node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
5,086
6
Linux_Userland_Filesystem:linux userland filesystem linux userland filesystem lufs file system linux similar fuse file system driver provides bridge kernel mode user mode lufs possible among things mount remote directories via ssh ftp gnutella fuse lufs filesystem developed little effort comparable normal application addition fuse linux kernel lufs lost relevance longer developed
[ 7364, 4229, 10341, 11568, 823, 2395, 2397 ]
Validation
5,087
4
Titan_Rain:titan rain titan rain designation given federal government united states series coordinated attacks american computer systems since 2003 known ongoing least three years attacks originated guangdong china activity known titan rain believed associated state-sponsored advanced persistent threat titan rain hackers gained access many united states defense contractor computer networks targeted sensitive information including lockheed martin sandia national laboratories redstone arsenal nasa series attacks believed actions people ’ liberation army pla unit 61398 hackers attacked american defense intelligence agency – dod british government departments ministry defence – mod british government incident 2006 part house commons computer system shut “ organised chinese hacking group. ” chinese government denied responsibility ‘ titan rain ’ caused friction u.s. chinese governments u.s. government blamed chinese government attacks 2004 unclassified although potentially fatal information alan paller sans institute research director stated attacks came individuals “ intense discipline ” “ organisation could military ” sophistication evidence pointed toward chinese military people ’ liberation army attackers ‘ titan rain ’ reportedly attacked multiple high-end political systems nasa fbi although sensitive classified information reported stolen hackers however able steal unclassified information e.g information home computer fact information classified somewhat irrelevant comes together could reveal strengths weaknesses u.s. making attack damaging ‘ titan rain ’ caused distrust countries united kingdom russia – superpowers china distrust occurred countries likely attacked either detect attack released statements attacked united kingdom stated officially governmental offices attacked hackers chinese source events ‘ titan rain ’ caused rest world cautious attacks china countries well thereby causing however small slight distrust countries distrust may affect future agreements dealings affect relationship china
[ 3072, 5636, 3852, 7440, 150, 9630, 184, 10297, 11195, 3704, 9688, 1113, 7515, 4830, 4063, 2147, 1381, 1254, 8045, 4462, 9460, 7798, 6520 ]
Test
5,088
3
Vortex86:vortex86 vortex86 computing system-on-a-chip soc based core compatible x86 microprocessor family produced dm p electronics originated rise technology vortex86 previously belonged sis got basic design rise technology sis sold dm p electronics taiwan adopting vortex86 series dm p manufactured m6117d intel 386sx compatible 25–40 mhz soc vortex86 cpus implement i586 architecture early versions vortex86 original vortex86sx floating point unit fpu code runs i486sx cpu without 487 run vortex86 code runs i586 use floating point instructions i586 code run vortex86dx later linux kernels build-time option emulate fpu cpu missing one program uses i586-level floating point instructions work vortex86 family cpu kernel albeit slowly model fpu advanced models fpus i686-level instructions fucomi code intended i686 may fail cpu lacks conditional move cmov instruction instruction combines effect conditional branch move instruction compilers asked optimize code advanced cpu example gnu compiler -march=i686 option generate code uses cmov linux systems intended run i686 generally runnable vortex86 gnu c library built i686 uses cmov instruction assembly language strcmp function dynamic loader ld.so uses hence program uses shared libraries even start technically cmov optional i686 architecture intel i686 product pentium pro consequently things generate code typically consider cmov available ask generate code i686 devices vortex86dx3 run fedora 17 i686 live cd successfully unlike use versions vortex86 implies vortex86dx3 implements i686 features others properties vortex86 original cpu reported linux kernel tool codice_1 note cpu later version fpu dm p provides embedded linux distribution customized use socs features netbsd/i386 able boot least dx3 sis55x/rise mp6 simply vortex86 – developed sis three integer mmx pipelines branch prediction 300 mhz 16 kb data 16 kb instruction l1 cache fpu l2 cache use sd ddr2 ram 600 mhz 1 ghz 2.02 w 800 mhz 16 kb data 16 kb instruction l1 cache fpu 256 kb l2 cache 6-staged pipeline address 1 gib ddr2 ram pdx-600 version vortex86dx differs number rs-232 ports 3 instead 5 i²c servo controllers thus targeting embedded industrial market netbooks similar belco 450r use chip package single 581-pin bga package 1 ghz cpu core hardly differs vortex86dx according several sources processor appear implemented simd multi-media instructions mmx version drops conformance isa integrates gpu hd audio controller also integrates udma/100 ide controller consumer grade version known pmx-1000 current models gecko edubook use xcore86 rebadge vortex86mx 32kb write 2-way l1 cache 256kb write through/write back 4-way l2 cache pci rev 2.1 32-bit bus interface 33 mhz ddr2 rom controller ipc internal peripheral controllers dma interrupt timer/counter included fast ethernet fifo uart usb2.0 host ata controller mx+ adds vga controller chip shared memory package single 720-pin bga package 32kb write 4-way l1 cache 16k instruction 16k data 256kb write through/write back 4-way l2 cache pci rev 2.1 32-bit bus interface 33 mhz ddr2 rom controller ipc internal peripheral controllers dma interrupt timer/counter included vga 100 mbps ethernet fifo uart usb2.0 host ata controller enhancements dx include com ports 9 2gb ram hd audio codec well gpio pins package single 720-pin bga package 32kb write 2-way l1 cache 128kb write through/write back 2-way l2 cache pci-e bus interface 300 mhz ddr3 rom controller ipc internal peripheral controllers dma interrupt timer/counter included fast ethernet fifo uart usb2.0 host ata controller package single 288-pin tfbga-package 1.0 ghz dual-core cpu i686-compatible vortex86 eight-way 32k i-cache eight-way 32k d-cache four-way 512 kb l2 cache write-through write-back policy support 2gb ddr3 ram pci-e bus interface 100 mbps ethernet fifo uart usb 2.0 host ata controller ide controller pata 100 2x hdd 2x sd primary channel sata 1.5gbit/s 1 port secondary channel package single 720-pin bga-package ex2 model two asymmetrical master/slave cpu cores master core runs 600mhz 16k i-cache 16k d-cache four-way 128 kb l2 cache write-through write-back policy slave core operates 400 mhz also 16kb i-cache 16kb d-cache l2 cache built-in fpu maximum ddr3 ram capacity 2gb produced using 65nm manufacturing process uses 19x19mm lfbga-441 package
[ 7008, 10658, 3175, 8523, 6924, 10734, 2383, 5681, 499, 1461, 823, 5368, 3194, 8125 ]
Test
5,089
4
Alan_Woodward_(computer_scientist):alan woodward computer scientist alan woodward british computer scientist visiting professor university surrey specialist computer security fellow institute physics chartered physicist chartered practitioner chartered engineer fellow british computer society eur ing fellow royal statistical society
[ 2558 ]
Test
5,090
3
Dataflow_architecture:dataflow architecture dataflow architecture computer architecture directly contrasts traditional von neumann architecture control flow architecture dataflow architectures program counter concept executability execution instructions solely determined based availability input arguments instructions order instruction execution unpredictable i.e behavior nondeterministic although commercially successful general-purpose computer hardware used dataflow architecture successfully implemented specialized hardware digital signal processing network routing graphics processing telemetry recently data warehousing also relevant many software architectures today including database engine designs parallel computing frameworks synchronous dataflow architectures tune match workload presented real-time data path applications wire speed packet forwarding dataflow architectures deterministic nature enable programmers manage complex tasks processor load balancing synchronization accesses common resources meanwhile clash terminology since term dataflow used subarea parallel programming dataflow programming hardware architectures dataflow major topic computer architecture research 1970s early 1980s jack dennis mit pioneered field static dataflow architectures manchester dataflow machine mit tagged token architecture major projects dynamic dataflow research however never overcame problems related instructions data dependencies proved fine-grained effectively distributed large network time instructions tagged results travel large connection network longer time actually computations nonetheless out-of-order execution ooe become dominant computing paradigm since 1990s form restricted dataflow paradigm introduced idea execution window execution window follows sequential order von neumann architecture however within window instructions allowed completed data dependency order accomplished cpus dynamically tag data dependencies code execution window logical complexity dynamically keeping track data dependencies restricts ooe cpus small number execution units 2-6 limits execution window sizes range 32 200 instructions much smaller envisioned full dataflow machines designs use conventional memory addresses data dependency tags called static dataflow machines machines allow multiple instances routines executed simultaneously simple tags could differentiate designs use content-addressable memory cam called dynamic dataflow machines use tags memory facilitate parallelism normally control flow architecture compilers analyze program source code data dependencies instructions order better organize instruction sequences binary output files instructions organized sequentially dependency information recorded binaries binaries compiled dataflow machine contain dependency information dataflow compiler records dependencies creating unique tags dependency instead using variable names giving dependency unique tag allows non-dependent code segments binary executed order parallel compiler detects loops break statements various programming control syntax data flow programs loaded cam dynamic dataflow computer tagged operands instruction become available output previous instructions and/or user input instruction marked ready execution execution unit known activating firing instruction instruction completed execution unit output data sent tag cam instructions dependent upon particular datum identified tag value marked ready execution way subsequent instructions executed proper order avoiding race conditions order may differ sequential order envisioned human programmer programmed order instruction along required data operands transmitted execution unit packet also called instruction token similarly output data transmitted back cam data token packetization instructions results allows parallel execution ready instructions large scale dataflow networks deliver instruction tokens execution units return data tokens cam contrast conventional von neumann architecture data tokens permanently stored memory rather transient messages exist transit instruction storage
[ 7173, 9739, 2066, 7699, 5655, 10779, 10781, 6181, 8231, 6184, 3630, 6705, 7218, 2623, 2113, 7234, 3142, 2638, 2140, 1122, 4194, 3175, 5223, 8810, 4205, 8815, 630, 6774, 8822, 7802, 6268, 3197, 7313, 6815, 8352, 5793, 2210, 6818, 6821, 579...
Test
5,091
3
Pitfall_II:_Lost_Caverns:pitfall ii lost caverns pitfall ii lost caverns platform video game originally released atari 2600 activision 1984 sequel pitfall 1982 games designed programmed david crane star jungle explorer pitfall harry pitfall ii major additions much larger world vertical scrolling rivers swim balloons grabbed float locations released north american video game crash 1983 interest 2600 waning pitfall ii one last major releases console one technically impressive cartridge contains custom display processor chip designed david crane allow improved visuals four channel music instead two system normally capable pitfall ii ported atari 5200 colecovision tandy color computer apple ii atari 8-bit family msx commodore 64 ibm pc compatibles self-booting disk game plot loosely remade super pitfall famicom/nes 1985 sega released arcade version pitfall ii different visual style ported sg-1000 console japan pitfall involved player avoiding danger forms crocodiles scorpions cobras quicksand lost caverns expands scope environment dramatically player descends deep underground addition familiar screen-flipping harry travels right left game adds element vertical scrolling harry falls cliff flies around grabbing onto balloon unlike first game pitfall harry unlimited time lives making impossible lose game harry touches dangerous creature simply loses points moves back last continue point marked red cross touched along journey unlike original pitfall however ground level underground pitfall ii 27 horizontal levels predominantly height stacked atop levels span full eight screens length openly accessible way across portions blocked cave walls force harry travel areas order progress quicksand tar pits replaced rivers chasms balloons let harry ascend new areas two new unplayable characters debut lost caverns quickclaw harry cowardly pet mountain lion rhonda adventure-seeking niece characters also appear harry saturday supercade children cartoon based pitfall games fact rhonda quickclaw created saturday supercade full year game released collecting rhonda quickclaw diamond ring necessary win game versions without second cave upon collection three game ends spot maximum possible score 199,000 differs atari 8-bit 5200 versions see another creature cave rat shown next screen right quickclaw shown beginning game platform harry starting point however harry able reach quickclaw facing rat head-on via third screen hole river advancing left attempts rat push back river addition previous game addition soundtrack musical cues act subtle rewards punishments performance main heroic theme plays short reaching loop acoustic music harry collects treasure main theme begins harry dies slower minor key version theme plays progresses back atmospheric theme finally harry ascends using balloon sobre las olas waves played atari 5200 atari 8-bit versions called adventurer edition title screens contain additional content programmer mike lorenzen reused david crane code 2600 version added entirely new level game would playable initial game finished marketing would allow two versions different demanded additional game stripped atari version instead left easter egg pitfall ii lost caverns named 1 best 25 atari 2600 games time issue 46 retro gamer magazine gamasutra included open world game game design essentials series
[ 5091, 7051, 9006, 6129, 10931 ]
None
5,092
5
Carrier-sense_multiple_access:carrier-sense multiple access carrier-sense multiple access csma media access control mac protocol node verifies absence traffic transmitting shared transmission medium electrical bus band electromagnetic spectrum transmitter attempts determine whether another transmission progress initiating transmission using carrier-sense mechanism tries detect presence carrier signal another node attempting transmit carrier sensed node waits transmission progress end initiating transmission using csma multiple nodes may turn send receive medium transmissions one node generally received nodes connected medium variations basic csma include addition collision-avoidance collision-detection collision-resolution techniques variations csma use different algorithms determine initiate transmission onto shared medium key distinguishing feature algorithms aggressive persistent initiating transmission aggressive algorithm may begin transmission quickly utilize greater percentage available bandwidth medium typically expense increased likelihood collision transmitters broadcasting vehicular ad hoc networks original 1-persistence p-persistence strategies often cause broadcast storm problem improve performance engineers developed three modified techniques weighted p-persistence slotted 1-persistence slotted p-persistence
[ 10112, 2306, 388, 8708, 3847, 9098, 10005, 11288, 2458, 5020, 1192, 11560, 7723, 11181, 2994, 7490, 9284, 5321, 6857, 7498, 2911, 2912, 2785, 5863, 2802, 4339 ]
None
5,093
2
MacOS_Server:macos server macos server product formerly called mac os x server os x server mac os x server stand-alone operating system whereas macos server sold operating system add-on app provides additional server programs along management administration tools ios macos prior version 10.7 lion mac os x server separate similar unix server operating system apple inc. architecturally identical desktop counterpart mac os x release version 10.7 lion mac os x mac os x server combined one release separate server operating system longer sold server-specific server applications work group management administration software tools mac os x server offered macos server add-on package macos sold mac app store 19.99 june 2019 along workgroup manager 10.8 available apple support web site tools simplify access key network services including mail transfer agent afp smb servers ldap server domain name server others also included particularly later versions numerous additional services tools manage web server wiki server chat server calendar server many others mac os x server provided operating system xserve computers rack mounted server computers designed apple also optionally pre-installed mac mini mac pro sold separately use macintosh computer meeting minimum requirements macos server based open source foundation called darwin uses open industry standards protocols included services applications file sharing sharing contact information calendars schedule events send secure instant messages conduct live video conferences send receive email contribute comment wikis publish company-wide blog produce distribute podcasts set websites first version mac os x mac os x server 1.0 mac os x server 1.0 – 1.2v3 based rhapsody hybrid openstep next computer mac os 8.5.1 gui looked like mixture mac os 8 platinum appearance openstep next-based interface included runtime layer called blue box running legacy mac os-based applications within separate window discussion implementing 'transparent blue box would intermix mac os applications written rhapsody yellow box environment would happen mac os x classic environment apple file services macintosh manager quicktime streaming server webobjects netboot included mac os x server 1.0 – 1.2v3 could use firewire devices released may 21 2001 mac os x server 10.0 included new aqua user interface apache php mysql tomcat webdav support macintosh manager netboot released september 25 2001 released august 23 2002 10.2 mac os x server release includes updated open directory user file management release based ldap beginning deprecation next-originated netinfo architecture new workgroup manager interface improved configuration significantly release also saw major updates netboot netinstall many common network services provided ntp snmp web server apache mail server postfix cyrus ldap openldap afp print server inclusion samba version 3 allows tight integration windows clients servers mysql v4.0.16 php v4.3.7 also included released october 24 2003 10.3 mac os x server release includes updated open directory user file management release based ldap beginning deprecation next-originated netinfo architecture new workgroup manager interface improved configuration significantly many common network services provided ntp snmp web server apache mail server postfix cyrus ldap openldap afp print server inclusion samba version 3 allows tight integration windows clients servers mysql v4.0.16 php v4.3.7 also included released april 29 2005 10.4 release adds 64-bit application support access control lists xgrid link aggregation e-mail spam filtering spamassassin virus detection clamav gateway setup assistant servers software update ichat server using xmpp boot camp assistant dashboard weblogs august 10 2006 apple announced first universal binary release mac os x server version 10.4.7 supporting powerpc intel processors time apple announced release intel-based mac pro xserve systems released october 26 2007 leopard server sold 999 unlimited client license features released august 28 2009 snow leopard server sold 499 included unlimited client licenses new features released july 20 2011 releasing developer preview mac os x lion february 2011 apple indicated beginning lion mac os x server would bundled operating system would marketed separate product however months later company said would instead sell server components us 49.99 add-on lion distributed mac app store well lion combined cost upgrade lion purchase os x server add-on costs approximately us 50 nonetheless significantly lower retail cost snow leopard server us 499 lion server came unlimited client licenses snow leopard server lion server includes new versions ical server wiki server mail server significantly lion server used ios mobile device management released july 25 2012 like lion mountain lion separate server edition os x server package available mountain lion mac app store us 19.99 included server management application called server well additional administrative tools manage client profiles xsan mountain lion server like lion server provided unlimited client licenses purchased could run unlimited number systems released october 22 2013 separate server edition mavericks separate server edition mountain lion package available mac app store 19.99 includes server management app called server well additional administrative tools manage client profiles xsan purchased run unlimited number machines enrolled mac ios developer programs given code download os x server free released october 16 2014 separate server edition yosemite separate server edition mavericks package available mac app store 19.99 includes server management app called server well additional administrative tools manage client profiles xsan purchased run unlimited number machines enrolled mac ios developer programs given code download os x server free released september 16 2015 version 5.0.3 os x server operates either os x yosemite 10.10.5 os x el capitan 10.11 released march 21 2016 os x server 5.1 requires 10.11.4 el capitan previous versions os x server ’ work 10.11.4 el capitan released september 20 2016 version 5.2 macos server operates either os x el capitan 10.11 macos sierra 10.12 released march 17 2017 version 5.3 macos server operates macos sierra 10.12.4 later released september 25 2017 version 5.4 macos server operates macos high sierra 10.13 later released january 23 2018 version 5.5 macos server operates macos high sierra 10.13.3 later released april 24 2018 version 5.6 macos server operates macos high sierra 10.13.5 later released september 28 2018 version 5.7 macos server operates macos mojave 10.14 later version apple stopped bundling open source services calendar server contacts server mail server dns dhcp vpn server websites macos server included services limited profile manager open directory xsan released march 25 2019 version 5.8 macos server operates macos mojave 10.14 later profile manager supports new restrictions payloads commands file print services directory services authentication mail services calendaring web hosting collaboration services application servers media streaming client management networking vpn distributed computing high-availability features file systems management features macos server available english japanese french german simplified chinese dutch italian korean spanish traditional chinese
[ 10755, 9732, 4615, 1549, 5647, 7697, 1042, 4114, 11289, 9245, 6186, 6700, 4657, 1074, 8754, 9784, 7739, 8253, 8767, 576, 8774, 9802, 8783, 5713, 4180, 3670, 1623, 4184, 10838, 9308, 2141, 4702, 3167, 7261, 3681, 9826, 2149, 5733, 8806, 10...
None
5,094
3
Byte_addressing:byte addressing byte addressing refers hardware architectures support accessing individual bytes data rather larger units called words would word-addressable computers sometimes called byte machines contrast word machines basic unit digital storage called bit storing single 0 1 many common architectures address 8 bits data time example intel 386sx processor handle 16-bit two-byte data since data transferred 16-bit bus however data memory may various lengths 64-bit architecture machine might still need access 8-bit data 64-bit address line data returned bottom 8 bits longer data line byte addressable memory refers architectures data accessed addressed units narrower bus eight-bit processor like intel 8008 addresses eight bits full width bus regarded word-addressable 386sx addresses memory 8-bit units fetch store 16 bits time termed byte-addressable bytes always meant 8 bits fact depending platform byte sizes 1 48 bits used past therefore term octet used context makes byte-length ambiguous example 1980s honeywell mainframes 36-bit words byte-addressable 9-bit bytes nonets used 7- 8-bit character codes either stored one 9-bit byte making characters individually addressable illustrate byte addressing useful consider ibm 7094 word-addressable concept byte 36-bit words stores six-bit character codes six word change 16th character string program determine fourth character third word string fetch third word mask old value fourth character value held register new one store back amended word least six machine instructions usually relegated subroutine every store fetch single character involves overhead calling subroutine returning byte addressing achieved one instruction store character code byte address text programs easier write smaller run faster advantage word addressing memory addressed number bits ibm 7094 15-bit addresses could address 32,768 words 36 bits machines often built full complement addressable memory addressing 32,768 bytes 6 bits would much less useful scientific engineering users consider 32-bit pentium processor 32-bit address bus address 4 billion different items using word addressing 32-bit address bus could address 4 gigawords 16 gigabytes using modern 8-bit byte 386sx successors used word addressing scientists engineers gamers could enjoyed programs 4x larger 32-bit machines word processing rendering html text applications would run slowly computers costly mainly used science engineering word addressing obvious mode became cost-effective use computers handling text hardware designers moved byte addressing systems pdp-10 use word addressing facilitate access individual bytes using special instructions access memory using byte pointer contains word address index specific byte within word
[ 1462, 7607, 8474, 1469, 7071 ]
Test
5,095
2
GNOME_Mobile_&_Embedded_Initiative:gnome mobile amp embedded initiative gnome mobile embedded initiative gmae also known gnome mobile initiative developing promoting use gnome platform mobile devices announced embedded linux conference santa clara california april 19 2007 gnome mobile strips deprecated components desktop backward compatibility adds mobile-specific components like matchbox window manager window manager optimized mobile integrated devices gnome mobile uses optimizes mainline codebase used desktop merely scaling design smaller form factor
[ 1537, 11394, 2955, 6413, 10255, 8848, 3859, 7450, 1822, 6691, 6694, 4011, 8621, 9908, 10945, 708, 3015, 4177, 3300, 3561, 4459, 6763, 9455 ]
None
5,096
2
RPM_Package_Manager:rpm package manager rpm package manager rpm originally red hat package manager recursive acronym free open-source package management system name rpm refers file format package manager program rpm intended primarily linux distributions file format baseline package format linux standard base although created use red hat linux rpm used many linux distributions also ported operating systems novell netware version 6.5 sp3 ibm aix version 4 centos fedora fedora project also sponsored red hat oracle linux versions variants linux operating systems use rpm package manager rpm package contain arbitrary set files rpm files “ binary rpms ” brpms containing compiled version software also “ source rpms ” srpms containing source code used build binary package appropriate tag file header distinguishes normal b rpms causing extracted /usr/src installation srpms customarily carry file extension “ .src.rpm ” .spm file systems limited 3 extension characters e.g old dos fat rpm originally written 1997 erik troan marc ewing based experiences system administrator performing software installation maintenance use package management rather manual building advantages simplicity consistency ability processes automated non-interactive features rpm include packages may come within particular distribution example red hat enterprise linux built parties example rpm fusion fedora circular dependencies among mutually dependent rpms so-called dependency hell problematic cases single installation command needs specify relevant packages rpms often collected centrally one repositories internet site often rpm repositories may either act local mirrors internet repositories locally maintained collections useful rpms several front-ends rpm ease process obtaining installing rpms repositories help resolving dependencies include working behind scenes package manager rpm database stored uses berkeley db back-end consists single database containing meta information installed rpms multiple databases created indexing purposes replicating data speed queries database used keep track files changed created user using rpm installs package thus enabling user via rpm reverse changes remove package later database gets corrupted possible rpm client killed index databases recreated command whilst rpm format across different linux distributions detailed conventions guidelines may vary across rpm delivered single file normally filename format example package filename associated source package would named rpms extension depend particular cpu architecture example rpms may contain graphics text programs use may also contain shell scripts programs written interpreted programming languages python rpm contents also include package label contains following pieces information package label fields need match filename libraries distributed two separate packages version one contains precompiled code use run-time second one contains related development files headers etc packages -devel appended name field system administrator ensure versions binary development packages match format binary consists four sections recipe creating rpm package spec file spec files end .spec suffix contain package name version rpm revision number steps build install clean package changelog multiple packages built single rpm spec file desired rpm packages created rpm spec files using rpmbuild tool spec files usually distributed within srpm files contain spec file packaged along source code typical rpm pre-compiled software ready direct installation corresponding source code also distributed done srpm also includes spec file describing software built srpm also allows user compile perhaps modify code software package could contain platform independent scripts case developer could provide srpm still installable rpm special version srpm contains spec file optionally patches include sources usually license two versions rpm development one led fedora project red hat separate group led previous maintainer rpm former employee red hat rpm.org community first major code revision july 2007 version 4.8 released january 2010 version 4.9 march 2011 4.10 may 2012 4.11 january 2013 4.12 september 2014 4.13 july 2015 version used distributions fedora red hat enterprise linux derivatives opensuse suse linux enterprise unity linux mageia openembedded tizen openmandriva lx formerly mandriva jeff johnson rpm maintainer since 1999 continued development efforts together participants several distributions rpm version 5 released may 2007 version used distributions wind river linux wind river linux 10 rosa linux openmandriva lx former mandriva linux switched rpm5 2011 also openpkg project provides packages common unix-platforms openmandriva lx going switch back rpm.org 4.0 release openembedded last major user rpm5 switched back rpm.org due issues rpm5
[ 2050, 10760, 7181, 1553, 8213, 5656, 6680, 5670, 3114, 2095, 561, 3129, 1594, 3131, 5179, 3649, 10817, 5705, 3147, 3659, 10317, 4174, 3667, 6227, 3162, 4186, 5723, 10857, 9324, 5742, 6257, 1138, 4729, 7293, 9353, 10387, 10900, 3222, 4775, ...
