node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
6,586 | 4 | Network_Admission_Control:network admission control network admission control nac refers cisco version network access control restricts access network based identity security posture network device switch router wireless access point dhcp server etc configured nac force user machine authentication prior granting access network addition guest access granted quarantine area remediation problems may caused authentication failure enforced inline custom network device changes existing switch router restricted dhcp class typical non-free wifi connection form nac user must present sort credentials credit card granted access network initial phase cisco network admission control nac functionality enables cisco routers enforce access privileges endpoint attempts connect network access decision basis information endpoint device current antivirus state antivirus state includes information version antivirus software virus definitions version scan engine network admission control systems allow noncompliant devices denied access placed quarantined area given restricted access computing resources thus keeping insecure nodes infecting network key component cisco network admission control program cisco trust agent resides endpoint system communicates cisco routers network cisco trust agent collects security state information antivirus software used communicates information cisco routers information relayed cisco secure access control server acs access control decisions made acs directs cisco router perform enforcement endpoint cisco product marked end life since november 30 2011 cisco terminology product longer developed supported besides user authentication authorization nac based upon compliance checking posture assessment evaluation system security based applications settings particular system using might include windows registry settings presence security agents anti-virus personal firewall nac products differ checking mechanisms nac vendors require 802.1x supplicant client agent installed including hexis netbeat nac trustwave enterasys offer agent-less posture checking designed handle bring device byod scenario agent-less approach works heterogenously across almost network environments network device types | [
9442,
2084,
3944,
11434,
6797,
2737,
5490,
8753,
2356,
6904
] | None |
6,587 | 2 | Dreamshell:dreamshell dreamshell unix-like operating system designed sega dreamcast video game console based kallistios libraries originally command line interface ability run third-party applications later versions dreamshell gained gui xml-module support applications written lua-scripts ability enhance functionality using functions klf-modules analogous dll kallisti os fixed modules mp3 ogg loaded console commands appear play formats well support implemented file manager internal external commands added facilitate ds kernel first application appeared dreamshell version 4.0 allows install operating system directly dreamcast bios lets change console regional setting video output format pal ntsc without flashing bios application relies consoles modified motherboard | [
4777,
1515,
237,
7151,
7983,
4561,
9840,
5397,
252,
479
] | Test |
6,588 | 4 | Crimeware:crimeware crimeware class malware designed specifically automate cybercrime crimeware distinct spyware adware designed perpetrate identity theft social engineering technical stealth order access computer user financial retail accounts purpose taking funds accounts completing unauthorized transactions enrich cyberthief alternatively crimeware may steal confidential sensitive corporate information crimeware represents growing problem network security many malicious code threats seek pilfer confidential information term crimeware coined david jevans february 2005 anti-phishing working group response fdic article putting end account-hijacking identity theft published december 14 2004 criminals use variety techniques steal confidential data crimeware including following methods crimeware threats installed victims computers multiple delivery vectors including crimeware significant economic impact due loss sensitive proprietary information associated financial losses one survey estimates 2005 organizations lost excess 30 million due theft proprietary information theft financial confidential information corporate networks often places organizations violation government industry-imposed regulatory requirements attempt ensure financial personal confidential us laws regulations include | [
3072,
6786,
5636,
5764,
7044,
10245,
10756,
9227,
9356,
9102,
3473,
7441,
4863,
4883,
1429,
278,
4245,
8471,
7449,
1690,
3867,
5404,
9242,
10141,
10392,
5281,
9761,
5284,
2213,
8998,
9256,
2857,
939,
300,
9771,
7855,
1970,
9909,
4023,
102... | None |
6,589 | 9 | Java_APIs_for_Bluetooth:java apis bluetooth java apis bluetooth wireless technology jabwt j2me specification apis allows java midlets running embedded devices mobile phones use bluetooth short-range wireless communication jabwt developed jsr-82 java community process jsr 82 implementations java 2 platform standard edition j2se also available original java specification request jsr-82 submitted motorola sun microsystems approved executive committee j2me september 2000 jsr-82 provided first standardized java api bluetooth protocols allowing developers write applications using bluetooth work devices conforming specification first version jsr-82 released march 2002 recent update jsr-82 maintenance draft review 4 released march 2010 specification reference implementation technology compatibility kit tck maintained motorola open source jabwt provides support discovery nearby bluetooth devices java applications use api scan discoverable devices identify services provided discovered devices search devices device frequently contacts jabwt provides object exchange api transfer data objects devices example two devices conforming obex protocol could exchange virtual business cards calendar appointments jabwt allows management local device ’ state jabwt applications able access information host device bluetooth address mark host device discoverable bluetooth devices register provide services jabwt supports connections different levels security applications using apis pass parameters connector.open method indicating level security required establish connection another device hundreds mobile devices different manufacturers comply jsr-82 specification google maintains list devices conform jsr-82 specification several open-source implementations jsr-82 specification available | [
4960,
9665,
3561,
5677,
9011
] | Validation |
6,590 | 5 | SDES:sdes sdes session description protocol security descriptions media streams way negotiate key secure real-time transport protocol proposed standardization ietf july 2006 see rfc 4568 keys transported sdp attachment sip message means sip transport layer must make sure no-one else see attachment done using tls transport layer methods like s/mime using tls assumes next hop sip proxy chain trusted take care security requirements request main advantage method extremely simple key exchange method picked several vendors already even though vendors use secure mechanism transport key helps get critical mass implementation make method de facto standard illustrate principle example phone sends call proxy using sips scheme indicates call must made secure key base-64 encoded sdp attachment phone receives answer proxy two-way secure call common problem secure media key exchange might finished first media packet arrives order avoid initial clicks packets must dropped usually short period time 100 ms major problem sdes method address end-to-end media encryption example user talking user b via proxy p sdes allows negotiation keys p b p b end-to-end media security must first establish trust relationship side use trusted intermediate call setup delay significantly increase makes applications like push-to-talk difficult peer-to-peer might difficult identify side example operator might implement b2bua architecture play role side still n't end-to-end security newer modern protocols like zrtp offer end-to-end encryption sip/rtp calls | [
10269,
10271
] | Test |
6,591 | 6 | Moose_File_System:moose file system moose file system moosefs open-source posix-compliant distributed file system developed core technology moosefs aims fault-tolerant highly available highly performing scalable general-purpose network distributed file system data centers initially proprietary software released public open source may 30 2008 currently two editions moosefs available moosefs follows similar design principles fossil file system google file system lustre ceph file system comprises three components achieve high reliability performance moosefs offers following features similarly cluster-based file systems moosefs uses commodity hardware running posix compliant operating system tcp/ip used interconnect | [
3328,
2051,
2314,
6291,
1049,
6049,
7983,
5170,
823,
5433,
3909,
7368,
6993,
3795,
11221,
728,
3931,
2395,
11638,
3450,
3582,
10111
] | None |
6,592 | 4 | Central_Equipment_Identity_Register:central equipment identity register central equipment identity register database imei numbers blacklisted handsets device esn imei number listed ceir supposed work member service providers networks paying members may access database number features added ceir like providing statistics number handset types growth/decline per network reported daily weekly monthly yearly base also see msisdn imsi used imei search imei used imsi common usage ceir stolen mobile devices user reports operator theft mobile devices imei number entered ceir supposedly making device unusable network although always work key reason sometimes work many operators many countries contribute imeis ceir also unique profile determines operators blocks included ceir updates received operator uk networks example receive block records originated non-uk networks annual fees required access ceir access tightly regulated contributing operators decide handsets block networks many network operators simply participate blocking users means losing revenue operators often trade business ethics revenue one operator country block use stolen handsets revenue flows operator instead ethical ones currently central equipment identity register frequently called imei db database system means central system network operators eir share individual blacklists one another service denied particular devices appear blacklist idea network operators compile one global blacklist imei db however agreement single ceir equipment identity register reduces threats theft mobile devices enabling individual operators prevent use stolen mobile devices networks improves users security switching stolen mobile devices making useless bricked mobile devices thieves thus less likely stolen first place number mobile devices messaging users continue grow become target fraudulent criminal activities mobile messaging application infrastructure companies nokia mavenir comviva primal technologies svyazcom tekelec examples providers equipment identity worldwide mobile operators like vodafone airwide mts svyazcom 4gtss cegetel tekelec deploy lists ceirs tra mandatory rule use ceir operator network prevent handset theft cloning dual sim cards imei:358251074242576 | [
5407
] | None |
6,593 | 4 | Protection_Profile:protection profile protection profile pp document used part certification process according iso/iec 15408 common criteria cc generic form security target st typically created user user community provides implementation independent specification information assurance security requirements pp combination threats security objectives assumptions security functional requirements sfrs security assurance requirements sars rationales pp specifies generic security evaluation criteria substantiate vendors claims given family information system products among others typically specifies evaluation assurance level eal number 1 7 indicating depth rigor security evaluation usually form supporting documentation testing product meets security requirements specified pp national institute standards technology nist national security agency nsa agreed cooperate development validated u.s. government pps pp states security problem rigorously given collection system products known target evaluation toe specify security requirements address problem without dictating requirements implemented pp may inherit requirements one pps order get product evaluated certified according cc product vendor define security target st may comply one pps way pp may serve template product st although eal easiest laymen compare simplicity deceptive number rather meaningless without understanding security implications pp st used evaluation technically comparing evaluated products requires assessing eal functional requirements unfortunately interpreting security implications pp intended application requires strong security expertise evaluating product one thing deciding product cc evaluation adequate particular application quite another obvious trusted agency possesses depth security expertise needed evaluate systems applicability common criteria evaluated products problem applying evaluations new problem addressed decades ago massive research project defined software features could protect information evaluated strength mapped security features needed specific operating environment risks results documented rainbow series rather separating eal functional requirements orange book followed less advanced approach defining functional protection capabilities appropriate assurance requirements single category seven categories defined way yellow book defined matrix security environments assessed risk established precisely security environment valid orange book categories approach produced unambiguous layman cookbook determine whether product usable particular application loss application technology seems unintended consequence superseding orange book common criteria | [
1350,
8904,
5865,
7979,
6604,
4303,
5136,
1905,
1010,
10962,
7354,
4253
] | Validation |
6,594 | 9 | Logo_(programming_language):logo programming language logo educational programming language designed 1967 wally feurzeig seymour papert cynthia solomon logo acronym name coined feurzeig bolt beranek newman derives greek logos meaning word thought general-purpose language logo widely known use turtle graphics commands movement drawing produced line vector graphics either screen small robot termed turtle language conceived teach concepts programming related lisp later enable papert called body-syntonic reasoning students could understand predict reason turtle motion imagining would turtle substantial differences among many dialects logo situation confused regular appearance turtle graphics programs named logo logo multi-paradigm adaptation dialect lisp functional programming language standard logo ucblogo best facilities handling lists files i/o recursion scripts used teach computer science concepts uc berkeley lecturer brian harvey computer science logo style trilogy logo usually interpreted language although developed compiled logo dialects lhogho liogo logo case-sensitive retains case used formatting logo created 1967 bolt beranek newman bbn cambridge massachusetts research firm wally feurzeig cynthia solomon seymour papert intellectual roots artificial intelligence mathematical logic developmental psychology first four years logo research development teaching work done bbn first implementation logo called ghost written lisp pdp-1 goal create mathematical land children could play words sentences modeled lisp design goals logo included accessible power informative error messages use virtual turtles allowed immediate visual feedback debugging graphic programming first working logo turtle robot created 1969 display turtle preceded physical floor turtle modern logo changed much basic concepts first turtle first turtle tethered floor roamer radio-controlled wireless bbn paul wexelblat developed turtle named irving touch sensors could move forwards backwards rotate ding bell earliest year-long school users logo 1968-69 muzzey jr high lexington virtual physical turtles first used fifth-graders bridge school lexington 1970-71 logo most-known feature turtle derived originally robot name on-screen cursor showed output commands movement small retractable pen together producing line graphics traditionally displayed either triangle turtle icon though represented icon turtle graphics added logo language seymour papert late 1960s support papert version turtle robot simple robot controlled user workstation designed carry drawing functions assigned using small retractable pen set attached robot body practical matter use turtle geometry instead traditional model mimics actual movement logic turtle robot turtle moves commands relative position left 90 means spin left 90 degrees logo implementations particularly allow use concurrency multiple turtles support collision detection allow user redefine appearance turtle cursor essentially allowing logo turtles function sprites multiple turtles supported mswlogo well 3d graphics input com ports lpt ports also allowed mswlogo windows gui interrupts triggered via keyboard mouse events simple gif animations may also produced mswlogo version 6.5 gifsave command turtle geometry also sometimes used environments logo alternative strictly coordinate-addressed graphics system instance idea turtle graphics also useful lindenmayer system generating fractals modern derivatives logo allow thousands independently moving turtles two popular implementations massachusetts institute technology starlogo northwestern university center connected learning ccl netlogo allow exploring emergent phenomena come many experiments social studies biology physics areas netlogo widely used agent-based simulation biological social sciences although one agreed-upon standard broad consensus core aspects language march 2009 197 implementations dialects logo strengths 197 longer wide use many still active development commercial logos still widely used schools include microworlds logo imagine logo logo primary influence smalltalk programming language also main influence etoys educational programming environment language essentially logo written squeak variant smalltalk logo influenced procedure/method model agentsheets agentcubes program agents similar notion turtle logo logo provided underlying language boxer boxer developed university california berkeley mit based literacy model making easier use nontechnical people kturtle variation logo implemented qt kde environment loosely based logo another result logo influence kojo variant scala scratch educational programming language runs squeak variant smalltalk inspired logo 2015 cubetto education robotics system children 3 years older developed crowd-source funding cubetto influenced logo montessori cubetto features small cubic turtle turns 90 degrees cubetto described update button-box mit logo system tortis | [
10752,
11269,
2056,
2572,
2062,
9231,
7184,
2577,
9749,
8728,
4633,
4122,
8226,
3119,
2105,
3132,
6717,
8258,
8771,
9795,
8262,
75,
4684,
1613,
9299,
10841,
3675,
7267,
2660,
8293,
2666,
5751,
7805,
9345,
2691,
1159,
9865,
6797,
9877,
580... | Validation |
