) store their nested call ...
Lance Pollard's user avatar
1 vote
1 answer
817 views

I am running ubuntu 18.04.3 server HWE edition in my local lab and while reading the manuals I came across the issue that I am unable to determine how to exclude users from connecting to my server via ...
Seemax's user avatar
  • 19
0 votes
1 answer
269 views

I was wondering whether there are any scenarios which require file(s) to be compressed multiple times with the same or a different algorithm. As far as i can tell the file size can be reduced further ...
TommyFlowers's user avatar
1 vote
2 answers
997 views

I'm currently testing changes in my scripts for performance purposes. Specifically, I want to change if to case statements. However, being new to shell programming I'm getting stuck on this type of ...
Matieu's user avatar
  • 23
-1 votes
2 answers
244 views

trying to complete Project Euler #5. The code I have should logically work, and it passes ShellCheck, but gives no output for some reason. The code is below. Thanks and sorry if this should be in a ...
Egrodo's user avatar
  • 207
3 votes
1 answer
3k views

How to log the Protocol, KexAlgorithm, Cipher and MAC algorithm negociated by the client and the client's user agent string? What I'm looking for is the OpenSSH equivalent to Apache HTTPD's CustomLog+...
Cerber's user avatar
  • 235

15 30 50 per page