None
5,097
9
Gunther_Schmidt:gunther schmidt gunther schmidt born 1939 rüdersdorf german mathematician works also informatics schmidt began studying mathematics 1957 göttingen university studying carl ludwig siegel returned göttingen spending time united states wwii 1960 transferred ludwig-maximilians-universität münchen studied functions several complex variables karl stein schmidt wrote thesis analytic continuation functions 1962 schmidt began work tu münchen students robert sauer beginning labs tutorials later mentoring administration schmidt interests turned toward programming collaborated hans langmaack rewriting braid group 1969 friedrich l. bauer klaus samelson establishing software engineering university schmidt joined group 1974 1977 submitted habilitation programs partial graphs became professor 1980 shortly appointed hold chair late klaus samelson one half years 1988 retirement 2004 held professorship faculty computer science universität der bundeswehr münchen classroom instructor beginners courses well special courses mathematical logic semantics programming languages construction compilers algorithmic languages working thomas strohlein authored textbook relations graphs published german 1989 english 1993 2012 2001 became involved large project 17 nations european cooperation science technology schmidt chairman project cost 274 tarski theory application relational structures knowledge instruments 2014 festschrift organized celebrate 75th year calculus relations relatively low profile among mathematical topics twentieth century schmidt others raised profile partial order binary relations organized grouping closure 2018 schmidt michael winter published relational topology reviews classical mathematical structures binary operations topological space lens calculus relations 1981 participated international summer school marktoberdorf edited lecture notes theoretical foundations programming methodology manfred broy gunther schmidt mainly known work relational mathematics co-founder ramics conference series 1994 textbooks calculus relations exhibit applications potential algebraic logic
[ 512, 1952, 8262, 4395, 1392, 1783, 5496 ]
Test
5,098
0
Paper_generator:paper generator paper generator computer software composes scholarly papers style appear academic journals conference proceedings typically generator uses technical jargon field compose sentences grammatically correct seem erudite actually nonsensical prose supported tables figures references may valid randomly inserted rather relevant examples include postmodernism generator snarxiv scigen latter used generate many computer science papers accepted publication
[ 1652, 5278, 10591 ]
Test
5,099
1
Malta_Maritime_Authority:malta maritime authority malta maritime authority mma awtorità marittima ta malta used independent state corporation government agency responsible governance operation regulation promotion ports mediterranean archipelago nation malta operation principal cargo port malta freeport done conjunction malta freeport terminals company established 1988 malta smaller ports provide service pleasure craft yacht marinas ferry services fishing industry local trade mma ports directorate port authority ports malta malta international ship register department mma 2010 mma longer exists separate entity forms part transport malta governmental institution encompasses transport control islands sea land air malta rich maritime heritage principal ports include
[ 6461 ]
Validation
5,100
2
Android_Oreo:android oreo android oreo codenamed android development eighth major release 15th version android mobile operating system first released alpha quality developer preview march 2017 released public august 21 2017 contains number major features including notification grouping picture-in-picture support video performance improvements battery usage optimization support autofillers bluetooth 5 system-level integration voip apps wide color gamuts wi-fi aware android oreo also introduces two major platform features android go – software distribution operating system low-end devices – support implementing hardware abstraction layer 28.3 android devices run oreo 12.9 8.0 15.4 8.1 making oreo major release commonly used version android android oreo internally codenamed oatmeal cookie march 21 2017 google released first developer preview android available nexus 5x nexus 6p nexus player pixel c pixel smartphones second considered beta quality released may 17 2017 third developer preview released june 8 2017 offered finalized version api dp3 finalized release api api level 26 changed camera ui reverted wi-fi cellular connectivity levels status bar back wi-fi left added themed notifications added battery animation settings battery new icon darker background clock app teardrop icon shape apps july 24 2017 fourth developer preview released included final system behaviors latest bug fixes optimizations android officially released august 21 2017 name oreo lawn statue unveiled promotional event across chelsea market new york city—a building formerly housed nabisco factory oreo cookies first produced factory images made available compatible pixel nexus devices later day sony xperia xz1 sony xperia xz1 compact first devices available oreo pre-installed android 8.1 released december 2017 pixel nexus devices features minor bug fixes user interface changes notifications snoozed batched topic-based groups known channels 'major ongoing feature orders alerts priority pinning important application top slot android oreo contains integrated support picture-in-picture modes supported youtube app youtube premium subscribers settings app features new design white theme deeper categorization different settings ringtone alarm notification sound settings contain option adding custom sounds list android 8.1 update supports display battery percentages connected bluetooth devices makes notification shade slightly translucent dims on-screen navigation keys order reduce possibility burn-in android oreo adds support neighborhood aware networking nan wi-fi based wi-fi aware bluetooth 5 wide color gamuts apps api autofillers multiprocess google browsing support webviews api allow system-level integration voip apps launching activities remote displays android runtime art features performance improvements android oreo contains additional limits apps background activities order improve battery life apps specify adaptive icons differently-shaped containers specified themes circles squares squircles android oreo supports new emoji included unicode 10 standard new emoji font also introduced notably redesigns face figures use traditional circular shape opposed blob design introduced kitkat underlying architecture android revised low-level vendor-specific code supporting device hardware separated android os framework using hardware abstraction layer known vendor interface vendor interfaces must made forward compatible future versions android new architecture called project treble allows quicker development deployment android updates devices vendors would need make necessary modifications bundled software devices shipping oreo must support vendor interface feature optional devices updated oreo earlier version seamless updates system introduced android 7.0 also modified download update files directly system partition rather requiring downloaded user partition first reduces storage space requirements system updates android oreo introduces new automatic repair system known rescue party operating system detects core system components persistently crashing startup automatically perform series escalating repair steps automatic repair steps exhausted device reboot recovery mode offer perform factory reset android 8.1 update also introduces neural network api designed provide apps hardware acceleration on-device machine learning operations api designed use machine learning platforms tensorflow lite specialized co-processors pixel visual core featured google pixel 2 smartphones dormant 8.1 installed also provides cpu fallback mode tailored distribution low-end devices known android go unveiled oreo intended devices 1 gb ram less mode platform optimizations designed reduce mobile data usage including enabling data saver mode default special suite google mobile services designed less resource- bandwidth-intensive google play store also highlight lightweight apps suited devices operating system interface also modified quick settings panel providing greater prominence information regarding battery mobile data limit available storage recent apps menu using modified layout limited four apps order reduce ram consumption api allowing mobile carriers implement data tracking top-ups within android settings menu google play services also modularized reduce memory footprint android go made available oems android 8.1 android oreo re-brands automatic scanning google play store sideloaded apps google play protect gives feature well find device formerly android device manager higher prominence security menu settings app opposed single system-wide setting enabling installation apps sources outside google play store function implemented permission granted individual apps i.e clients third-party app repositories amazon appstore f-droid verified boot includes rollback protection feature enforces restriction rolling back device previous version android aimed preventing potential thief bypassing security measures installing previous version operating system n't place
[ 5637, 11273, 8719, 3600, 7700, 9244, 11294, 1578, 7722, 10284, 5677, 8754, 10293, 1083, 6212, 69, 8262, 4683, 4685, 11343, 3664, 8280, 8285, 2658, 8821, 11391, 1670, 7816, 5262, 10393, 8858, 7835, 673, 8870, 1191, 1203, 7359, 196, 3269, 3...
Validation
5,101
9
Comparison_of_JavaScript_engines_(DOM_support):comparison javascript engines dom support following tables compare document object model dom compatibility support number javascript engines used web browsers features fully supported based dom level 2 dom level 3 modules w3c recommendation exact version number given certain feature added version dom level 0 dom level 3 modules still development included see list ecmascript engines full list interfaces within section considered fundamental must fully implemented conforming implementations dom including html dom implementations interfaces defined form part dom core specification objects expose interfaces never encountered dom implementation deals html interfaces found within section mandatory section extends dom core api describe objects methods specific html documents xhtml documents general functionality needed manipulate hierarchical document structures elements attributes found core section functionality depends specific elements defined html found section elements deprecated since html 4.01 listed elements attributes listed deprecated xhtml 1.1 example presentation attributes image maps frames targets interfaces found within section mandatory interfaces section base interfaces used represent type style sheet interfaces within section considered fundamental css interfaces must supported conforming implementations css module interfaces represent css style sheets specifically interfaces found within section mandatory interfaces found within section mandatory first goal design generic event system allows registration event handlers describes event flow tree structure provides basic contextual information event second goal event model provide common subset current event systems used dom level 0 browsers see also dom events details interfaces found within section mandatory document may one views associated e.g. computed view document applying css stylesheet multiple presentations e.g html frame document client view alternate representation presentation associated source document interfaces found within section mandatory interfaces provide easy-to-use robust selective traversal document contents interfaces found within section mandatory includes methods creating moving range methods manipulating content ranges interfaces within section considered fundamental must fully implemented conforming implementations dom load save module interfaces found within section mandatory module provides interfaces guide construction editing xml documents examples guided editing queries like combine questions like schema allow insert/delete insert/delete document still valid
[ 8068, 3462, 6791, 1802, 6154, 8605, 6176, 1698, 5031, 1203, 438, 4920, 1470, 7871, 5311, 5067, 3407, 339, 11223, 4056, 9560, 9561, 8923, 8289, 482, 487, 9195, 10991, 10739, 10744 ]
Validation
5,102
5
IP_over_Avian_Carriers:ip avian carriers computer networking ip avian carriers ipoac proposal carry internet protocol ip traffic birds homing pigeons ip avian carriers initially described rfc 1149 request comments rfc issued internet engineering task force ietf written d. waitzman released april 1 1990 one several april fools day request comments waitzman described improvement protocol rfc 2549 ip avian carriers quality service 1 april 1999 later rfc 6214—released 1 april 2011 13 years introduction ipv6—carpenter hinden published adaptation rfc 1149 ipv6 ipoac successfully implemented nine packets data packet loss ratio 55 due operator error response time ranging 3,000 seconds ≈54 minutes 6,000 seconds ≈1.77 hours thus technology suffers poor latency nevertheless large transfers avian carriers capable high average throughput carrying flash memory devices effectively implementing sneakernet last 20 years information density storage media thus bandwidth avian carrier increased 3 times fast bandwidth internet ipoac may achieve bandwidth peaks orders magnitude internet used multiple avian carriers rural areas example 16 homing pigeons given eight 512 gb sd cards take hour reach destination throughput transfer would 145.6 gbit/s excluding transfer sd cards 28 april 2001 ipoac actually implemented bergen linux user group name cpip carrier pigeon internet protocol sent nine packets distance approximately five kilometers three miles carried individual pigeon containing one ping icmp echo request received four responses real life implementation mentioned french mp martine billard french assemblée nationale debates hadopi implementation noted song paper pings steve savitzky december 2005 gartner report bird flu concluded “ pandemic would n't affect systems directly ” humorously criticized neglecting consider rfc 1149 rfc 2549 analysis although collisions unlikely packets lost particularly raptors rafting photographers already use pigeons sneakernet transport digital photos flash media camera tour operator 30-mile distance single pigeon may able carry tens gigabytes data around hour average bandwidth basis compares favorably current adsl standards even accounting lost drives march 12 2004 yossi vardi ami ben-bassat guy vardi sent 3 homing pigeons 100 km distance carrying 20-22 tiny memory cards msystems disk-on-chip containing 1.3 gb amounting total 4 gb data achieving effective throughput 2.27 mbps purpose test measure confirm improvement rfc 2549 since developers used flash memory instead paper notes specified rfc 2549 experiment widely criticized example optimized implementation breaks official standard inspired rfc 2549 9 september 2009 marketing team unlimited regional company south africa decided host tongue-in-cheek pigeon race pet pigeon winston local telecom company telkom sa race send 4 gigabytes data howick hillcrest approximately 60 km apart pigeon carried microsd card competed telkom adsl line winston beat data transfer telkom adsl line total time two hours six minutes 57 seconds uploading data microsd card completion download card time winston victory adsl transfer 4 complete november 2009 australian comedy/current-affairs television program hungry beast repeated experiment hungry beast team took challenge fiery parliament session wherein government time blasted opposition supporting telecommunications investments saying opposition way australians would data transfer carrier pigeons hungry beast team read south african experiment assumed developed western country australia would higher speeds experiment team transfer 700mb file via three delivery methods determine fastest carrier pigeon microsd card car carrying usb stick telstra australia largest telecom provider adsl line data transferred tarana rural new south wales western-sydney suburb prospect new south wales distance 132 km road approximately halfway race internet connection unexpectedly dropped transfer restarted pigeon race time approximately 1 hour 5 minutes car came second 2 hours 10 minutes internet transfer finish dropped second time coming back estimated time upload completion one point high 9 hours point estimated upload time fall 4 hours similar pigeon race conducted september 2010 tech blogger trefor.net isp timico cto trefor davies farmer michelle brumfield rural yorkshire england delivering five-minute video bbc correspondent 75 miles away skegness pigeon pitted carrying memory card 300mb hd video davies haircut upload youtube via british telecom broadband pigeon released 11.05 arrived loft one hour fifteen minutes later upload still incomplete failed interim
[ 3592, 3218, 11413, 5531, 3742, 1315, 10924, 6319, 562, 6456, 4797, 4158, 3006, 64, 7364, 2887, 5469, 5470, 5472, 10341, 10344, 11112, 8432, 6651 ]
None
5,103
2
Windows_Embedded_Compact_7:windows embedded compact 7 windows embedded compact 7 formerly known windows embedded ce 7.0 seventh major release windows embedded ce operating system windows embedded compact 7 real-time os separate windows nt line designed target enterprise specific tools industrial controllers consumer electronics devices digital cameras gps systems also automotive infotainment systems windows embedded compact designed run multiple cpu architectures supports x86 sh automotive arm development microsoft employee working division claimed microsoft working hard release shares underlying kernel windows phone microsoft officially confirmed said windows phone 7 based windows embedded ce 6.0 r3 features borrowed windows embedded compact 7 thus making hybrid solution windows embedded compact 7 released march 1 2011 windows embedded compact 7 contains features
[ 8576, 641, 3463, 3978, 651, 6797, 8080, 3857, 1298, 7057, 2196, 8976, 9366, 10896, 11283, 4505, 4515, 11301, 3496, 6441, 6697, 1581, 7983, 3250, 3890, 10675, 9910, 6462, 7615, 321, 7106, 7234, 582, 1098, 10957, 5454, 9173, 11605, 2391, 32...
Test
5,104
2
DataReader:datareader ado.net datareader broad category objects used sequentially read data data source datareaders provide efficient way access data thought firehose cursor asp classic except server-side cursor used datareader parses tabular data stream microsoft sql server methods retrieving data sources datareader usually accompanied command object contains query optionally parameters connection object run query datareader class ado.net number classes implement idatareader interface datareaders small footprint good performance tailor-made task hand however makes difficult write application moved one backend data source another provider-specific datareaders expose types used underlying database example values null microsoft sql server .net framework prior version 2.0 using datareader retrieve data developer choose read field values strongly typed manner example weakly typed manner returning example approaches pros cons using strongly typed retrieval methods cumbersome especially without specific knowledge underlying data numeric values database translate several .net types trying retrieve value using wrong type results exception thrown stops code running slows application also true use right type encounter value avoided using boolean function datareader class benefit retrieval method data validation performed sooner improving probability data correction possible weakly typed data retrieval allows quick code writing allows data used fashion developer n't know beforehand types returned effort programmer extract value variable proper type using methods datareader datareader cases used place datatable however many programmers experienced connection bloat following approach datareader used already open database connection connection n't closed datareader method called exception thrown data processed example described strong weak typing method never called developer writes code explicitly declaring disposing datareader without use block c construct good way avoid problem shown code example sample accessing sql data using datareader
[ 736, 9348, 4135, 2669, 9263, 3573, 11030 ]
None
5,105
2
KernelCare:kernelcare kernelcare live kernel patching service provides security patches bugfixes range popular linux kernels installed without rebooting system kernelcare software released gpl2 first beta introduced march 2014 commercially launched may 2014 kernelcare supports centos/rhel 5.x 6.x 7.x cloudlinux 5.x 6.x 7.x parallels cloud server oracle linux/rhel 6.x 7.x amazon linux virtuozzo openvz rhel6/rhel proxmox 3.x 4.x 5.x virt-sig/xen4centos debian 6.x 7.x 8.x 9.x ubuntu 14.04 lts 16.04 lts 18.04 lts kernelcare agent resides user server periodically checks kernelcare distribution servers new patches available currently running kernel kernelcare agent downloads applies patches running kernel kernelcare patch piece code used substitute vulnerable buggy code kernel arbitrary code line modification missing security check set functions even modified data structures patch compiled usual generated code additional information changed code pieces caused original source code modification information apply code pieces resulting code modifications safely applied running kernel special kernelcare kernel module applies patches loads patches kernel address space sets relocations i.e. fixes references original kernel code data safely switches execution path original code updated code blocks code ensures patch applied safely cpu n't execute original code blocks moment switching new version
[ 4616, 3082, 5139, 6675, 7187, 10776, 25, 10780, 4637, 10785, 9762, 6180, 5158, 7217, 8242, 9266, 9784, 10809, 576, 4161, 8772, 6213, 8268, 589, 593, 10333, 97, 6244, 5222, 10856, 8298, 4207, 7285, 9335, 2168, 1147, 5244, 3197, 4734, 1150,...
Train
5,106
6
Fsck:fsck system utility fsck file system consistency check tool checking consistency file system unix unix-like operating systems linux macos freebsd similar command chkdsk exists microsoft windows ancestor ms-dos agreed pronunciation pronounced f-s-c-k f-s-check fizz-check f-sack fisk fizik f-sick f-sock f-sek feshk sibilant fsk fix farsk fusk generally fsck run either automatically boot time manually system administrator command works directly data structures stored disk internal specific particular file system use fsck command tailored file system generally required exact behaviors various fsck implementations vary typically follow common order internal operations provide common command-line interface user fsck utilities provide options either interactively repairing damaged file systems user must decide fix specific problems automatically deciding fix specific problems user answer questions reviewing problems need resolved file system without actually fixing partially recovered files original file name reconstructed typically recovered lost+found directory stored root file system system administrator also run fsck manually believe problem file system file system normally checked unmounted mounted read-only system special maintenance mode modern journaling file systems designed tools fsck need run unclean shutdown i.e crash ufs2 file system freebsd background fsck usually necessary wait fsck finish accessing disk full copy-on-write file systems zfs btrfs designed avoid causes corruption traditional fsck repair tool scrub utility examines repairs problems background mounted file system equivalent programs microsoft windows ms-dos chkdsk scandisk severity file system corruption led terms fsck fscked becoming used among unix system administrators minced oath fuck fucked unclear whether usage cause effect report question answer session usenix 1998 claims fsck originally different name go fsck occasionally used online injunction person go correct issue attitude ignorance subject matter etc way running fsck involves fixing fundamental errors following example checks file system configured mounted /usr partition file system needs unmounted first following example checks linux jfs file system mdadm software raid device
[ 5120, 515, 9733, 9735, 3976, 6797, 4750, 6416, 2194, 5397, 2198, 3350, 2199, 6812, 287, 9343, 9762, 6947, 10405, 7847, 5032, 4398, 7983, 823, 1336, 9016, 7356, 8772, 965, 8266, 3659, 8395, 8522, 8651, 9166, 10967, 9946, 2395, 7136, 5985, ...
Test
5,107
4
BREACH:breach breach backronym browser reconnaissance exfiltration via adaptive compression hypertext security exploit https using http compression breach built based crime security exploit breach announced august 2013 black hat conference security researchers angelo prado neal harris yoel gluck idea discussed community announcement crime attack presented general attack could work effectively large number protocols exploits spdy request compression tls compression demonstrated largely mitigated browsers servers crime exploit http compression mitigated even though authors crime warned vulnerability might even widespread spdy tls compression combined breach instance crime attack http compression—the use gzip deflate data compression algorithms via content-encoding option within http many web browsers servers given compression oracle rest breach attack follows general lines crime exploit performing initial blind brute-force search guess bytes followed divide-and-conquer search expand correct guess arbitrarily large amount content breach exploits compression underlying http protocol therefore turning tls compression makes difference breach still perform chosen-plaintext attack http payload result clients servers either forced disable http compression completely thus reducing performance adopt workarounds try foil breach individual attack scenarios using cross-site request forgery csrf protection another suggested approach disable http compression whenever referrer header indicates cross-site request header present approach allows effective mitigation attack without losing functionality incurring performance penalty affected requests around 2013-2014 ietf draft proposal tls extension length-hiding padding theory could used mitigation attack allows actual length tls payload disguised insertion padding round fixed set lengths randomize external length thereby decreasing likelihood detecting small changes compression ratio basis breach attack however draft since expired without action
[ 513, 517, 1157, 1288, 9744, 3473, 1683, 1688, 3742, 2083, 2470, 8358, 3629, 11693, 11569, 9394, 7736, 9281, 9412, 3657, 5834, 10831, 4561, 11345, 5590, 474, 3805, 7264, 8674, 2275, 7139, 10341, 11119, 501, 1526, 2169, 3707, 510, 4863 ]
Validation
5,108
4
Self-service_password_reset:self-service password reset self-service password reset sspr defined process technology allows users either forgotten password triggered intruder lockout authenticate alternate factor repair problem without calling help desk common feature identity management software often bundled software package password synchronization capability typically users forgotten password launch self-service application extension workstation login prompt using another user web browser telephone call users establish identity without using forgotten disabled password answering series personal questions using hardware authentication token responding notification e-mail less often providing biometric sample voice recognition users either specify new unlocked password ask randomly generated one provided self-service password reset expedites problem resolution users fact thus reduces help desk call volume also used ensure password problems resolved adequate user authentication eliminating important weakness many help desks social engineering attacks intruder calls help desk pretends intended victim user claims forgotten account password asks new password rather merely asking users answer security questions modern password reset systems may also leverage sequence authentication steps despite benefits self-service password reset relies solely answers personal questions introduce new vulnerabilities since answers questions often obtained social engineering phishing techniques simple research users frequently reminded never reveal password less likely treat sensitive answers many commonly used security questions pet names place birth favorite movie much information may publicly available users personal home pages answers elicited someone pretending conduct opinion survey offering free dating service since many organizations standard ways determining login names real names attacker knows names several employees organization choose one whose security answers readily obtained vulnerability strictly due self-service password reset—it often exists help desk prior deployment automation self-service password reset technology often used reduce type vulnerability introducing stronger caller authentication factors human-operated help desk using prior deployment automation september 2008 yahoo e-mail account governor alaska vice president united states nominee sarah palin accessed without authorization someone able research answers two security questions zip code date birth able guess third met husband incident clearly highlighted choice security questions important prevent social engineering attacks password systems jakobsson stolterman wetzel yang proposed use preferences authenticate users password reset underlying insights preferences stable long period time publicly recorded approach includes two phases -- setup authentication setup user asked select items either like dislike several categories items dynamically selected big candidate set presented user random order authentication phase users asked classify preferences like dislike selected items displayed random order jakobsson stolterman wetzel yang evaluated security approach user experiments user emulations attacker simulations two-factor authentication 'strong authentication method adds another layer security password reset process cases consists preference based authentication plus second form physical authentication using something user possesses i.e smartcards usb tokens etc. one popular method sms email advanced sspr software requires user provide mobile phone number personal e-mail address setup event password reset pin code sent user phone email need enter code password reset process modern technology also allows authentication via voice biometrics using voice recognition technology major problem self-service password reset inside corporations similar organizations enabling users access system forgot primary password since sspr systems typically web-based users need launch web browser fix problem yet log workstation problem solved various approaches addressing catch-22 compromises e.g. desktop software deployment domain-wide password reset account telephone access visiting neighbour continuing call help desk etc. companies created software presents restricted web browser login screen sole ability access password reset page without logging system example novell client login extension technology technologies effectively give user access computer resources specifically web browser reset passwords without authenticating computer security high priority capabilities limited user expected mode two additional problems related one locked users conjunction preference-based authentication self-service password reset procedures could also rely network existing human relations among users scenario user forgot password asks colleague assistance helper colleague authenticates password reset application vouches user identity scenario problem changes one authenticating user forgot password one understanding users ability vouch users
[ 3521, 10801, 1557, 5433, 7994, 5435 ]
Test
5,109
2
Absolute_Linux:absolute linux absolute linux lightweight linux distribution works older hardware based slackware linux client designed everyday use internet multimedia documents absolute linux default file window managers icewm rox programs offered default include gimp libreoffice firefox xfburn p7zip qbittorrent many script utilities included absolute linux aid configuration maintenance system
[ 5356, 499, 5363, 5397, 5078, 3097, 7483 ]
Test
5,110
2
Tinfoil_Hat_Linux:tinfoil hat linux tinfoil hat linux thl compact security-focused linux distribution designed high security developed shmoo group first version 1.000 released february 2002 appears low priority project image files source available gzip format thl used almost modern pc requires intel 80386 better computer least 8 mb ram distribution fits single hd floppy small footprint provides additional benefits beyond making system easy understand verify- computer need even hard drive making easier sanitize computer use logo tinfoil hat tux linux mascot wearing tinfoil hat tinfoil hat uses number measures defeat hardware software surveillance methods like keystroke logging video camera tempest advantage thl used virtually modern pc using x86 processor architecture example one might install computer kept locked room connected network used cryptographically signing keys fairly easy create tinfoil hat booting floppy microsoft windows verifying checksum tricky text documentation salted jokes reinforces humor stark contrast serious paranoiac tone surrounding text- name pokes fun tinfoil hats commonly ascribed paranoiacs method protecting oneself mind-control waves tinfoil hat linux requires one work text-only environment linux i.e starting straight bourne shell editor vi graphical user interface uses busybox instead normal util-linux gnu coreutils formerly known fileutils shellutils textutils common unix tools tinfoil hat also offers gnu nano text editor
[ 2050, 516, 8837, 7435, 6797, 10127, 2321, 8978, 5397, 4887, 10394, 673, 3745, 10530, 6436, 4389, 9253, 10149, 11305, 7854, 9646, 2738, 4790, 823, 439, 56, 59, 7483, 3903, 4673, 2375, 4039, 8907, 4561, 1110, 10967, 9693, 2914, 485, 3685, ...
