Which configuration to tune to best-utilize fast SSD

I am doing some testing on the MySQL performance on top of different devices, including SMR-HDD, SAS-HDD, SATA-SSD, NVMe-SSD, Optane-SSD. I want to find configurations that exclusively friendly to specific type(s) of device(s) with respect to performance.

I am using TPC-H benchmark as workload. Could you please suggest some candidate configurations to test?


best configuration of game

I have a created a demo game. When I run that application in my mobile. I am unable to open that game(configuration of this game is very high). enter image description here

I added a picture of Quality of my game.

Device name : Huawei

Model : Lua-U22

API level : 22

Ram : 1

Storage : 8gigabytes

enter image description here

above picture is of after I open that application

enter image description here

Main Question : https://stackoverflow.com/questions/66151485/best-configuration-of-game/

@Usama Altaf your answer had solved my issue. But, I got another type of issue.

enter image description here enter image description here enter image description here

Configuration to use OWASP WebGoat whilw online? [closed]

OWASP WebGoat is a deliberately insecure webapplication with a set of tutorials how to hack it (and how to protect your own application). OWASP advises to disconnect from the internet while using it since it is an insecure application after all, and firewalls might be misconfigured or missing (see the prior question OWASP WebGoat Warning Meaning).

Is there a checklist how to use WebGoat safely while in a video conference? The first step is presumably to run it in the docker container. How do I configure that docker?

In setting up a VM, does the Bridged or NAT configuration provide more separation security?

I am setting up a few VM’s (assume VB w/ Linux). They will all be on the same PC host (assume Linux) and the intent is to have all the VM’s handle separate functions (business, personal finance, and fuck off time) and have no connection to each other through the network or otherwise. I want to set them up in a way that creates the best security as far as separation from each other and the host. The host will function only to host the VM’s. I would prefer to use one VPN subscription, which has been purchased anonymously. However, if this compromises the separation of these VM’s, then I would consider changing the approach.

So, the question here is, given this setup, which method (Bridged or NAT) would work better as far as providing the least amount of leaked information between the VM’s/Host?

Additional information:

The plan is to setup software firewalls allowing only outgoing connections for the VM’s and the host. I am still looking into whether this is best approach (secure and user friendly approach).

Any other board allowable suggestions would also be appreciated.

Optional/Mandatory Requirement For ‘req’ Command Configuration File Options Missing In OpenSSL v1.1.1g Manual Pages?

The OpenSSL v1.1.1 manual page for the req command’s Configuration File Format options seems to be missing any mention about whether each option is mandatory or optional. The other OpenSSL command manual pages (ca and ts) that support configuration file usage do stipulate whether each configuration file option is mandatory or optional.

Does anyone know which req configuration file options are mandatory and which are optional?

How Is The OpenSSL Configuration File Parsed?

I’m trying to understand how OpenSSL parses its configuration file. In the sample configuration file that is installed with OpenSSL v1.1.1g, its seems to be divided into three main sections – the [ ca ] section, the [ req ] section, and the [ tsa ] section (because of the lines that contain ############# ... that separate these sections). Inside the [ ca ] and [ req ] sections there are key/value pairs whose name is a command option and whose value "links" to another section in the configuration file. A good example is the x509_extensions = usr_cert key/value pair in the [ ca ] section.

I am under the impression that the OpenSSL config file is processed by the OpenSSL parser starting at the first line of the file and processing the next line in turn (please correct me if that’s not the case). Therefore, I would expect the [ ca ] section’s x509_extensions = usr_cert to be linked to a section of the config file that occurrs inside the [ ca ] section. But it doesn’t – it links to the [ usr_cert ] section that occurs inside the [ req ] section, which is outside the [ ca ] section.

So, what’s happening when the OpenSSL parser processes the configuration file? Is my visual perception of inside and outside wrong when I read the configuration file? Does the parser "call" the linked section, process its key/value pairs, then return parsing of the config file to the next line in the config file? If this is the case, wouldn’t it make it much easier to understand the structure of the config file if "links" to sections that pertained to the command whose section is being parsed were actually present within the command’s section?

Can Windows CMD/DOS Commands Be Used In An OpenSSL Configuration File On Windows 10? [migrated]

I’m using OpenSSL v1.1.1g on a Windows 10 machine (I don’t know Linux – yet). Can Windows CMD/DOS commands be used in the OpenSSL configuration file or is the configuration file limited to the use of OpenSSL commands only? I assume the answer to this question is "No" since OpenSSL uses its own parser to process OpenSSL configuration files, but I’d like to have my assumption confirmed.