6,595 | 7 | Digital_omnivore:digital omnivore digital omnivore descriptive term meant capture indiscriminate seamless modalities consumers use access world wide web cultural meme reflects popularization smartphones introduction tablets web-enabled devices allow consumers access media content several touch-points course daily digital lives mobile web users increasingly mobile devices cross-platform multimedia consumption continue re-shape digital landscape terms type media content consume consume according new 2011 survey comscore smartphones tablets driving nearly 7 digital traffic united states two-thirds growth attributed smartphones alone today half u.s. mobile population uses mobile media 19 past year 116 million people growth expected increase 36.1 americans age 13 smartphone digital omnivores global phenomenon driving 5 non-computer device internet traffic august 2011 singapore leads way 7.2 u.s united kingdom score 6.8 australia canada complete top five global markets 5.3 4.4 respectively looking deeper 6.8 non-pc web-browsing done u.s. find 64.4 comes mobile phones 28.1 tablets 7.5 devices game consoles e-readers means u.s. 4 overall web browsing comes smartphones 1.6 tablets small figures point way people beginning toggle devices across various day-parts analysis way consumers u.s. viewed news content different devices throughout day demonstrates influence devices way people consume content typical weekend morning digital omnivores access news using tablet favor computer working day return tablet use evening peaking hours 9pm midnight mobile phones used web-browsing throughout day users away personal computer increased wi-fi availability mobile broadband adoption changing way people going online today august 2011 third 37.2 u.s. digital traffic coming mobile phones occurred via wi-fi connection tablets traditionally required wi-fi connection access internet increasingly driving traffic using mobile broadband access tablets yet widely adopted already contribute nearly 2 web browsing traffic united states traffic driven almost exclusively ipad accounted 97 tablet traffic second half 2011 period ipads also began account higher share internet traffic iphones 46.8 vs. 42.6 ios device traffic u.s. tablet users largely display demographic characteristics early technology adopters younger males 49.5 age 34 average incomes 45.9 belong households earning 100,000 year point time half tablet users report used tablet least previous month activities social networking online shopping consuming news viewing videos entertainment current trend content providers optimizing sites tablets creating tablet-specific apps continues likely tablet owners interact devices even messaging set connected consumers move effortlessly online terrestrial lives may seem chaotic complex difficult navigate actually presenting opportunities never thought possible media execution buying quickly becoming new creativity levers marketers smartphone tablet connected device represents unique canvas media engagement brands strategically manage communication strategy across complementary messaging matrix best positioned create long term loyalty high engagement audiences consumers utilizing full-spectrum digital devices cultural communicators must understand patterns order develop incremental unduplicated reach across entire digital ecosystem | [
1602,
4194,
6539,
119,
1083
] | Validation |
6,596 | 3 | X86_assembly_language:x86 assembly language x86 assembly language family backward-compatible assembly languages provide level compatibility way back intel 8008 introduced april 1972. x86 assembly languages used produce object code x86 class processors like assembly languages uses short mnemonics represent fundamental instructions cpu computer understand follow compilers sometimes produce assembly code intermediate step translating high level program machine code regarded programming language assembly coding machine-specific low level assembly languages typically used detailed time critical applications small real-time embedded systems operating system kernels device drivers x86 assembly instruction represented mnemonic often combined one operands translates one bytes called opcode nop instruction translates 0x90 instance hlt instruction translates 0xf4 potential opcodes documented mnemonic different processors may interpret differently making program using behave inconsistently even generate exception processors opcodes often turn code writing competitions way make code smaller faster elegant show author prowess x86 assembly language two main syntax branches intel syntax originally used documentation x86 platform syntax intel syntax dominant ms-dos windows world syntax dominant unix world since unix created bell labs summary main differences intel syntax syntax many x86 assemblers use intel syntax including nasm fasm masm tasm yasm gas supported syntaxes since version 2.10 via .intel_syntax directive x86 processors collection registers available used stores binary data collectively data address registers called general registers register special purpose addition along general registers additionally ip register points memory offset next instruction code segment points first byte instruction ip register accessed programmer directly x86 registers used using mov instructions example intel syntax mov ax 1234h copies value 1234hex 4660d register ax mov bx ax copies value ax register bx register x86 architecture real virtual 8086 mode uses process known segmentation address memory flat memory model used many environments segmentation involves composing memory address two parts segment offset segment points beginning 64 kb group addresses offset determines far beginning address desired address segmented addressing two registers required complete memory address one hold segment hold offset order translate back flat address segment value shifted four bits left equivalent multiplication 2 16 added offset form full address allows breaking 64k barrier clever choice addresses though makes programming considerably complex real mode/protected example ds contains hexadecimal number 0xdead dx contains number 0xcafe would together point memory address 0xdead 0x10 0xcafe 0xeb5ce therefore cpu address 1,048,576 bytes 1 mb real mode combining segment offset values find 20-bit address original ibm pc restricted programs 640 kb expanded memory specification used implement bank switching scheme fell use later operating systems windows used larger address ranges newer processors implemented virtual memory schemes protected mode starting intel 80286 utilized os/2 several shortcomings inability access bios inability switch back real mode without resetting processor prevented widespread usage 80286 also still limited addressing memory 16-bit segments meaning 2 bytes 64 kilobytes could accessed time access extended functionality 80286 operating system would set processor protected mode enabling 24-bit addressing thus 2 bytes memory 16 megabytes protected mode segment selector broken three parts 13-bit index table indicator bit determines whether entry gdt ldt 2-bit requested privilege level see x86 memory segmentation referring address segment offset notation segment offset used example flat address 0xeb5ce written 0xdead:0xcafe segment offset register pair ds dx special combinations segment registers general registers point important addresses intel 80386 featured three operating modes real mode protected mode virtual mode protected mode debuted 80286 extended allow 80386 address 4 gb memory new virtual 8086 mode vm86 made possible run one real mode programs protected environment largely emulated real mode though programs compatible typically result memory addressing tricks using unspecified op-codes 32-bit flat memory model 80386 extended protected mode may important feature change x86 processor family amd released x86-64 2003 helped drive large scale adoption windows 3.1 relied protected mode since windows could run many applications including dos applications using virtual memory simple multitasking x86 processors support five modes operation x86 code real mode protected mode long mode virtual 86 mode system management mode instructions available others 16-bit subset instructions available 16-bit x86 processors 8086 8088 80186 80188 80286 instructions available real mode x86 processors 16-bit protected mode 80286 onwards additional instructions relating protected mode available 80386 later 32-bit instructions including later extensions also available modes including real mode cpus v86 mode 32-bit protected mode added additional instructions provided modes manage features smm special instructions available intel i386sl i486 later cpus finally long mode amd opteron onwards 64-bit instructions registers also available instruction set similar mode memory addressing word size vary requiring different programming strategies modes x86 code executed processor runs real mode immediately power operating system kernel program must explicitly switch another mode wishes run anything real mode switching modes accomplished modifying certain bits processor control registers preparation additional setup may required switch general features modern x86 instruction set x86 architecture hardware support execution stack mechanism instructions codice_8 codice_9 codice_10 codice_11 used properly set stack pass parameters allocate space local data save restore call-return points codice_11 size instruction useful implementing space efficient fast calling conventions callee responsible reclaiming stack space occupied parameters setting stack frame hold local data recursive procedure several choices high level codice_13 instruction introduced 80386 takes procedure-nesting-depth argument well local size argument may faster explicit manipulation registers codice_14 codice_15 codice_16 whether faster slower depends particular x86-processor implementation well calling convention used compiler programmer particular program code x86 code intended run x86-processors several manufacturers different technological generations processors implies highly varying microarchitectures microcode solutions well varying gate- transistor-level design choices full range addressing modes including immediate base+offset even instructions codice_8 codice_9 makes direct usage stack integer floating point address data simple well keeping abi specifications mechanisms relatively simple compared risc architectures require explicit call stack details x86 assembly standard mathematical operations codice_19 codice_20 codice_21 codice_22 logical operators codice_23 codice_24 codice_25 codice_26 bitshift arithmetic logical codice_27/codice_28 codice_29/codice_30 rotate without carry codice_31/codice_32 codice_33/codice_34 complement bcd arithmetic instructions codice_35 codice_36 codice_37 others x86 assembly language includes instructions stack-based floating-point unit fpu fpu optional separate coprocessor 8086 80386 on-chip option 80486 series standard feature every intel x86 cpu since 80486 starting pentium fpu instructions include addition subtraction negation multiplication division remainder square roots integer truncation fraction truncation scale power two operations also include conversion instructions load store value memory following formats binary-coded decimal 32-bit integer 64-bit integer 32-bit floating-point 64-bit floating-point 80-bit floating-point upon loading value converted currently used floating-point mode x86 also includes number transcendental functions including sine cosine tangent arctangent exponentiation base 2 logarithms bases 2 10 e stack register stack register format instructions usually codice_38 codice_39 codice_40 equivalent codice_41 codice_42 one 8 stack registers codice_41 codice_44 ... codice_45 like integers first operand first source operand destination operand codice_46 codice_47 singled first swapping source operands performing subtraction division addition subtraction multiplication division store comparison instructions include instruction modes pop top stack operation complete example codice_48 performs calculation codice_49 removes codice_41 top stack thus making result codice_44 top stack codice_41 modern x86 cpus contain simd instructions largely perform operation parallel many values encoded wide simd register various instruction technologies support different operations different register sets taken complete whole mmx sse4.2 include general computations integer floating point arithmetic addition subtraction multiplication shift minimization maximization comparison division square root example codice_53 performs 4 parallel 16-bit indicated codice_54 integer adds indicated codice_55 codice_56 values codice_57 stores result codice_56 streaming simd extensions sse also includes floating point mode first value registers actually modified expanded sse2 unusual instructions added including sum absolute differences used motion estimation video compression done mpeg 16-bit multiply accumulation instruction useful software-based alpha-blending digital filtering sse since sse3 3dnow extensions include addition subtraction instructions treating paired floating point values like complex numbers instruction sets also include numerous fixed sub-word instructions shuffling inserting extracting values around within registers addition instructions moving data integer registers xmm used sse /fpu used mmx registers x86 processor also includes complex addressing modes addressing memory immediate offset register register offset scaled register without offset register optional offset another scaled register example one encode codice_59 single instruction loads 32 bits data address computed codice_60 offset codice_61 selector stores codice_62 register general x86 processors load use memory matched size register operating simd instructions also include half-load instructions x86 instruction set includes string load store move scan compare instructions codice_63 codice_64 codice_65 codice_66 codice_67 perform operation specified size codice_68 8-bit byte codice_54 16-bit word codice_70 32-bit double word increments/decrements depending df direction flag implicit address register codice_71 codice_63 codice_73 codice_64 codice_66 codice_65 codice_67 load store scan operations implicit target/source/comparison register codice_78 codice_79 codice_62 register depending size implicit segment registers used codice_61 codice_71 codice_83 codice_73 codice_85 codice_86 register used decrementing counter operation stops counter reaches zero scans comparisons inequality detected stack implemented implicitly decrementing push incrementing pop stack pointer 16-bit mode implicit stack pointer addressed ss sp 32-bit mode ss esp 64-bit mode rsp stack pointer actually points last value stored assumption size match operating mode processor i.e. 16 32 64 bits match default width codice_8/codice_9/codice_10/codice_11 instructions also included instructions codice_13 codice_92 reserve remove data top stack setting stack frame pointer codice_93/codice_1/codice_2 however direct setting addition subtraction codice_96/codice_97/codice_98 register also supported codice_13/codice_92 instructions generally unnecessary code beginning function ... functionally equivalent instructions manipulating stack include codice_101/codice_102 storing retrieving e flags register codice_103/codice_104 instructions store retrieve entire integer register state stack values simd load store assumed packed adjacent positions simd register align sequential little-endian order sse load store instructions require 16-byte alignment function properly simd instruction sets also include prefetch instructions perform load target register used cache loading sse instruction sets also include non-temporal store instructions perform stores straight memory without performing cache allocate destination already cached otherwise behave like regular store generic integer floating point simd instructions use one parameter complex address second source parameter integer instructions also accept one memory parameter destination operand x86 assembly unconditional jump operation codice_105 take immediate address register indirect address parameter note risc processors support link register short immediate displacement jumping also supported several conditional jumps including codice_106 jump zero codice_107 jump non-zero codice_108 jump greater signed codice_109 jump less signed codice_110 jump above/greater unsigned codice_111 jump below/less unsigned conditional operations based state specific bits e flags register many arithmetic logic operations set clear complement flags depending result comparison codice_112 compare codice_113 instructions set flags performed subtraction bitwise operation respectively without altering values operands also instructions codice_114 clear carry flag codice_115 complement carry flag work flags directly floating point comparisons performed via codice_116 codice_117 instructions eventually converted integer flags jump operation three different forms depending size operand short jump uses 8-bit signed operand relative offset current instruction near jump similar short jump uses 16-bit signed operand real protected mode 32-bit signed operand 32-bit protected mode far jump one uses full segment base offset value absolute address also indirect indexed forms addition simple jump operations codice_10 call subroutine codice_11 return subroutine instructions transferring control subroutine codice_10 pushes segment offset address instruction following codice_10 onto stack codice_11 pops value stack jumps effectively returning flow control part program case codice_123 segment base pushed following offset codice_124 pops offset segment base return also two similar instructions codice_125 interrupt saves current e flags register value stack performs codice_123 except instead address uses interrupt vector index table interrupt handler addresses typically interrupt handler saves cpu registers uses unless used return result operation calling program software called interrupts matching return interrupt instruction codice_127 restores flags returning soft interrupts type described used operating systems system calls also used debugging hard interrupt handlers hard interrupts triggered external hardware events must preserve register values state currently executing program unknown protected mode interrupts may set os trigger task switch automatically save registers active task using interrupt 21h output – samples use libc printf print stdout flags heavily used comparisons x86 architecture comparison made two data cpu sets relevant flag flags following conditional jump instructions used check flags branch code run e.g flags also used x86 architecture turn certain features execution modes example disable maskable interrupts use instruction flags register also directly accessed low 8 bits flag register loaded codice_128 using codice_129 instruction entire flags register also moved stack using instructions codice_101 codice_102 codice_125 including codice_133 codice_127 instruction pointer called codice_135 16-bit mode codice_136 32-bit mode codice_137 64-bit mode instruction pointer register points memory address processor next attempt execute directly accessed 16-bit 32-bit mode sequence like following written put address codice_138 codice_62 sequence instructions generates position-independent code codice_10 takes instruction-pointer-relative immediate operand describing offset bytes target instruction next instruction case 0 writing instruction pointer simple — codice_105 instruction sets instruction pointer target address example sequence like following put contents codice_62 codice_136 64-bit mode instructions reference data relative instruction pointer less need copy value instruction pointer another register | [
132,
1029,
518,
7173,
6025,
9739,
9996,
1805,
398,
6797,
8590,
9871,
7316,
8853,
9366,
6296,
1952,
10786,
6821,
2088,
7983,
5040,
7601,
9911,
8125,
8126,
2623,
6335,
9921,
10689,
963,
9028,
9668,
8262,
585,
5065,
6730,
2380,
2637,
5326,
... | Test |
6,597 | 7 | XCAT:xcat xcat extreme cloud administration toolkit open-source distributed computing management software developed ibm used deployment administration linux aix based clusters xcat xcat specific features designed take advantage ibm hardware including xcat achieved recognition june 2008 used ibm roadrunner set computing speed record time xcat default systems management tool ibm intelligent cluster solution xcat used lenovo | [
6615,
8582,
8554,
1515,
5612,
6797,
10926,
7983,
10130,
3133,
4149,
823,
5273,
3323,
3677
] | Train |
6,598 | 9 | CyberQuery:cyberquery cyberquery software product cyberscience corporation inc originally developed data handling analysis data general aos aos/vs minicomputers available platforms cyberquery extended major unix platforms vax/vms digital equipment corporation personal computers microsoft windows invented 1980 cyberquery declarative 4gl fourth-generation programming language early design slightly influenced ramis data access analysis languages query language ge time sharing systems cyberquery automates process accessing files tables reading records rows basic operation allows user/developer concentrate details working data within record effect working almost entirely within implicit program loop runs record compared general-purpose programming languages automation allows user/developer ignore technical details data stored concentrate information contained data cyberquery data dictionary describe datasets users wish access removes physical details file structure program user/developer original target customers cyberquery personnel departments ease use non computer specialists early design goal architecture advantage cyberquery portable reports written one database run unmodified provided underlying data logically similar differences hidden data dictionary cyberquery widely deployed industries including manufacturing finance medical retail | [