Test
5,111
4
Christien_Rioux:christien rioux christien rioux also known handle dildog co-founder chief scientist burlington massachusetts based company veracode main patent holder educated mit rioux computer security researcher l0pht heavy industries company stake later bought symantec stake looked security weaknesses software led development smart risk analyzer sra co-authored best-selling windows password auditing tool stake lc l0phtcrack antisniff network intrusion detection system also member cult dead cow ninja strike force formerly member l0pht dildog best known author original code back orifice 2000 open source remote administration tool also well known author tao windows buffer overflow
[ 9217, 9569, 1187, 10914, 1861, 8135, 5512, 6665, 10279, 2007, 8827, 9214 ]
Test
5,112
2
After_School_(app):school app school ios android social network mobile application allows users defined network currently high schools share anonymous text-based posts images others july 2016 school users 20,000 american high schools according ceo michael callahan app created network “ teens could use express reach others ask offer help fellow teens distress. ” app created michael callahan cory levy one inc. debuted mid-november 2014 re-release app april 2015 school implemented “ mature content ” filters age verification 24/7 live anonymous support first fastest internet response system threats february 2016 school announced raising 16.4 million series round app also detects threatening harmful messages using language algorithms enforces single-report immediate user removal violations
[]
Test
5,113
4
FTP_bounce_attack:ftp bounce attack ftp bounce attack exploit ftp protocol whereby attacker able use port command request access ports indirectly use victim machine middle man request technique used port scan hosts discreetly access specific ports attacker access direct connection example nmap port scanner nearly modern ftp server programs configured default refuse port commands would connect host originating host thwarting ftp bounce attacks
[ 5636, 7364, 10924, 2797, 2739, 3700, 7031 ]
Test
5,114
5
Flock_(web_browser):flock web browser flock discontinued web browser specialized providing social networking web 2.0 facilities built user interface earlier versions flock used gecko html rendering engine mozilla version 2.6.2 released january 27 2011 last version based mozilla firefox starting version 3 flock based chromium used webkit rendering engine flock available free download supported microsoft windows mac os x one time linux well support flock discontinued april 2011 flock successor round two raised money bessemer venture partners catamount ventures shasta ventures angel investors bart decrem geoffrey arone co-founded company flock raised 15 million fourth round funding led fidelity ventures may 22 2008 estimated total 30 million according cnet company previous investors bessemer venture partners catamount ventures shasta ventures also participated round january 2011 flock inc. acquired zynga browser discontinued support ending april 26 2011 flock 2.5 integrated social networking media services including myspace facebook youtube twitter flickr blogger gmail yahoo mail etc logging supported social services flock could track updates friends profiles uploaded photos flock latest 2.5 version added twitter search functionality multi-casting status updates multiple services introduction instant messaging via facebook chat browser features include december 2007 flock mashable open web awards applications widgets march 2008 flock south southwest web award community cnet gave mac os x version flock 1.0 title best mac software 2007 pc world harry mccracken reviewed flock new favorite web browser february 2008 aol announced would discontinue support netscape browser recommended flock firefox alternative browsers userbase netscape 9 users netscape 8 userbase aol recommended flock browser users march 2008 flock announced seen nearly 3 million downloads 135 increase active users first two months 2008 also announced 70 percent flock users making default browser choice may 2008 flock social networking category webby awards flock nominated award along facebook bebo ning flock discontinuation announced april 2011 reviewer joey sneddon omg ubuntu offered analysis whether poor implementation design wise one needs glance 'rockmelt example social browser done right general apathy towards alerts twitter flickr facebook digg et al face time moot flock flocked innovation never quite lived hype upon exiting beta flock number awards
[ 513, 6657, 9736, 2579, 9241, 6171, 2076, 9757, 7713, 3110, 10791, 9770, 559, 4661, 3639, 10808, 3643, 9275, 64, 9281, 5707, 10834, 5205, 6231, 8281, 2139, 6747, 6237, 106, 1642, 9834, 9841, 115, 9843, 3191, 4728, 637, 1664, 2182, 6791, ...
None
5,115
2
WAITS:waits waits heavily modified variant digital equipment corporation monitor operating system later renamed better known tops-10 pdp-6 pdp-10 mainframe computers used stanford artificial intelligence laboratory sail mid-1960s 1991 mainframe computer ran also went name sail never official expansion waits common variant west-coast alternative another variant worst acronym invented timesharing system name endorsed sail community public vote choosing among alternatives two contenders saints stanford ai new timesharing system sinners stanford incompatible non-new extensively rewritten system proposed systems programmers though waits less visible frequent exchange people ideas two communities innovations pioneered waits exerted enormous indirect influence waits alumni xerox parc elsewhere also played major roles developments led xerox star apple macintosh sun workstation later sold sun microsystems early screen modes emacs example directly inspired waits e editor -- one family editors first real-time editing editing commands invisible one typed text point insertion/overwriting modern style multi-region windowing said originated system also featured unusual level support called multimedia computing allowing analog audio video signals including tv radio switched programming terminals switching capability terminal video even allowed users separate offices view type virtual terminal single user instantly switch among multiple full virtual terminals also invented bucky bits thus alt key every ibm pc waits legacy one waits feature notable pre-web days news-wire search engine called ns news service allowed waits hackers instantly find store notified selected ap new york times news-wire stories searches using arbitrary combinations words news story retrieval search instantaneous story automatically indexed words came wire
[ 2179, 10499, 10883, 394, 3978, 1804, 6797, 273, 7057, 6675, 7187, 5141, 9366, 11539, 6296, 25, 8474, 10776, 8092, 4637, 7325, 9887, 10016, 9762, 421, 5158, 10235, 2345, 7983, 3248, 7217, 11184, 11255, 6837, 823, 9784, 4409, 10809, 6075, 7...
Train
5,116
3
Universal_Data_Element_Framework:universal data element framework universal data element framework udef controlled vocabulary developed open group provided framework categorizing naming indexing data assigned every item data structured alphanumeric tag plus controlled vocabulary name describes meaning data allowed relating data elements similar elements defined organizations udef defined dewey-decimal like code concept example employee number often used human resource management udef tag a.5_12.35.8 controlled vocabulary description employee.person_employer.assigned.identifier udef superseded open data element framework o-def application used hospital last name first name several people could include following example concepts examples following udef ids available
[ 8975 ]
Test
5,117
2
CryptGenRandom:cryptgenrandom cryptgenrandom deprecated cryptographically secure pseudorandom number generator function included microsoft cryptoapi win32 programs microsoft recommends use anywhere random number generation needed 2007 paper hebrew university suggested security problems windows 2000 implementation cryptgenrandom assuming attacker control machine microsoft later acknowledged problems exist windows xp vista microsoft released fix bug windows xp service pack 3 mid-2008 win32 api includes comprehensive support cryptographic security including native tls support via schannel api code signing capabilities built native windows libraries cryptographic operations rsa aes key generation libraries turn rely cryptographically secure pseudorandom number generator csprng cryptgenrandom standard csprng win32 programming environment microsoft-provided cryptography providers share implementation cryptgenrandom currently based internal function called rtlgenrandom general outline algorithm published rtlgenrandom generates specified fips 186-2 appendix 3.1 sha-1 g function entropy nowiki /nowiki omitted long lists low-level system information fields performance counters nowiki /nowiki security cryptosystem csprng significant origin dynamic key material keys needed fly aes tls session keys protect https sessions bank websites originate csprngs pseudorandom numbers predictable session keys predictable well cryptgenrandom de facto standard csprng win32 environments security critical windows users specifics cryptgenrandom algorithm officially published unpublished random number generation algorithm may susceptible theoretical weaknesses including use outdated algorithms reliance entropy gathering several monotonically-increasing counters might estimated controlled extent attacker local access system cryptanalysis cryptgenrandom published november 2007 leo dorrendorf others hebrew university jerusalem university haifa found significant weaknesses windows 2000 implementation algorithm take advantage vulnerability attacker would first need compromise program running random number generator weaknesses paper depend attacker siphoning state bits generator attacker position carry attack would typically already position defeat random number generator instance simply sniff outputs generator fix memory known values however hebrew university team notes attacker need steal state bits order persistently violate security cryptgenrandom instance also use information glean determine past random numbers generated potentially compromising information credit card numbers already sent paper attacks based fact cryptgenrandom uses stream cipher rc4 run backwards state known also take advantage fact cryptgenrandom runs user mode allowing anyone gains access operating system user level example exploiting buffer overflow get cryptgenrandom state information process finally cryptgenrandom refreshes seed entropy infrequently problem aggravated fact win32 process instance cryptgenrandom state means compromise one process transitively compromise every process may also increase longevity successful break details cryptgenrandom algorithm public dorrendorf team used reverse engineering tools discern algorithm works paper first published record windows cryptographic random number generator operates windows 2000 xp 2003 successfully undergone eal4+ evaluations including cryptgenrandom fipsgenrandom implementations security target documentation available common criteria portal indicates compliance eal4 requirements conclusions drawn security algorithm result eal4 measures products best practices stated security objectives rarely involves in-depth cryptanalysis microsoft obtained validation rng implementations following environments tests designed test conformance various approved rng specifications rather provide measure product ’ security ... thus validation interpreted evaluation endorsement overall product security conclusions drawn security algorithm result fips evaluations necessarily inspect source code evaluate way rng seeds generated windows developers several alternative means accessing cryptgenrandom functionality alternatives invoke algorithm share security characteristics may advantages historically always told developers use functions rand generate keys nonces passwords rather use functions like cryptgenrandom creates cryptographically secure random numbers problem cryptgenrandom need pull cryptoapi cryptacquirecontext fine 're using crypto functions default windows xp later install cryptgenrandom calls function named advapi32 rtlgenrandom require load cryptapi stuff fact new whidbey crt function rand_s calls rtlgenrandom programmers using .net use rngcryptoserviceprovider class cng long term replacement deprecated crypto api provides equivalent function bcryptgenrandom well dedicated functions key generation
[ 11584, 8065, 1474, 8679, 8554, 9196, 5677, 1683, 5397, 3573, 1941, 10173 ]
None
5,118
5
Logical_link_control:logical link control ieee 802 reference model computer networking logical link control llc data communication protocol layer upper sublayer data link layer layer 2 seven-layer osi model llc sublayer provides multiplexing mechanisms make possible several network protocols e.g ip ipx decnet appletalk coexist within multipoint network transported network medium also provide flow control automatic repeat request arq error management mechanisms llc sublayer acts interface media access control mac sublayer network layer llc sublayer primarily concerned multiplexing protocols transmitted mac layer transmitting demultiplexing receiving also provide node-to-node flow control error management flow control error management capabilities llc sublayer used protocols netbios frames protocol however protocol stacks running atop 802.2 use llc sublayer flow control error management cases flow control error management taken care transport layer protocol tcp application layer protocol higher layer protocols work end-to-end fashion i.e re-transmission done original source final destination rather individual physical segments protocol stacks multiplexing capabilities llc sublayer used llc sublayer key component early packet switching networks x.25 networks lapb data link layer protocol flow control error management carried node-to-node fashion meaning error detected frame frame retransmitted one switch next instead extensive handshaking nodes made networks slow ieee 802.2 standard specifies llc sublayer ieee 802 local area networks ieee 802.3/ethernet ethertype field used ieee 802.5 ieee 802.11 ieee 802.2 also used non-ieee 802 networks fddi since bit errors rare wired networks ethernet provide flow control automatic repeat request arq meaning incorrect packets detected cancelled retransmitted except case collisions detected csma/cd mac layer protocol instead retransmissions rely higher layer protocols ethertype ethernet frame using ethernet ii framing used multiplex different protocols top ethernet mac header seen llc identifier however ethernet frames lacking ethertype llc identifier ethernet header instead use ieee 802.2 llc header ethernet header provide protocol multiplexing function wireless communications bit errors common wireless networks ieee 802.11 flow control error management part csma/ca mac protocol part llc layer llc sublayer follows ieee 802.2 standard non-ieee 802 protocols thought split mac llc layers example hdlc specifies mac functions framing packets llc functions protocol multiplexing flow control detection error control retransmission dropped packets indicated protocols cisco hdlc use hdlc-like packet framing llc protocol telephone network modems ppp link layer protocols considered llc protocol providing multiplexing provide flow control error management telephone network bit errors might common meaning error management crucial today provided modern protocols today modem protocols inherited llc features older lapm link layer protocol made modem communication old x.25 networks gprs llc layer also ciphering deciphering sn-pdu sndcp packets another example data link layer split llc flow error control mac multiple access itu-t g.hn standard provides high-speed local area networking existing home wiring power lines phone lines coaxial cables
[ 6403, 9860, 9987, 1030, 3847, 9992, 6544, 1297, 3218, 7698, 8211, 11413, 5270, 6681, 5402, 5021, 2206, 3742, 5405, 10271, 10274, 1955, 9381, 4650, 10924, 562, 2994, 2996, 9909, 4918, 3383, 7478, 7865, 3133, 3006, 4543, 2752, 4797, 5437, 5...
Test
5,119
2
Image_Mastering_API:image mastering api image mastering application programming interface imapi component microsoft windows operating system used cd dvd authoring recording windows applications windows media player windows media center windows movie maker windows dvd maker windows explorer use imapi create iso images burn discs windows refers discs created using imapi mastered burns contrast term live file system implies packet writing use imapi imapi originally introduced windows xp imapi version 2.0 released windows vista windows server 2008 26 june 2007 version released update windows xp windows server 2003 microsoft received requests hardware software vendors 19 january 2009 microsoft released windows feature pack storage 1.0 update allows imapi 2.0 support recordable blu-ray disc bd-r rewritable blu-ray disc bd-re media also adds support universal disk format udf 2.5 file system windows feature pack storage available windows xp later integrated windows 7 imapi provides ability create burn single-session multi-session discs including bootable discs also provides low-level access burn engine developing support new devices well access extended recorder properties imapi supports every major writable cd dvd format including imapi supports writing disks iso 9660 including cdda audio joliet imapi v2.0 also supports writing discs universal disk format file system imapi version 2.0 supports following additional features unlike imapi version 1.0 imapi version 2.0 implemented dll rather windows service imapi 2.0 suffers limitations notably allow filesystem imported raw image .iso file optical drive effect means generate disk images used modify
[ 10243, 10769, 9234, 1043, 1055, 2083, 8227, 1577, 4143, 9263, 11316, 1077, 8246, 4174, 4178, 9813, 603, 2145, 5231, 1656, 7290, 5754, 9340, 5761, 9348, 5765, 10886, 2183, 5259, 653, 6797, 9869, 3224, 4771, 7846, 2221, 10414, 8391, 214, 99...
Test
5,120
2
Copy-on-write:copy-on-write copy-on-write cow cow sometimes referred implicit sharing shadowing resource-management technique used computer programming efficiently implement duplicate copy operation modifiable resources resource duplicated modified necessary create new resource resource shared copy original modifications must still create copy hence technique copy operation deferred first write sharing resources way possible significantly reduce resource consumption unmodified copies adding small overhead resource-modifying operations copy-on-write finds main use sharing virtual memory operating system processes implementation fork system call typically process modify memory immediately executes new process replacing address space entirely thus would wasteful copy process memory fork instead copy-on-write technique used copy-on-write implemented efficiently using page table marking certain pages memory read-only keeping count number references page data written pages kernel intercepts write attempt allocates new physical page initialized copy-on-write data although allocation skipped one reference kernel updates page table new writable page decrements number references performs write new allocation ensures change memory one process visible another copy-on-write technique extended support efficient memory allocation page physical memory filled zeros memory allocated pages returned refer page zeros marked copy-on-write way physical memory allocated process data written allowing processes reserve virtual memory physical memory use memory sparsely risk running virtual address space combined algorithm similar demand paging copy-on-write pages also used linux kernel kernel same-page merging feature loading libraries application also use copy-on-write technique dynamic linker maps libraries private like follows writing action libraries trigger cow virtual memory management codice_1 cow also used library application system code multithreaded systems cow implemented without use traditional locking instead use compare-and-swap increment decrement internal reference counter since original resource never altered safely copied multiple threads reference count increased without need performance-expensive locking mutexes reference counter turns 0 definition 1 thread holding reference resource safely de-allocated memory without use performance-expensive locking mechanisms benefit copy resource resulting performance gain traditional deep-copying therefore valid single- multithreaded systems string class provided c++ standard library specifically designed allow copy-on-write implementations initial c++98 standard newer c++11 standard php programming language types except references implemented copy-on-write example strings arrays passed reference modified duplicated non-zero reference counts allows act value types without performance problems copying assignment making immutable qt framework many types copy-on-write implicitly shared qt terms qt uses atomic compare-and-swap operations increment decrement internal reference counter since copies cheap qt types often safely used multiple threads without need locking mechanisms mutexes benefits cow thus valid single- multithreaded systems cow may also used underlying mechanism snapshots provided logical volume management file systems btrfs zfs database servers microsoft sql server typically snapshots store modified data stored close main array weak form incremental backup substitute full backup systems also use cow technique avoid fuzzy backups otherwise incurred file set files backed changes backup implementing snapshots two techniques despite names copy-on-write usually refers first technique cow two data writes compared row one difficult implement efficiently thus used infrequently copy-on-write technique used emulate read-write storage media require wear leveling physically write read many qcow2 qemu copy write disk image format uses copy-on-write technique reduce disk image size live cds live usbs use copy-on-write techniques give impression able add delete files directory without actually making changes cd usb flash drive phantom os uses cow levels database file system time computer running system fail starts software operating system resume operation small amounts work lost basic approach program data kept virtual memory schedule summary software data written virtual memory forming log tracks current value location value computer fails recent copy log data remain safe disk operation resumes operating system software reads log restore consistent copies programs data approach uses copy-on-write levels software including application software requires support within application programming language practice phantom os permits languages generate java byte codes
[ 2051, 2564, 6669, 3598, 10257, 9236, 6677, 5142, 8214, 3611, 4637, 5661, 9249, 9762, 5158, 10292, 3640, 7225, 11323, 8772, 1109, 86, 11351, 3170, 4708, 9836, 7789, 9333, 6263, 9335, 1150, 9343, 10883, 7818, 654, 4238, 2193, 2194, 2197, 21...
