kali-bork
Oracle VirtualBox testing on Kali 2019.3 via the Phoronix Test Suite.
kali-bork
Processor: Intel Core i7-8850H (2 Cores), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 8192MB, Disk: 21GB VBOX HDD, Graphics: llvmpipe 8GB, Audio: Intel 82801AA AC 97 Audio, Network: 2 x Intel 82540EM
OS: Kali 2019.3, Kernel: 5.2.0-kali2-amd64 (x86_64), Desktop: KDE Plasma 5.14.5, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 19.1.4 (LLVM 8.0 256 bits), Compiler: GCC 9.2.1 20200104 + Clang 7.0.1-9, File-System: ext4, Screen Resolution: 1850x972, System Layer: Oracle VirtualBox
Java Notes: OpenJDK Runtime Environment (build 11.0.4+11-post-Debian-1)
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Bork File Encrypter
Bork is a small, cross-platform file encryption utility. It is written in Java and designed to be included along with the files it encrypts for long-term storage. This test measures the amount of time it takes to encrypt a sample file. Learn more via the OpenBenchmarking.org test page.
kali-bork
Processor: Intel Core i7-8850H (2 Cores), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 8192MB, Disk: 21GB VBOX HDD, Graphics: llvmpipe 8GB, Audio: Intel 82801AA AC 97 Audio, Network: 2 x Intel 82540EM
OS: Kali 2019.3, Kernel: 5.2.0-kali2-amd64 (x86_64), Desktop: KDE Plasma 5.14.5, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 19.1.4 (LLVM 8.0 256 bits), Compiler: GCC 9.2.1 20200104 + Clang 7.0.1-9, File-System: ext4, Screen Resolution: 1850x972, System Layer: Oracle VirtualBox
Java Notes: OpenJDK Runtime Environment (build 11.0.4+11-post-Debian-1)
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 8 January 2020 09:45 by user root.