martijn.be | On Sunday it was time for my weekly run with the Brussels Manneke Piss Hash House Harriers . I ran quite a bit slower than usual, not having fully recovered from the 24 km the previous day… Lesson learnt: take it easy on a day after a serious run! Not only was it my fifteenth run with BMPH³, but… | glasgow hash, hash home, nash hash, hash yearly, event hash | beer, glasgow, june, run, bit | 15 |
hobbiton.be | As promised here , I've put the Apache module that protects Java and PHP sites from Hash Algorithm Collision DOS attacks on GitHub . | site hash, hash algorithm | collision, algorithm, clone, recipe, tomcat | 5 |
palmki.be | After the registration, the scan of the hand palm vein structure is hash-coded, and that way your biometric data is stored safely. Once this is done, users just need to present their hand. The Palmki software will perform a biometric recognition of the hand by matching it with the saved hash-code… | structure hash, hash way, hand hash, hash code, cryptographic hash | identity, verification, access, vein, payment | 3 |
m2tec.be | vBulletin uses a “more advanced way” of hashing, just like phpBB3. phpBB2 used just old plain MD5 hashes. | way hash, hash like | php, mysql, function, sudo, java | 2 |
virtualidentity.be | AI audience cities college campuses communities corporations crypto cryptocurrency cryptographic cultural currency cyborg data science decentralized dev distinction distributed ledger effects family units functionality hash hypermedia identity immutable industries interaction interpretation json… | functionality hash, hash hypermedia | identity, virtual, technology, reality, artificial | 2 |
zupertails.be | DC++ is basically used to easily share your shareable data through means of a searchable index by connecting to a local server. If you plan to use this software, please hash all your shares beforehand as this takes a long time to complete . For more info on hashing, check the DC++ software manual)… | info hash, hash software | song, file, thing, list, library | 1 |
bittremieux.be | Journal Extremely fast and accurate open modification spectral library searching of high-resolution mass spectra using feature hashing and graphics processing units. | feature hash, hash graphic | mass, research, control, conference, bioinformatics | 1 |
0110.be | The main algorithms are simplified. There is also a reduction of dependencies and a refocus to core functionality. This also simplifies building the software. The retrieval characteristics are improved, mainly thanks to the use of a fine-grained Gabor transform. Also new is the near-exact hashing… | exact hash, hash construct | java, thread, file, library, fig | 1 |
groots.be | Note that in the above command, I’m providing a custom Id for the handler, avoiding Plesk to generate a long hash, making it difficult to modify your handler via its Id if you want to later on. | long hash, hash difficult | mariadb, grafana, debian, mysql, ubuntu | 1 |
kizombalovefunctionaltherapy.be | An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here . After approval of your comment, your profile picture is visible to the public in the context of your… | address hash, hash gravatar | functional, therapy, health, medicine, disease | 1 |
helsentailors.be | • Morgano Cashmere • Paul & Shark • Peuterey • M. Pescarolo • Polo by R.L. • Ralph Lauren • RE hash jeans | lauren hash, hash jean | uk, tailor, bespoke, fragrance, basement | 1 |
nicolasleroy.be | I was working on a site, and suddenly saw that the urls were a bit funky. At the end of each url I found some hash, like this: | url hash, hash like | technology, category, photography, registration, sql | 1 |
marcbogaerts.be | Notice that the passwords are stored in clear text, which is obviously not a very good idea. The programmers could have hashed the passwords before storing them in the database; that would have left us with a password hash and we still would not know what the actual users’ passwords were. But… | password hash, hash actual | exercise, vulnerability, query, request, java | 1 |
be2concept.be | Welcome to My QtoA, where you can ask questions and receive answers from other members of the community. | | ask, answer, register, popular, implementation | 0 |
nvrrdt.be | nvrrdt | Nothing more than thoughts. Might be developed once. For now, just some thoughts. | process hash, hash function, compiler hash | thought, proposal, function, compiler, process | 0 |
kinesistvanroy.be | Kinesitherapie in Mortsel… HomePage… sitemap… Contact… | theme hash, hash theme | theme | 0 |
farzana.be | Here are some plastic products. Please have a look. For more products you can click on Products Menu on top. For prices and other queries please contact with us. | square hash, hash theme | theme, soon, query, price, flat | 0 |
zean.be | Welcome to my website. I am a full stack software developer who also loves machine learning. | basic hash | august, sunday, azure, learn, command | 0 |
rtos.be | …high-side linux lock low-side low-side switching mosfet mutex object-orientation power mosfet process pwm queue relay scrum semaphore sensor board signal solar energy stm32 stm32-discovery stm32f100 system architecture task thread timer toolchain top-down wind energy wind turbine wiring diagram | tree hash, hash table | embedded, energy, harvester, thread, gui | 0 |