Test
5,121
8
Co-ment:co-ment co-ment online word processor allowing collaborative writing commenting inspired software package stet created handle gnu gpl version 3 online revision free software available affero gpl co-ment allows groups users collaboratively elaborate online texts offers wiki-style editing environment supporting many syntaxes allows finely controlled layouts including table images main interest comment feature allowing users attach remarks specific extracts text leading text building procedure based strong equipped debates advanced comment navigation features also provided help discover new annotations go history debate also possible set email alerts text edits new comments co-ment fitted many import/export formats support txt doc odt html co-ment special focus layout respect exported file types available free web service extended pro accounts following wordpress model source code available website also bundled drupal module greatest use cases co-ment education particular first language literature teaching secondary education co-ment inspired stet tool created handle online revision gpl v3 since used licenses mozilla public license creative commons licence family co-ment also used legal works administrative works advocacy works
[ 8554 ]
Test
5,122
0
Collocation_extraction:collocation extraction collocation extraction task using computer extract collocations automatically corpus traditional method performing collocation extraction find formula based statistical quantities words calculate score associated every word pairs proposed formulas mutual information t-test z test chi-squared test likelihood ratio within area corpus linguistics collocation defined sequence words terms co-occur often would expected chance 'crystal clear 'middle management 'nuclear family 'cosmetic surgery examples collocated pairs words words often found together make compound noun example 'riding boots 'motor cyclist
[ 2440, 2059, 6798, 11538, 1044, 5399, 538, 7599, 4531, 4662, 3127, 2488, 10557, 6208, 3533, 5197, 6223, 8538, 5857, 1890, 7780, 7918, 8046, 8688, 9200, 10231, 8440, 7164 ]
Test
5,123
2
Etcher_(software):etcher software balenaetcher commonly referred 'etcher free open-source utility used writing image files .iso .img files well zipped folders onto storage media create live sd cards usb flash drives developed balena licensed apache license 2.0 etcher developed using electron framework supports windows macos linux latest stable release balenaetcher version 1.5.51. balenaetcher originally called etcher name changed october 29 2018 resin.io changed name balena balenaetcher uses google analytics mixpanel even 'send anonymous usage data checkbox checked etcher primarily used graphical user interface additionally command line interface available active development future planned features include support persistent storage allowing live sd card usb flash drive used hard drive well support flashing multiple boot partitions single sd card usb flash drive
[ 3462, 5612, 7983, 11221, 6012, 4637 ]
Test
5,124
3
Macadam_Bumper:macadam bumper macadam bumper also known pinball wizard computer pinball construction set developed ere informatique france first released 8-bit computers 1985 atari st 1986 ms-dos 1987 st pc versions released us pinball wizard 1988 accolade game includes full-featured graphics sound lights even tilt capability game features four simulations varying obstacles atari st flipper back-board controls manipulated mouse moving mouse much activate tilt sensors players customize game changing parameters point scores table slope bumper elasticity number game balls parts menu player assemble pinball machine paint decorate game ’ paint menu 1988 dragon gave game 4½ 5 stars
[ 9166, 9006 ]
None
5,125
4
Kill_Pill:kill pill computing kill pill term given mechanisms technologies designed render systems useless either user command predefined set circumstances kill pill technology commonly used disable lost stolen devices security purposes also used enforcement rules contractual obligations kill pill technology used prominently smartphones especially disablement lost stolen devices notable example find iphone service allows user password protect wipe idevice remotely aiding protection private data similar applications exist smartphone operating systems including android blackberry windows phone kill pill technology notably used anti-piracy measure windows vista released ability severely limit functionality determined copy obtained piracy feature later dropped complaints false positives caused genuine copies vista act though pirated concept kill pill also applied remote removal server malicious files applications client system technology standard component handheld computing devices mainly due generally limited operating systems means obtaining applications functionality also reportedly available applications downloaded windows store windows 8 operating systems kill pill technology used frequently vehicles variety reasons remote vehicle disablement used prevent vehicle starting prevent moving prevent vehicle continued operation non-remotely vehicles require driver recognition starting moving asking password form biometrics driver kill pill technology often used governments prevent drunk driving repeat offenders punishment deterrent installation ignition interlock devices sentencing alternative drunk drivers almost 50 united states device requires driver blow breathalyzer starting vehicle driver found legal blood alcohol content limit vehicle start kill pill technology also implemented contextually disable certain aspects smartphone functionality patent obtained apple claims ability disable antenna screen camera smartphone settings like theaters schools areas high security sensitivity kill pill technology criticized allowing suppression personal liberties kill pill utilized school setting prevent academic dishonesty suggested governments may also use suppress people example disabling phone camera antenna area protest ability remotely remove files applications user device also come fire apple apparent ability blacklist applications rendering unusable idevice raised concerns user rights downloading app store july 2014 applications appear apple blacklist website
[ 9063, 11368, 4490, 10900, 1083, 10207 ]
Test
5,126
1
Navy_Directory:navy directory navy directory formerly navy list naval register official list naval officers ranks seniority ships command appointed etc. published government naval authorities country navy list fulfills important function international law warships required article 29 united nations convention law sea commanded commissioned officer whose name appears appropriate service list past copies navy list also important sources information historians genealogists navy list royal navy longer published hard-copy royal navy united kingdom publishes annual lists active reserve officers biennial lists retired officers equivalent united states navy naval register updated online continuous basis ship removed naval vessel register united states naval list country ship said stricken 2015 navy list renamed 'navy directory good sources historical data royal navy navy lists current editor navy list cliona willis
[ 650 ]
None
5,127
3
Squish_'em:squish 'em squish'em also known squish'em sam 1983 video game designed tony ngo published sirius software atari 8-bit family vic-20 commodore 64 msx colecovision console colecovision version features digitised speech without additional hardware published squish'em featuring sam game sequel sewer sam squish'em vertically scrolling game likened 1980 arcade game crazy climber players guide sam top uncompleted 48 storey buildings order collect suitcases money time sam reaches top building grabs money parachutes order attempt next building building represented grid girders connected vertically horizontally different patterns sometimes single way next storey building style buildings change grid layout colors change sam progresses game sam moves shimmying horizontally across grid climbing upwards moved storey climb back buildings patrolled dangerous enemies move horizontally across grid debris dropped sam must avoid making contact enemy without jumping hit falling debris results sam knocked building losing life player starts game four lives extra lives collected play 128 held player enemies 'squished jumped also jumped avoided ascending next storey enemy squished rendered harmless short period turning white becoming invulnerable enemy turned white must avoided jumped jumping enemies difficult landing squishing play progresses enemies become taller faster making harder squish avoid falling debris prevents players climbing many storeys enemies must avoided skillfully order prevent sam cornered invulnerable enemy tall easily jumped colecovision version game digitised speech employed sam performs certain actions instance exclaims squish 'em successfully attacking enemy money money money collecting suitcase top building one colecovision games contain speech unlike rival intellivision console colecovision lacks speech module craig holyoak deseret news rated colecovision version 3 5 praising game voice effects criticizing unoriginal despite boundaries technology pushed stated game contains plenty cute enabling appeal ages genders also stated little new keep experienced gamer long screen holyoak played game intensely number days lost interest mastering ability squish dangerous enemies finished stating less jaded looking climbing game new twist squish 'em may well unofficial homebrew clone even using name released atari 2600 2007
[ 9006 ]
Validation
5,128
3
MSX-Engine:msx-engine msx-engine chip specially developed integrated circuit home computers built according msx specifications generally chip combines functions many separate older/simpler chips one done reduce required circuit board space power consumption importantly production costs complete systems first msx-engine chip t7775 operated next standard zilog z80-clone chip main cpu system later versions engine also included z80 clone cpu single chip package s-1990 special case really msx-engine chip used glue logic msx-engine external r800 cpu t9769 used msx 2 computers msx 1 computers mostly t7775 t7937 used also find s-1985 s-3527 systems msx 2 generation msx2+ onwards toshiba took complete production msx engine chips last generation msx turbo-r used nec s-1990 turbor bus controller together r800 cpu msx engine chips yamaha mostly used msx-computers sony philips toshiba chips mostly used computers sanyo matsushita panasonic/national short overview msx-engine chips note ic also used many msx2 computers include msx2-specific functions machines implemented using additional ic's s1990 msx-engine acts like bus controller combining element combines z80 inside t9769c actual msx engine r800 cpu memory slot logic hardware inside t9769c also contains hardware assists debugging software
[ 10018, 8355, 6889, 4682, 9006, 1403, 4796, 5502 ]
Test
5,129
9
ADMB:admb admb ad model builder free open source software suite non-linear statistical modeling created david fournier developed admb project creation non-profit admb foundation ad ad model builder refers automatic differentiation capabilities come autodif library c++ language extension also created david fournier implements reverse mode automatic differentiation related software package admb-re provides additional support modeling random effects markov chain monte carlo methods integrated admb software making useful bayesian modeling addition bayesian hierarchical models admb provides support modeling random effects frequentist framework using laplace approximation importance sampling admb widely used scientists academic institutions government agencies international commissions commonly ecological modeling particular many fisheries stock assessment models built using software admb freely available new bsd license versions available windows linux mac os x opensolaris operating systems source code admb made publicly available march 2009 work david fournier 1970s development highly parameterized integrated statistical models fisheries motivated development autodif library ultimately admb likelihood equations models typically non-linear estimates parameters obtained numerical methods early fournier work became clear general numerical solutions likelihood problems could reliably achieved using function minimization algorithms incorporate accurate information gradients likelihood surface computing gradients i.e partial derivatives likelihood respect model variables must also done accuracy likelihood computation fournier developed protocol writing code compute required derivatives based chain rule differential calculus protocol similar suite methods came known reverse mode automatic differentiation statistical models using methods typically included eight constituent code segments model developers usually interested first constituents programming tools reduce overhead developing maintaining seven greatly increase productivity bjarne stroustrup began development c++ 1970s bell labs enhancement c programming language c++ spread widely 1989 c++ compilers available personal computers polymorphism c++ makes possible envisage programming system mathematical operators functions overloaded automatically compute derivative contributions every differentiable numerical operation computer program fournier formed otter research ltd. 1989 1990 autodif library included special classes derivative computation requisite overloaded functions c++ operators functions standard c++ math library autodif library automatically computes derivatives objective function accuracy objective function thereby frees developer onerous task writing maintaining derivative code statistical models equally important standpoint model development autodif library includes gradient stack quasi-newton function minimizer derivative checker container classes vectors matrices first application autodif library published 1992 autodif library however completely liberate developer writing model constituents listed 1993 fournier abstracted writing statistical models creating admb special template language simplify model specification creating tools transform models written using templates autodif library applications admb produces code manage exchange model parameters model function minimizer automatically computes hessian matrix inverts provide estimate covariance estimated parameters admb thus completes liberation model developer tedious overhead managing non-linear optimization thereby freeing focus interesting aspects statistical model mid-1990s admb earned acceptance researchers working aspects resource management population models based admb used monitor range endangered species commercially valuable fish populations including whales dolphins sea lions penguins albatross abalone lobsters tunas marlins sharks rays anchovy pollock admb also used reconstruct movements many species animals tracked electronic tags 2002 fournier teamed hans skaug introduce random effects admb development included automatic computation second third derivatives use forward mode automatic differentiation followed two sweeps reverse model ad certain cases 2007 group admb users included john sibert mark maunder anders nielsen became concerned admb long-term development maintenance agreement reached otter research sell copyright admb purpose making admb open-source project distributing without charge non-profit admb foundation created coordinate development promote use admb admb foundation drafted proposal gordon betty moore foundation funds purchase admb otter research moore foundation provided grant national center ecological analysis synthesis university california santa barbara late 2007 regents university california could purchase rights admb purchase completed mid-2008 complete admb libraries posted admb project website december 2008 may 2009 3000 downloads libraries occurred source code made available december 2009 mid-2010 admb supported common operating systems windows linux macos sun/sparc common c++ compilers gcc visual studio borland 32 64 bit architectures admb foundation efforts first two years admb project focused automating building admb different platforms streamlining installation creation user-friendly working environments planned technical developments include parallelization internal computations implementation hybrid mcmc improvement large sparse matrix use random effects models
[ 7301, 7945, 3980, 2317, 6797, 15, 7950, 8079, 2457, 5148, 7580, 7326, 7341, 9133, 7983, 6962, 823, 6718, 2242, 5830, 5703, 4808, 5833, 5450, 8262, 2000, 9944, 2652, 10848, 11363, 11239, 4840, 363, 5612, 5741, 7148, 7924 ]
Validation
5,130
2
Conda_(package_manager):conda package manager conda open-source cross-platform language-agnostic package manager environment management system originally developed solve difficult package management challenges faced python data scientists today popular python/r package manager released berkeley software distribution license anaconda inc big difference conda pip package manager package dependencies managed significant challenge python data science reason conda created pip installs python package dependencies required whether conflict packages previously installed working installation example google tensorflow suddenly stop working pip-install new package needs different version numpy library insidiously everything might still appear work get different results unable reproduce results elsewhere n't pip-install order conda analyses current environment everything installed version limitations specify e.g want tensorflow 2.0 figures install compatible dependencies tell want ca n't done pip contrast install package specify dependencies even breaks packages conda allows users easily install different versions binary software packages required libraries appropriate computing platform also allows users switch package versions download install updates software repository conda written python programming language manage projects containing code written language e.g. r including multi-language projects conda install python programming language similar python-based cross-platform package managers wheel pip popular conda channel bioinformatics software bioconda provides multiple software distributions computational biology fact conda package environment manager included versions anaconda miniconda anaconda repository
[ 7684, 6119, 5833, 8554, 5067, 5612, 4302, 11221, 9151 ]
Test
5,131
4
Exploit_kit:exploit kit exploit kit simply collection exploits simple one-in-all tool managing variety exploits altogether exploit kits act kind repository make easy users without much technical knowledge use exploits users add exploits use simultaneously apart pre-installed ones one earlier kits mpack 2006 exploit kits often designed modular easy use enabling addition new vulnerabilities removal existing ones exploit kits also provide user interface person controls typically includes information success rates types statistics well ability control settings typical kit collection php scripts target security holes commonly used programs apple quicktime mozilla firefox widely used software oracle java adobe systems products targeted particularly often exploit kits come packed variety tools ranging hunting vulnerabilities automated exploitation security loopholes discovered basically follows simple hierarchy five steps hacking exploit kit gathers information victim machine finds vulnerabilities determines appropriate exploit delivers exploit typically silently drive-by downloads executes malware running post-exploitation modules maintain remote access compromised system lastly measure cover tracks uses special techniques like erasing logs avoid detection days pass exploit kits becoming ever sophisticated tend neatly packaged require understanding exploits little computer proficiency kits may web interface showing active victims statistics may support period updates like commercial software exploit kits sold cybercriminal circles often vulnerabilities already loaded onto study solutionary security engineering research team sert found 70 exploit kits released q4 2012 come russia followed china brazil 20 attributed typical relatively unsophisticated kit may cost us 500 per month licenses advanced kits reported cost much 10,000 per month exploit kits often encoded instead plain php prevent unlicensed use complicate anti-malware analysis research recorded future threat intelligence team revealed adobe flash player provided six top 10 vulnerabilities used exploit kits 2016 flash player popularity cyber criminals remains even increased adobe security issue mitigation efforts.kits continue include exploitation vulnerabilities patched years back continues significant population unpatched machines exploit kits tend deployed covertly legitimate web sites hacked unknown site operators visitors exploit kits named include mpack phoenix blackhole crimepack rig angler nuclear neutrino magnitude exploit kits
[ 3555, 8644, 901, 10756, 2857, 107, 3473, 1970, 4883, 7515, 4471, 10392, 7739, 1979, 10297 ]
None
5,132
7
CBRP:cbrp cbrp cluster based routing protocol routing protocol wireless mesh networks cbrp originally designed mid 1998 national university singapore subsequently published internet draft august 1998 cbrp one earlier hierarchical ad-hoc routing protocols cbrp nodes dynamically form clusters maintain structural routing support minimize excessive discovery traffic typical ad-hoc routing many performance studies cbrp conducted area vehicular ad-hoc network vanet cbrp shown perform moderately well large high density mesh networks
[ 9098, 10021 ]
Validation
5,133
4
Data_Protection_Act_1998:data protection act 1998 data protection act 1998 c 29 united kingdom act parliament designed protect personal data stored computers organised paper filing system enacted eu data protection directive 1995 provisions protection processing movement data dpa 1998 individuals legal rights control information act apply domestic use example keeping personal address book anyone holding personal data purposes legally obliged comply act subject exemptions act defined eight data protection principles ensure information processed lawfully superseded data protection act 2018 dpa 2018 23 may 2018 dpa 2018 supplements eu general data protection regulation gdpr came effect 25 may 2018 gdpr regulates collection storage use personal data significantly strictly 1998 act replaced data protection act 1984 access personal files act 1987 implemented eu data protection directive 1995 privacy electronic communications ec directive regulations 2003 altered consent requirement electronic marketing positive consent opt-in box exemptions remain marketing similar products services existing customers enquirers still given permission opt basis jersey data protection law modelled uk law section 1 defines personal data data used identify living individual anonymised aggregated data less regulated act providing anonymisation aggregation done reversible way individuals identified various means including name address telephone number email address act applies data held intended held computers 'equipment operating automatically response instructions given purpose held 'relevant filing system cases paper records may classified 'relevant filing system address book salesperson diary used support commercial activities freedom information act 2000 modified act public bodies authorities durant case modified interpretation act providing case law precedent person data processed following rights schedule 1 lists eight data protection principles personal data processed fairly lawfully order data classed 'fairly processed least one six conditions must applicable data schedule 2 except mentioned exceptions individual needs consent collection personal information use purpose question european data protection directive defines consent “ …any freely given specific informed indication wishes data subject signifies agreement personal data relating processed ” meaning individual may signify agreement writing however non-communication interpreted consent additionally consent appropriate age capacity individual circumstances case e.g. organisation intends continue hold use personal data relationship individual ends consent cover even consent given n't assumed last forever although cases consent lasts long personal data needs processed individuals may able withdraw consent depending nature consent circumstances personal information collected used data protection act also specifies sensitive personal data must processed according stricter set conditions particular consent must explicit act structured processing personal data covered act providing number exceptions part iv notable exceptions act grants acknowledges various police court powers act details number civil criminal offences data controllers may liable data controller failed gain appropriate consent data subject however 'consent specifically defined act common law matter uk data protection act large act reputation complexity basic principles honoured protecting privacy interpreting act always simple many companies organisations individuals seem unsure aims content principles act hide behind act refuse provide even basic publicly available material quoting act restriction act also impacts way organisations conduct business terms contacted marketing purposes telephone direct mail also electronically led development permission based marketing strategies definition personal data data relating living individual identified sensitive personal data concerns subject race ethnicity politics religion trade union status health sex life criminal record information commissioner office website states regarding subject access requests sars right find organisation using storing personal data called right access exercise right asking copy data commonly known making ‘ subject access request general data protection regulation gdpr came force 25 may 2018 organisations could charge specified fee responding sar £10 requests following gdpr copy personal data provided free organisation may charge additional copies charge fee thinks request ‘ manifestly unfounded excessive ’ may ask reasonable fee administrative costs associated request compliance act regulated enforced independent authority information commissioner office maintains guidance relating act january 2017 information commissioner office invited public comments eu ’ article 29 working party proposed changes data protection law anticipated introduction extensions interpretation act guide general data protection regulation
[ 2818, 1934, 3599, 1169, 3858, 4133, 3880, 9901, 3773, 4037, 7623, 6344, 845, 6609, 5461, 5726, 6885, 11368, 4732 ]
Validation
5,134
9
Code_Morphing_Software:code morphing software code morphing software cms technology used transmeta microprocessors execute x86 instructions broad view cms reads x86 instructions generates instructions proprietary vliw processor style shade cms translation much expensive shade produces much higher quality code cms also contains interpreter simulates user-mode system mode operation
[ 7983, 499, 725, 3071 ]
Test
5,135
4
Block_(Internet):block internet internet block ban technical measure intended restrict access information resources blocking inverse unblocking may implemented owners computers using software countries including china singapore block access certain news information united states children internet protection act requires schools receiving federal funded discount rates internet access install filter software blocks obscene content pornography applicable content harmful minors blocking may also refer denying access web server based ip address client machine certain websites including social networks facebook editable databases like wikimedia projects wikis users apply blocks based either ip number account users deemed undesirable prevent performing certain actions blocks kind may occur several reasons produce different effects social networks users unrestrictedly block users typically preventing sending messages viewing blocker information profile privileged users apply blocks affect access undesirables entire website blocking used moderators administrators social media forums deny access users broken rules likely order ensure peaceful orderly discussion place common reasons blocking spamming trolling flaming criticize cases use bans administrators large websites twitter saying bans may politically financially motivated however websites legal right decide allowed post users often respond voting feet going place administrators see behavior acceptable blocked users may completely unable access part site content usually case censoring filtering mechanisms responsible block shadow ban user given false impression content still posted site reality hidden users ban evasion act attempting get around ban whether temporary permanent website alternate accounts set people evading bans websites referred sockpuppets typically someone caught evading ban sockpuppet sockpuppet account banned original ban temporary may extended even made permanent sometimes user ip address may banned well user access site create new accounts sites may remove traces ban-evader tv tropes wikipedia example may mass-delete pages created ban-evader ban evasion detected tracing user ip address two accounts using ip address could sign ban evasion also use vpn shown rapid drastic changes ip address user short period time also sign user trying get around ban ban evasion also spotted posts contributions two accounts look similar sites email associated multiple accounts identical similar emails sign ban evasion users permanently banned ban evasion may able appeal ban case sites tv tropes creating sockpuppets ban evaders use variety tactics disguise fact new account created previously banned user using new names alternate email address vpns proxy servers mask ip address changing ip address sometimes needing rely dynamic ip address automatically change time using site public internet access locations schools libraries
[ 4224, 2884, 2634, 4725, 5749, 1627, 9117 ]
None
5,136
4
Cryptographic_Module_Testing_Laboratory:cryptographic module testing laboratory cryptographic module testing laboratory cmtl information technology computer security testing laboratory accredited conduct cryptographic module evaluations conformance fips 140-2 u.s. government standard national institute standards technology nist national voluntary laboratory accreditation program nvlap accredits cmtls meet cryptographic module validation program cmvp standards procedures replaced fips 140-2 cryptographic module validation program cmvp laboratories must meet following requirements cmtl also common criteria cc testing laboratory cctl cc fips 140-2 different abstractness focus tests fips 140-2 testing defined cryptographic module provides suite conformance tests four fips 140 security levels fips 140-2 describes requirements cryptographic modules includes areas physical security key management self tests roles services etc standard initially developed 1994 prior development cc cc evaluation protection profile pp usually created user security target st typically pp covers broad range products operational environment modifiable operational environment operating system requirements common criteria applicable fips security levels 2
[ 6593, 4067, 420, 8904, 11432, 1905, 10962, 2932, 2558 ]
Test
5,137
3
SPARClite:sparclite discontinued sparclite risc processor family based 32-bit sparc v8 architecture manufactured approximately 1990s fujitsu designation mb8683x used many embedded applications including number early digital cameras followed fujitsu fr fr-v processors
[ 9137, 1399 ]
None
5,138
4
Blackra1n:blackra1n blackra1n program jailbreaks versions 3.1 3.1.1 3.1.2 apple operating system iphone ipod touch known ios program uses bug usb code firmware iphone ipod touch allowing unsigned code executed blackra1n uses exploit patch firmware iphone ipod touch dfu device firmware upgrade mode mode used upgrading firmware itunes also activated user program allows users install cydia icy removed blackra1n rc3 rock package managers applications allow user access tweaks homebrew applications root directory file system ios device blackra1n also perform tethered jailbreaks ipod touch 3g iphone 3gs devices running os 3.1.2 ios 3.1.3 released spiritjb released provided untethered jailbreaks 3.1.2 3.1.3. blackra1n superseded spirit comex
[ 11584, 1346, 9762, 9732, 6537, 5067, 9518, 7983, 464, 3473, 9972, 8918, 4283, 7420, 4957 ]
Test
5,139
8
LYME_(software_bundle):lyme software bundle lyme lyce software stacks composed entirely free open-source software build high-availability heavy duty dynamic web pages stacks composed lyme lyce bundles combined many free open-source software packages e.g netsniff-ng security testing hardening snort intrusion detection ids intrusion prevention system ips rrdtool diagrams nagios collectd cacti monitoring databases mnesia couchdb well yaws also mochiweb misultin cowboy written erlang web applications developed lyme/lyce may run entirely one erlang virtual machine contrast lamp web server apache application written php perl python might process database always separate process result using erlang lyme lyce applications perform well high load distribution fault tolerance needed query data manipulation language mnesia also erlang rather sql therefore web-application lyme developed using single programming language interest lyme stack begun august 2005 soon cited high-performance web application platform used single development language throughout favorable comparisons popular stacks ruby rails soon forthcoming comparisons lamp also favourable although highlighted difficulties porting sql thinking different context mnesia successful user lyme swedish internet payment-processing company klarna built whole architecture lyme seen successful project demonstrates virtues lyme functional programming general lyme also covered erlang session software practice advancement spa 2008 besides yaws several web servers written erlang e.g mochiweb misultin cowboy besides mnesia couchdb couple databases written erlang e.g. cloudant couchbase server born membase database management system optimized storing data behind interactive web applications riak simpledb part amazon web services
[ 4616, 3082, 19, 10780, 10785, 3618, 6180, 1580, 2098, 8242, 4161, 10817, 8772, 6213, 8268, 589, 7248, 593, 6244, 5222, 10856, 4207, 5244, 5245, 4734, 11391, 7812, 8326, 7821, 4238, 10382, 2195, 2711, 6808, 9882, 1694, 2723, 8364, 10413, 1...