4042
] | Test |
6,599 | 4 | Military_Cryptanalytics:military cryptanalytics military cryptanalytics milcryp sometimes known revision lambros d. callimahos series books written william f. friedman title military cryptanalysis may also contain contributions cryptanalysts training manual national security agency military cryptanalysts published government use 1957 1977 though parts ii written 1956 1959 introduction part volume callimahos text represents extensive expansion revision scope content earlier work entitled 'military cryptanalysis part william f. friedman expansion revision necessitated considerable advancement made art since publication previous text callimahos referred parts iii–vi end first volume ... part iii deal varieties aperiodic substitution systems elementary cipher devices cryptomechanisms embrace detailed treatment cryptomathematics diagnostic tests cryptanalysis part iv treat transposition fractioning systems combined substitution-transposition systems part v treat reconstruction codes solution enciphered code systems part vi treat solution representative machine cipher systems however parts iv–vi never completed military cryptanalytics military cryptanalysis subjects foia requests including one john gilmore 1992-1993 two charles varga 2004 2016 four parts military cryptanalysis first two parts military cryptanalytics series declassified third part military cryptanalytics far released severely redacted form n't considered worth reprinting released portions repeat material first two parts 1984 nsa released copies military cryptanalytics parts ii us national archives records administration record group 457 srh-273 srh-274 respectively srh stands special research history declassified books reprinted aegean park press part military cryptanalytics consists two volumes first volume contains tutorial text second volume contains appendices part includes material uniliteral multiliteral ciphers polyalphabetic ciphers part ii includes material repeating-key bipartite systems periodic ciphers part ii volume ii includes zendian problem practical exercise traffic analysis cryptanalysis aegean park press edition wayne g. barker added programs trs-80 | [
7652,
4007,
7119,
6928,
7887,
9615,
3731,
2580,
1941
] | Test |
6,600 | 7 | Social_cloud_computing:social cloud computing social cloud computing also peer-to-peer social cloud computing area computer science generalizes cloud computing include sharing bartering renting computing resources across peers whose owners operators verified social network reputation system expands cloud computing past confines formal commercial data centers operated cloud providers include anyone interested participating within cloud services sharing economy turn leads options greater economies scale bearing additional advantages hosting data computing services closer edge may needed peer-to-peer p2p computing networking enable decentralized cloud computing area research sometime social cloud computing intersects peer-to-peer cloud computing social computing verify peer peer owner reputation thus providing security quality service assurances users demand computing environments may constructed altered statically dynamically across peers internet based available resources verified reputation provide assurances social cloud computing highlighted potential benefit large-scale computing video gaming media streaming tenets social cloud computing famously employed berkeley open infrastructure network computing boinc making service largest computing grid world another service uses social cloud computing subutai social subutai allows peer-to-peer sharing hardware resources well files globally within small network many challenges arise moving traditional cloud infrastructure social cloud environment case traditional cloud computing availability demand essential many cloud customers social cloud computing n't provide availability guarantee p2p environment peers mobile devices may enter leave p2p network time pcs primary purpose override p2p computation time relatively successful use cases recent years require real time results computation power small subset module larger algorithm data set unlike large scale data centers company brand image people may less likely trust peers vs. large company like google amazon running sort computation sensitive information would need encrypted properly overhead encryption may reduce usefulness p2p offloading resources distributed small pieces many peers computations inherent trust must placed client regardless encryption may promised client similar availability reliability computations must consistent uniform computations offloaded client continuously interrupted mechanism detecting must place client may know computation tainted needs completely re-run p2p social computing reliable expected computation power difficult achieve speed client calculation may depend much client using end device ways overcoming may allow computations occur night specified times client resources use | [
8640,
4194
] | Train |
6,601 | 6 | Iostat:iostat iostat input/output statistics computer system monitor tool used collect show operating system storage input output statistics often used identify performance issues storage devices including local disks remote disks accessed network file systems nfs also used provide information terminal tty input output also includes basic cpu information codice_1 displays output line row gives numerical data one device first column lists device name subsequent columns show various statistics device columns include average service time svc_t includes time request service queue also seek time transfer time average busy percentage b essentially proportion time device use percentage time queue empty w means proportion time requests device yet fulfilled best run codice_2 specifying time interval seconds example codice_3 order see results time otherwise output reflect values entire timespan since system last rebooted codice_2 tool available unix unix-like operating systems freebsd macos com.apple.pkg.core package linux sysstat package solaris syntax output codice_2 often differs slightly sun microsystems stated high values wait svc_t fields suggest lack overall throughput system indicating system overloaded i/o operations consistently high values kr/s kw/s w b fields also indicate possible i/o bottleneck versions solaris solaris 7 iostat give misleading information wait field multiprocessor systems iostat misinterpret one processor state waiting i/o meaning processors system wait also advisable disregard high values svc_t field disks low rates activity less 5 fsflush process force average service time synchronising data disk memory iostat display information individual volumes disk volume manager used vxstat command used show information instead contrast using linux lvm volume manager iostat display volume information individually logical volume device mapper dm device | [
6369,
9665,
5000,
1801,
7983,
1776,
5492,
5397,
4438,
823,
7188,
9882
] | None |
6,602 | 6 | PGPDisk:pgpdisk pgp virtual disk disk encryption system allows one create virtual encrypted disk within file older versions windows nt freeware example bundled pgp v6.0.2i ckt builds pgp still available download longer maintained today pgp virtual disk available part pgp desktop product family running windows 2000/xp/vista mac os x | [
7040,
8640,
2050,
7139,
9281,
10631,
4746,
8331,
7794,
3572,
5749,
3382,
823,
6644,
8283
] | Test |
6,603 | 9 | Alice_K._Hartley:alice k. hartley alice hartley 1937-2017 american computer scientist business woman hartley worked several dialects lisp implementing multiple parts interlisp maintaining macintosh common lisp developing concepts computer science programming language design still use today hartley hobby gamer playing advising early computer games 1970s 90s hartley also antiques collector importer dealer proprietor elephant castle antiques store boston hartley spent career researcher litton industries mit bbn early employee vice president technology paladian systems engineer apple computer retiring boston massachusetts alice hartley born bridgeport connecticut december 13 1937 lowell james hartley minneapolis minnesota rachel matilda virta aura finland hartley graduated whittier junior high school bridgeport connecticut highschool valedictorian class 1955 member newtonians science club cheerleader finalist fourteenth annual westinghouse science talent search hartley accepted mit 1955 general motors scholarship graduated msc physics june 12 1959 1961 alice hartley co-wrote “ study program pattern recognition research ” george sebestyen litton systems inc earliest record research-related employment outside mit following litton industries alice hartley worked senior scientist bbn technologies bolt beranek newman inc. early 1969 “ took dan murphy ’ role bbn lisp ” added number new data types system including “ arrays strings large numbers floating point numbers ” time bbn hartley co-developed concept spaghetti stack daniel g. bobrow form stack tracing functionality interlisp brought early debugging tools programming community hartley also worked douglas w. clark implementation list-linearizing garbage collector hartley listed maintainer interlisps basic system 1974 “ interlisp reference manual ” along side warren teitelman user facilities jw goodman special arithmetic functions reads a. k. hartley basic system i.e. interpreter input/output garbage collector plus subrs i.e hand-coded machine language functions print cons prog go etc plus compiler.hartley thanked paul graham introduction ansi common lisp mentioned collaborator guy steele evolution lisp hartley resigned bbn november 7th 1984 join new ai engineering firm palladian software inc vice president technology worked 1987 palladain hartley lead development various “ artificial inteligence ” systems financial modeling trading financial markets palladian software inc hartley worked apple computers allegro common lisp tools using lisp macintosh hartley single handedly maintained macintosh common lisp 2007 open-sourced source code llgpl | [
10981,
6502,
3336,
2062,
9969,
4122
] | None |
6,604 | 4 | Security_Target:security target common criteria information technology security evaluation version 3.1 part 1 called cc 3.1 cc defines security target st implementation-dependent statement security needs specific identified target evaluation toe words st defines boundary specifies details toe product evaluation process according cc st document provided vendor product st defines information assurance security functional requirements given information system product called target evaluation toe st complete rigorous description security problem terms toe description threats assumptions security objectives security functional requirements sfrs security assurance requirements sars rationales sars typically given number 1 7 called evaluation assurance level eal indicating depth rigor security evaluation usually form supporting documentation testing product meets sfrs st contains detailed implementation-specific information demonstrates product addresses security requirements may refer one protection profiles pps case st must fulfill generic security requirements given pps may define requirements 1 introduction – overview toe including key features purpose 2 conformance claims – identifies conformance claims toe evaluation 3 security problem definition describes threats assumptions operational environment objective demonstrate security problem intended addressed toe operational environment 4 security objectives – concise abstract statement intended solution problem specified security problem definition security objective must trace back least one threat osp 1 aspect security achieve purpose objective using certain mitigation measures confidentiality integrity availability user authenticity access authorisation accountability 2 confidentiality integrity availability required support applicable foundational requirements.- 5 extended components definition – extended components must consist measurable objective elements conformance demonstrated 6 security requirements defines describes sfrs cc part 2 sars cc part 3 7.toe summary specifications enables evaluators potential consumers gain general understanding toe implemented | [
6593,
8904,
7979,
1905,
10962
] | Test |
6,605 | 1 | Norwegian_Ship_Registers:norwegian ship registers norwegian ship registers sometimes called nis-nor norwegian government agency responsible operating norwegian international ship register norwegian ship register norwegian shipbuilding register register subordinate norwegian ministry trade industry ministry transport based bergen | [
5147,
6726
] | None |
6,606 | 4 | Rkhunter:rkhunter rkhunter rootkit hunter unix-based tool scans rootkits backdoors possible local exploits comparing sha-1 hashes important files known good ones online databases searching default directories rootkits wrong permissions hidden files suspicious strings kernel modules special tests linux freebsd rkhunter notable due inclusion popular operating systems fedora debian etc tool written bourne shell allow portability run almost unix-derived systems 2003 developer michael boelen released version rootkit hunter several years development early 2006 agreed hand development development team since time eight people working set project properly work towards much-needed maintenance release project since moved sourceforge | [
3395,
2213,
8582,
107,
6092,
7983,
3473,
5492,
5397,
11188,
823,
7192,
186,
9791
] | Test |
6,607 | 3 | M32R:m32r m32r 32-bit risc instruction set architecture isa developed mitsubishi electric embedded microprocessors microcontrollers isa owned renesas electronics corporation company designs fabricates m32r implementations m32r processors used embedded systems engine control units digital cameras pdas isa supported linux gnu compiler collection dropped linux kernel version 4.16 | [
7170,
8450,
11395,
1798,
3467,
6925,
10767,
1170,
1298,
7445,
9371,
8861,
3493,
4773,
6311,
9638,
682,
4269,
11054,
9391,
2224,
4144,
11314,
1462,
823,
9911,
11447,
10945,
7234,
7235,
6084,
3014,
3142,
3911,
9928,
9163,
9932,
2517,
9685,
... | None |
6,608 | 3 | Apple_A4:apple a4 apple a4 32-bit package package pop system-on-a-chip soc designed apple inc. manufactured samsung combines arm cortex-a8 cpu powervr gpu emphasizes power efficiency chip commercially debuted release apple ipad tablet followed shortly iphone 4 smartphone ipod touch 4th generation apple tv 2nd generation superseded apple a5 processor used ipad 2 released following year subsequently replaced apple a5x processor ipad 3rd generation software updates devices using chip ceased 2014 release ios 8 apple a4 based arm processor architecture first version released runs 1 ghz ipad contains arm cortex-a8 cpu core paired powervr sgx 535 graphics processor gpu built samsung 45 nm silicon chip fabrication process clock speed units used iphone 4 ipod touch 4th generation 800 mhz clock speed unit used apple tv released cortex-a8 core used a4 thought use performance enhancements developed chip designer intrinsity subsequently acquired apple collaboration samsung resulting core dubbed hummingbird able run far higher clock rates implementations remaining fully compatible cortex-a8 design provided arm performance improvements include additional l2 cache cortex-a8 cpu core used a4 also used samsung s5pc110a01 soc a4 processor package contain ram supports pop installation top package a4 used ipad ipod touch 4th gen apple tv 2nd gen contains two low-power 128 mb ddr sdram chips total 256 mb ram iphone 4 two chips 256 mb total 512 mb ram connected processor using arm 64-bit-wide amba 3 axi bus twice width memory buses socs used contemporary apple iphone ipod touch supporting greater need graphics bandwidth ipad apple a4 chip along original ipad announced january 27 2010 apple latest creation event june 7 2010 steve jobs publicly confirmed iphone 4 would contain a4 processor although yet known time would frequency bus width caches a4 found earlier produced ipad september 1 2010 ipod touch 4th generation apple tv 2nd generation updated include a4 processor later october 4 2011 apple refreshed ipod touch 4th generation add white model along existing black model models still contain a4 processor september 10 2013 apple a4 chip discontinued | [
9732,
1549,
7697,
4114,
9235,
11282,
6165,
11289,
7706,
1563,
8222,
1057,
2551,
38,
6183,
1576,
4139,
6700,
7211,
8237,
9774,
2097,
9784,
8250,
8253,
576,
7745,
1090,
7747,
2635,
8783,
4180,
10838,
10840,
9312,
9826,
99,
8806,
3691,
8812,... | None |
6,609 | 1 | Cifas:cifas cifas fraud prevention service united kingdom not-for-profit membership association representing organisations across public private voluntary sectors 2016 cifas 360 member organisations cifas states mission ‘ detect deter prevent fraud society harnessing technology working partnership ’ cifas operates two core fraud prevention databases largest uk national fraud database internal fraud database systems also used banks building societies access home office immigration data specialist portal data cifas members revealed instances identity fraud uk reached record levels 2016 particularly among people aged 30 trend continued 2017 cifas reporting 89,000 cases identity fraud first six months year cifas data 2016 2017 also highlighted growing issue money mules – people allow bank accounts used launder money cifas reported number young people 18-24-year-olds allowing accounts used transfer proceeds crime risen unprecedented 75 per cent last year cifas established 1988 consumer credit trade association ccta acronym cifas credit industry fraud avoidance system although company longer operates acronym remit broadened developed association office fair trading well information commissioner office continue day take active interest development cifas cifas today run board directors includes independent directors chief executive deputy chief executive 1988 2016 majority directors elected participating organisations participate governance organisation advisory board cifas national fraud database allows participating organisations exchange confirmed details applications products services considered fraudulent exchange confirmed information accounts services fraudulently misused confirmed information insurance claims considered fraudulent organisations also exchange information innocent victims fraud protect fraud internal fraud database allows participating organisations exchange details confirmed cases applicant member staff acted fraudulently data protection act individual right make subject access request cifas accordance act disclose data held individual statutory fee cifas credit reference agency 2014 immigration act became law cifas named sole provider home office immigration data launched cifas immigration portal cip december 2014 current account-providing banks building societies uk required use cip access home office data disqualified persons victims identity fraud people risk identity fraud apply cifas protective registration fee protective registration acts warning organisation carry additional checks verify identity applicant customer cifas also operates protecting vulnerable scheme helps local authorities protect individuals subject mental capacity act 2005 care cifas works fraud prevention financial public sector academic charitable organisations law enforcement raise awareness fraud promote best practice fraud prevention collaborative partners include city london police cipfa home office age uk financial fraud action uk cifas member joint fraud taskforce set former home secretary theresa may 2015 | [
5133
] | Test |
6,610 | 8 | Plasmapper:plasmapper plasmapper plasmid mapper freely available web server automatically generates annotates high-quality circular plasmid maps particularly useful online service molecular biologists wishing generate plasmid maps without purchase maintain expensive commercial software plasmapper accepts plasmid/vector dna sequence input fasta format uses sequence pattern matching blast sequence alignment automatically identify label common promoters terminators cloning sites restriction sites reporter genes affinity tags selectable marker genes origins replication open reading frames plasmapper reformats presents identified features simple textual form high-resolution multicolored image appearance content output customized numerous ways using variety online options plasmapper images rendered rasterized portable network graphics png jpg scalable vector graphics svg formats accommodate variety user needs preferences images textual output sufficient quality may used directly publications presentations | [] | None |