bugged.be | Android api c Commercial configuration Google GWT Innovation interrupt j2ee Jasper Java java linux Kylie Linux Linux vmware Maven microcontroller msp430 Netbeans Oracle Reporting rxtx Serial simpliciti SmartGWT Sql Texas Instruments Windows | | linux, entry, sql, java, postgresql | 0 |
mrwaggel.be | MyCustomTray is the software tool to create your own custom menus in your system toolbar. Create easy accessible shortcuts to folder locations, websites, programs and command tools. With the simple in browser graphical manager interface you will set up and run your own custom tray menus in no time. | | march, example, human, size, readable | 0 |
schu.be | RSS… First experience with Gemini… Fictitious phone numbers and email addresses… Things not to do with… | | july, june, onion, march, october | 0 |
maccabiantwerp.be | Site under heavy consturction…… Tennis… Football… Basketball… About… Home… Log in… Entries RSS… | theme hash, hash theme | antwerp, heavy, entry, theme, meta | 0 |
megabuds.be | Unfortunately, the App Store guidelines in both the Google Play Store and the Apple App Store are very strict when it comes to selling cannabis. It does not matter what the actual legal status in the respective country with regard to cannabis / CBD is. The sale of marijuana in the app is… | cbd hash, hash cbd | oil, shipping, ingredient, wishlist, help | 0 |
vminds.be | This solution is based on SQL temporal tables to keep a history record as the data changes are brought in. Input is taken from the SCD merge statements to know what exact keys were updated or inserted: | | sql, merge, lineage, ssrs, powershell | 0 |
telebudget.be | TeleBudget is the cheapest provider in Belgium . Simply use our access numbers to make cheap calls abroad. You don't need to signup, just start using TeleBudget. The use of our cheap access numbers will be charged on you regular phone bill. It can't be easier! | hash sign | number, access, rate, republic, united | 0 |
arrrcamp.be | I've been to ArrrrCamp 3 times now and it is absolutely one of my favourite conferences. The organisers care deeply about the whole conference, speakers and attendees. This leads to top content and a great experience for everyone. And with the parties, activities and even the long breaks between… | option hash, hash parser | conference, ruby, sail, conduct, fantastic | 0 |
doratec.be | phpinfo()… phpmyadmin… msd… sqlbuddy… webgrind… | | mysql, php, apache, load, core | 0 |
lianaenfabio.be | Environment… Included files… Loaded extensions… | | environment, file, load, core, calendar | 0 |
dju.be | æ·±å�³å¸�永诺æ��å½±å�¨æ��è�¡ä»½æ��é��å�¬å�¸å®�æ�¹ç½�ç«�-å�½äº§é�ªå��ç�¯-LEDæ��å½±ç�¯-é�ªå��ç�¯è§¦å��å�¨-å®�æ�¶å¿«é�¨çº¿-æ� 线é�¥æ�§å¿«é�¨çº¿-YONGNUO, photographic photographic equipment, equipment, camera camera accessories, accessories, flash flash light, light, camera camera remote remote… | password hash, hash openssl | photography, light, photographer, lightroom, overflow | 0 |
etrovub.be | The choice of the version of PHP to use is limited to the versions of the PHP addons installed in your Wampserver what avoids an error of version PHP. | gmp hash, hash iconv | php, apache, file, mysql, mariadb | 0 |
vives-kortrijk-elic.be | calendar… cgi-fcgi… Core… ctype… filter… hash… iconv… json… libxml… mysqli… mysqlnd… openssl… pcre… | hash support, hash engine | value, php, file, ilia, driver | 0 |
bybrightfish.be | About… Documentation… Knowledgebase… | hashone hash, hash theme | theme, latest, late | 0 |
it-solution.be | conversations centered around development with Visual Studio 2019, Azure DevOps, and GitHub. We’ll have something for everyone, whether you’re a developer who uses C#, C++, or Python or target the web, desktop, or cloud. And, of course, you’ll be one of the first who get to try out the Visual… | square hash, hash theme | march, visual, developer, late, month | 0 |
hoedenmaker.be | …houses. It is a charming and elegant house built in 1675. Located in the peaceful and quiet residential area of Saint-Gilles quarter, about 400 m north of the medieval centre of the city and less than 10 minutes walk to the Market Square and the Belfry tower . ‘De Hoedenmaker’ is a three-story… | square hash, hash theme | holiday, flemish, century, bruges, rate | 0 |
beoptimized.be | BeOptimized is a SAS expert company based in Brussels. We offer high quality consulting activities in the Business Intelligence, Data Integration and Analytics in traditional SAS9 as well as in SAS Viya. | hash object | consulting, programming, optimization, trick, sql | 0 |
wouterdemol.be | …Spain… Nightbus To Leeds… Moroccan Hash… All the way up… Monos y Montañas… Ghent By Night… Parkour… | moroccan hash | photography, travel, landscape, ghent, line | 0 |
f20.be | In Tempus Fugit 2, the idea is still, like in the first vm; to create something “out of the ordinary”. The vm contains both user and root flags. If you don’t see them, you are not looking in the right place... Need any hints? Feel free to contact me on Twitter: @4nqr34z | | vulnerable, fugit, tempus, vmware, story | 0 |