Test
5,140
0
Eurodicautom:eurodicautom eurodicautom pioneering terminology database european commission created 1975 initially use translators commission staff 1980 consultable line within commission european community grew expanded six seven nine finally eleven languages plus latin scientific names public user interfaces added later providing general public free access multilingual terminology fields activity european union students rennes university ufr2 lea technical translator terminologist department regularly worked reviewing creating entries existing database several languages 2007 eurodicautom replaced interactive terminology europe iate
[ 8284, 2901 ]
None
5,141
3
SUN_workstation:sun workstation sun workstation modular computer system designed stanford university early 1980s became seed technology many commercial products including original workstations sun microsystems 1979 xerox donated alto computers developed palo alto research center stanford computer science department well universities developing early internet altos connected using ethernet form several local area networks sun design inspired alto used lower-cost modular components project name derived initials campus stanford university network professor forest baskett suggested best-known configuration relatively low-cost personal workstation computer-aided logic design work design created 3m computer 1 million instructions per second mips processor 1 megabyte memory 1 megapixel raster scan bit-map graphics display sometimes 10,000 estimated price called fourth — megapenny director computer facilities ralph gorin suggested configurations initially funded project graduate student andy bechtolsheim designed hardware several students staff members assisting software aspects project vaughan pratt became unofficial faculty leader project 1980 three key technologies made sun workstation possible large-scale integration vlsi integrated circuits multibus ecad ecad electronic computer assisted design known electronic design automation allowed single designer quickly develop systems greater complexity stanford artificial intelligence laboratory sail pioneered personal display terminals 1971 system showing age bechtolsheim used stanford university drawing system suds design sun boards sail system suds originally developed foonly computer structured computer aided logic design scald package used verify design automate layout produce wire-wrapped prototypes printed circuit boards vlsi integrated circuits finally allowed high-level hardware functionality included single chip graphics display controller first board designed published 1980 motorola 68000 cpu along memory parallel port controller serial port controller included main cpu board designed bechtolsheim third board interface 2.94 mbits/second experimental ethernet speed standardized 10 mbits/second multibus computer interface made possible use standard enclosures use circuit boards made different vendors create configurations example cpu board combined multi-port serial controller created terminal server called tip terminal interface processor connected many terminals digital equipment corporation time-sharing systems stanford anywhere internet configuring multiple ethernet controllers including commercial ones available one cpu board created router william yeager wrote software later adopted evolved cisco systems version hardware les earnest licensed cpu board one first commercial low-cost laser printer controllers company called imagen processor board combined prototype high performance graphics display students james h. clark group later formed silicon graphics incorporated eventually ten sun workstations built 1981 1982 stanford declined build bechtolsheim licensed hardware design several vendors frustrated none chosen build workstation vinod khosla also stanford convinced bechtolsheim along scott mcnealy found sun microsystems order build sun-1 workstation included improvements earlier design faculty members research using sun workstations included david cheriton brian reid john hennessy
[ 9665, 10051, 5829, 7269, 1809, 6834, 1398, 5115 ]
Test
5,142
6
Novell_Storage_Services:novell storage services novell storage services nss file system used novell netware operating system support nss introduced 2004 suse linux via low-level network ncpfs protocol unique features make especially useful setting shared volumes file server local area network nss 64-bit journaling file system balanced tree algorithm directory structure published specifications netware 6.5
[ 5120, 2051, 2564, 6669, 3598, 10257, 9236, 6677, 8214, 3611, 9249, 9762, 5158, 3629, 7225, 11323, 8772, 1109, 4708, 9836, 7789, 9333, 6263, 9335, 9343, 7818, 6797, 654, 2193, 2194, 2197, 2199, 6297, 11419, 6309, 1190, 5286, 10405, 5293, 7...
None
5,143
2
Nokia_N80:nokia n80 nokia n80 3g smartphone nokia announced november 2 2005 part multimedia nseries line runs symbian os v9.1 s60 3rd edition interface first released june 2006 support high-speed umts/wcdma connections features include 3.1-megapixel camera interpolated 2.0-megapixels built-in flash front camera videoconferencing wi-fi 802.11g universal plug play upnp fm radio bluetooth 1.2 minisd memory card slot support 3d java games 2.1-inch display pixel density 259 ppi due 352x416 resolution 2.1 displaymaking one nokia sharpest displays 2005 2006 n80 world first upnp-compatible phone allowing transfer media files compatible devices wi-fi n80 officially described multimedia computer nokia like successor nokia n95 nokia originally announced n80 supporting bluetooth 2.0 however released bluetooth 1.2 therefore n80 currently support stereo playback bluetooth nokia n80 internet edition second version handset hardware normal n80 released q4 2006 available patina bronze pearl black following additional software included january 2007 pearl black model available sale us 499 nokia announced new internet edition firmware available 'classic n80 using nokia official software updater downloadable nokia.com internet edition firmware made available nokia software updater end users could update n80 specification n80 internet edition flashing n80 firmware n80 internet edition required use several hacked nokia servicing software applications including phoenix service software nokia software update nemesis changing product code method questionable legality jurisdictions may violate terms phone warranty reports occasional failure method due user error unknown reasons leaving phone unusable state properly-equipped service center could recover
[ 1537, 8577, 3205, 11655, 1674, 9359, 1424, 529, 2449, 8083, 10770, 7063, 2072, 8472, 5274, 5019, 5659, 669, 11545, 4003, 4132, 6310, 167, 40, 3626, 5290, 10410, 690, 10802, 7220, 821, 5175, 7866, 1083, 1728, 7617, 4291, 7877, 10053, 199, ...
Validation
5,144
3
Orion_(system-on-a-chip):orion system-on-a-chip orion system-on-a-chip manufactured marvell technology group used network-attached storage based armv5te architecture on-chip support ethernet sata usb used hardware made hewlett-packard d-link among others supported lenny release debian gnu/linux
[ 5384, 9964 ]
Test
5,145
4
HP_MediaSmart_Server:hp mediasmart server hp mediasmart server home server hewlett-packard ran microsoft windows home server operating system october 2008 hp mediasmart server sold two models ex470 rrp us 599 ex475 rrp us 749 feature 1.8 ghz amd sempron 3400+ processor one gigabit ethernet port four internal sata drive bays four usb 2.0 ports one esata port two models identical exception amount included storage ex470 one 500 gb hard drive preinstalled ex475 two 500 gb hard drives preinstalled hackers enthusiasts modded ex470 adding vga monitor upgrading memory 512 mb 2 gb upgrading processor 2.6 ghz amd le-1640 december 29 2008 hp announced two models ex485 ex487 available pre-orders starting january 8 2009 newer models include support apple time machine backup software also use 2.0 ghz intel celeron processor replacing amd sempron old models features include revamped user interface larger preinstalled hard drives one 750 gb drive ex485 two 750 gb drives ex487 april 30 2009 hp announced mediasmart server lx195 intended low-cost entry home server market new model featured single internal 640 gb drive 1.6 ghz intel atom 230 processor 1 gb ddr2 memory gigabit ethernet four usb ports storage expansion software features included lx195 initial launch features ex485/ex487 server september 14 2009 hp launched two new mediasmart servers ex490 comes 1 tb hard disk storage costs 549 ex495 comes 1.5 tb costs 699 7200 rpm 490 comes intel celeron processor 2.2 ghz 495 intel pentium processor dual core 2.5 ghz november 30 2010 windows home server team microsoft confirmed rumors hp would offering hardware next version windows home server codenamed vail hp would stop selling mediasmart servers altogether end calendar year 2010
[ 5384, 2196, 7983 ]
Train
5,146
5
Silly_window_syndrome:silly window syndrome silly window syndrome problem computer networking caused poorly implemented tcp flow control serious problem arise sliding window operation sending application program creates data slowly receiving application program consumes data slowly server problem unable process incoming data requests clients reduce amount data send time window setting tcp packet server continues unable process incoming data window becomes smaller smaller sometimes point data transmitted smaller packet header making data transmission extremely inefficient name problem due window size shrinking silly value since certain amount overhead associated processing packet increased number packets means increased overhead process decreasing amount data end result thrashing synchronization sender receiver regarding capacity flow data size packet window syndrome problem created silly window syndrome created sender nagle algorithm used nagle solution requires sender send first segment even small one wait ack received maximum sized segment mss accumulated silly window syndrome created receiver david clark solution used clark solution closes window another segment maximum segment size mss received buffer half empty 3 causes sws sws efficiency communication almost 0 sws duration short possible heuristic method send tcp must allow sending application make write calls collect data transferred call transmitting large segment sending tcp delays sending segments accumulate reasonable amounts data known clumping heuristic method receiver uses maintain internal record available window delay advertising increase window size sender advance significant amount amount depends receiver buffer size maximum segment size using method prevents small window advertisements received applications extract data octets slowly
[ 4490, 10924, 3725, 5840, 5906, 4918 ]
Test
5,147
1
Norwegian_International_Ship_Register:norwegian international ship register norwegian international ship register nis separate norwegian ship register norwegian vessels aimed competing flags convenience registers panama liberia originally proposed erling dekke næss 1984 established bergen 1987 managed norwegian ship registers 2010 12th ship register gross tonnage representing 1 global tonnage years register established norwegian register lost could compete lower-cost registers main objectives establishing register register highly successful 2002 880 vessels register total around criticism countries opened second registers norway nis germany gis denmark dis fewer restrictions nationality crew allegedly lower safety standards main national register
[ 3090, 676, 6605, 6726 ]
None
5,148
9
DADiSP:dadisp dadisp data analysis display pronounced day-disp numerical computing environment developed dsp development corporation allows one display manipulate data series matrices images interface similar spreadsheet dadisp used study signal processing numerical analysis statistical physiological data processing dadisp designed perform technical data analysis spreadsheet like environment however unlike typical business spreadsheet operates table cells contain single scalar values dadisp worksheet consists multiple interrelated windows window contains entire series multi-column matrix window stores data also displays data several interactive forms including 2d graphs xyz plots 3d surfaces images numeric tables like traditional spreadsheet windows linked change data one window automatically updates dependent windows numerically graphically users manipulate data primarily windows dadisp window normally referred letter w followed window number w1 example formula codice_1 assigns series values 1 2 3 w1 formula codice_2 sets second window compute square value w1 w2 contain series 1 4 9 values w1 change 3 5 2 4 values w2 automatically update 9 25 4 16 dadisp includes series based programming language called spl series processing language used implement custom algorithms spl c/c++ like syntax incrementally compiled intermediate bytecode executed virtual machine spl supports standard variables assigned codice_3 hot variables assigned codice_4 example statement codice_5 assigns series 1 2 3 standard variable square values assigned codice_6 variable b contains series 1 3 9 changes b change b preserves values assigned without regard future state however statement codice_7 creates hot variable hot variable analogous window except hot variables display data assignment codice_8 computes square values changes b automatically updates setting codice_9 causes b automatically update 9 25 4 16 dadisp originally developed early 1980s part research project mit explore aerodynamics formula one racing cars original goal project enable researchers quickly explore data analysis algorithms without need traditional programming
[ 9345, 5380, 7301, 5129, 3980, 6797, 15, 8079, 7580, 7326, 7341, 9133, 7983, 6962, 6718, 2242, 5830, 5703, 8262, 5833, 2519, 11239, 4840, 363, 5356, 5741, 7148, 2045 ]
Test
5,149
9
PDF/E:pdf/e iso 24517-1:2008 iso standard published 2008 standard defines format pdf/e creation documents used geospatial construction manufacturing workflows ref name= pdf/e-iso-standard iso 24517-1:2008 document management -- engineering document format using pdf -- part 1 use pdf 1.6 pdf/e-1 /ref based pdf reference version 1.6 adobe systems specification also supports interactive media including animation 3d pdf/e subset pdf designed open neutral exchange format engineering technical documentation. ref name= pdf/e-ready-guide creating pdf/e-ready files /ref pdf/e standard specifies portable document format pdf used creation documents engineering workflows key benefits pdf/e include standard define method creation conversion paper electronic documents pdf/e format committee managing iso 24517 pdf/e needs subject-matter experts assist development part 2 standard iso 24517 pdf/e created meet needs organizations need reliably create exchange review engineering documentation however first part standard address 3d video dynamic content address integrated source data
[ 10752, 8854, 11036, 9245, 2206, 5413, 10413, 11056, 8627, 3126, 1079, 5816, 6977, 8904, 1610, 9290, 8524, 2519, 2904, 4058, 4064, 8421, 8426, 5614, 1010, 3447, 2045, 10238 ]
Test
5,150
8
Unique_user:unique user according ifabc global web standards unique user uu ip address plus identifier term unique visitor may used instead unique user terms essentially meaning see sites may use user agent cookie and/or registration id note users allocated ip addresses dynamically example dial-up internet service providers definition may overstate understate real number individual users concerned unique users common way measuring popularity website often quoted potential advertisers investors website unique users usually measured standard period time typically month use performance indicators unique visitors/users controversial greg harmon belden research inferring many companies reporting online performance may overstate number unique visitors remember identifier computer person usually computer identified cookie often specific individual browser computer since increasing percentage people united states least access computer home work school one may divide reported total unique users half another increasing fraction people regularly delete cookies machines—presumably home work—and yet another large fraction use one browser machines means typical news site example people might typically visit day keep breaking news reported unique users might overstate number different people factor four plus side wishing impress advertisers investors reported number sessions visits pageviews probably accurate smaller group people visits much often looks pages raw numbers would suggest similar turf total unduplicated reach frequency metric often used television radio newspaper analyses unique users measure distribution content number distinct consumers common mistake using unique user numbers adding unique user numbers across dimensions unique user metric valid given set dimensions e.g time browsers example website may 100 unique users day day dimension particular week data one extrapolate number weekly unique users unique user count week 100 700 however website administrators track unique user traffic longer period time build reliable view performance direct competitors within sector online businesses tend static conversation rate ratio unique users new business clients calculating movement unique users conversion funnel time period must used every step unique user counts websites typically counted using cookies browser visits website website checks existence particular cookie cookie present cookie value captured cookie present website create cookie unique visitors refers number distinct individuals requesting pages website given period regardless often visit visits refer number times site visited matter many visitors make visits individual goes website tuesday wednesday recorded two visits one visitor purpose tracking unique visitors help marketers understand website user behavior visitor make multiple visits specified period number visits may greater number visitors visitor sometimes referred unique visitor unique user clearly convey idea visitor counted measurement users visitors requires standard time period distorted automatic activity bots classify web content estimation visitors visits traffic statistics usually filtered remove type activity eliminating known ip addresses bots requiring registration cookies using panel data
[ 5442, 4167, 3688, 9768, 9036, 6576, 113, 8914, 2996, 7965 ]
None
5,151
1
Anchor_modeling:anchor modeling anchor modeling agile database modeling technique suited information changes time structure content provides graphical notation used conceptual modeling similar entity-relationship modeling extensions working temporal data modeling technique involves four modeling constructs anchor attribute tie knot capturing different aspects domain modeled resulting models translated physical database designs using formalized rules translation done tables relational database mostly sixth normal form anchor modeling created order take advantage benefits high degree normalization avoiding drawbacks advantages able non-destructively evolve model avoid null values keep information free redundancies gained performance issues due extra joins largely avoided thanks feature modern database engines called 'table elimination order handle changes information content anchor modeling emulates aspects temporal database resulting relational database schema earliest installations using anchor modeling made sweden first dating back 2004 data warehouse insurance company built using technique 2007 technique used data warehouses one oltp system presented internationally lars rönnbäck 2007 transforming data intelligence tdwi conference amsterdam stirred enough interest technique warrant formal description since research concerning anchor modeling done collaboration creators olle regardt lars rönnbäck team department computer systems sciences stockholm university first paper anchor modeling formalized presented 28th international conference conceptual modeling best paper award commercial web site provides material anchor modeling free use creative commons license online modeling tool also available free use open source anchor modeling four basic modeling concepts anchors attributes ties knots anchors used model entities events attributes used model properties anchors ties model relationships anchors knots used model shared properties states attributes ties historized changes information model need kept example model showing different graphical symbols concepts seen symbols resemble used entity–relationship modeling couple extensions double outline attribute tie indicates history changes kept knot symbol outlined square rounded edges also available anchor modeling handles two types informational evolution structural changes content changes changes structure information represented extensions high degree normalization makes possible non-destructively add necessary modeling concepts needed capture change way every previous schema always remains subset current schema since existing schema touched gives benefit able evolve database highly iterative manner without causing downtime changes content information done emulating similar features temporal database relational database anchor modeling pieces information tied points time intervals time open closed time points events occur modeled using attributes e g birth dates persons time purchase intervals time value valid captured historization attributes ties e g changes hair color person period time person married relational database achieved adding single column data type granular enough capture speed changes table corresponding historized attribute tie adds slight complexity one row table examined order know interval closed points intervals time directly related domain modeled points time information entered database handled use metadata anchor modeling rather mentioned constructs information changes database needs kept bitemporal anchor modeling used addition updates also delete statements become non-destructive anchor modeling one-to-one mapping symbols used conceptual model tables relational database every anchor attribute tie knot corresponding table database unambiguously defined structure conceptual model thereby translated relational database schema using simple automated rules vice versa different many modeling techniques complex sometimes subjective translation steps conceptual logical physical levels anchor tables contain single column identities stored identity assumed property entity always present immutable identities rarely available domain modeled instead technically generated e g incrementing number sequence example anchor identities nephews donald duck set 1-tuples codice_1 knots thought combination anchor single attribute knot tables contain two columns one identity one value due storing identities values together knots historized usefulness comes able reduce storage requirements improve performance since tables referencing knots store short value rather long string example knot genders set 2-tuples codice_2 static attribute tables contain two columns one identity entity value belongs one actual property value historized attribute tables extra column storing starting point time interval knotted attribute table value column identity references knot table example static attribute names set 2-tuples codice_3 example knotted static attribute genders set 2-tuples codice_4 example historized attribute changing colors outfits set 3-tuples codice_5 static tie tables relate two anchors contain two columns storing identities historized tie tables extra column storing starting point time interval knotted tie tables additional column referenced knot example static tie sibling relationship set 2-tuples codice_6 resulting tables sixth normal form except ties columns part primary key
[ 2369, 5794, 10145, 11457, 9893, 9286, 5320, 2512, 10737, 9075, 2901, 7767, 3001, 3004, 5151 ]
Test
5,152
3
Gyrodine:gyrodine note player fire guns time
[ 10931, 9006 ]
Train
5,153
4
Jeffrey_Carney:jeffrey carney jeffrey martin carney former united states air force intelligence specialist convicted spying east german ministry state security mfs stasi one stasi successful spies code-named kid uwe carney became alienated angry u.s. air force u.s. policies president ronald reagan began handing u.s. military documents stasi working west berlin u.s. air force transfer back goodfellow air force base 1984 carney decided request permanent asylum east germany whereabouts remained unknown 1990 carried rolls deserter carney finally apprehended fall berlin wall special agents united states air force office special investigations afosi april 22 1991 pintschstrasse 12 friedrichshain district berlin carney entered u.s. air force december 1980 april 1982 april 1984 assigned 6912th electronic security group electronic security command tempelhof central airport berlin linguist intelligence specialist duty station 6912th marienfelde field site zdf film informationen um jeden preis carney admitted homosexuality primary reason became spy carney quickly became disillusioned air force intelligence gathering operations several stories attempting turn badge quit protest first-hand experiences nato exercise able archer 83 strengthened resolve help avoid nuclear conflict later lonely alienated psychological stress felt one talk problems intended defect east germany first crossing allowed drawn espionage east german intelligence agents expertly manipulated claimed complete loyalty working marienfelde field site berlin carney began copying classified documents provided stasi repeatedly crossing back forth east germany 1984 involuntarily transferred goodfellow air force base texas work technical instructor carney believed goodfellow training base real-world intelligence interest stasi soon discovered wrong carney continued providing stasi documents meeting handlers mexico city rio de janeiro 1985 feeling cut supervisors east berlin increasing risk became known year spy sought protection east german embassy mexico city flown havana assistance cuban government weeks later returned east berlin via prague continued work stasi hva abt xi ha iii intercepting translating non-secure telephone communications u.s. military commanders well east german telephone lines dedicated u.s. embassy east berlin course spying carney provided stasi eastern bloc intelligence services one hundred top-secret u.s. military documents services east germany awarded nva service medal bronze medal waffenbrüderschaft brotherhood arms gold internal stasi file shows value work performed stasi kgb earning praise kgb general chebrikov well general zaitsev group soviet forces germany gsfg break case came fall berlin wall november 1989 many stasi records became available foreign investigators journalists april 1991 carney located help least two former stasi intelligence officers turned informants preparation apprehension quickly assigned 7350th air base group former base tempelhof central airport several months apprehension ironically assignment official unintended consequence assigning carney unit supported desert shield/desert storm 1991 result carney received national defense service medal solitary confinement fort leavenworth kansas several years later 22 april 1991 carney apprehended public street afosi agents near residence pintschstraße 12 friedrichshain used soviet sector berlin immediately following apprehension taken tempelhof airport identified underwent nearly 28 hours intense interrogation carney refused answer questions repeated requests counsel denied point afosi consultation u.s. agencies decided quietly remove carney german territory secretly flown united states aboard military aircraft following day carney arrest return united states coordinated highest levels united states government without consulting german officials u.s ambassador federal republic germany vernon walters personally acted adviser commander-in-chief united states air forces europe urging haste carney pleaded guilty charges espionage conspiracy desertion sentenced december 1991 38 years prison carney served mandatory portion sentence quantico virginia later united states disciplinary barracks fort leavenworth kansas carney released 2002 serving 11 years seven months twenty days twenty-year sentence accordance pretrial agreement release prison carney attempted return germany claiming german citizen however east germany never naturalized citizen thus obtained german passport fraudulently german authorities refused grant passport reported living ohio november 2011 carney submitted lengthy manuscript detailing life spy united states air force security review numerous delays manuscript finally cleared july 26 2012 book enemies american cold war journey published 2013
[ 1639 ]
None
5,154
9
Runtime_library:runtime library computer programming runtime library rtl set low-level routines used compiler invoke behaviors runtime environment inserting calls runtime library compiled executable binary runtime environment implements execution model built-in functions fundamental behaviors programming language execution run time computer program execution calls runtime library cause communication executable binary runtime environment runtime library often includes built-in functions memory management exception handling therefore runtime library always specific platform compiler runtime library may implement portion runtime environment behavior one reads code calls available typically thin wrappers simply package information send runtime environment operating system however sometimes term runtime library meant include code runtime environment even though much code directly reached via library call example language features performed efficient accurate runtime implemented runtime environment may invoked via runtime library api e.g logic errors array bounds checking dynamic type checking exception handling possibly debugging functionality reason programming bugs discovered program tested live environment real data despite sophisticated compile-time checking testing performed development another example runtime library may contain code built-in low-level operations complicated inlining compilation implementations arithmetic operations directly supported targeted cpu various miscellaneous compiler-specific operations directives concept runtime library confused ordinary program library like created application programmer delivered third party dynamic library meaning program library linked run time example c programming language requires minimal runtime library commonly called codice_1 defines large standard library called c standard library provided implementation
[ 1409, 7173, 8069, 6664, 5514, 3980, 4112, 9490, 6555, 5663, 1952, 8609, 7462, 9981, 5165, 7983, 1715, 2620, 1348, 8262, 8136, 6477, 10703, 3413, 2519, 8280, 2138, 6112, 3553, 1122, 7904, 8037, 10470, 1384, 4592, 5872, 9714, 2804, 7292, 74...
Test
5,155
2
Python_Package_Manager:python package manager python package manager pypm python utility intended simplify tasks locating installing upgrading removing python packages determine recent version software package installed system install upgrade package local remote host pypm non-free may used activestate activepython distribution pypm uses “ pypm repositories ” collections pre-compiled packages repositories contain high variety modules published pypi pypm inspired perl package manager ppm
[ 8068, 9487, 788, 1813, 8213, 10900, 8476, 4775, 6828, 5819, 190, 9671, 5578, 5067, 3918, 463, 3667, 4309, 6361, 2010, 2401, 1379, 741, 231, 6119, 9063, 8554, 7293 ]
None
5,156
2
John_Mashey:john mashey john r. mashey born 1946 us computer scientist director entrepreneur mashey holds ph.d. computer science pennsylvania state university developed assist assembler language teaching software worked pwb/unix operating system bell labs 1973 1983 authoring pwb shell also known mashey shell moved silicon valley join convergent technologies ending director software joined mips computer systems early 1985 managing operating systems development helping design mips risc architecture well specific cpus systems software continued similar work silicon graphics 1992–2000 contributing design numaflex modular computer architecture using numalink ending vp chief scientist mashey one founders standard performance evaluation corporation spec benchmarking group acm national lecturer four years guest editor ieee micro one long-time organizers hot chips conferences chaired technical conferences operating systems cpu chips gave public talks software engineering risc design performance benchmarking supercomputing credited first spread term concept big data 1990s became consultant venture capitalists high-tech companies trustee computer history museum 2008 2012 received usenix lifetime achievement award flame award contributions unix community since early days written articles skeptical inquirer regarding climate change denial 2010 published 250-page critical report wegman report mashey report concluded wegman report contained plagiarized text story featured usa today interviewed science magazine stated spending retirement years compiling voluminous critiques calls 'real conspiracy produce 'climate antiscience research investigated secretive funding climate contrarian thinktanks mashey blogs desmogblog focuses global warming mashey became scientific technical consultant committee skeptical inquiry 2015 mashey married angela hey cambridge university waterloo university graduate ph.d. imperial college london
[ 7234, 10051, 8260, 1702, 5160, 9391, 11442, 2132, 5492, 5272, 4859, 8671 ]
Test
5,157
4
Cooperative_database:cooperative database cooperative database type database holds information customers transactions many companies contribute information database return aggregate information customers companies provided databases used promotional mailings credit card fraud detection fighting e-mail spam alternatively term cooperative database used describe database systems incorporate techniques aid users beyond returning direct answers databases example give explanations query returns results detect report user misconception suggested query provide justifications returned answers relax query attributes find close non-precise answers fundamental goal extend databases towards reflecting cooperative principle particular avoid misleading users omission pertinent contextual detail
[ 2369, 2901 ]
Test
5,158
6
File_attribute:file attribute file attributes metadata associated computer files define file system behavior attribute one two states set cleared attributes considered distinct metadata dates times filename extensions file system permissions addition files folders volumes file system objects may attributes traditionally ms-dos microsoft windows four attributes archive hidden read-only system windows added new ones systems derived 4.4bsd-lite freebsd netbsd openbsd dragonfly bsd macos sets system user attributes newer versions linux kernel also support set file attributes traditionally dos microsoft windows files folders accepted four attributes new versions windows came microsoft added inventory available attributes ntfs file system including limited attributes displayed attributes column windows explorer include 4.4bsd 4.4bsd-lite files directories folders accepted four attributes could set owner file superuser user attributes two attributes could set superuser system attributes freebsd added additional attributes also supported dragonfly bsd freebsd also supports whereas dragonfly bsd supports netbsd added another attribute also supported openbsd macos added three attributes dos os/2 windows codice_3 command cmd.exe command.com used change display four traditional file attributes file explorer windows show seven mentioned attributes set clear system attribute windows powershell become component windows 7 later features two commands read write attributes codice_4 codice_5 change attribute file windows nt user must appropriate file system permissions known write attributes write extended attributes 4.4bsd 4.4bsd-lite derivatives codice_6 codice_7 commands used change display file attributes change user attribute file 4.4bsd-derived operating systems user must owner file superuser change system attribute user must superuser linux codice_8 codice_9 commands used change display file attributes
[ 2560, 5120, 2564, 6155, 6669, 3598, 10257, 7187, 9236, 6677, 5142, 8214, 10774, 25, 10776, 3611, 4637, 9249, 9762, 4643, 6180, 7217, 10803, 52, 7225, 10809, 11323, 576, 2625, 8772, 4170, 7244, 6221, 1109, 3160, 10333, 97, 11363, 4708, 676...