6,611 | 1 | Placenames_Database_of_Ireland:placenames database ireland placenames database ireland also known logainm.ie database archive place names ireland created fiontar dublin city university collaboration placenames branch department culture heritage gaeltacht website public resource primarily aimed journalists translators students teachers historians researchers genealogy placenames commission established department finance 1946 advise ordnance survey ireland government irish name places placenames commission ceased 11 october 2012 placenames committee took place 19 september 2013 placenames branch branch department culture heritage gaeltacht established official languages act 2003 supports placenames commission/committee investigating historical irish-language names places although 1922 constitution irish free state current constitution adopted 1937 make irish national language law regard placenames carried 19th-century uk statutes established ordnance survey griffith valuation english-language name official status irish-language names adopted place english-language names 1920 e.g king county became laois kells county meath became ceannanus mór department posts telegraphs adopted irish names ad-hoc sometimes inconsistent disputed locals irish-language scholars 1973 oireachtas passed act codify official assignment irish names alongside rather instead english names 1975 first statutory instrument made 1973 gave official irish names post towns names chosen advice placenames branch differed adopted previous decades cases causing controversy 1973 act replaced 2003 act terms placenames committee continues advise minister prior issuing statutory instruments database website www.logainm.ie european language label 2010 category winner 2011 2016 irish egovernment awards | [
2901
] | Test |
6,612 | 0 | Semantometrics:semantometrics semantometrics tool evaluating research functionally extension tools bibliometrics webometrics altmetrics instead evaluating citations – entails relying outside evidence – uses semantic evaluation full text research paper evaluated | [
1890
] | Validation |
6,613 | 5 | IGMP_snooping:igmp snooping igmp snooping process listening internet group management protocol igmp network traffic control delivery ip multicasts network switches igmp snooping listen igmp conversation hosts routers maintain map links need ip multicast transmission multicasts may filtered links need conserving bandwidth links switch default flood multicast traffic ports broadcast domain vlan equivalent multicast cause unnecessary load host devices requiring process packets solicited purposefully exploited form basis denial-of-service attack igmp snooping designed prevent hosts local network receiving traffic multicast group explicitly joined provides switches mechanism prune multicast traffic links contain multicast listener igmp client essentially igmp snooping layer 2 optimization layer 3 igmp igmp snooping takes place internally switches protocol feature igmp snooping allows switch forward multicast traffic links solicited snooping therefore especially useful bandwidth-intensive ip multicast applications iptv igmp snooping although important technique overlaps two standards organizations namely ieee standardizes ethernet switches ietf standardizes ip multicast means clear standards body responsible technique igmp snooping carries informational status despite actually referred standards work normative order igmp thus igmp snooping function multicast router must exist network generate igmp queries without querier igmp membership reporting may incomplete tables associating member ports multicast groups potentially incomplete snooping work reliably igmp snooping implementations include full querier capability igmpv2 igmpv3 contain provision selecting querier multiple available querier lowest ip address given role igmp general queries querier must unconditionally forwarded switches involved igmp snooping igmp snooping proxy reporting report suppression actively filters igmp packets order reduce load multicast router joins leaves heading upstream router filtered minimal quantity information sent switch trying ensure router single report group regardless many active listeners two active listeners group first one leaves switch determines router need information since affect status group router point view next time routine query router switch forward reply remaining host presence proxy reporting router generally know recently joined member group | [
10461,
2409,
1411,
2509
] | Train |
6,614 | 4 | Attack_Surface_Analyzer:attack surface analyzer attack surface analyzer tool created analysis changes made attack surface operating systems since windows vista beyond tool recommended microsoft sdl guidelines verification stage development according microsoft sdl team one tool checking changes made attack surface windows operating system attack surface analyzer developed problem check verify effects various software installations system way back since windows server 2003 developed back use multiple tools every type change made attack surface painful process check everything using multiple tools problem made microsoft create application developers could analyze changes made windows attack surface first used developers microsoft later january 18 2011 beta version version 5.1.3.0 tool named attack surface analyzer released public testers administrators attack surface analyzer compare two scan data system called baseline scan product scan 32-bit 64-bit versions software available windows vista windows 7 respective server editions news windows xp version released attack surface analyzer one tool analysis changes made various parts attack surface windows 6 series operating system includes windows vista windows 7 using one tool analyze changes made registry file permissions windows iis server gac assemblies lot done according microsoft tool use engineers security team microsoft analyze effects software installation windows operating system would possible one tool would use different software different parts windows combine effects logically tool enlists various elements enumerates running system scan elements list comprehensive set elements possible well important elements changed new software installed system software might change elements list change different elements system attack surface analyzer combines easier analyze parts attack surface analyzer tell changes sure cases also able tell particular change configuration causing threat tool enlist threats categories parts operating system scans noticeable issues services configurations file system acls issues related processes running system getting list threats system great thing software released microsoft one knows windows better microsoft improved concerns security shown microsoft important severity threat also known team enterprise attack surface analyzer also shows severity threats finds however seems report severity every threat instead shows severity threat category example severity threat caused “ executables weak acls ” threat severity level 1 less caused “ processes impersonation tokens ” threat severity level 2 surely desirable feature enlist level severity caused threat rather category belongs however news might available every organization experts various domains security may case network security expert organization aware details terminology domain say windows services however two issues may connected possible case important experts two security expert teams know everything terms use might required cases brief description along link technet library describing term detail threats changes attack surface enlisted report generated attack surface analyzer brief description usually enough experts might needed cases microsoft made easy find right resource term rather relying upon web search engines attack surface windows operating system concerns various parts operating system would difficult anyone understand report changes listed serial order attack surface analyzer makes easy user browse report listing threats categories providing table contents html page attack surface analyzer compare two scan data generated two different scans generate report viewed html format also possible run scans one system generate another system using tool good windows vista clients possible generate report using current version attack surface analyzer windows vista case attack surface analyzer used run scans windows vista client transfer scan result files computer running windows 7 generate browse report windows 7 based computer attack surface analyzer works windows 6.x series operating systems report generation done 6.1 version operating systems following system requirements attack surface analyzer official download page installable windows vista windows 7 windows server 2008 windows server 2008 r2 collection attack surface data windows vista windows 7 windows server 2008 windows server 2008 r2 analysis attack surface data report generation windows 7 windows server 2008 r2 microsoft .net 3.5 sp1 microsoft enlisted hardware requirements separately tool able perform job machine meeting hardware requirements installed operating system note however running time generation scan data report depends hardware capabilities better hardware would get work done faster attack surface analyzer list two types scans namely baseline scan product scan strict technical terms scans difference logical technical scan run user run generate data initial system data compared product scan running baseline scan product whose effect attack surface operating system checked installed installation changes system configuration possibly installing services changing firewall rules installing new .net assemblies baseline scan logical scan run user using attack surface analyzer generates file containing configuration system software installed product scan signifies state system ‘ product ’ installed context product software whose effects system upon installation checked generate report two scans required minimum product scan would capture changes made system installation software product testing scan data generated scan compared baseline scan data find changes made system configurations different points worth note one system state captured using attack surface analyzer combination used report generation however ‘ baseline scan ’ one taken automatically called product scan | [
9441,
8386,
4423,
4074,
6797,
2383,
7983,
3573,
4439,
8094
] | Validation |
6,615 | 7 | Warewulf:warewulf warewulf computer cluster implementation toolkit facilitates process installing cluster long term administration changing administration paradigm make slave node file systems manageable one point automate distribution node file system node boot allows central administration model slave nodes includes tools needed build configuration files monitor control nodes totally customizable adapted type cluster software administration perspective make much difference running 2 nodes 500 nodes procedure still warewulf scalable admins perspective also uses standard chroot'able file system every node extremely configurable lends custom environments easily warewulf designed hpc system hpc system warewulf along lines distributed linux distribution specifically system replicating managing small lightweight linux systems one master using warewulf hpc packages lam/mpi/mpich sun grid engine pvm etc easily deployed throughout cluster warewulf solves problem slave node management rather strict hpc specific system even though designed hpc mind flexible home grown cluster administratively scales well result flexibility ease customization warewulf used production hpc implementations also development systems like kasy0 first system break one hundred dollar per gflops barrier non hpc systems web server cluster farms intrusion detection clusters high-availability clusters | [
225,
9762,
6597,
823,
4149,
2710,
3927,
4309
] | Test |
6,616 | 2 | Proportional_set_size:proportional set size computing proportional set size pss portion main memory ram occupied process composed private memory process plus proportion shared memory one processes unshared memory including proportion shared memory reported pss example since pss defined sum unshared memory process proportion memory shared processes pss two processes follows concept mostly related unique linux operating system proposed matt mackall complications arose trying count real memory used process concepts resident set size virtual memory size vmsize n't helping developers tried know much memory programs using | [
6543,
1025,
2383,
823
] | Test |
6,617 | 4 | Crypt_(Unix):crypt unix unix computing crypt utility program used encryption due ease breaking considered obsolete cryptographer robert morris wrote crypt first appeared version 3 unix encourage codebreaking experiments morris managed break crypt hand dennis ritchie automated decryption method james reeds improved version appeared version 7 reeds peter j. weinberger also broke also unix password hash function name crypt though used encrypting data sense otherwise essentially unrelated distinguish two writers often refer utility program crypt 1 documented section 1 unix manual pages refer password hash function crypt 3 documentation section 3 manual crypt 1 simple command encrypt decrypt data usually used filter traditionally implemented using algorithm based enigma machine considered cryptographically far weak provide security brute-force attacks modern commodity personal computers versions unix shipped even weaker version crypt 1 command order comply contemporaneous laws regulations limited exportation cryptographic software simply implementations caesar cipher effectively secure rot13 implemented caesar cipher well-known key linux distributions generally include unix compatible version crypt command largely due combination three major factors source code several old versions crypt command available unix heritage society unix archive recent crypt source code available opensolaris project enhanced symmetric encryption utilities available linux also portable unix-like system including mcrypt ccrypt provide support much sophisticated modern algorithms used encrypt decrypt files compatible traditional crypt 1 command providing correct command line options programs breaking crypt 1 encryption widely available bob baldwin crypt breaker workbench written 1984-1985 interactive tool provides successive plaintext guesses must corrected user peter selinger unixcrypt-breaker uses simple statistical model guess plausible plaintexts require user interaction | [
3488,
3937,
2050,
6369,
7556,
8867,
9444,
10881,
11363,
4140,
5357,
7983,
9298,
5492,
5397,
310,
9306,
733
] | Test |
6,618 | 7 | Plug_computer:plug computer plug computer external device often configured use home office compact computer consists high-performance low-power system-on-a-chip processor several i/o ports usb ports ... typically runs number linux distributions versions provisions connecting display best suited running media server back-up services file sharing remote access functions thus acting bridge in-home protocols digital living network alliance dlna server message block smb cloud based services however plug computer offerings analog vga monitor and/or hdmi connectors along multiple usb ports permit use display keyboard mouse thus making full-fledged low-power alternatives desktop notebook computers name plug computer derived small configuration devices plug computers often enclosed ac power plug ac adapter plug computers typically consume little power inexpensive one manufacturer claims 119 plug computer draws 1.2 watts cost 2 year run number devices type began appear 2009 consumer electronics show chippc another one | [
1537,
3585,
2308,
7300,
4236,
10893,
911,
1935,
4623,
1682,
8592,
10768,
405,
2965,
2328,
4377,
8986,
5019,
10265,
6178,
291,
6307,
3238,
5159,
9766,
6444,
10109,
558,
8495,
3121,
5681,
9266,
823,
7352,
1849,
1083,
1728,
1089,
2496,
4289,... | Test |
6,619 | 7 | UKCloud:ukcloud ukcloud previously named skyscape cloud services british public cloud company headquartered farnborough united kingdom one largest uk cloud providers company founded 2011 rebranding ukcloud august 2016 ukcloud cloud provider several customers including genomics england ministry justice cabinet office amongst others company established 2011 co-founders jeff thomas jeremy sanders phil dawson simon hansford skyscape cloud services changed name ukcloud ltd five years later following legal wrangle sky ukcloud services provided partnership qinetiq vmware cisco dell emc ark data centres ukcloud focuses changing uk government purchases uses services detailed march 2011 uk government ict strategy company since sold government g-cloud frameworks digital marketplace since first iteration framework 2012 offer multi-cloud platform consisting vmware oracle openstack microsoft azure ukcloud subject regular audits assessments inspections certification bodies regulators accreditors firm recently achieved iso27017 iso27018 also certified iso9001 iso20000 iso27001 ukcloud carbon neutral company offers customers carbon neutral hosting achieved independent assessment co2 emissions produced direct indirect sources required deliver followed offset-inclusive emissions reduction programme ukcloud also completely sovereign cloud provider meaning applications data hosted uk datacentres company incorporated british company uk legal jurisdiction 2016 ukcloud communications deloitte technology fast 500 emea award also cloudex 20:20 award uk industry award 2013. winners sunday times hiscox tech track 100 2016 ukcloud winners tech track 100 ranking number 1 league table 2016 2017 ukcloud announced recipients prestigious queen ’ awards enterprise innovation 2018 ukcloud award g-cloud public sector provider year second year consecutively company also featured one future fifty ’ fastest growing technology companies addition founding alliance partners ukcloud since announced cloud native cloud platform based upon redhat openstack oracle cloud platform | [
6153
] | Test |
6,620 | 4 | Xymon:xymon xymon network monitoring application using free software operates gnu general public license central server runs unix linux hosts application inspired open-source version big brother network monitoring application maintains backward compatibility 2002 2004 henrik storner wrote open-source software add-on called bbgen toolkit march 2005 stand-alone version released called hobbit versions released 2005 2008 since prior user trademark hobbit existed tool finally renamed xymon january 2012 quest software discontinued development big brother xymon offers graphical monitoring showing status various network services device well range application operating system metrics listing number mail messages queued defined level downtime web-based graphical display uses red/yellow/green condition icon host/test top colored background indicating current worst status across hosts tests user click colored icon view specific details available relevant graphs metric statistics built-in reporting tools include sla-type reports availability historical state services snapshots xymon supports generation alarms sent email also use external tools send messages via means eg sms networked hosts devices monitored xymon server using network probes supporting large extensible range protocols including smtp http/s dns hosts use supported operating system also run xymon client also free software additionally collect operating system application monitoring metrics report xymon server clients available unix linux formats including source tarball rpm debian package xymon download site sourceforge windows hosts use big brother client windows bbwin client winpsclient written windows powershell scripting language plugins extend monitoring new types applications services many extension scripts big brother run unchanged xymon | [
5096,
7983,
5492,
5397,
823,
1211,
1501
] | None |
