p-test1
x79a-45gd
auto-over
Processor: Intel Xeon E5-1650 v2 @ 4.00GHz (6 Cores / 12 Threads), Motherboard: MSI X79A-GD45 (MS-7735) v1.0 (V2.25B6 BIOS), Chipset: Intel Xeon E7 v2/Xeon, Memory: 16384MB, Disk: 500GB CT500P1SSD8 + 960GB SanDisk SDSSDHII + 256GB SAMSUNG SSD 830 + 62GB DT Rubber 3.0, Graphics: ASUS NVIDIA GeForce GTX 970 4GB (1050/3505MHz), Audio: Realtek ALC892, Monitor: EV2455, Network: Realtek RTL8111/8168/8411
OS: ManjaroLinux 18.0.4, Kernel: 4.19.56-1-MANJARO (x86_64), Desktop: Cinnamon 4.2.0, Display Server: X Server 1.20.5, Display Driver: NVIDIA 430.26, OpenGL: 4.6.0, Compiler: GCC 9.1.0, File-System: ext4, Screen Resolution: 5760x1200
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
John The Ripper
This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.
auto-over
Processor: Intel Xeon E5-1650 v2 @ 4.00GHz (6 Cores / 12 Threads), Motherboard: MSI X79A-GD45 (MS-7735) v1.0 (V2.25B6 BIOS), Chipset: Intel Xeon E7 v2/Xeon, Memory: 16384MB, Disk: 500GB CT500P1SSD8 + 960GB SanDisk SDSSDHII + 256GB SAMSUNG SSD 830 + 62GB DT Rubber 3.0, Graphics: ASUS NVIDIA GeForce GTX 970 4GB (1050/3505MHz), Audio: Realtek ALC892, Monitor: EV2455, Network: Realtek RTL8111/8168/8411
OS: ManjaroLinux 18.0.4, Kernel: 4.19.56-1-MANJARO (x86_64), Desktop: Cinnamon 4.2.0, Display Server: X Server 1.20.5, Display Driver: NVIDIA 430.26, OpenGL: 4.6.0, Compiler: GCC 9.1.0, File-System: ext4, Screen Resolution: 5760x1200
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 13 July 2019 11:40 by user jusch.