Test
5,159
7
CtrlS:ctrls ctrls tier-4 datacenter india headquartered hyderabad deals large group networked computer servers typically used various organizations remote storage processing distribution large amounts data large groups remote servers networked allow centralized data storage online access computer services resources ctrls belongs industry hyderabad branches mumbai delhi ctrls datacenters founded 2008 hyderabad india established aim keep online applications data secure provide network storage services various organizations sridhar pinnapureddy founder ceo ctrls spearheaded 200 innovations energy management dc infra cloud disaster recovery also founder chairman pioneer group companies interests internet services infrastructure picked recognitions outstanding entrepreneur year – 2010 asia pacific region apea rajiv gandhi shiromani global economic council karamveer puraskar 2007 awarded icongo accomplishments contributions society ctrls developed capabilities provide platform level services include data center infrastructure storage backup hardware os layers network security layers offers services disaster recovery demand managed services private cloud-on-demand enable clients make paradigm shift captive datacenter model outsourced one tier 4 data centers ctrls located hyderabad mumbai delhi bangalore headquarters hyderabad
[ 6018, 1539, 8451, 6027, 4236, 10893, 526, 911, 272, 1935, 8592, 405, 2328, 4377, 8986, 10265, 5662, 11038, 5666, 6307, 9766, 39, 2217, 6444, 8495, 3121, 5681, 9906, 7352, 10681, 11070, 448, 4289, 11201, 8515, 10820, 3269, 4683, 4429, 590,...
Test
5,160
9
ASSIST_(computing):assist computing assist assembler system student instruction systems teaching ibm system/370-compatible assembler interpreter developed early 1970s penn state university graham campbell john mashey plus student assistants late 1960s computer science education expanded rapidly university computer centers faced large growth usage students whose needs sometimes differed professionals batch processing environments needed run short programs decks punched cards fast turnaround minutes overnight programs often included syntax errors compiled would often fault quickly optimization flexibility far less important low overhead watfiv successful pioneering effort build fortran compiler tuned student use universities began running dedicated fast-batch memory partition small run-time limit 5 seconds ibm system/360 model 67 low limit enabled fast turnaround avoided waste time programs stuck infinite loops watfiv success helped inspire development assist pl/c student-oriented programs fit fast-batch model became widely used among universities assist enhanced promoted others northern illinois university wilson singletary ross overbeek university tennessee charles hughes charles pfleeger reported 1978 assist used 200+ universities 1980s niu new implementation ibm pcs assist/i interactive used computer scientist john ehrman teach boot camp course assembly programming share computing meetings least 2011 perhaps several years march 1 1998 penn state declared assist longer copyrighted program freely available per last release notes original assist code seems still get use seen 2017 demonstration video assembling source running mvs 3.8 emulation laptop ibm system/360 /370 computers used 24-bit addressing ignored high-order 8 bits assembly programmers era including wrote assist often saved precious memory using high-order 8 bits flags required compatibility mode ibm introduced 31-bit 64-bit addressing
[ 1952, 5156, 7053, 7983, 9714, 3323, 477 ]
None
5,161
0
Lexicase:lexicase lexicase type dependency grammar originally developed beginning early 1970s stanley starosta university hawaii dozens starosta graduate students also contributed theory wrote least 20 doctoral dissertations using lexicase analyze numerous languages asia japanese mandarin vietnamese thai khmer tagalog etc europe greek russian etc africa swahili yoruba lexicase monostratal x-bar grammar i.e transformational grammar words heads phrases i.e assumed empty phrases lexicase words features determine morphosyntactic distribution dependents primary goal lexicase provide simple transparent disprovable means testing cross-linguistic tendencies lexically focused theory lexicase used identify verb subcategories korean russian thai vietnamese noun subcategories khmer thai provide overall language description pacoh central vietnam regarding arguments clause structure used explore case greek mandarin chinese transitivity ergativity amis indigenous language taiwan proto-central pacific austronesian among topics
[ 4070 ]
Test
5,162
5
12-channel_carrier_system:12-channel carrier system u.s. telephone network 12-channel carrier system early frequency-division multiplexing system standard used carry multiple telephone calls single twisted pair wires mostly short medium distances system twelve voice channels multiplexed high frequency carrier passed balanced pair trunk line similar used individual voice frequency connections original system obsolete today multiplexing voice channels units 12 24 channels modern digital trunk lines t-1 legacy system twelve channel scheme first devised early 1930s provide line spectrum covering 60 108 khz type j carrier telephone system equivalent four wire two wire facilities open wire carrier used almost exclusively interstate long haul toll telephony became basic building block channel group succeeding long haul systems type k type l systems late 1970s long haul channel groups used single-sideband/suppressed carrier heterodyne scheme produced western electric type a-1 a-6 channel bank twelve channel scheme order maintain bandwidth routing compatibility carried short haul carriers well started developing eliminate voice band open wire trunk lines 1950s bell system vacuum-tube driven n-1 carrier early 1950s used twelve channel carrier system using double sideband/unsuppressed carrier operation n't need network timebase synchronization maintain frequency accuracy n-2 similar heterodyning scheme discrete transistorized plug-in unit architecture n3 used frequency plan scheme using single sideband different voice channel side carrier technique first seen 16 channel type open wire short haul carrier 1950s doubled capacity 24 channels basic digital type pcm carrier introduced late 1950s became now-ubiquitous t-1 digital world repeaters spaced approximately 6 miles 10 km apart depending wire gauge exceptions n-carriers used 19 gage unloaded toll pairs two-wire operation repeater either received directions low frequency band sent directions higher band vice versa frequency frogging allowed equivalent four-wire operation single cable pair two-wire operation period type n-1 widespread use lenkurt corporation owned controlled general telephone fielded variant competitor type bn bn used pairs repeaters bell n-cxr used four channel groups lower single-sideband heterodyning 24 channels per carrier later seen western electric type n-3 type bn used times bell operating companies 1956 hush-a-phone decision us supreme court landmark case challenged benign monopoly us telephone equipment industry part settlement bell operating companies buy use small amounts lenkurt collins microwave carrier systems california type bn used almost exclusively provide trunk private line connections pacific tel tel toll offices local general telephone end offices
[ 7490, 2787, 8811, 3115, 3156 ]
None
5,163
4
Anonymous_call_rejection:anonymous call rejection north american nanp telephone system anonymous call rejection acr landline calling feature screens calls callers blocked caller id information often free included caller id landlines may available separately local telephone company feature available cellphone services caller id sprint t-mobile usa verizon wireless provide service acr prevents dialing feature code successfully calling customer service verizon wireless currently provide blocked anonymous call rejection north america feature enabled vertical service code *77 disabled *87 anonymous call rejection service callers block number get recording saying accept blocked calls anonymous call rejection service callers block number reach
[ 11170, 1518 ]
None
5,164
3
PalmPilot_Professional:palmpilot professional palmpilot professional personal digital assistant palmpilot released march 10 1997 updated version pilot 5000 delayed general availability professional model marketplace marketed compact design back-lit display ability quickly connect microsoft windows macintosh personal computer ability synchronize via cradle modem sold separately computer making possible send e-mails set appointments others set contact information various third party applications upirc enabled connecting various messaging systems including popular instant messaging services optional memory card ir port available upgrade directly palm
[ 2308, 10500, 6790, 6797, 3606, 8982, 6178, 9013, 694, 1603, 5318, 3017, 11337, 9037, 2258, 1621, 4832, 4449, 2285, 2420, 8952, 9598 ]
None
5,165
9
D_(programming_language):programming language also known dlang multi-paradigm system programming language created walter bright digital mars released 2001 andrei alexandrescu joined design development effort 2007 though originated re-engineering c++ distinct language redesigned core c++ features also sharing characteristics languages notably java python ruby c eiffel design goals language attempt combine performance safety compiled languages expressive power modern dynamic languages idiomatic code commonly fast equivalent c++ code also shorter language whole memory-safe include optional attributes designed check memory safety type inference automatic memory management syntactic sugar common types allow faster development bounds checking design contract features concurrency-aware type system help reduce occurrence bugs designed lessons learned practical c++ usage rather purely theoretical perspective although uses many c c++ concepts also discards compatible c c++ source code however constrained design rule code legal c behave way gained features c++ example closures anonymous functions compile time function execution adds functionality c++ also implementing design contract unit testing true modules garbage collection first class arrays associative arrays dynamic arrays array slicing nested functions lazy evaluation re-engineered template syntax retains c++ ability perform low-level programming add inline assembler c++ multiple inheritance replaced java-style single inheritance interfaces mixins hand declaration statement expression syntax closely matches c++ inline assembler typifies differences application languages like java c inline assembler lets programmers enter machine-specific assembly code within standard code method often used system programmers access low-level features processor needed run programs interface directly underlying hardware operating systems device drivers built-in support documentation comments allowing automatic documentation generation supports five main programming paradigms imperative object-oriented metaprogramming functional concurrent actor model imperative programming almost identical c. functions data statements declarations expressions work c c runtime library may accessed directly hand notable differences c area imperative programming include codice_1 loop construct allows looping collection nested functions functions declared inside another may access enclosing function local variables object-oriented programming based single inheritance hierarchy classes derived class object support multiple inheritance instead uses java-style interfaces comparable c++ pure abstract classes mixins separates common functionality inheritance hierarchy also allows defining static final non-virtual methods interfaces metaprogramming supported combination templates compile time function execution tuples string mixins following examples demonstrate compile-time features templates written imperative style compared c++ functional style templates regular function calculates factorial number ulong factorial ulong n use codice_2 compile-time conditional construct demonstrated construct template performs calculation using code similar function template factorial ulong n following two examples template function defined used compute factorials types constants need specified explicitly compiler infers types right-hand sides assignments enum fact_7 factorial 7 example compile time function execution ordinary functions may used constant compile-time expressions provided meet certain criteria enum fact_9 factorial 9 codice_3 function performs codice_4-like data formatting also compile-time ctfe msg pragma displays result compile time import std.string format pragma msg format 7 fact_7 pragma msg format 9 fact_9 string mixins combined compile-time function execution allow generating code using string operations compile time used parse domain-specific languages code compiled part program import footod // hypothetical module contains function parses foo source code void main supports functional programming features function literals closures recursively-immutable objects use higher-order functions two syntaxes anonymous functions including multiple-statement form shorthand single-expression notation two built-in types function literals codice_5 simply pointer stack-allocated function codice_6 also includes pointer surrounding environment type inference may used anonymous function case compiler creates codice_6 unless prove environment pointer necessary likewise implement closure compiler places enclosed local variables heap necessary example closure returned another function exits function scope using type inference compiler also add attributes codice_8 codice_9 function type prove apply functional features currying common higher-order functions map filter reduce available standard library modules codice_10 codice_11 alternatively function compositions expressed using uniform function call syntax ufcs natural left-to-right reading import std.stdio std.concurrency std.variant void foo void main memory usually managed garbage collection specific objects may finalized immediately go scope explicit memory management possible using overloaded operators codice_12 codice_13 simply calling c malloc free directly garbage collection controlled programmers may add exclude memory ranges observed collector disable enable collector force either generational full collection cycle manual gives many examples implement different highly optimized memory management schemes garbage collection inadequate program safed name given subset guaranteed memory safe writes memory allocated already recycled functions marked codice_14 checked compile time ensure use features could result corruption memory pointer arithmetic unchecked casts functions called must also marked codice_14 codice_16 functions marked codice_16 cases compiler distinguish safe use feature disabled safed potential case memory corruption initially banners dip1000 dip25 part language specification provides protections certain ill-formed constructions involving lifetimes data current mechanisms place primarily deal function parameters stack memory however stated ambition leadership programming language provide thorough treatment lifetimes within programming language within safe code lifetime assignment involving reference type checked ensure lifetime assignee longer assigned example applied function parameter either pointer type references keywords return scope constrain lifetime use parameter standard dictates following behaviour annotated example given c application binary interface abi supported well c fundamental derived types enabling direct access existing c code libraries bindings available many popular c libraries additionally c standard library part standard d. microsoft windows access component object model com code takes permissive realistic approach interoperation c++ code code marked extern c++ following features specified c++ namespaces used via syntax extern c++ namespace namespace name c++ namespace c++ side using namespace std class base class derived public base int derived :mul int factor derived *createinstance int void deleteinstance derived side programming language official subset known better c subset forbids access features requiring use runtime libraries c accessed via- current implementations -betterc flag compilation better c may call code compiled flag linked code code compiled without better c option may call code compiled however lead slightly different behaviours due differences c handle asserts walter bright decided start working new language 1999 first released december 2001 reached version 1.0 january 2007 first version language d1 concentrated imperative object oriented metaprogramming paradigms similar c++ dissatisfied phobos official runtime standard library members community created alternative runtime standard library named tango first public tango announcement came within days 1.0 release tango adopted different programming style embracing oop high modularity community-led project tango open contributions allowed progress faster official standard library time tango phobos incompatible due different runtime support apis garbage collector threading support etc. made impossible use libraries project existence two libraries widely use led significant dispute due packages using phobos others using tango june 2007 first version d2 released beginning d2 development signalled stabilization d1 first version language placed maintenance receiving corrections implementation bugfixes d2 introduce breaking changes language beginning first experimental const system d2 later added numerous language features closures purity support functional concurrent programming paradigms d2 also solved standard library problems separating runtime standard library completion d2 tango port announced february 2012 release andrei alexandrescu book programming language 12 june 2010 marked stabilization d2 today commonly referred january 2011 development moved bugtracker patch-submission basis github led significant increase contributions compiler runtime standard library december 2011 andrei alexandrescu announced d1 first version language would discontinued 31 december 2012 final d1 release v1.076 31 december 2012 code official compiler digital mars compiler walter bright originally released custom license qualifying source available conforming open source definition 2014 compiler front-end re-licensed open source boost software license re-licensed code excluded back-end partially developed symantec 7 april 2017 entire compiler made available boost license symantec gave permission re-license back-end 21 june 2017 language accepted inclusion gcc gcc 9 language frontend merged gcc current implementations compile directly machine code efficient execution editors integrated development environments ides supporting include eclipse microsoft visual studio slickedit emacs vim scite smultron textmate monodevelop zeus geany among others open source ides windows exist written poseidon d-ide entice designer applications debugged using c/c++ debugger like gdb windbg although support various d-specific language features extremely limited windows programs debugged using ddbg microsoft debugging tools windbg visual studio converted debug information using cv2pdb zerobugs debugger linux experimental support language ddbg used various ides command line zerobugs graphical user interface gui example program prints command line arguments codice_18 function entry point program codice_19 array strings representing command line arguments codice_20 array characters represented codice_21 d1 codice_22 d2 codice_1 statement iterate collection case producing sequence indexes codice_24 values codice_25 array codice_19 index codice_24 value codice_25 types inferred type array codice_19 following shows several capabilities design trade-offs short program iterates lines text file named codice_30 contains different word line prints words anagrams words notable organisations use programming language projects include facebook ebay netflix successfully used aaa games javascript virtual machine operating system kernel gpu programming web development numerical analysis gui applications passenger information system
[ 9224, 2576, 1556, 2585, 3613, 9245, 5154, 8739, 2603, 2605, 5677, 7728, 2045, 1586, 5684, 1591, 9794, 8771, 10819, 4173, 595, 84, 4182, 10841, 102, 7274, 5743, 8303, 8304, 9331, 9848, 5754, 7292, 9345, 1666, 5255, 1673, 2186, 4747, 6797, ...