6,621 | 4 | Bicycle_attack:bicycle attack tls bicycle attack refers method discovering password length encrypted packets transmitted via ssl https term first coined december 30 2015 guido vranken wrote premise bicycle attack makes brute-forcing passwords much easier length passwords known moreover refutes idea ssl-encrypted http packets obscure length | [
7556,
2558
] | Validation |
6,622 | 2 | Open_Source_Business_Alliance:open source business alliance open source business alliance e.v german non-profit operates europe biggest network companies organizations developing building using open source software alliance founded july 2011 stuttgart two founding associations linux solutions group e.v lisog live linux-verband e.v. officially merged groups annual general meetings 20th 21 july 2011 merger aimed create unified lobby group german open-source movement 2014 attempted consolidation failed osb alliance open source business foundation osbf first announced intention merge two associations form single large advocacy group 18 november 2013 almost year negotiations achieved agreement merger collapsed 15 october 2014 alliance main aims central objectives alliance current board open source business alliance e.v consists 11 members honorary chairman osb alliance supports working groups cover wide range issues january 2015 following working groups operation | [
3969,
546,
4194,
10851,
10971,
5800,
9320,
1101,
4429,
8909,
2864,
9455,
467,
8147,
823,
3323,
6780,
10747
] | None |
6,623 | 4 | ZeroFOX:zerofox zerofox cyber security company based baltimore maryland provides cloud-based software service saas organizations detect risks found social media digital channels phishing malware scams impersonator accounts piracy counterfeit zerofox created 2013 name riskive changed current name months later company began startup 8,000 sq ft. space inside betamore startup incubator baltimore federal hill neighborhood 2015 zerofox raised 27 million series b funding 2016 company outgrown space moved 18,000 sq ft. space inside former pabst brewing facility south baltimore 2017 zerofox raised 40 million funding led redline capital management european venture firm silver lake waterman fund focuses pre-ipo companies prior investors new enterprise associates highland capital partners core capital also contributed investment helped bring zerofox ’ total funding 88 million | [
7515,
467
] | Validation |
6,624 | 2 | DNIX:dnix dnix original spelling d-nix unix-like real-time operating system swedish company dataindustrier ab diab version called abcenix also developed abc1600 computer luxor daisy systems also something called daisy dnix cad workstations unrelated diab product dataindustrier ab literal translation computer industries shareholding company started 1970 lars karlsson single-board computer manufacture sundsvall sweden producing zilog z80-based computer called data board 4680 1978 diab started work swedish television company luxor ab produce home office computer series abc 80 abc 800 1983 diab independently developed first unix-compatible machine diab ds90 based motorola 68000 cpu d-nix made appearance based unix system v license diab however industrial automation company needed real-time operating system company replaced t-supplied unix kernel in-house developed yet compatible real-time variant kernel originally z80 kernel called os8 time company also replaced several unix standard userspace tools implementations point code derived unix machines could deployed independently unix license two years later cooperation luxor computer called abc 1200 developed office market parallel diab continue produce enhanced versions ds90 computer using newer versions motorola cpus motorola 68010 68020 68030 eventually 68040 1990 diab acquired groupe bull continued produce support ds machines brand name diab names diab 2320 diab 2340 etc. still running diabs version dnix isc systems corporation isc purchased right use dnix late 1980s use line motorola 68k-based banking computers isc later bought olivetti turn resold wang bought getronics corporate entity often referred 'isc answered bewildering array names years code branch svr2 compatible version received extensive modification development hands notable features operating system support demand paging diskless workstations multiprocessing asynchronous i/o ability mount processes handlers directories file system message passing real-time support consisted largely internal event-driven queues rather list search mechanisms 'thundering herd static process priorities two classes run completion timesliced support contiguous files avoid fragmentation critical resources memory locking quality orthogonal asynchronous event implementation yet equalled current commercial operating systems though approach concept yet adopted synchronous marshalling point asynchronous activity could asynchronous ad infinitum dnix handled aplomb asynchronous i/o facility obviated need berkeley sockets select svr4 streams poll mechanism though socket emulation library preserved socket semantics backward compatibility another feature dnix none standard utilities ps frequent offender rummaged around kernel memory job system calls used instead meant kernel internal architecture free change required handler concept allowed network protocol stacks outside kernel greatly eased development improved overall reliability though performance cost also allowed foreign file systems user-level processes improved reliability main file system though could external process pulled kernel performance reasons dnix could well considered microkernel though formally developed handlers could appear type 'native unix file directory structure device file i/o requests handler could process could passed handlers including underlying one upon handler mounted handler connections could also exist passed around independent filesystem much like pipe one effect tty-like 'devices could emulated without requiring kernel-based pseudo terminal facility example handler saved day isc diskless workstation support bug implementation meant using named pipes workstation could induce undesirable resource locking fileserver handler created workstation field accesses afflicted named pipes appropriate kernel fixes could developed handler required approximately 5 kilobytes code implement indication non-trivial handler need large isc also received right manufacture diab ds90-10 ds90-20 machines file servers multiprocessor ds90-20 however expensive target market isc designed servers ported dnix isc designed gui-based diskless workstations use file servers ported dnix though isc used daisy workstations running daisy dnix design machines would run diab dnix negligible confusion internally drafting layout staff rarely talked software staff moreover hardware design staff n't use either system running joke went something like isc build computers n't use asynchronous i/o support dnix allowed easy event-driven programming workstations performed well even though relatively limited resources gui diskless workstation 7 mhz 68010 processor usable 512k memory kernel consumed approximately half workstations 1 mb memory though later 2 mb 4 mb versions along 10 mhz processors full-blown installation could consist one server 16 mhz 68020 8 mb ram 200 mb hard disk 64 workstations though slow boot array would perform acceptably bank teller application besides innate efficiency dnix associated diab c compiler key high performance generated particularly good code 68010 especially isc got done isc also retargeted texas instruments tms34010 graphics coprocessor used last workstation diab c compiler course used build dnix one factors contributing efficiency still available form wind river systems systems still use writing 2006 former seattle-first national bank branches branded bank america may probably isc customers still using dnix capacity isc considerable dnix presence central south america dnix native system call dnix 2 library function analogous standard unix unix 2 syscall 2 function took multiple arguments first function code semantically single call provided appropriate unix functionality though syntactically different unix course numerous dnix-only extensions dnix function codes organized two classes type 1 type 2 type 1 commands associated i/o activity anything could potentially cause issuing process block major examples f_open f_close f_read f_write f_iocr f_iocw f_wait f_nap type 2 remainder f_getpid f_gettime etc could satisfied kernel immediately invoke asynchronicity special file descriptor called trap queue created via type 2 opcode f_otq type 1 call would f_nowait bit or-ed function value one additional parameters dnix 2 trap queue file descriptor return value asynchronous call normal value kernel-assigned identifier time asynchronous request completed read 2 f_read trap queue file descriptor would return small kernel-defined structure containing identifier result status f_cancel operation available cancel asynchronous operation n't yet completed one arguments kernel-assigned identifier process could cancel requests currently owned exact semantics cancellation request handler fundamentally meant waiting terminated partially completed operation could returned addition kernel-assigned identifier one arguments given asynchronous operation 32-bit user-assigned identifier often referenced function pointer appropriate subroutine would handle i/o completion method merely convention entity read trap queue elements responsible interpreting value note asynchronous events gathered via normal file descriptor read operations reading capable made asynchronous implications semi-autonomous asynchronous event handling packages could exist within single process dnix 5.2 lightweight processes threads also note potentially blocking operation capable issued asynchronously dnix well equipped handle many clients single server process process restricted one trap queue i/o requests could grossly prioritized way addition native dnix 2 call complete set 'standard libc interface calls available open 2 close 2 read 2 write 2 etc besides useful backwards compatibility implemented binary-compatible manner ncr tower computer binaries compiled would run unchanged dnix dnix kernel two trap dispatchers internally one dnix method one unix method choice dispatcher programmer using interchangeably acceptable semantically identical wherever functionality overlapped machines 68000 trap 0 instruction used unix 2 calls trap 4 instruction dnix 2 two trap handlers really quite similar though usually hidden unix 2 call held function code processor d0 register whereas dnix 2 held stack rest parameters dnix 5.2 networking protocol stacks internally except thin x.25-based ethernet protocol stack added isc use diskless workstation support package networking conducted reading writing handlers thus socket mechanism libsocket 3 existed used asynchronous i/o talk tcp/ip handler typical berkeley-derived networking program could compiled run unchanged modulo usual unix porting problems though might efficient equivalent program used native asynchronous i/o dnix process could used handle i/o requests extend filesystem process called handler major feature operating system handler defined process owned least one request queue special file descriptor procured one two ways f_orq f_mount call former invented isolated request queue one end typically handed child process network remote execution programs many used method provide standard i/o paths children latter hooked filesystem file i/o requests could adopted handlers network login programs even used method provide standard i/o paths children semantics logging unix requires way multiple perhaps-unrelated processes horn standard i/o path operator mounted directory filesystem handler received i/o calls point handler would read small kernel-assigned request data structures request queue reading could done synchronously asynchronously handler author desired handler would whatever request required satisfied often using dnix f_uread f_uwrite calls read write request data space would terminate request appropriately using f_termin privileged handler could adopt permissions client individual requests subordinate handlers filesystem via f_t1req call n't need reproduce subordinate permission scheme handler unable complete request f_passrq function could used pass i/o requests one handler another handler could perform part work requested passing rest another handler common handler state-machine oriented requests fielding client done asynchronously allowed single handler field requests multiple clients simultaneously without blocking unnecessarily part request structure process id priority handler could choose work first based upon information requirement work performed order requested aid possible poll request trap queues see work considered buckling actually particular restriction number request queues process could used provide networking facilities chroot jails example give appreciation utility handlers isc handlers existed isc purchased 5.2 svr2 compatible 5.3 svr3 compatible versions dnix time purchase dnix 5.3 still undergoing development diab dnix 5.2 deployed time isc engineers incorporated 5.3 kernel features 5.2 primarily shared memory ipc divergence features diab isc versions dnix diab 5.3 likely went contain svr3 features isc 5.2 ended also diab went dnix 5.4 svr4 compatible os isc developers considerably extended version dnix 5.2 listed features involving kernel based upon needs general trends unix industry dnix development isc effectively ceased 1997 number planned os features left table | [
2179,
6276,
6787,
7299,
10883,
7305,
6412,
6675,
7187,
5397,
9366,
7319,
1304,
2201,
2073,
9628,
6813,
3487,
9762,
10788,
5029,
5413,
3241,
6187,
10030,
7983,
3248,
10926,
2995,
9141,
823,
3512,
8504,
9784,
6207,
9151,
321,
10561,
10436,
... | Validation |
6,625 | 2 | AppArmor:apparmor apparmor application armor linux kernel security module allows system administrator restrict programs capabilities per-program profiles profiles allow capabilities like network access raw socket access permission read write execute files matching paths apparmor supplements traditional unix discretionary access control dac model providing mandatory access control mac included mainline linux kernel since version 2.6.36 development supported canonical since 2009 addition manually creating profiles apparmor includes learning mode profile violations logged prevented log used generating apparmor profile based program typical behavior apparmor implemented using linux security modules lsm kernel interface apparmor offered part alternative selinux critics consider difficult administrators set maintain unlike selinux based applying labels files apparmor works file paths proponents apparmor claim less complex easier average user learn selinux also claim apparmor requires fewer modifications work existing systems example selinux requires filesystem supports security labels thus provide access control files mounted via nfs apparmor filesystem-agnostic apparmor represents one several possible approaches problem restricting actions installed software may take selinux system generally takes approach similar apparmor one important difference selinux identifies file system objects inode number instead path apparmor inaccessible file become accessible hard link created selinux inode-based model would still deny access newly created hard links hard link would pointing inaccessible inode selinux apparmor also differ significantly administered integrate system isolation processes also accomplished mechanisms like virtualization one laptop per child olpc project example sandboxes individual applications lightweight vserver 2007 simplified mandatory access control kernel introduced 2009 new solution called tomoyo included linux 2.6.30 like apparmor also uses path-based access control apparmor first used immunix linux 1998–2003 time apparmor known subdomain reference ability security profile specific program segmented different domains program switch dynamically apparmor first made available sles opensuse first enabled default sles 10 opensuse 10.1 may 2005 novell acquired immunix rebranded subdomain apparmor began code cleaning rewriting inclusion linux kernel 2005 september 2007 apparmor maintained novell novell suse legal owner trademarked name apparmor apparmor first successfully ported/packaged ubuntu april 2007 apparmor became default package starting ubuntu 7.10 came part release ubuntu 8.04 protecting cups default ubuntu 9.04 items mysql installed profiles apparmor hardening continued improve ubuntu 9.10 ships profiles guest session libvirt virtual machines evince document viewer optional firefox profile apparmor integrated october 2010 2.6.36 kernel release apparmor integrated synology dsm 5.1 beta 2014 apparmor enabled solus release 3 2017/8/15 apparmor enabled default debian 10 buster | [
4616,
3082,
5139,
10780,
10785,
6180,
8242,
9266,
5179,
4161,
8772,
6213,
2118,
3654,
8268,
589,
593,
1107,
4192,
10851,
6244,
5222,
10856,
8298,
4207,
5755,
5244,
4734,
11391,
7812,
7821,
4238,
10382,
2195,
2711,
6808,
9882,
1694,
5279,
... | Test |
6,626 | 0 | Snack_Sound_Toolkit:snack sound toolkit snack sound toolkit cross-platform library written kåre sjölander swedish royal technical university kth bindings scripting languages tcl python ruby provides audio i/o audio analysis processing functions spectral analysis pitch tracking filtering related graphics functions display sound pressure waveform spectrogram available microsoft windows linux mac os x solaris hp-ux freebsd netbsd irix snack sound toolkit used number linguistic research tools including wavesurfer transcriber sndbite well applications snackamp mp3 music player used academic research delft university technology springer collection perception multimodal dialogue systems includes research essay utilizing snack human-computer speech interaction toolkit included component activestate tcl python distributions | [
10409,
8554,
6797,
692,
10965,
823,
1304,
9245
] | Test |
6,627 | 1 | ADSO:adso application development system online adso tool used expedite writing testing modular applications using idms databases activities flow-of-control processing data storage definition data verification editing error handling terminal input output menu creation menu display specified using series screens instead conventional detailed code adso ads/o ads originally cullinet product later company acquired computer associates ads/o three components adsg adsa adsr tools used along ads/o develop ads/o application adso used develop online batch applications | [
3816,
7188,
2901
] | None |
