Skip to main content
We’ve updated our Terms of Service. A new AI Addendum clarifies how Stack Overflow utilizes AI interactions.

Questions tagged [algorithms]

Filter by
Sorted by
Tagged with
3 votes
2 answers
5k views

I am using Rocky Linux 8 and 9 and they use the crypto-policy framework from Red Hat. Now I want to adjust some settings in the policy to forbid sshd to use some specific algorithms. But I can not ...
Lucas's user avatar
  • 2,955
2 votes
1 answer
5k views

I have this lines in my /etc/ssh/sshd_config file: MACs hmac-sha2-256,hmac-sha2-512,[email protected],[email protected] MACs [email protected],[email protected],-hmac-...
Shrm's user avatar
  • 178
-2 votes
1 answer
920 views

i have this task to do, but im actually stuck with this round-robin algorithm, here's the details input file there are 3 process A, B and C second column is the arrival time third column is nut value ...
peter louis's user avatar
0 votes
0 answers
498 views

I've got a program with some compiled sorting algorithms, and I'm trying to use top to monitor its cpu and ram usage. Normally this would be fine, given that the process runs for a few minutes, ...
Jordan Renaud's user avatar
2 votes
1 answer
2k views

I want to re-position elements of an array (change index of array elements) based on a condition. I don't know how to translate this to jq which is more of a functional language. Basically I want to ...
Zeta.Investigator's user avatar
0 votes
0 answers
56 views

In Kali Linux, I found an unknown hash algorithm used to encrypt the Kali Linux password. root:$y$j9T$J3nInhusIQkrmvCnX8tlo.$KduXmrDY7wv3o2P/k9t35adUH5XWUBYngo1Wxypy2X.:18749:0:99999:7::: My ...
Md. Zidan Khan's user avatar
9 votes
1 answer
3k views

It seems that the even the most recent version of GRUB2 doesn't support LUKS2 with the PBKDF Argon2ID (source). The Raspberry Pi bootloader for instance fully supports this new hashing function. Is ...
Polizi8's user avatar
  • 305
1 vote
1 answer
99 views

I've been studying programming for like 3 years or so but my teachers never taught me algorithms. Are there any online courses for beginners? with tasks.
Nib Bba's user avatar
  • 13
-2 votes
1 answer
722 views

why it is not possible to use SJF as the scheduling algorithm for Linux?
user422990's user avatar
2 votes
1 answer
2k views

I have looked in several places such as here but none explain in detail the structs used for implementing the stack itself (the place where "tasks" (processes/threads) store their nested call ...
Lance Pollard's user avatar
1 vote
1 answer
817 views

I am running ubuntu 18.04.3 server HWE edition in my local lab and while reading the manuals I came across the issue that I am unable to determine how to exclude users from connecting to my server via ...
Seemax's user avatar
  • 19
0 votes
1 answer
264 views

I was wondering whether there are any scenarios which require file(s) to be compressed multiple times with the same or a different algorithm. As far as i can tell the file size can be reduced further ...
TommyFlowers's user avatar
1 vote
2 answers
993 views

I'm currently testing changes in my scripts for performance purposes. Specifically, I want to change if to case statements. However, being new to shell programming I'm getting stuck on this type of ...
Matieu's user avatar
  • 23
-1 votes
2 answers
238 views

trying to complete Project Euler #5. The code I have should logically work, and it passes ShellCheck, but gives no output for some reason. The code is below. Thanks and sorry if this should be in a ...
Egrodo's user avatar
  • 207
3 votes
1 answer
3k views

How to log the Protocol, KexAlgorithm, Cipher and MAC algorithm negociated by the client and the client's user agent string? What I'm looking for is the OpenSSH equivalent to Apache HTTPD's CustomLog+...
Cerber's user avatar
  • 235
0 votes
3 answers
2k views

Using Ubuntu Linux 16.04 and g++, I was wondering if could obtain microsecond or millisecond granularity when I calculate the number of nanoseconds between Unix Epoch or Windows Epoch and an arbitrary ...
Frank's user avatar
  • 711
3 votes
2 answers
175 views

I have a space or comma separated table with two columns, each row representing equivalence of the two words. A B B C B D C E F G What I want is a table with each row listing all mutually ...
Vinay's user avatar
  • 41
6 votes
4 answers
1k views

Can scrypt be used as the hashing algorithm for LUKS? Can I tune its parameters? How can I do this?
user avatar
21 votes
7 answers
15k views

Unix systems usually just error out if they are confronted with a path that contains a symlink loop or just too many symlinks, because they have a limit to the number of symlinks they will traverse in ...
JanKanis's user avatar
  • 1,451
5 votes
2 answers
13k views

I can't figure out why the tcp_adv_win_scale and tcp_app_win variables coexist in Linux.  The information from tcp(7) says: For tcp_adv_win_scale: tcp_adv_win_scale (integer; default: 2; since Linux ...
javag87's user avatar
  • 53
5 votes
4 answers
16k views

I have FILE_A which has over 300K lines and FILE_B which has over 30M lines. I created a bash script that greps each line in FILE_A over in FILE_B and writes the result of the grep to a new file. ...
marcio_rogerio's user avatar
30 votes
1 answer
4k views

Until recently I thought the load average (as shown for example in top) was a moving average on the n last values of the number of process in state "runnable" or "running". And n would have been ...
user368507's user avatar
  • 2,223
9 votes
3 answers
2k views

It sounds quite counter-productive to me to cache pages that are swapped out. If you swap pages in, what is the advantage to first cache them in memory, only to have to than move them to the right ...
txwikinger's user avatar
  • 2,256