None
5,166
5
TSIG:tsig tsig transaction signature computer-networking protocol defined rfc 2845 primarily enables domain name system dns authenticate updates dns database commonly used update dynamic dns secondary/slave dns server tsig uses shared secret keys one-way hashing provide cryptographically secure means authenticating endpoint connection allowed make respond dns update although queries dns may usually made without authentication updates dns must authenticated since make lasting changes structure internet naming system update request may arrive via insecure channel internet one must take measures ensure authenticity integrity request use key shared client making update dns server helps ensure authenticity integrity update request one-way hashing function serves prevent malicious observers modifying update forwarding destination thus ensuring integrity message source destination timestamp included tsig protocol prevent recorded responses reused would allow attacker breach security tsig places requirement dynamic dns servers tsig clients contain accurate clock since dns servers connected network network time protocol provide accurate time source dns updates like queries normally transported via udp since requires lower overhead tcp however dns servers support udp tcp requests update specified rfc 2136 set instructions dns server include header zone updated prerequisites must satisfied record updated tsig adds final record includes timestamp hash request also includes name secret key used sign request rfc 2535 recommendations form name response successful tsig update also signed tsig record failures signed prevent attacker learning anything tsig key using specially crafted update probes nsupdate program use tsig dns updates tsig record format records update request meaning fields described rfc 1035 although tsig widely deployed several problems protocol result number alternatives extensions proposed
[ 929, 2887, 10344, 3018, 10924, 6797, 6098, 11250, 11413 ]
Validation
5,167
6
EXOFS:exofs exofs formerly known osdfs object-based file system implemented top external object store name stands extended object file system referring use ext2-based metadata object storage devices exofs originally developed avishay traeger ibm hrl originally based ext2 file system since 2008 panasas develops maintains exofs open-osd.org exofs included mainline linux kernel since version 2.6.30-rc1 linux distribution implemented utility making file systems exofs current kernel line removed version 5.1-rc1
[ 9762, 7983, 2901, 2197, 823, 9277 ]
None
5,168
9
FP_(programming_language):fp programming language fp short function programming programming language created john backus support function-level programming paradigm allows eliminating named variables language introduced backus 1977 turing award lecture programming liberated von neumann style subtitled functional style algebra programs paper sparked interest functional programming research eventually leading modern functional languages function-level paradigm backus hoped fp never found much use outside academia 1980s backus created successor language fl remained research project values fp programs map one another comprise set closed sequence formation values built set atoms booleans integers reals characters etc ⊥ undefined value bottom sequences bottom-preserving fp programs functions f map single value x another functions either primitive i.e. provided fp environment built primitives program-forming operations also called functionals example primitive function constant transforms value x constant-valued function x̄ functions strict another example primitive function selector function family denoted 1,2 ... contrast primitive functions functionals operate functions example functions unit value 0 addition 1 multiplication functional unit produces value applied function f one core functionals fp addition constructed primitives functionals function may defined recursively equation simplest kind e f expression built primitives defined functions function symbol f using functionals fp84 extension fp include infinite sequences programmer-defined combining forms analogous backus added fl successor fp lazy evaluation unlike ffp another one backus variations fp fp84 makes clear distinction objects functions i.e. latter longer represented sequences former fp84 extensions accomplished removing fp restriction sequence construction applied non -⊥ objects fp84 entire universe expressions including whose meaning ⊥ closed sequence construction fp84 semantics embodied underlying algebra programs set function-level equalities may used manipulate reason programs
[ 9345, 1826, 3876, 8262, 2216, 6536, 7627, 2670, 8722, 11219, 2774, 2519, 1976, 5081 ]
Test
5,169
4
Inference_attack:inference attack inference attack data mining technique performed analyzing data order illegitimately gain knowledge subject database subject sensitive information considered leaked adversary infer real value high confidence example breached information security inference attack occurs user able infer trivial information robust information database without directly accessing object inference attacks piece together information one security level determine fact protected higher security level
[ 5373 ]
Validation
5,170
6
CloudStore:cloudstore cloudstore kfs previously kosmosfs kosmix c++ implementation google file system parallels hadoop project implemented java programming language cloudstore supports incremental scalability replication checksumming data integrity client side fail-over access c++ java python fuse module file system mounted linux september 2007 kosmix published kosmosfs open source last commit activity 2010 google code page kosmosfs points quantcast file system github successor kfs former project sourceforge used name cloudstore 2008
[ 1801, 5677, 3795, 7155, 11221, 823, 2395, 6591 ]
None
5,171
2
Utah_GLX:utah glx utah glx project aimed creating fully free open-source basic hardware-accelerated 3d renderer using opengl rendering api linux kernel-based operating systems utah glx predates direct rendering infrastructure used 2014 john d. carmack worked utah glx
[ 9604, 10971, 5492, 4902 ]
Validation
5,172
4
Trusteer:trusteer trusteer portfolio digital identity trust software products belonging ibm security founded mickey boodaei rakesh k. loonkar israel 2006 trusteer acquired september 2013 ibm 1 billion highest valuation multiple ibm ever paid business ibm trusteer helps organizations seamlessly establish digital identity trust across web customer journey cloud-based intelligence backed ai patented machine learning trusteer provides holistic approach identifying new existing customers without negatively impacting user experience 500 leading organizations rely trusteer help enable secure customers ’ digital journey support business growth trusteer presence north america south america europe africa japan ibm trusteer helps brands accelerate digital growth establishing digital identity trust across channels helping recognize customers deter bad actors trusteer rapport adaptive endpoint solution helps protect financial institutions end-users transparently detecting protecting financial malware infections phishing attacks account takeover provides comprehensive security layer anti-virus software typically designed address financial malicious activity software service offering uses 24/7 threat intelligence including geographic customize detection matrix address new threats real-time including attacking specific financial institution used leading financial institutions worldwide trusteer rapport combines global footprint millions endpoints years threat data analysis experience innovative technology achieve high rates detection low false positives increasingly sophisticated financial threat environment specifically trusteer rapport detects alerts organization pharming phishing screenshots overlays financial malware advises end-user account risk compromised moment installed end-user ’ computer trusteer rapport immediately checks removes existing financial malware malicious patches starts performing continuous transparent monitoring kernel operating system browser application levels protect new threats trusteer rapport supports browser extensions google chrome microsoft edge apple safari mozilla firefox supports microsoft internet explorer use trusteer rapport end-users simply install rapport browser extension web browser choice trusteer rapport compatible microsoft windows 7 higher multiple mac os x versions supported browsers platforms end-users download trusteer rapport free charge financial institutions offer software free charge offer safer online banking customers organizations also acquire trusteer mobile sdk extend protection native mobile applications trusteer pinpoint platform digital identity trust lifecycle platform designed provide b2c access management dynamically managing digital identity trust web mobile applications platform made three products trusteer pinpoint platform allows organizations improve digital customer journey single platform dynamically manage risk-based seamless authentication user-friendly step-up authentication establish trust identity proofing new guest users happens need validate new anonymous customer user true customer intent initiating payment fraud abusing loyalty program guests new customers let unimpeded ones complete step-up authentication using advanced intelligence global visibility ibm trusteer pinpoint™ assure solution designed help detect predict risk fraudulent intent new guest customers also enables companies conduct early account monitoring new accounts ’ type insight ’ critical reducing abandonment caused friction security measures increasing loyalty program registrations growing digital channel sustain trust continuous authentication trusted users better protect customer accounts payment journeys compromised detecting account takeovers unauthorized logins activity requires comprehensive view account access device session user perspective ibm trusteer pinpoint detect delivers kind visibility using behavioral biometric capabilities behavioral analytics transparently build user profiles continually authenticate online identities using machine learning patented analytics platform analyzes patterns mouse movements astonishing speeds volumes differentiate account user ’ “ normal ” digital behavior abnormal behavior insight combined device activity evidence transactional data geolocation data either abnormal user behavior known fraudster behavior detected trusteer pinpoint detect provides recommended action real-time along detailed reasoning session details organization take steps confirm trust necessary confirm trust combine risk assessment strong adaptive authentication confirm trust abnormal user behavior suspicious activity identified ibm trusteer pinpoint verify cloud-based authentication service seamlessly integrates pinpoint assure pinpoint detect help companies apply strong step-up authentication necessary application developers simply use exposed interfaces service challenge users perform second factor authentication via digital application users choose enroll various forms two-factor authentication one-time passcodes via email sms mobile push notification biometric authentication trusteer pinpoint products use context- based intelligence combining device id proxy emulator detection malware remote access trojan rat infection detection bot detection email phone number intelligence account history patterns behavioral biometrics navigation session analysis determine trust risk level associated user trusteer mobile sdk helps organizations build digital identity trust mobile confidence customers differentiating trusted mobile devices users suspicious ones exposes real-time mobile risk allow account compromise mitigation proactively detects mobile device risk native mobile applications available standalone assessing risk indicators mobile device integrates ibm trusteer pinpoint digital identity trust platform use threat intelligence correlate mobile device user behavior account risk factors across digital channels specifically ibm trusteer mobile sdk generates strong persistent global device id uses robust set capabilities detect mobile device risks real-time applies machine learning analytics offer actionable insights suspicious mobile user behavior threat detection capabilities include real-time overlay attacks emulators sms stealers remote access tools rats insecure wi-fi networks active pharming rooting jailbreaking uses server-side trusteer pinpoint capabilities correlated aggregated awareness device anomalies user behavior account risk indicators—such account takeover phishing attacks malware infections compromised credentials advanced evasion methods—across digital channels also works seamlessly trusteer pinpoint platform detect protect mobile device fraudulent activity early digital account creation process guest user new mobile device introduced trusteer apex automated solution tries prevent exploits malware compromising endpoints extracting information apex three layers security exploit prevention data exfiltration prevention credentials protection apex protects employee credentials phishing attacks validating employees submitting credentials authorized enterprise web-application login urls apex also prevents corporate employees re-using corporate credentials access non-corporate public applications like paypal e-bay facebook twitter apex requires users provide different credentials applications lower risk credentials exposure trusteer apex targeted behaviors small group applications hypothesis responsible overwhelming majority exploits namely java adobe ’ reader flash microsoft ’ office technology behind trusteer apex rely threat signatures so-called whitelists good applications instead watches applications run spots suspicious malicious behavior based knowledge normal application behavior refined large user base trusteer claims apex block web-based attacks used implant malware exploiting vulnerable applications data loss due malware infections spotting attempts untrusted applications processes send data outside organization connect internet-based command control c c networks end users reported problems rapport slow pcs due high cpu ram utilization incompatibility various security/antivirus products difficulty removing software presentation given 44con september 2011 bypassing trusteer rapport keylogger protection shown relatively trivial shortly thereafter trusteer confirmed flaw corrected said even hacker able use flaw disable anti-keylogging functions rapport secondary security protection technologies would still play rapport software incompatible windows tool driver verifier may cause blue screen system crash since driver verifier intended end users production environment workstations trusteer support recommends end users run driver verifier trusteer endpoint protection installed march 2011 blue gem rival company filed lawsuit trusteer california court blue gem accused trusteer plagiarizing code order maintain compatibility anti-keystroke logging software types intel chipset first introduced back 2007 trusteer described accusations baseless
[ 10915, 3941, 6311, 5450, 8792, 5006, 9455, 8978, 10040, 6484, 9397, 278, 10291, 3960, 3323 ]
Test
5,173
4
Patch_Tuesday:patch tuesday patch tuesday also known update tuesday unofficial term used refer microsoft regularly releases software patches software products widely referred way industry microsoft formalized patch tuesday october 2003 patch tuesday occurs second sometimes fourth tuesday month north america far integrated windows update wu function concerned patch tuesday begins 18:00 17:00 utc 10:00 pst utc−8 10:00 pdt utc−7 updates show download center added wu kb articles technet bulletin unlocked later microsoft pattern releasing larger number updates even-numbered months fewer odd-numbered months minor updates also released outside patch tuesday daily updates consist malware database refreshes windows defender microsoft security essentials sometimes extraordinary patch tuesday two weeks regular patch tuesday updates could released time starting windows 98 microsoft included windows update installed executed would check patches windows components microsoft would release intermittently release microsoft update system also checks updates microsoft products microsoft office visual studio sql server earlier versions windows update suffered two problems microsoft introduced patch tuesday october 2003 reduce cost distributing patches system accumulates security patches month dispatches second tuesday month event system administrators may prepare following day informally known exploit wednesday marks time exploits may appear wild take advantage unpatched machines newly announced vulnerabilities tuesday chosen optimal day week distribute software patches done maximize amount time available upcoming weekend correct issues might arise patches leaving monday free address unanticipated issues might arisen preceding weekend obvious security implication security problems solution withheld public month policy adequate vulnerability widely known extremely obscure always case cases vulnerability information became public actual worms circulating prior next scheduled patch tuesday critical cases microsoft issues corresponding patches become ready alleviating risk updates checked installed frequently ignite 2015 event microsoft revealed change distributing security patches release security updates home pcs tablets phones soon ready enterprise customers stay monthly update cycle reworked windows update business many exploitation events seen shortly release patch analysis patch helps exploit developers immediately take advantage previously undisclosed vulnerability remain unpatched systems therefore term exploit wednesday coined microsoft warned users discontinued support windows xp starting april 8 2014 users running windows xp afterwards would risk attacks security patches newer windows versions reveal similar vulnerabilities present newer older windows versions allow attacks devices unsupported windows versions c.f zero-day attacks however microsoft stopped fixing vulnerabilities unsupported windows versions regardless widely known vulnerabilities became leaving vulnerabilities unfixed devices running windows versions vulnerable attacks microsoft made singular exception rapid spread wannacry ransomware released patches may 2017 unsupported windows xp windows 8 windows server 2003 addition supported windows versions windows vista extended support ended april 11 2017 leave vulnerabilities discovered afterwards unfixed creating situation vista xp windows 7 service pack 1 support already run without support end january 14 2020 january 10 2023 windows 8.1 cause unfixed vulnerabilities issue users operation systems support windows 8 already ended january 12 2016 users install windows 8.1 windows 10 continue get support support windows 7 without sp1 ended april 9 2013 ability install sp1 continue get support 2020 install windows 8.1 windows 10 receive support 2020 one major change introduction windows 10 microsoft started release new version windows 10 twice per year microsoft modern lifecycle policy newly released windows 10 version starts grace period previous version regard support unlike previous windows products received infrequent updates via service packs support governed fixed lifecycle policy new policy home pro versions windows 10 provided security feature updates called mainstream support 18 months release enterprise education versions 24 months give example support windows 10 home/pro version 1703 released april 2017 stopped microsoft october 2018 support versions 1507 1511 released 2015 officially ended 2017 microsoft announced would give extended support security feature updates least one semi-annual channel sac windows 10 version october 14 2025 according microsoft device needs install latest version feature update current version reaches end service help keep device secure remain supported microsoft previous windows operating systems device running unsupported version windows longer receives security patches potentially affected unfixed vulnerabilities issue beginning end support date counter microsoft designed update system home pro editions windows 10 cases technically possible latest windows version downloaded installed automatically however drawn criticism due problems forced upgrades introduce addition commonly used editions like home pro microsoft offers specialized long-term servicing branch ltsb long-term servicing channel ltsc versions windows 10 longer support timelines governed microsoft fixed lifecycle policy e.g windows 10 enterprise 2016 ltsb receive extended support october 13 2026 sap security patch day company advises users install security updates chosen coincide patch tuesdays adobe systems update schedule flash player since november 2012 also coincides patch tuesday one reasons flash player comes part windows starting windows 8 flash player updates built-in plugin based version need published time order prevent reverse-engineering threats windows update uses background intelligent transfer service bits download updates using idle network bandwidth however bits use speed reported network interface nic calculate bandwidth lead bandwidth calculation errors example fast network adapter e.g 10 mbit/s connected network via slow link e.g 56 kbit/s according microsoft bits compete full bandwidth nic ... bits visibility network traffic beyond client furthermore windows update servers microsoft honor tcp slow-start congestion control strategy result users network may experience significantly slower connections machines actively retrieving updates particularly noticeable environments many machines individually retrieve updates shared bandwidth-constrained link found many multi-pc homes small medium-sized businesses bandwidth demands patching large numbers computers reduced significantly deploying windows server update services wsus distribute updates locally addition updates downloaded microsoft servers windows 10 devices share updates peer-to-peer fashion windows 10 devices local network even windows 10 devices internet potentially distribute updates faster reducing usage networks metered connection
[ 1417, 6797, 3473, 10132, 4117, 11030, 3867, 2041, 10398, 9375, 10924, 7739, 10173, 8640, 10957, 5210, 7515, 9695, 3944, 6265 ]
None
5,174
4
Virtual_machine_escape:virtual machine escape computer security virtual machine escape process breaking virtual machine interacting host operating system virtual machine completely isolated guest operating system installation within normal host operating system 2008 vulnerability cve-2008-0923 vmware discovered core security technologies made vm escape possible vmware workstation 6.0.2 5.5.4 fully working exploit labeled cloudburst developed immunity inc. immunity canvas commercial penetration testing tool cloudburst presented black hat usa 2009
[ 5378, 2275, 6153, 7983, 8047, 10264, 2558 ]
Test
5,175
2
Nokia_N71:nokia n71 nokia n71 smartphone announced nokia november 2 2005 released june 2006 nokia joint-first clamshell smartphone like n92 announced day n71 runs symbian os v9.1 s60 3rd edition features include 2 megapixel camera built-in flash front vga camera allow real-time video calling fm radio bluetooth digital music player functionality comes standard full web browser support 3d java games also 3g mini-sd card slot expandable memory features include ability transfer data via w-cdma 2100 gprs edge nokia promotes n71 2-megapixel digital rear camera producing high-quality photography video well music radio functionality phone multimedia mini-sd card means hold 2 gigabytes equating potentially hundreds tracks according nokia specifications
[ 1537, 4609, 8577, 3205, 11655, 9359, 1424, 529, 2449, 8083, 10770, 5143, 2072, 7063, 5274, 5019, 5659, 669, 8472, 11545, 4003, 4132, 6310, 167, 40, 3626, 5290, 10410, 10802, 7220, 821, 7866, 1083, 1728, 7617, 4291, 7877, 10053, 199, 967, ...
None
5,176
2
Address_space_layout_randomization:address space layout randomization address space layout randomization aslr computer security technique involved preventing exploitation memory corruption vulnerabilities order prevent attacker reliably jumping example particular exploited function memory aslr randomly arranges address space positions key data areas process including base executable positions stack heap libraries linux pax project first coined term aslr published first design implementation aslr july 2001 patch linux kernel seen complete implementation providing also patch kernel stack randomization since october 2002 first mainstream operating system support aslr default openbsd version 3.4 2003 followed linux 2005 address space randomization hinders types security attacks making difficult attacker predict target addresses example attackers trying execute return-to-libc attacks must locate code executed attackers trying execute shellcode injected stack find stack first cases system obscures related memory-addresses attackers values guessed mistaken guess usually recoverable due application crashing address space layout randomization based upon low chance attacker guessing locations randomly placed areas security increased increasing search space thus address space randomization effective entropy present random offsets entropy increased either raising amount virtual memory area space randomization occurs reducing period randomization occurs period typically implemented small possible systems must increase vma space randomization defeat randomization attackers must successfully guess positions areas wish attack data areas stack heap custom code useful data loaded one state attacked using nop slides code repeated copies data allows attack succeed area randomized one handful values contrast code areas library base main executable need discovered exactly often areas mixed example stack frames injected onto stack library returned following variables declared calculate probability attacker succeeding assume number attempts carried without interrupted signature-based ips law enforcement factor case brute forcing daemon restarted also figure many bits relevant many attacked attempt leaving however many bits attacker defeat following formulas represent probability success given set attempts bits entropy many systems formula_14 thousands millions 64-bit systems numbers typically reach millions least hector marco-gisbert ismael ripoll showed 2014 bypass aslr 64-bit systems less one second certain circumstances 32-bit systems 2004 computer speeds 16 bits address randomization shacham co-workers state ... 16 bits address randomization defeated brute force attack within minutes authors statement depends ability attack application multiple times without delay proper implementations aslr like included grsecurity provide several methods make brute force attacks infeasible one method involves preventing executable executing configurable amount time crashed certain number times android possibly systems implement library load order randomization form aslr randomizes order libraries loaded supplies little entropy approximation number bits entropy supplied per needed library appears yet account varied library sizes actual entropy gained really somewhat higher note attackers usually need one library math complex multiple libraries shown well note case attacker using one library simplification complex formula formula_15 values tend low even large values importantly since attackers typically use c standard library thus one often assume formula_17 however even small number libraries bits entropy gained thus potentially interesting combine library load order randomization vma address randomization gain extra bits entropy note extra bits entropy apply mmap segments libraries attackers may make use several methods reduce entropy present randomized address space ranging simple information leaks attacking multiple bits entropy per attack heap spraying little done possible leak information memory layout using format string vulnerabilities format string functions printf use variable argument list job format specifiers describe argument list looks like way arguments typically passed format specifier moves closer top stack frame eventually return pointer stack frame pointer extracted revealing address vulnerable library address known stack frame completely eliminate library stack randomization obstacle attacker one also decrease entropy stack heap stack typically must aligned 16 bytes smallest possible randomization interval heap must page-aligned typically 4096 bytes attempting attack possible align duplicate attacks intervals nop slide may used shellcode injection string replaced arbitrary number slashes attempting return system number bits removed exactly formula_18 intervals attacked decreases limited due amount data stack heap stack example typically limited grows much less allows although conservative estimate would around 8– corresponding 4– stack stuffing heap hand limited behavior memory allocator case glibc allocations 128 kb created using mmap limiting attackers 5 bits reduction also limiting factor brute forcing although number attacks perform reduced size attacks increased enough behavior could circumstances become apparent intrusion detection systems aslr-protected addresses leaked various side channels removing mitigation utility recent attacks used information leaked cpu branch target predictor buffer btb memory management unit mmu walking page tables clear class aslr attack mitigated benefit aslr reduced eliminated several mainstream general-purpose operating systems implement aslr android 4.0 ice cream sandwich provides address space layout randomization aslr help protect system third party applications exploits due memory-management issues position-independent executable support added android 4.1 android 5.0 dropped non-pie support requires dynamically linked binaries position independent library load ordering randomization accepted android open-source project 26 october 2015 included android 7.0 release dragonfly bsd implementation aslr based upon openbsd model added 2010 default enabled setting sysctl vm.randomize_mmap 1 support aslr appear freebsd 13.0 currently development disabled default apple introduced aslr ios 4.3 released march 2011 kaslr introduced ios 6 randomized kernel base 0x01000000 1+0xrr 0x00200000 0xrr random byte sha1 random data generated iboot 2nd-stage ios boot loader linux kernel enabled weak form aslr default since kernel version 2.6.12 released june 2005 pax exec shield patchsets linux kernel provide complete implementations exec shield patch linux supplies 19 bits stack entropy period 16 bytes 8 bits mmap base randomization period 1 page 4096 bytes places stack base area 8 mb wide containing 524,288 possible positions mmap base area 1 mb wide containing 256 possible positions position-independent executable pie implements random base address main executable binary place since 2003 provides address randomness main executable used shared libraries pie feature use network facing daemons – pie feature used together prelink feature executable prelink tool implements randomization prelink time rather runtime design prelink aims handle relocating libraries dynamic linker allows relocation occur many runs program result real address space randomization would defeat purpose prelinking randomization disabled specific process changing execution domain using personality 2 kernel address space layout randomization kaslr bringing support address space randomization running linux kernel images randomizing kernel code placed boot time merged linux kernel mainline kernel version 3.14 released 30 march 2014 compiled disabled boot time specifying one kernel boot parameters several side-channel attacks x86 processors could leak kernel addresses late 2017 kernel page-table isolation kpti aka kaiser developed defeat attacks however method protect side-channel attacks utilizing collisions branch predictor structures microsoft windows vista released january 2007 later aslr enabled executables dynamic link libraries specifically linked aslr-enabled compatibility enabled default applications typically older software incompatible aslr fully enabled editing registry entry hklm\system\currentcontrolset\control\session manager\memory management\moveimages installing microsoft enhanced mitigation experience toolkit locations heap stack process environment block thread environment block also randomized security whitepaper symantec noted aslr 32-bit windows vista may robust expected microsoft acknowledged weakness implementation host-based intrusion prevention systems wehntrust ozone also offer aslr windows xp windows server 2003 operating systems wehntrust open-source complete details ozone implementation available noted february 2012 aslr 32-bit windows systems prior windows 8 effectiveness reduced low memory situations similar effect also achieved linux research test code caused mac os x 10.7.3 system kernel panic left unclear aslr behavior scenario support aslr userland appeared netbsd 5.0 released april 2009 enabled default netbsd-current april 2016 kernel aslr support amd64 added netbsd-current october 2017 making netbsd first bsd system support kaslr 2003 openbsd became first mainstream operating system support strong form aslr activate default openbsd completed aslr support 2008 added support pie binaries openbsd 4.4 malloc 3 designed improve security taking advantage aslr gap page features implemented part openbsd codice_3 system call detect use-after-free bugs released 2013 openbsd 5.3 first mainstream operating system enable position-independent executables default multiple hardware platforms openbsd 5.7 activated position-independent static binaries static-pie default mac os x leopard 10.5 released october 2007 apple introduced randomization system libraries mac os x lion 10.7 released july 2011 apple expanded implementation cover applications stating address space layout randomization aslr improved applications available 32-bit apps heap memory protections making 64-bit 32-bit applications resistant attack os x mountain lion 10.8 released july 2012 later entire system including kernel well kexts zones randomly relocated system boot aslr introduced solaris beginning solaris 11.1 released october 2012 aslr solaris 11.1 set system-wide per zone per-binary basis side-channel attack utilizing branch target buffer demonstrated bypass aslr protection 2017 attack named aslr⊕cache demonstrated could defeat aslr web browser using javascript
[ 8576, 642, 1922, 5636, 8066, 3462, 3473, 11537, 11539, 8852, 7702, 1820, 2717, 2467, 4389, 7717, 5799, 8231, 9854, 2732, 5040, 9393, 435, 11188, 10933, 823, 6968, 5054, 1474, 3395, 3270, 4423, 5065, 1103, 7760, 9424, 1106, 3283, 4562, 853...
Test
5,177
2
GhostBSD:ghostbsd ghostbsd unix-like operating system based trueos mate default desktop environment gnome previous desktop environment xfce-desktop community based edition aims easy install ready-to-use easy use project goal combine security privacy stability usability openness freedom free charge prior ghostbsd 18.10 project based freebsd may 2018 announced future versions operating system based trueos beginning ghostbsd 18.10 project moved base freebsd trueos following trueos based ghostbsd releases ghostbsd originally licensed 3-clause bsd license revised bsd license new bsd license modified bsd license 2014 eric turgeon re-licensed ghostbsd 2-clause license simplified bsd license freebsd license ghostbsd contains gpl-licensed software following minimum recommended requirements
[ 7552, 7425, 2179, 2180, 1927, 1801, 10761, 274, 5397, 8725, 9625, 1946, 4636, 2212, 6438, 10535, 684, 4908, 1071, 3248, 7983, 9009, 11184, 11698, 11573, 1718, 9784, 1465, 5819, 7483, 3006, 9151, 11459, 9927, 8266, 8395, 8909, 5710, 6864, ...
Test
5,178
4
F5_Networks:f5 networks f5 networks inc. global company specializes application services application delivery networking adn f5 technologies focus delivery security performance availability web applications well availability servers cloud resources data storage devices networking components f5 headquartered seattle washington additional development manufacturing sales/marketing offices worldwide known originally load balancing product today f5 product services line expanded things related delivery applications including local load balancing acceleration global dns based load balancing acceleration security web application firewall application authentication access products ddos defense f5 technologies available data center cloud including private public multi-cloud environments based platforms aws microsoft azure google cloud openstack f5 networks originally named f5 labs established 1996 company name inspired 1996 movie twister reference made fastest powerful tornado fujita scale f5 f5 first product launched 1997 load balancer called big-ip server went became overloaded big-ip directed traffic away server servers could handle load june 1999 company initial public offering listed nasdaq stock exchange symbol ffiv 2010 2011 f5 networks fortune list 100 fastest-growing companies company also rated one top ten best-performing stocks p 500 2010 f5 also named best place work online jobs recruiting site glassdoor 2015 2016 competitors included cisco systems 2012 citrix systems radware françois locoh-donou replaced john mcadam president ceo april 3 2017 may 3 2017 f5 announced would move longtime headquarters waterfront near seattle center new downtown seattle skyscraper called f5 tower move occur early 2019 2017 f5 launched dedicated site organization focused gathering global threat intelligence data analyzing application threats publishing related findings dubbed “ f5 labs ” nod company ’ history team continues research application threats publish findings every week benefit broader security community 2019 f5 networks occupies leading position ranking popular companies wikipedia f5 big-ip product family comprises hardware modularized software virtual appliances run f5 tmos operating system depending appliance selected one big-ip product modules added offerings include september 7 2004 f5 networks released version 9.0 big-ip software addition appliances run software version 9.0 also marked introduction company tmos architecture significant enhancements including subsequent releases enhanced performance improves application security supported cloud application deployments f5 describes big-iq framework managing big-ip devices application services irrespective form factors hardware software cloud deployment model on-premises private/public cloud hybrid big-iq supports integration ecosystem participants public cloud providers orchestration engines cloud connectors set open restful apis big-iq uses multi-tenant approach management allows organizations move closer service without concern might affect stability security services fabric silverline cloud-based application service offerings include security services waf ddos protection services 2017 company introduced technologies make f5 capabilities portable across broader range environments including
[ 2049, 2563, 550, 10790, 9262, 8753, 2098, 569, 5178, 9279, 64, 2118, 8269, 5201, 2134, 94, 1118, 4194, 7786, 7791, 8816, 4722, 4725, 7809, 2705, 1172, 3732, 161, 3237, 8358, 3243, 1708, 6318, 6834, 1216, 10433, 4814, 9423, 10451, 6364, ...