6,628 | 5 | Microsoft_Notification_Protocol:microsoft notification protocol microsoft notification protocol msnp also known mobile status notification protocol instant messaging protocol developed microsoft use microsoft messenger service instant messaging clients connect skype since 2014 earlier windows live messenger msn messenger windows messenger microsoft messenger mac third-party clients pidgin trillian also communicate using protocol msnp first used publicly available product first release msn messenger 1999 major change made protocol new command syntax changes results version-number incremented one format msnp october 2003 microsoft started blocking access messenger service using versions msnp8 starting september 11 2007 microsoft forces current users msn messenger upgrade windows live messenger 8.1 due security considerations msnp1 never public believed used early stages design development msn messenger 1 pre-release version made available developers 1999 internet draft however production version differed published version subtle ways msnp2 msnp3 supported msn messenger 2.0 msnp3 4 5 supported messenger servers july 2000 used msn messenger 3.0 4.0 msnp6 used later versions msn messenger 4.x 2002 msn messenger 5.0 used msnp7 msnp8 introduced different authentication method sending authorization microsoft passport secure servers returning challenge string minimum version protocol accepted .net messenger service microsoft blocked earlier versions security reasons old obsolete clients unable sign forcing users upgrade clients version 5.0 msn messenger one uses msnp version windows messenger uses msnp8 standard version including 4.7 latest 5.1 protocol supports windows messenger-to-windows messenger webcam voice capabilities msnp9 introduced msn messenger 6 adding support type data messages used transferring display pictures custom emoticons clients frame-by-frame web cam rather traditional stream like windows media player wmv format improved voice system well improved nat traversal file transfers employed msn messenger 6.1 microsoft started blocking earlier versions october 2003 however big overhaul obvious change integration hotmail address books employed msn messenger 7.0 employed msn messenger 7.5 employed windows live messenger 8.0 msnp13 features lot changes notably contact list synchronization removed clients must instead send soap request contacts server also known client goes abch abch stands address book clearing house address book service behind msn windows live services client must send contacts data server send presence information msnp14 adds yahoo messenger interoperability msnp15 protocol version introduced windows live messenger 8.1 2006-09-08 based msnp14 uses different authentication mechanism called rps relying party suite twn tweener authentication used protocol versions 14 sso single sign-on rps authentication used protocol versions 15 addition new authentication mechanism microsoft also planning making properties user roaming user display picture future personal status messages wherever user signs furthermore support user locations added personal status message although feature later removed windows live messenger 8.1 client msnp16 used pre-release version windows live messenger 9.0 leaked december 2007 features multiple points presence mpop ability sign 2 places time chats replicated places uux data extended contain endpoint data also mpop well signature sound msn object data msnp17 identified windows live messenger servers messenger.hotmail.com unused official client released microsoft msnp18 used windows live messenger 2009 14.0 main new addition groups feature much like persistent grouped conversations uux data extended include scene image msn object data employed windows live messenger 2011 wave 4 employed windows live messenger 2012 employed skype since early 2014 | [
10242,
5251,
3460,
5382,
4746,
1036,
5647,
11408,
3610,
3228,
10271,
3105,
9511,
1962,
9519,
8758,
1467,
6208,
1218,
6982,
6855,
2760,
1738,
2892,
6993,
3284,
4318,
4704,
3812,
4068,
9572,
10486,
3959,
7928,
10748
] | Test |
6,629 | 8 | SPARQL:sparql sparql pronounced sparkle recursive acronym sparql protocol rdf query language rdf query language—that semantic query language databases—able retrieve manipulate data stored resource description framework rdf format made standard rdf data access working group dawg world wide web consortium recognized one key technologies semantic web 15 january 2008 sparql 1.0 became official w3c recommendation sparql 1.1 march 2013 sparql allows query consist triple patterns conjunctions disjunctions optional patterns implementations multiple programming languages exist exist tools allow one connect semi-automatically construct sparql query sparql endpoint example viziquer addition exist tools translate sparql queries query languages example sql xquery sparql allows users write queries loosely called key-value data specifically data follow rdf specification w3c thus entire database set subject-predicate-object triples analogous nosql databases usage term document-key-value mongodb sql relational database terms rdf data also considered table three columns – subject column predicate column object column subject rdf analogous entity sql database data elements fields given business object placed multiple columns sometimes spread across one table identified unique key rdf fields instead represented separate predicate/object rows sharing subject often unique key predicate analogous column name object actual data unlike relational databases object column heterogeneous per-cell data type usually implied specified ontology predicate value also unlike sql rdf multiple entries per predicate instance one could multiple child entries single person return collections objects like children thus sparql provides full set analytic query operations codice_1 codice_2 codice_3 data whose schema intrinsically part data rather requiring separate schema definition however schema information ontology often provided externally allow joining different datasets unambiguously addition sparql provides specific graph traversal syntax data thought graph example demonstrates simple query leverages ontology definition codice_4 friend friend specifically following query returns names emails every person dataset query joins together triples matching subject type predicate codice_5 person codice_6 person one names codice_7 mailboxes codice_8 author query chose reference subject using variable name codice_9 readable clarity since first element triple always subject author could easily used variable name codice_10 codice_11 whatever name chosen must line query signify query engine join triples subject result join set rows – codice_9 codice_13 codice_14 query returns codice_13 codice_14 codice_9 often complex uri rather human-friendly string note codice_9 may multiple mailboxes returned set codice_13 row may appear multiple times mailbox query distributed multiple sparql endpoints services accept sparql queries return results computed results gathered procedure known federated query whether federated manner locally additional triple definitions query could allow joins different subject types automobiles allow simple queries example return list names emails people drive automobiles high fuel efficiency case queries read data database sparql language specifies four different query variations different purposes query forms takes codice_24 block restrict query although case codice_23 query codice_24 optional sparql 1.1 specifies language updating database several new query forms another sparql query example models question country capitals africa variables indicated codice_27 codice_28 prefix bindings codice_29 codice_30 returned triple ends semicolon subject triple implicitly complete following pair entire triple example codice_31 short codice_32 sparql query processor search sets triples match four triple patterns binding variables query corresponding parts triple important note property orientation class matches conducted solely class-attributes properties – see duck typing make queries concise sparql allows definition prefixes base uris fashion similar turtle query prefix codice_33 stands “ nowiki http //example.com/exampleontology /nowiki ” geosparql defines filter functions geographic information system gis queries using well-understood ogc standards gml wkt etc. sparul another extension sparql enables rdf store updated declarative query language adding codice_34 codice_35 methods open source reference sparql implementations see list sparql implementations comprehensive coverage including triplestore apis storages implemented sparql standard | [
5632,
9345,
11650,
8451,
2948,
8070,
7943,
140,
396,
6161,
5907,
8979,
10004,
151,
11674,
2972,
10910,
7455,
4768,
6433,
9248,
9631,
9893,
6775,
10791,
10413,
53,
6330,
10938,
4797,
574,
5830,
6470,
8262,
5449,
9286,
9290,
8788,
2901,
994... | Train |
6,630 | 1 | SQLSTATE:sqlstate programs calling database accords sql standard receive indication success failure call return code called sqlstate consists 5 byte divided two parts first second byte contains class following three subclass class belongs one four categories denotes success class 00 w denotes warning class 01 n denotes data class 02 x denotes exception classes following table lists standard-conforming values based table last column shows part standard defines row empty definition origins part 2 foundation | [
10413
] | None |
6,631 | 9 | Visual_Objects:visual objects visual objects object-oriented computer programming language used create computer programs operate primarily windows although used general-purpose programming tool almost exclusively used create database programs original visual objects project code-named aspen started part nantucket attempts bring clipper language windows move procedural object-oriented style also converted clipper p-code system true native compiler introduced elements c language typed variables including windows extensions com odbc later ado symbol datatype offers ability form name-based linkages may used connect menu events object methods form direct linkages server columns controls windows version finally brought market computer associates unfortunately released market-ready almost head-to-head competition first release borland delphi product language still use however last release grafx software 2012 version 2.8 sp4 version number 2838 grafx announced new versions would released next incarnation visual objects language vulcan.net written grafx scratch visual objects compatible true cls compliant .net language taking full advantage .net framework | [
6112,
8868,
4614,
2183,
8262,
10921,
3435,
6797,
2929,
2903,
2045,
5374
] | None |
6,632 | 7 | Chromebox:chromebox chromebox small form-factor pc running google chrome os operating system device debuted may 2012 chromeboxes like chrome os devices including chromebook laptops primarily support web applications thereby relying heavily internet connection software functionality data storage connection via local area network wireless ethernet port machines classed small form-factor pcs typically feature power switch set connections support keyboard pointing device one monitors solid state drives used storage wireless printers supported first chromebox released samsung may 29 2012 ran dual-core intel celeron processor 867 1.3 ghz featured six usb 2.0 ports two displayport++ slots compatible hdmi dvi vga february 2014 google bundled intel core i7 chromebox business video conferencing package 1080p high definition camera module external microphone/speaker remote control chromebox meetings system retailed 999 plus 250 annual management fee waived first year—a cost thousands dollars less unified videoconferencing systems including cisco polycom system employed google hangouts-like interface 15 participants dedicated url sharing screens management accounts scheduling meetings updated system announced november 2017 featured 4k camera machine learning feature automatically identifies frames participants march 2014 asus established new price low-end chromebox market compact 1.32 pound model retailed 179 featured celeron cpu four usb 3.0 ports yahoo tech columnist david pogue called asus device among smallest least-expensive desktop computers ever sold likening smart car ’ hauling lumber home depot ’ terrific deal—and days ’ get want go may asus released faster model intel core i3 processor hewlett-packard entered market june chromebox powered intel celeron processor optionally bundling keyboard mouse august acer introduced two models could stand vertically provided business-oriented features including encryption fast deletion local data september dell entered market entry-level machine well dell implementation google video conferencing system august 2015 aopen announced family chromeboxes designed principally driving content digital commercial signage models ruggedized on-site operation capability run android apps chrome os devices introduced google 2016 realized certain chromebooks 2017 seemed bypass chromeboxes cluster new chromebox offerings appeared 2018 including acer asus hp oregon-based ctl compute teach learn maker chromebooks since 2014 launched first chromebox march 2018 | [
4096,
4623,
3600,
8719,
7700,
9244,
8735,
9766,
5159,
10284,
3121,
3633,
4683,
11343,
3664,
7248,
8285,
2658,
4194,
5732,
8821,
2170,
7816,
4236,
10893,
5262,
6800,
11408,
10393,
8858,
7841,
6307,
1203,
7352,
7359,
4289,
196,
3269,
3782,
... | Validation |
6,633 | 9 | Temporary_variable:temporary variable computer programming temporary variable variable short lifetime usually hold data soon discarded placed permanent memory location short-lived usually declared local variable i.e. variable local scope formal definition makes variable temporary often-used term programming typical example would swapping contents two variables swap contents variables b one would typically use temporary variable temp follows preserve data overwritten b temporary variables usually named identifiers abbreviate word temporary temp tmp simply common metasyntactic variable names common foo bar baz see also foobar computer hardware designed exploit behaviour temporary data cache register file may contain temporaries internally microprocessor never need committed main memory hence consuming external memory bandwidth | [
5059,
7523,
3175,
1193,
10510,
655,
52,
11125,
407,
2936,
7193,
11487
] | Validation |
6,634 | 2 | Reconstructor:reconstructor reconstructor program allows anyone customize iso image ubuntu variants kubuntu xubuntu website longer functioning | [
8554,
9902,
7983,
5618,
823,
985
] | Test |
6,635 | 4 | AdultSwine:adultswine adultswine malware discovered 2018 check point software technologies malware found programmed around 60 apps google play store primarily aimed children bug would display pornographic ads clicked would instruct victims download malicious software attempt steal personal data estimated 3 7 million users may infected according representative google apps removed play store developer accounts associated apps locked check point cautions users extra vigilant installing apps particularly intended use children ” | [
3858,
7515,
8668,
7983
] | Test |
6,636 | 4 | HDIV:hdiv hdiv web application security framework controls information flow server client avoiding many important web risks hdiv extends web applications behaviour adding security functionalities maintaining api framework specification implies hdiv may used applications developed spring mvc grails jstl struts 1 struts 2 javaserver faces symfony transparent way programmer without adding complexity application development | [
899,
4198,
2470,
3560,
6219,
3341,
9293,
5404,
10526
] | Validation |
6,637 | 6 | NTFS_volume_mount_point:ntfs volume mount point ntfs volume mount points specialized ntfs filesystem objects used mount provide entry point volumes mount points created directory ntfs file system gives reference root directory mounted volume empty directory converted mount point mounted volume limited ntfs filesystem formatted file system supported microsoft windows volume mount points supported ntfs 3.0 introduced windows 2000 though quite similar regular posix mount points found unix unix-like systems support local filesystems windows vista later ntfs symbolic links used link local directories remote smb network paths symbolic links work boot impossible redirect e.g nevertheless possible redirect | [
11270,
5643,
4624,
537,
540,
3102,
9762,
8227,
8740,
1577,
10281,
2101,
10812,
3648,
10310,
1098,
7754,
7244,
4173,
4174,
10828,
9808,
4178,
10839,
603,
9819,
3170,
622,
9839,
4210,
7796,
1656,
6265,
7290,
4731,
10879,
8841,
6797,
2193,
9... | Validation |
6,638 | 3 | Aleph_kernel:aleph kernel aleph discontinued operating system kernel developed university rochester part rig project 1975 aleph early set road creation first practical microkernel operating system mach aleph used inter-process communications move data programs kernel applications could transparently access resources machine local area network time 3-mbit/s experimental xerox ethernet project eventually petered several years due rapid changes computer hardware market ideas led creation accent carnegie mellon university leading turn mach applications written rig system communicated via ports ports essentially message queues maintained aleph kernel identified machine unique opposed globally unique id consisting process id port id pair processes automatically assigned process number pid startup could ask kernel open ports processes could open several ports read automatically blocking allowing programs run data arrived processes could also shadow another receiving copy every message sent one shadowing similarly programs could interpose another receiving messages essentially cutting original message conversation rig implemented number data general eclipse minicomputers ports implemented using memory buffers limited 2 kb size produced significant overhead copying large amounts data another problem realized retrospect use global id allowed malicious software guess ports thereby gain access resources since ids based program id port ids changed program restarted making difficult write servers clients could rely specific port number service | [
8633,
7561,
7187,
7983
] | Validation |
6,639 | 3 | Instruction_cycle:instruction cycle instruction cycle also known fetch–decode–execute cycle simply fetch-execute cycle cycle central processing unit cpu follows boot-up computer shut order process instructions composed three main stages fetch stage decode stage execute stage simpler cpus instruction cycle executed sequentially instruction processed next one started modern cpus instruction cycles instead executed concurrently often parallel instruction pipeline next instruction starts processed previous instruction finished possible cycle broken separate steps program counter pc special register holds memory address next instruction executed fetch stage address stored pc copied memory address register mar pc incremented order point memory address next instruction executed cpu takes instruction memory address described mar copies memory data register mdr mdr also acts two-way register holds data fetched memory data waiting stored memory also known memory buffer register mbr eventually instruction mdr copied current instruction register cir acts temporary holding ground instruction fetched memory decode stage control unit cu decode instruction cir cu sends signals components within cpu arithmetic logic unit alu floating point unit fpu alu performs arithmetic operations addition subtraction also multiplication via repeated addition division via repeated subtraction also performs logic operations binary shifts well fpu reserved performing floating-point operations computer cpu different cycles based different instruction sets similar following cycle cycle begins soon power applied system initial pc value predefined system architecture instance intel ia-32 cpus predefined pc value codice_1 typically address points set instructions read-only memory rom begins process loading booting operating system fetch step instruction control unit fetches instruction address memory unit decoding process allows cpu determine instruction performed cpu tell many operands needs fetch order perform instruction opcode fetched memory decoded next steps moved appropriate registers decoding done cpu control unit step evaluates type operation performed memory operation computer checks whether direct indirect memory operation i/o register instruction computer checks type executes instruction function instruction performed instruction involves arithmetic logic alu utilized stage instruction cycle useful perspective end user everything else overhead required make execute step happen | [
7173,
9224,
9739,
2066,
7699,
5655,
10779,
10781,
6181,
8231,
3630,
6705,
7218,
2623,
2113,
7234,
3142,
2638,
3157,
1122,
3175,
8815,
630,
8822,
6268,
3197,
11395,
7313,
6815,
8352,
5793,
6818,
6821,
7852,
9391,
2224,
2226,
7858,
9911,
88... | Test |