Test
5,179
2
Unix_security:unix security unix security refers means securing unix unix-like operating system secure environment achieved design concepts operating systems also vigilant user administrative practices core security feature systems file system permissions files typical unix filesystem permissions set enabling different access file permissions file commonly set using chmod command seen ls command example unix permissions permit different users access file different user groups different permissions file advanced unix filesystems include access control list concept allows permissions granted multiple users groups access control list may used grant permission additional individual users groups example example chacl command linux operating system user sue granted write permission /pvr directory users unix style operating systems often belong managed groups specific access permissions enables users grouped level access system many unix implementations add additional layer security requiring user member wheel user privileges group order access codice_1 command unix unix-like systems account group enables user exact complete control system often known root account access account gained unwanted user results complete breach system root account however necessary administrative purposes security reasons root account seldom used day day purposes sudo program commonly used usage root account closely monitored root access visualised familiar superman stories using following analogy unix many tools improve security used properly users administrators selecting strong password guarding properly probably important things user improve unix security unix systems essential information users stored file codice_2this file keeps track users registered system main definitions passwords correctly hash password also stored place entries codice_2 occupy exactly one line following form example would since users must read access codice_2 file many common tasks codice_5 use codice_2 map uids login names example anyone could also read password hashes users solve problem file codice_7 created store password hashes root read access password shadowing 2nd field password hash replaced x tells system retrieve corresponding user password via codice_7 file codice_7 file often contains values first two fields remaining fields codice_7 file include fields may used improve unix security enforcing password security policy administrators delete old accounts promptly operating systems like software may contain bugs need fixing may enhanced addition new features patching operating system secure manner requires software come trustworthy source altered since packaged common methods verifying operating system patches altered include use cryptographic hash md5 based checksum use read-only media security standpoint specific packaging method rpm package manager format originally red hat linux important use features ensure integrity patch source distributions include ability examine code suspicious content drawback absent accompanying cryptographic hash value user must able perform security analysis code linux distributions use rpm package manager format providing base functionality software updates make use md5 gpg ensure content integrity hash values packaged rpm file verified package installed linux distributions use debian .deb package format providing base functionality software updates make use gpg signatures ensure content integrity signature computed package constructed verified later package installed regardless vendor distribution software distributions provide mechanism verifying software legitimate modified since originally packaged unnecessary system software installed configured system software longer required removed completely possible commands inetd xinetd act super-servers variety network protocols rlogin telnet ftp turning unnecessary services approach usually called proactive security operating systems secure default amongst others free bsd flavours freebsd netbsd openbsd proactively secure example output netstat netbsd 3.0 workstation clearly outlines technique following example bsd system shows machine ssh service listening public network interface computer sendmail listening loopback interface access service may restricted using firewall file system security within unix unix-like systems based 9 permission bits set user group id bits sticky bit total 12 bits permissions apply almost equally filesystem objects files directories devices 9 permission bits divided three groups three bits first group describes permissions file owner second group describes permissions group associated file owner directory containing file third group describes permissions associated process user id file group three bits contains bit indicating read write execute access granted case directories execute access interpreted permission perform filename lookup within directory set user id set group id bits commonly abbreviated set-uid set-gid respectively used change identity process executes file either bits set file set-uid permission bit set cause process executes file temporarily switch effective user id file owner file set-gid permission bit set cause process executes file temporarily switch effective group id file group process may alternate effective user group id inherited file real user group id inherited user logged system provides mechanism process may limit access rights possesses code regions require access rights form security technique known privilege separation improves program security limiting unintended undesirable actions processes directory set-gid permission bit set cause newly created file initial file group value equal file group directory provides mechanism whereby subsystem system mail subsystem create files common file group value set-gid processes within subsystem able read write file sticky bit formally known save text swap bit derives name original purpose originally sticky bit caused process initial memory image stored contiguous image disk drive used store real memory pages use improved performance commonly executed commands making initial memory image readily available modern unix systems longer perform function bit set name preserved nonetheless case files sticky-bit may used system indicate style file locking performed case directories sticky bit prevents process one super-user privileges one effective user id file owner deleting file within directory sticky bit commonly used publicly writable directories various temporary working space directories system root squash reduction access rights remote superuser root using identity authentication local user remote user primarily feature nfs may available systems well problem arises remote file system shared multiple users users belong one multiple groups unix every file folder normally separate permissions read write execute owner normally creator file group owner belongs world users allows restriction read write access authorized users general nfs server must also protected firewall superuser rights ordinary user able change file ownership set arbitrary permissions access protected content even users need root access individual workstations may authorized similar actions shared file system root squash reduces rights remote root making one longer superuser unix like systems root squash option turned /etc/exports file server side implementing root squash authorized superuser performs restricted actions logging nfs server directly mounting exported nfs folder selinux set kernel extensions control access precisely strictly defining files folders network ports resources accessed confined process system mostly used restrict processes database server rather human users also limit processes run root distributions use comparable alternatives like apparmor unix-like operating systems immune microsoft windows viruses binaries created run windows generally wo n't run platforms however many unix like installations provide file storage services microsoft windows clients use samba software may unintentionally become repository viruses stored users common unix servers act mail transfer agents consequently email virus scanning often installed clamav virus scanner available source code form may used scan unix file systems viruses infect operating systems viruses worms target unix-like operating systems fact first computer worm—the morris worm—targeted unix systems network firewall protects systems networks network threats exist opposite side firewall firewalls block access strictly internal services unwanted users cases filter network traffic content iptables current user interface interacting linux kernel netfilter functionality replaced ipchains unix like operating systems may provide native functionality open source firewall products exist detailed information iptables contained elsewhere brief discussion contained order describe iptables may used configure linux firewall netfilter provides state-full packet filter configured according network interface protocol source and/or destination address source and/or destination port state packet network packet traverses several chains time received network interface time accepted host forwarded another host common chains input output forward input chain traversed packets received network interface regardless whether accepted host forwarded another host output chain traversed packets transmitted network interface forward chain traversed packets routed host one network interface another case multi-homed system system one physical network interface built-in chains default policy defines action taken packet reaches end chain packet traversal ends rule matches packet action accept drop reject return simplest iptables firewall consists rules desired service followed rule indicates packets reach rule dropped system permitted example incoming email traffic would rule accepted connections smtp port dropped others rule would required indicated established connections also permitted outgoing connections would receive responses systems following example shows simple packet filter input chain described example addition explicit drop action ensures packets discarded default policy input chain accidentally changed accept less need output chain default policy output chain safely set accept instances may desirable firewall limit certain outgoing connections certain set approved systems known egress filtering may used prevent viruses within firewall escaping systems example may policy network limit outgoing email connections single authorized email servers way combating e-mail spam could achieved following example need include rules example default policy output chain accept note also rule assumes host acting firewall sending email email server good assumption typically firewall system contains minimal amount system code needed act firewall restrictive output chain would contain permissive accept entries services may accessed outside firewall restrictive drop policy chain secure network communication packet sniffing attacks
[ 2050, 9353, 1297, 2322, 5397, 8344, 3742, 3873, 3750, 8998, 7983, 9909, 823, 8504, 8631, 5179, 700, 4414, 9791, 1474, 2887, 842, 6735, 1109, 8283, 5472, 6625, 1509, 10341, 5096, 2409, 11112, 2292, 5492, 5749, 8954, 2558, 4863 ]
Test
5,180
1
Project_6:project 6 project 6 simply p6 global surveillance project jointly operated u.s. central intelligence agency cia close cooperation german intelligence agencies bundesnachrichtendienst bnd bundesamt für verfassungsschutz bfv part efforts combat terrorism project includes massive database containing personal information photos license plate numbers internet search histories telephone metadata presumed jihadists headquarters project located neuss germany
[ 1930, 7893 ]
Test
5,181
5
Explicit_Congestion_Notification:explicit congestion notification explicit congestion notification ecn extension internet protocol transmission control protocol defined rfc 3168 2001 ecn allows end-to-end notification network congestion without dropping packets ecn optional feature may used two ecn-enabled endpoints underlying network infrastructure also supports conventionally tcp/ip networks signal congestion dropping packets ecn successfully negotiated ecn-aware router may set mark ip header instead dropping packet order signal impending congestion receiver packet echoes congestion indication sender reduces transmission rate detected dropped packet rather responding properly ignoring bits outdated faulty network equipment historically dropped mangled packets ecn bits set measurements suggested fraction web servers public internet setting ecn prevents network connections reduced less 1 passive support existed ubuntu linux since 12.04 windows server since 2012 passive support popular websites increased 8.5 2012 70 may 2017 adoption across internet requires clients actively request ecn june 2015 apple announced ecn enabled default supported future products help drive adoption ecn signaling industry-wide ecn requires specific support internet layer transport layer following reasons without ecn congestion indication echo achieved indirectly detection lost packets ecn congestion indicated setting ecn field within ip packet ce echoed back receiver transmitter setting proper bits header transport protocol example using tcp congestion indication echoed back setting ece bit ecn uses two least significant right-most bits diffserv field ipv4 ipv6 header encode four different code points endpoints support ecn mark packets ect 0 ect 1 packet traverses active queue management aqm queue e.g. queue uses random early detection red experiencing congestion corresponding router supports ecn may change code point codice_5 instead dropping packet act referred “ marking ” purpose inform receiving endpoint impending congestion receiving endpoint congestion indication handled upper layer protocol transport layer protocol needs echoed back transmitting node order signal reduce transmission rate ce indication handled effectively upper layer protocol supports ecn used conjunction upper layer protocols tcp support congestion control method echoing ce indication transmitting endpoint tcp supports ecn using two flags tcp header first ecn-echo ece used echo back congestion indication i.e signal sender reduce amount information sends second congestion window reduced cwr acknowledge congestion-indication echoing received use ecn tcp connection optional ecn used must negotiated connection establishment including suitable options syn syn-ack segments ecn negotiated tcp connection sender indicates ip packets carry tcp segments connection carrying traffic ecn capable transport marking ect code point allows intermediate routers support ecn mark ip packets ce code point instead dropping order signal impending congestion upon receiving ip packet congestion experienced code point tcp receiver echoes back congestion indication using ece flag tcp header endpoint receives tcp segment ece bit reduces congestion window packet drop acknowledges congestion indication sending segment cwr bit set node keeps transmitting tcp segments ece bit set receives segment cwr bit set see affected packets tcpdump use filter predicate codice_6 since transmission control protocol tcp perform congestion control control packets pure acks syn fin segments control packets usually marked ecn-capable 2009 proposal suggests marking syn-ack packets ecn-capable improvement known ecn+ shown provide dramatic improvements performance short-lived tcp connections ecn also defined transport layer protocols perform congestion control notably dccp stream control transmission protocol sctp general principle similar tcp although details on-the-wire encoding differ principle possible use ecn protocols layered udp however udp requires congestion control performed application current networking apis give access ecn bits since ecn effective combination active queue management aqm policy benefits ecn depend precise aqm used observations however appear hold across different aqms expected ecn reduces number packets dropped tcp connection avoiding retransmission reduces latency especially jitter effect drastic tcp connection single outstanding segment able avoid rto timeout often case interactive connections remote logins transactional protocols http requests conversational phase smtp sql requests effects ecn bulk throughput less clear modern tcp implementations fairly good resending dropped segments timely manner sender window large use ecn found detrimental performance highly congested networks using aqm algorithms never drop packets modern aqm implementations avoid pitfall dropping rather marking packets high load many modern implementations tcp/ip protocol suite support ecn however usually ship ecn disabled windows versions since windows server 2008 windows vista support ecn tcp since windows server 2012 enabled default windows server versions data center transmission control protocol dctcp used previous windows versions non-server versions disabled default ecn support enabled using shell command freebsd 8.0 netbsd 4.0 implement ecn support tcp activated sysctl interface setting 1 value parameter likewise sysctl used openbsd since version 2.4.20 linux kernel released november 2002 linux supports three working modes ecn tcp configured sysctl interface setting parameter one following values beginning version 4.1 linux kernel released june 2015 mechanism specified rfc 3168 section 6.1.1.1 enabled default ecn enabled value 1 fallback mechanism attempts ecn connectivity initial setup outgoing connections graceful fallback transmissions without ecn capability mitigating issues ecn-intolerant hosts firewalls mac os x 10.5 10.6 implement ecn support tcp controlled using boolean sysctl variables first variable enables ecn incoming connections already ecn flags set second one tries initiate outgoing connections ecn enabled variables default set enable respective behavior june 2015 apple inc. announced os x 10.11 released later year would ecn turned default never happened macos sierra ecn enabled 50 percent tcp sessions june 2015 apple inc. announced ios 9 next version ios would support ecn turned default tcp ecn negotiation enabled 5 randomly selected connections wi-fi ethernet ios 9 50 randomly selected connections wi-fi ethernet cellular carriers ios 10 100 ios 11 solaris kernel supports three states ecn tcp default behavior solaris 11 full ecn usage activated via since ecn marking routers dependent form active queue management routers must configured suitable queue discipline order perform ecn marking cisco ios routers perform ecn marking configured wred queuing discipline since version 12.2 8 t. linux routers perform ecn marking configured one red gred queue disciplines explicit ecn parameter using sfb discipline using codel fair queuing fq_codel discipline cake queuing discipline modern bsd implementations freebsd netbsd openbsd support ecn marking altq queueing implementation number queuing disciplines notably red blue freebsd 11 included codel pie fq-codel fq-pie queuing disciplines implementation ipfw/dummynet framework ecn marking capability data center transmission control protocol data center tcp dctcp utilizes ecn enhance transmission control protocol congestion control algorithm used data center networks whereas standard tcp congestion control algorithm able detect presence congestion dctcp using ecn able gauge extent congestion dctcp modifies tcp receiver always relay exact ecn marking incoming packets cost ignoring function meant preserve signalling reliability makes dctcp sender vulnerable loss acks receiver mechanism detect cope algorithms provide equivalent better receiver feedback reliable approach active research topic
[ 10242, 1541, 1030, 8211, 6681, 6682, 2079, 10271, 6689, 9251, 2085, 7208, 6186, 7214, 8238, 562, 1586, 8754, 9269, 11321, 3133, 6723, 8265, 4687, 1623, 10341, 10344, 3695, 4723, 2679, 4729, 5251, 649, 9868, 3218, 9365, 11413, 152, 3742, 9...
Test
5,182
8
Chartbeat:chartbeat chartbeat technology company provides data analytics global publishers company started 2009 headquartered new york city us saas company integrates code websites publishers media companies news organizations track audience engagement loyalty metrics make decisions content publish promote web sites august 2010 company spun betaworks separate entity chartbeat praised criticized alternative google analytics real-time data betaworks launched chartbeat april 2009 real-time web analytics tool said publishers could use react quickly changes user behavior time google analytics offer real-time data launch chartbeat part broader strategy betaworks capitalize growth real-time stream-based social web betaworks also invested twitter tumblr bit.ly tweetdeck august 2010 company spun betaworks separate entity july 2011 chartbeat launched newsbeat version service news sites february 2016 founding ceo tony haile resigned company seven years ceo long time coo john saroff named successor october 2017 chartbeat made updates user experience design including rebrand flagship product chartbeat publishing
[ 1794, 467, 5524, 119 ]
Train
5,183
4
Robert_Lipka:robert lipka robert stephen lipka june 16 1945 – july 5 2013 former army clerk national security agency nsa 1997 pleaded guilty conspiracy commit espionage sentenced 18 years prison arrested 30 years betrayal statute limitations espionage robert lipka assigned national security agency intelligence analyst 1964 19-year-old u.s. army soldier worked central communications room 1964–1967 responsible removing disseminating highly classified documents throughout agency despite junior rank lipka held high security clearance access diverse array highly classified documents september 1965 lipka presented soviet embassy 16th street walk-in volunteer spy announced responsible shredding highly classified documents next two years made contact residency around fifty times using variety skilled tradecraft according handler time former kgb general oleg danilovich kalugin young soldier lipka ... involved shredding destroying nsa documents could supply us wealth material goes say lipka gave whatever got hands often little idea turning lipka compromised daily weekly top-secret reports white house information us troop movements throughout world communications among nato allies two years lipka supplied kgb top-secret information received payment 27,000 kalugin claims lipka used money received around 500 1,000 per package delivered finance college education however lipka regularly complained deserved money threatened break contact demand met august 1967 lipka made good threat left nsa end military service order attend millersville university pennsylvania order discourage attempts kgb recontact lipka sent final message claiming double agent us intelligence along according vasili mitrokhin kgb knew lie high importance classified documents lipka provided residency illegals non diplomatic cover handlers tried renew contact lipka intermittently least another 11 years though without success similar john anthony walker case lipka ex-wife made accusations treason fbi 1993 armed accusations revelations kalugin memoir information separate investigation implicating lipka fbi decided use false flag operation catch fbi agent dmitri droujinsky contacted lipka posing gru officer based washington named sergei nikitin lipka told nikitin still owed money course four meetings nikitin gave lipka 10,000 lengthy investigation lipka admitted spy nsa february 1996 arrested home millersville pa charged handing classified documents soviet union statute limitations espionage cases matter lipka ceased spying soviet union three decades arrest may 1997 lipka accepted plea deal avoid trial could resulted life sentence courtroom philadelphia inquirer reported lipka exploded tears confessed handed classified information kgb agents sentenced september 1997 18 years prison 10,000 fine additional reimbursement fbi 10,000 given nikitin according federal bureau prisons lipka released december 8 2006 july 5 2013 robert lipka died meadville pa age 68 remains cremated john w. whiteside iii fool mate true story espionage national security agency 2014
[ 9856, 11544, 7887 ]
Validation
5,184
3
Composite_artifact_colors:composite artifact colors composite artifact colors designation commonly used address several graphic modes 1970s 1980s home computers machines connected ntsc tv monitor composite video outputs video signal encoding allowed extra colors displayed manipulating pixel position screen limited machine hardware color palette though modern tvs might work well mode used mainly games since limited display horizontal resolution normal mostly used ibm pc cga graphics trs-80 color computer apple ii computers also possible atari 8-bit limitations composite video regarding horizontal resolution also exploited systems adjacent pixel values got averaged horizontally producing solid colors generating transparency effects pal displays ntsc 4.43 ones effect n't generate new colors rather mix adjacent horizontal pixel values however depending pal system used results vary pal pal n used color artifacts seen ntsc might also possible higher resolution video connection used graphics displayed dither patterns machines zx spectrum mega drive took advantage situation using ibm color graphics adapter cga ntsc tv-out separation luminance chrominance imperfect yielding cross-color artifacts color smearing especially problem 80-column text reason text graphics modes described exists twice normal color version monochrome version monochrome version mode turns ntsc color decoding viewing monitor completely resulting black-and-white picture also color bleeding hence sharper picture rgbi monitors two versions mode identical exception 320×200 graphics mode monochrome version produces third palette described however programmers learned flaw could turned asset distinct patterns high-resolution dots would smear consistent areas solid colors thus allowing display completely new colors since new colors result cross-color artifacting often called artifact colors standard 320×200 four-color 640×200 color-on-black graphics modes could used technique resulting screens would usable resolution 160×200 16 colors trs-80 color computer 256×192 two color graphics mode uses four colors due quirk ntsc television system possible reliably display 256 dots across screen due limitations ntsc signal phase relationship vdg clock colorburst frequency first colorset green black dots available alternating columns green black distinct appear muddy green color however one switches white black colorset instead muddy gray expected result either orange blue reversing order alternating dots give opposite color effect mode becomes 128×192 4 color graphics mode black orange blue white available apple ii created color graphics exploiting similar effect coco games used mode colors available useful ones provided hardware 4 color modes vdg internally power either rising falling edge clock bit patterns represent orange blue predictable coco games start title screen asks user press reset button colors correct coco 3 fixes clock-edge problem always user holds f1 key reset choose color set coco 3 analog rgb monitor black white dot patterns artifact see one uses tv composite monitor patch games use hardware 128×192 four color mode gime chip allows color choices mapped users pal countries see green purple stripes instead solid red blue colors readers rainbow hot coco magazine learned use poke commands switch 6847 vdg one artifact modes extended color basic continues operate though still displaying one 128x192 four-color modes thus entire set extended color basic graphics commands used artifact colors users developed set 16 artifact colors using 4×2 pixel matrix use poke commands also make colors available graphics commands although colors drawn one horizontal line time interesting artworks produced effects especially since coco max art package provides palette colors resulting 16 color palette color graphics apple ii series uses quirk ntsc television signal standard made color display relatively easy inexpensive implement apple ii display provides two pixels per ntsc subcarrier cycle color burst reference signal computer attached color display display green showing one alternating pattern pixels magenta opposite pattern alternating pixels white placing two pixels next later blue orange became available tweaking offset pixels half pixel-width relation color-burst signal high-resolution display offers colors simply compressing narrower pixels subcarrier cycle coarse low-resolution graphics display mode works differently output pattern dots per pixel offer color options patterns stored character generator rom replaces text character bit patterns computer switched low-res graphics mode text mode low-res graphics mode uses memory region circuitry used graphics 8 mode atari 8-bit computers using color television interface adaptor ctia chip designed display black white resolution 320×192 programmers found using artifact colors blue red also used mode software on-line systems wizard princess use feature display four colors atari began shipping computers improved graphic television interface adaptor gtia users found programs displayed incorrect colors needed updates many high-profile game titles offers graphics optimized composite color monitors ultima ii first game game series ported ibm pc uses cga composite graphics king quest also innovative use 16-color graphics titles include microsoft decathlon king quest ii king quest iii using composite connection pal tv system generate new colors instead horizontal blurring effect given different bandwidths pal broadcast systems pal-m pal-n pal-b etc.. actual effect intensity vary effect pronounced higher display resolutions used exploited game artists machines using dithering patterns one notable example mega drive takes full advantage simulate transparency effects earlier machine zx spectrum uses effect blend colors simulate half bright variations basic 8 color palette home computers like atari st commodore amiga also graphics prepared dithering techniques take advantage composite tv connections regarding amiga special hold-and-modify particularly suited displaying high color tv-like images taking full advantage horizontal blurring
[ 5184, 2633 ]
Validation
5,185
5
EPON_Protocol_over_Coax:epon protocol coax epon protocol coax epoc refers transparent extension ethernet passive optical network epon cable operator hybrid fiber-coax hfc network service provider perspective use coax portion network transparent epon protocol operation optical line terminal olt thereby creating unified scheduling management quality service qos environment includes optical coax portions network ieee 802.3 ethernet working group initiated standards process creation epoc study group november 2011 epoc adds family ieee 802.3 ethernet first mile efm standards institute electrical electronics engineers ieee 802.3 standards committee published standards symmetric 1gbit/s epon network originally published september 2004 ieee 802.3ah-2004 10gbit/s epon network permitting symmetric 10gbit/s asymmetric 10gbit/s downstream 1gbit/s upstream originally published june 2009 ieee 802.3av-2009 also known 10g-epon call interest cfi group process initiated may 2011 broadcom receiving requests initiating epoc standardization ieee chinese cable operators also north american cable operators many companies became involved cfi creation consensus process according cfi materials representatives following companies supported formation study group alcatel-lucent aurora networks bright house networks broadcom cogeco cable inc. cablelabs comcast cox networks dell fiberhome telecommunication technologies harmonic inc. hewlett-packard high speed design huawei neophotonics pmc-sierra qualcomm sumitomo electric industries technical working committee china radio tv association time warner cable wuhan yangtze optical technologies co. ltd. zte november 2011 epon phy coax cfi presented ieee 802.3 working group plenary creation epoc study group sg approved may 2012 epoc study group completed draft project authorization request par 5 criteria responses set objectives work materials require review approval ieee 802.3 working group ieee 802 lan/man standards committee lmsc ieee new standards committee nescom upon receiving approval epoc study group transition epoc task force tf begin work leads directly creating draft standard 30 august 2012 ieee-sa approved par permitting ieee 802.3 working group charter ieee p802.3bn task force ieee 802.3 standards apply media access control mac sublayer physical sublayer specifications respective management epon ieee 802.3 defined separately service provider mac phy called optical line terminal olt subscriber mac physical sublayer called optical network unit onu medium interconnecting olt onu fiber optical cable two wavelengths defined full-duplex operation one continuous downstream channel operation olt transmitting one onus another upstream burst mode channel operation permits olt-controlled time-division sharing upstream channel amongst onus pon similarly epoc architecture consists service provider coax line terminal clt subscriber coax network unit cnu intent clt mac sublayer olt mac sublayer cnu mac sublayer onu mac sublayer optical physical sublayer fiber optical media replaced coax physical sublayer coaxial distribution network cxdn media coax media downstream upstream communication channels utilize radio frequency rf spectrum assigned made available cable operator coax network case coax network medium dependent interface mdi typically industry standard f connector ieee 802.3 standards describe implementations system solutions use olt clt onu cnu standard apply respective mac physical sublayers two system models discussion ieee 802.3 epoc study group first direct output ieee 802.3 epoc standardization effort i.e. clt one cnus interconnected coaxial distribution network second enabled future epoc standard outside scope ieee 802.3 working group traditional epon deployment consisting olt device one onu devices attached pon one new devices referred functionally optical coax media converter cmc attach one side pon cxdn associated cnus communications coax media follows epoc standard intent second model permit olt transparently manage collection onu cnu devices similar fashion e.g unified epon management scheduling quality service second model viewed extending ethernet pon onto coax given likely shorter reach coax clt developed likely used fttb applications clt building epoc tenants second possibility outside plant e.g strand mounted cabinet based clt would fttc
[ 2785, 9863, 5384, 816, 7698, 5270, 2998, 1400, 10303 ]
None