6,640 | 9 | Compatibility_of_C_and_C++:compatibility c c++ c c++ programming languages closely related many significant differences c++ began fork early pre-standardized c designed mostly source-and-link compatible c compilers time due development tools two languages ides compilers often integrated single product programmer able specify c c++ source language however c subset c++ consequently c programs compile c++ code without modification likewise c++ introduces many features available c practice almost code written c++ conforming c code article however focuses differences cause conforming c code ill-formed c++ code conforming/well-formed languages behave differently c c++ bjarne stroustrup creator c++ suggested incompatibilities c c++ reduced much possible order maximize inter-operability two languages others argued since c c++ two different languages compatibility useful vital according camp efforts reduce incompatibility hinder attempts improve language isolation official rationale 1999 c standard c99 endorse nowiki /nowiki principle maintaining largest common subset c c++ maintaining distinction allowing evolve separately stated authors content let c++ big ambitious language several additions c99 supported current c++ standard conflicted c++ features variable-length arrays native complex number types codice_1 type qualifier hand c99 reduced incompatibilities compared c89 incorporating c++ features codice_2 comments mixed declarations code c++ enforces stricter typing rules implicit violations static type system initialization requirements compile-time enforcement in-scope variables initialization subverted c valid c code disallowed c++ rationale provided annex c.1 iso c++ standard though c++ favors c99 c11 added several additional features c incorporated standard c++ complex numbers variable length arrays note complex numbers variable length arrays designated optional extensions c11 flexible array members restrict keyword array parameter qualifiers compound literals designated initializers c++ adds numerous additional keywords support new features renders c code using keywords identifiers invalid c++ example syntactical constructs valid c c++ produce different results two languages several differences previous section also exploited create code compiles languages behaves differently example following function return different values c c++ due c requiring codice_15 front structure tags codice_60 refers variable c++ allowing omitted codice_60 refers implicit codice_62 beware outcome different codice_44 declaration placed inside function presence identifier name function scope inhibits implicit codice_62 take effect c++ outcome c c++ would observe also ambiguity example due use parenthesis codice_65 operator using codice_66 would expect codice_67 expression type thus example would compile c++ c c++ maintain large degree source compatibility object files respective compilers produce important differences manifest intermixing c c++ code notably reasons c++ code call c function codice_68 c++ code must prototype codice_68 codice_70 likewise c code call c++ function codice_71 c++ code codice_71 must declared codice_70 common practice header files maintain c c++ compatibility make declaration codice_70 scope header differences c c++ linkage calling conventions also subtle implications code uses function pointers compilers produce non-working code function pointer declared codice_70 points c++ function declared codice_70 example following code using sun microsystems c++ compiler produces following warning codice_77 declared c linkage calling conventions passed c function codice_68 | [
1931,
6414,
10510,
6160,
5521,
3736,
1435,
155,
10143,
1952,
5796,
2605,
5165,
5806,
9008,
3765,
7479,
10043,
1724,
10555,
10684,
9665,
6338,
963,
5961,
1610,
1611,
9804,
4173,
6349,
8397,
11212,
11219,
1236,
5588,
6102,
7894,
4057,
10586,
... | None |
6,641 | 2 | Enhanced_Write_Filter:enhanced write filter enhanced write filter ewf component windows xp embedded windows embedded standard 7 stores volume changes another medium instead applying original volume ewf allows writes discarded committed original volume later either directly inaction based configuration minimizes writes specified hard disk ewf fbwf file-based write filter become popular enthusiast computing way decreasing wear solid-state drives netbooks carpcs ewf three main operating modes ewf disk ewf ram ewf ram reg mode location ewf volume stores configuration overlay volume stores file changes different ewf disk stores overlay data outside primary disk allowing external disk compactflash used overlay ewf volume stored unpartitioned space disk ewf ram stores overlay data ram ewf volume unpartitioned space disk ewf ram reg ewf ram except ewf volume stored windows registry case appropriation ewf carpcs often based windows xp smaller footprint used similar effect windows vista netbooks diminish write activity enhance lifespan solid state drives due changes windows vista however disk mode used unlike commercial ram disks ewf reclaim ram files deleted ewf ram ewf ram reg mode memory consumed ever increases eventually system free space crash automatic adjustment daylight saving time compatible ewf causing incorrect time settings reboot | [
11270,
5643,
4624,
537,
540,
3102,
9762,
8227,
8740,
1577,
10281,
5681,
2101,
10812,
3648,
10310,
1098,
7754,
7244,
4173,
4174,
10828,
9808,
4178,
10839,
603,
9819,
3170,
622,
9839,
4210,
7796,
1656,
6265,
7290,
4731,
8315,
1150,
10879,
8... | None |
6,642 | 8 | Webtrekk:webtrekk webtrekk gmbh german company offers marketing analytics customer intelligence software webtrekk companies connect analyze activate user marketing data across devices since 2019 webtrekk part marketing technology service provider mapp webtrekk founded 2004 ceo christian sauer cto norman wahnschaff 2009 webtrekk received €1 million venture capital investment corporate finance partners winners awin-sponsored publisher initiative contest 2012 webtrekk frost sullivan award finally bringing ‘ real time ’ online/digital analytics 2014 webtrekk closed third round financing collecting total €25 million dpe deutsche private equity 2018 webtrekk bronze international stevie award category business competitive intelligence “ cross device tracking tool cross device bridge 2019 webtrekk honored german stevie award gold realtime predictions 2019 webtrekk acquired marketing technology service provider mapp webtrekk provides variety products gain insights data trigger marketing activities products services cross-channel campaign reporting ai-enabled marketing intelligence webtrekk customer analytics suite includes user-centric analytics personalized product recommendations customer intelligence dashboards customer journey tracking tag integration web behavior re-targeting webtrekk data streams enable raw data captured processed streamed real time since acquisition webtrekk mapp consolidate offerings webtrekk ’ customers also access mapp ’ cross-channel marketing cloud consulting support another part webtrekk offering consulting unit works customers specific large-scale projects support team available answer questions functions interface webtrekk products access raw first-party data core component webtrekk products data exported real-time data warehouses bi systems used carry in-depth analyses within customer analytics suite suite customizable dashboard engine enables customers display connected external data sources social media channels crm systems webtrekk 400 customers including flixbus ing mytoys focus industries finance publishing e-commerce products privacy certified german tüv association confirm data privacy security webtrekk ’ data servers located european union housed data centres certified international organization standardization | [
6576,
1943
] | Train |
6,643 | 4 | Norton_AntiVirus:norton antivirus norton antivirus anti-virus anti-malware software product developed distributed symantec corporation since 1991 part norton family computer security products uses signatures heuristics identify viruses features included e-mail spam filtering phishing protection symantec distributes product download box copy oem software norton antivirus norton internet security related product held 61 us retail market share security suites first half 2007 competitors terms market share study include antivirus products ca trend micro kaspersky lab norton antivirus runs microsoft windows linux macos windows 7 support development versions 2006 2008 version 2009 windows 7 supported update already versions 2010 2011 2012 natively support windows 7 without needing update version 12 version fully compatible mac os x lion 2015 series products symantec made changes portfolio briefly discontinued norton antivirus action later reversed introduction norton antivirus basic may 1989 symantec launched symantec antivirus macintosh sam sam 2.0 released march 1990 incorporated technology allowing users easily update sam intercept eliminate new viruses including many n't exist time program release august 1990 symantec acquired peter norton computing peter norton norton company developed various dos utilities including norton utilities include antivirus features symantec continued development acquired technologies technologies marketed name norton tagline symantec norton crossed-arm pose registered u.s. trademark traditionally featured norton product packaging however pose later moved spine packaging eventually dropped altogether early 1991 u.s. computers invaded hundreds foreign virus strains corporate pc infection becoming serious problem symantec norton group launched norton antivirus 1.0 nav pc compatible computers ads product suggested retail 129 featured norton crossed-arm pose wearing pink shirt surgical mask covering nose mouth 1998 version 5.0 update sam renamed norton antivirus nav macintosh product activation introduced norton antivirus 2004 addressing estimated 3.6 million counterfeit norton products sold alphanumeric code generated identify computer configuration ties product key users allowed activate product five times product key spyware adware detection removal introduced 2005 version tagline antispyware edition tagline dropped later releases however norton antivirus 2009 classic include spyware adware detection classic edition marketed alongside norton antivirus 2009 include spyware adware detection existing users 2006 2007 2008 2009 versions upgrade latest 2010 version without buying new subscription upgrading preserve number days left user subscription redesigned main graphical user interface aggregates information central user interface cnet reports norton protection center useful attempts advertise additional products facilitate detection zero-day malware bloodhound disassembles variety programming languages scans code malicious instructions using predefined algorithms internet explorer homepage hijacking protection introduced release well however notably missing search engine hijacking protection cnet highlighted norton antivirus 2006 noticeable impact system performance operating system requirements call windows 2000 service pack 3 windows xp 150 mb free space 300 mhz processor required either operating system 128 mb ram required windows 2000 256 mb required windows xp norton antivirus released september 12 2006 symantec revised norton antivirus goal reducing high system resource utilization windows vista compatibility introduced release well despite 80 code rewritten cnet reports mixed results performance testing windows 2000 compatibility dropped release compatibility 32-bit versions windows vista added release patch symantec hardware requirements vista call 150 mb free space 800 mhz processor 512 mb ram requirements windows xp similarly call 150 mb free space 300 mhz processor 256 mb ram norton antivirus 2008 released august 28 2007 emphasizing malware prevention new features include sonar looks suspicious application behavior release adds real-time exploit protection preventing attackers leveraging common browser application vulnerabilities installed 32-bit versions windows xp service pack 2 300 mb free space 300 mhz processor 256 mb ram required installed 32-bit 64-bit versions windows vista 300 mb free space 800 mhz processor 256 mb ram needed norton antivirus 2009 released september 8 2008 addressing performance issues 300 changes made zero-impact goal.benchmarking conducted passmark software pty ltd highlights 47-second install time 32 second scan time 5 mb memory utilization symantec funded benchmark test provided scripts used benchmark participating antivirus software security status settings displayed single main interface cpu usage monitor displays total cpu utilization norton cpu usage main interface features include norton insight whitelisting technology cuts scanning times mapping known safe files using information online database address malware response times updates delivered every 5 15 minutes however updates tested symantec may cause false positives incorrectly identify files malicious exploit scanner found 2007 2008 versions dropped release installed 32-bit versions windows xp service pack 2 150 mb free space 300 mhz processor 256 mb ram required installed 32-bit 64-bit versions windows vista 150 mb free space 800 mhz processor 512 mb ram required two variations norton antivirus 2009 also marketed symantec gaming edition provides finer control norton downloads updates allows components suite disabled either manually automatically computer enters full-screen mode classic edition find remove adware spyware version 17.0 released september 9 2009 several features updated release including sonar dubbed sonar 2 uses information determine application truly malicious norton insight present users information origins activities performance applications along reputation data new feature codenamed autospy helps users understand norton malware found previous releases removed threats sight quietly warned users potentially confusing users deceived downloading rogue security software much information placed back main window toggle button switches sides symantec also added windows 7 support aside symantec also added norton download insight prevent drive drive downloads symantec briefly discontinued standalone norton antivirus product 2015 instead replacing norton security fbi confirmed active development magic lantern keylogger intended obtain passwords encrypted e-mail documents criminal investigations magic lantern first reported media bob sullivan msnbc 20 november 2001 ted bridis associated press fbi intends deploy magic lantern form e-mail attachment attachment opened installs trojan horse suspect computer activated suspect uses pgp encryption often used increase security sent email messages activated trojan log pgp password allows fbi decrypt user communications symantec major antivirus vendors whitelisted magic lantern trojan rendering antivirus products including norton antivirus incapable detecting concerns around whitelisting include uncertainties magic lantern full surveillance potential whether hackers could subvert redeploy purposes outside law enforcement graham cluley technology consultant sophos said way knowing written fbi even ’ know whether used fbi commandeered third party another reaction came marc maiffret chief technology officer co-founder eeye digital security states customers paying us service protect forms malicious code us law enforcement job make exceptions law enforcement malware tools proponents magic lantern argue technology would allow law enforcement efficiently quickly decrypt time-sensitive messages protected encryption schemes implementing magic lantern require physical access suspect computer unlike carnivore predecessor magic lantern since physical access computer would require court order fbi spokesman paul bresson response question whether magic lantern also needed court order deploy would say like technology projects tools deployed fbi would used pursuant appropriate legal process january 28 2010 symantec anti-virus update marked spotify trojan horse disabling software across millions pcs retail customers report slow indifferent service bugs examples include faulty error message stating current subscriptions expired users received error stating virus protection updated error occurred update software refused allow daily updates though bug reported 2004 corrected 2005 2006 versions another incident occurred may 2007 norton antivirus flagged components pegasus email client malicious rendering program corrupted symantec customer service addressed problem running checklist troubleshooting steps always successful july 25 2006 symantec released faulty update norton antivirus 2006 users users reported onscreen message stating norton antivirus 2006 support repair feature please uninstall reinstall. symantec claimed faulty update downloaded customers 1:00 pm 7:00 pm july 25 2006 symantec developed workaround tool listed troubleshooting steps available company released statement stating expected deliver repair patch affected users monday july 31 2006 norton antivirus criticized refusing uninstall completely leaving unnecessary files behind another issue versions prior 2009 installed liveupdate updates norton-branded software separately user must uninstall norton antivirus liveupdate component manually liveupdate component purposely left behind update norton-branded products present response symantec developed norton removal tool symnrt remove leftover registry keys values along files folders however neither route uninstallation remove subscription data preserved prevent users installing multiple trial copies symnrt remove norton programs symnrt started removal process stopped recommended close running programs prior running symnrt act winfax users recommended back databases running symnrt norton antivirus 2007 install alongside zonealarm incompatibility caused annoyance norton customers purchased norton antivirus 2007 prior warning notice incompatibility symantec recommends removing zonealarm reinstalling internet worm protection feature disabled controls applications access internet protocols use march 9 2009 users norton antivirus 2006 2007 experienced firewall warning stating norton-associated file pifts.exe trying connect internet although file revealed harmless diagnostic patch program gained attention media symantec removed posts forum concerning pifts information available purpose program speculation program malware backdoor sans internet storm center claimed spoken symantec employee confirmed program part update process intended harm graham cluley consultant antivirus vendor sophos found pifts connected symantec server forwarding product computer information march 10 symantec made official response pifts program claiming posts support forum deleted due forum spam rules however deletion pifts-related posts began spam attacks symantec stated pifts diagnostic patch cole stated purpose update help determine many customers would need migrated windows 7-compatible versions norton antivirus pifts apparently released without digital signature verify identity causing firewalls prompt permission attempted connect internet symantec criticized consumers perceived ethical violations including allegations support technicians would tell customers systems infected needed technician resolve remotely extra fee refuse refund customers alleged systems actually infected norton antivirus 11 mac introduced support mac os x v10.5 leopard platform capability detect macintosh windows malware features include vulnerability scanner blocks attackers leveraging software exploits norton antivirus 11 also includes ability scan within compressed archived files time capsule volumes operating requirements call mac os x tiger powerpc intel core processor 128 mb ram 100 mb free hard disk space also required norton antivirus dual protection mac intended macintosh users windows running systems using boot camp virtualization software vmware fusion provides license norton antivirus 11 norton antivirus 2009 2009 2012 editions symantec made huge changes products speed performance norton products 2 running processes using 24 mb ram soon virus recognized information regards virus virus signature stored pandemic definitions file contains vital know-how become aware get rid virus according tests sponsored symantec passmark security benchmark 2012 norton antivirus norton internet security lightest suites available av-comparatives.org also tested products gave similar results pcmag recognises 2011 2012 lines fastest strongest protection pcworld tests security software put norton internet security 2009 1st place 2011 test pcworld norton internet security winner dennis technology labs tests sponsored symantec confirms performance effectiveness norton 2011 2012 lines 14th august 2013 prime minister new zealand john key addressed identified misinformation surrounding gcsb amendment bill claiming actions government communications security bureau analogous norton antivirus | [
2049,
10756,
1052,
2084,
550,
2601,
6699,
7739,
10308,
4165,
3163,
8283,
2654,
4710,
107,
10872,
9341,
127,
7809,
131,
6797,
10903,
10392,
6297,
7834,
156,
2721,
2213,
6823,
3243,
1708,
8368,
6834,
10935,
704,
7362,
202,
7886,
8398,
1242,... | Test |
6,644 | 4 | Evil_maid_attack:evil maid attack evil maid attack attack unattended device attacker physical access alters undetectable way later access device data name refers scenario maid could subvert device left unattended hotel room – concept also applies situations device intercepted transit taken away temporarily airport law enforcement personnel 2009 blog post security analyst joanna rutkowska coined term evil maid attack due hotel rooms common place devices left unattended post detailed method compromising firmware unattended computer via external usb flash drive – therefore bypassing truecrypt disk encryption d. defreez computer security professional first mentioned possibility evil maid attack android smartphones 2011 talked whispercore android distribution ability provide disk encryption androids 2007 former u.s. commerce secretary carlos gutierrez allegedly targeted evil maid attack business trip china left computer unattended trade talk beijing suspected device compromised although allegations yet confirmed denied incident caused u.s. government wary physical attacks 2009 symantec cto mark bregman advised several u.s. agencies leave devices u.s. travelling china instructed buy new ones leaving dispose returned physical attempts retrieve data would ineffective attack begins victim leaves device unattended attacker proceed tamper system victim password protection authentication computer intruder turn computer immediately access victim information however device password protected full disk encryption firmware device needs compromised usually done external drive compromised firmware often provides victim fake password prompt identical original password input compromised firmware sends password attacker removes reboot order successfully complete attack attacker must return device unattended second time steal now-accessible data another method attack dma attack attacker accesses victim information hardware devices connect directly physical address space attacker simply needs connect hardware device order access information evil maid attack also done replacing victim device identical device original device bootloader password attacker needs acquire device identical bootloader password input screen device lock screen however process becomes difficult attacker must acquire background picture put lock screen mimicking device either case victim inputs password false device device sends password attacker possession original device attacker access victim data legacy bios considered insecure evil maid attacks architecture old updates option roms unsigned configuration unprotected additionally support secure boot vulnerabilities allow attacker boot external drive compromise firmware compromised firmware configured send keystrokes attacker remotely unified extensible firmware interface uefi provides many necessary features mitigating evil maid attacks example offers framework secure boot authenticated variables boot-time tpm initialization security despite available security measures platform manufacturers obligated use thus security issues may arise unused features allow attacker exploit device many full disk encryption systems truecrypt pgp whole disk encryption susceptible evil maid attacks due inability authenticate user attacker still modify disk contents despite device powered encrypted attacker modify encryption system loader codes steal passwords victim unattended device vulnerable network evil maid attack attacker knows victim device well enough replace victim device identical model password-stealing mechanism thus victim inputs password attacker instantly notified able access stolen device information one approach detect someone close handling unattended device proximity alarms motion detector alarms wireless cameras used alert victim attacker nearby device thereby nullifying surprise factor evil maid attack android app created 2017 edward snowden monitoring transmit results user smartphone absence tamper-evident technology various kinds used detect whether device taken apart – including low-cost solution putting glitter screw holes attack suspected victim device checked see malware installed challenging suggested approaches checking hashes selected disk sectors partitions device surveillance times attacker perform evil maid attack left unattended device may also placed inside lockbox attacker physical access however situations device taken away temporarily airport law enforcement personnel practical basic security measures latest up-to-date firmware shutting device leaving unattended prevent attack exploiting vulnerabilities legacy architecture allowing external devices open ports respectively cpu-based disk encryption systems tresor loop-amnesia prevent data vulnerable dma attack ensuring leak system memory tpm-based secure boot shown mitigate evil maid attacks authenticating device user unlocking correct password given user measures unauthorized code executed device measurements done root trust systems microsoft bitlocker intel txt technology anti evil maid program builds upon tpm-based secure boot attempts authenticate device user | [
9569,
2630,
3495,
6602,
1515,
8333,
9791,
7794,
8978,
1143,
7354,
4863
] | None |
6,645 | 4 | National_Initiative_for_Cybersecurity_Education:national initiative cybersecurity education national initiative cybersecurity education nice partnership government academia private sector focused supporting country ability address current future cybersecurity education workforce challenges standards best practices nice led national institute standards technology nist u.s. department commerce comprehensive national cybersecurity initiative cnci established president george w. bush january 2008 included twelve initiatives one initiative 8 aimed making federal cybersecurity workforce better prepared handle cybersecurity challenges may 2009 cyberspace policy review directed president barack obama elevated cnci initiative 8 initially focused improving federal cybersecurity workforce ability perform cybersecurity work scope expanded beyond federal workforce include private sector workforce truly making national charge march 2010 obama administration declassified limited material regarding cnci making initiative 8 public initiative 8 expand cyber education billions dollars spent new technologies secure u.s. government cyberspace people right knowledge skills abilities implement technologies determine success however enough cybersecurity experts within federal government private sector implement cnci adequately established federal cybersecurity career field existing cybersecurity training personnel development programs good limited focus lack unity effort order effectively ensure continued technical advantage future cybersecurity must develop technologically-skilled cyber-savvy workforce effective pipeline future employees take national strategy similar effort upgrade science mathematics education 1950 ’ meet challenge additionally cnci described training education professional development programs lacking “ unity effort ” cybersecurity enhancement act 2014 title iv established “ national cybersecurity awareness education program ” known national initiative cybersecurity education nice digital economy enabled knowledgeable skilled cybersecurity workforce energize promote robust network ecosystem cybersecurity education training workforce development nice cybersecurity workforce framework nice cybersecurity workforce framework nice framework nist special publication 800-181 national focused resource categorizes describes cybersecurity work publication serves fundamental reference support workforce capable meeting organization cybersecurity needs establishing taxonomy common lexicon describes cybersecurity work workers irrespective work performed nice framework intended applied public private academic sectors although nice framework published nist special publication august 2017 working drafts document use since 2010 publication intended living document updated periodically based change requests nice program office plethora tools resources exist learning implementing nice framework learn nist.gov/nice/framework nice strategic plan cybersecurity enhancement act 2014 requires strategic plan developed implemented every five years current nice strategic plan includes multitude guiding values three primary goals 1 accelerate learning skills development 2 nurture diverse learning community 3 guide career planning workforce development see current past versions nice strategic plan nist.gov/nice supporting growth sustainment nation cybersecurity workforce building foundation secure american future may 2017 president donald trump issued executive order strengthening cybersecurity federal networks critical infrastructure part order states policy united states “ support growth sustainment workforce skilled cybersecurity related fields foundation achieving objectives cyberspace. ” consequently secretary commerce secretary homeland security directed provide report president findings recommendations regarding support growth sustainment nation cybersecurity workforce public private sectors report supporting growth sustainment nation cybersecurity workforce building foundation secure american future response charge nice framework work role capability indicators indicators performing work roles nice framework work role capability indicators indicators performing work roles draft nist interagency report 8193 co-authored representatives u.s. department homeland security national institute standards technology booz allen hamilton inc document helps determine qualities accomplishments indicate someone suitable perform particular job activity qualities defined report “ capability indicators. ” nice headquartered nist facilities gaithersburg maryland nice program office activities organized three categories government engagement industry engagement academic engagement committees nice several committees nice challenge project nice challenge project led california state university san bernardino designed create flexible set challenge environments supporting infrastructure low barrier use one would able perform tasks outlined nice cybersecurity workforce framework used platform instruction well evaluate endeavor part cybersecurity workforce cyberseek cyberseek interactive heat map pathway tool developed comptia partnership burning glass technologies provides data visualization need supply cybersecurity workers guide employers job seekers policy makers education training providers guidance counselors cyberseek includes cybersecurity jobs heat map shows information supply workers relevant credentials project also shows career pathways cybersecurity map opportunities advancement field regional alliances multistakeholder partnerships stimulate cybersecurity education workforce development ramps ramps program provides funding opportunities build multistakeholder workforce partnerships employers schools institutions higher education community organizations | [
6360,
11561,
9088,
9607
] | Test |
6,646 | 4 | KeyRaider:keyraider keyraider computer malware affects jailbroken apple ios devices specifically iphones allows criminals steal users login password information well lock devices demand ransom unlock discovered researchers palo alto networks weiphone august 2015 believed led 225,000 people login password information stolen making according cybersecurity columnist joseph steinberg one damaging pieces malware ever discovered apple universe malware originally found chinese website spread 18 countries including united states keyraider affects iphones jailbroken | [
9732,
1970,
1299,
11577,
7515,
4957
] | None |
6,647 | 2 | DOCS_(software):docs software docs display operator console support software package ibm mainframes cfs inc. enabling access system console using 3270-compatible terminals computer operators communicated ibm mainframe computers using electro-mechanical typewriter-like console came standard ibm 360 370 computer except upper end models offered video consoles model 20 came standard without console majority smaller less expensive ibm 360s 370s came equipped ruggedized selectric keyboard devices selectric major step teletypes tty associated unix smaller systems still clunky video consoles provided certain models considered particularly user friendly ignored two thirds ibm mainframe market dos vse descendants docs replaced supplanted typewriter interface video screen practice worked little like present-day instant messenger programs icq qq aim adium ichat etc data entry line bottom messages scrolling real time screen commands otherwise identical docs available dos dos/vs dos/vse came packaged third party operating systems edos computer software company later acquired nixdorf product ran several dos-related platforms several vendors offered docs part os docs developed cfs inc. brookline massachusetts kayser-roth data center whitman massachusetts dick goran wrote video interface leigh lundin wrote operating system interface transcript recorder docs required dedicated partition dos three partitions dos/vs seven giving partition docs placed crimp practicability leigh lundin designed fx pseudo-partition relieved user relinquishing working partition fx appeared dos/vs version sdi grasp f0 docs sold north america cfs inc brookline overseas sales cfs engaged mail order local vendors product also embedded third party operating system packages edos vdos | [
868,
8900,
7272,
8393,
4586,
10094,
8687,
7928,
9137,
10958,
5492,
3669,
2616,
11131
] | Validation |
6,648 | 4 | UK_cyber_security_community:uk cyber security community cyber security information assurance community united kingdom diverse many stakeholders groups contributing support uk cyber security strategy following list stakeholders according parliamentary committee uk government enough protect nation cyber attack cyber aware cross-government awareness behaviour campaign provides advice simple measures individuals take protect cyber crime department digital culture media sport one lead government departments cyber security policy responsible supporting promoting uk cyber security sector promoting cyber security research innovation working national cyber security centre help ensure uk organisations secure online resilient cyber threats get safe online united kingdom-based campaign national initiative teach citizens basic computer security internet privacy national crime agency nca hosts law enforcement cyber crime unit incorporating child exploitation online protection centre national cyber security centre uk ’ authority cyber security parent organisation gchq absorbed replaced cesg information security arm gchq well centre cyber assessment cca computer emergency response team uk cert uk cyber-related responsibilities centre protection national infrastructure cpni ncsc provides advice support public private sector avoid cyber threats cesg originally communications-electronics security group branch gchq worked secure communications information systems government critical parts uk national infrastructure centre protection national infrastructure cpni provided protective security advice businesses organisations across national infrastructure national security council cabinet committee tasked overseeing issues related national security intelligence coordination defence strategy office cyber security information assurance ocsia supports minister cabinet office rt hon francis maude mp national security council determining priorities relation securing cyberspace unit provides strategic direction coordinates action relating enhancing cyber security information assurance uk ocsia headed james quinault trustworthy software initiative tsi uk public good activity sponsored uk government centre protection national infrastructure aimed 'making software better warning advice reporting points warps provide trusted environment members community share problems solutions uk cyber security forum social enterprise representing cyber sme small medium enterprise uk forum composed 20 regional cyber clusters around uk cluster run subsidiary uk cyber security forum operated groups volunteers provide events around uk engage public cyber security provide continued professional development cyber professionals official clusters ads trade organisation companies operating uk aerospace defence security space industries business continuity institute bci established 1994 enable individual members obtain guidance support fellow business continuity practitioners profit accreditation certification organisation cdf promotes global interests uk crypto development industry information assurance advisory council iaac works across industry government academia towards ensuring uk ’ information society robust resilient secure foundation iaac set baroness neville-jones chaired organisation 2007 handing current chairman sir edmund burton affiliates include bt group northrop grumman qinetiq raytheon pwc o2 uk ultra electronics glaxosmithkline 2012/13 work programme focused consumerisation effects information assurance iacg formed following uk national ia conference 2006 iacg encourages greater collaboration commercial supply base information assurance products services operating within uk public sector stakeholders include cesg bis office cyber security information assurance ocsia cyber security operations centre csoc cpni group maintains uk information assurance community map hosted cesg web site two co-chairs colin robbins nexor ross parsell thales iacg ceased operation 2014 information systems security association issa not-for-profit international professional organization information security professionals practitioners uk chapter institute information security professionals iisp independent non-profit body governed members principal objective advancing professionalism information security practitioners thereby professionalism industry whole isaca international professional association deals governance previously known information systems audit control association isc ² international information systems security certification consortium non-profit organization specializes information security education certifications ndi former government-funded organisation building supply chains mod manufacturers using smes united kingdom techuk formerly known intellect uk trade association technology industry cyber security group focused “ high threat ” areas – including defence national security resilience protection critical national infrastructure intelligence organised crime chaired dr andrew rogoyski roke manor research security resilience group works build strong relationships technology industry policymakers customers end users chaired stephen kingan nexor tigerscheme commercial certification scheme technical security specialists backed university standards covering wide range expertise tigerscheme cesg certified uk candidates subject independent rigorous academic assessment authority tigerscheme founded 2007 principle commercial certification scheme run independent lines would give buyers security testing services confidence hiring recognised reputable company june 2014 operational authority tigerscheme transferred usw commercial services ltd. ukceb not-for-profit membership organisation whose mission transform secure information sharing life collaboration defence acquisition support british computer society bcs professional body learned society represents working information technology united kingdom internationally security data privacy group cyber scheme profit professional examination body contract national cyber security centre provide technical exams support governments assured penetration testing company scheme check exams independent rigorous conducted practitioner team member level team leader levels gchq accredited several academic centres excellence cyber security research accreditations expire july 2017 results re-accreditation process expected mid february 2017 information security research group isrg university south wales multidisciplinary team academics industrial experts focusing upon cyber security particular group focusing upon cyber security centre csc de montfort university multidisciplinary group academics focus wide variety cyber security digital forensics issues centre mission provide full benefits safe secure resilient cyberspace | [
10116,
8613,
6054,
9319,
4904,
10823,
5226,
7979,
7692,
4435,
691,
4595,
6110,
10717,
2558
] | Validation |
6,649 | 5 | Link_Control_Protocol:link control protocol computer networking link control protocol lcp forms part point-to-point protocol ppp within family internet protocols setting ppp communications sending receiving devices send lcp packets determine standards ensuing data transmission lcp protocol devices use ppp transmit data network lcp packet determines acceptability link lcp packets embedded ppp packets therefore basic ppp connection established lcp reconfigure lcp ppp packets control code 0xc021 info field contains lcp packet four fields code id length data | [
2080,
8432,
5991
] | Validation |
6,650 | 5 | Registered_port:registered port registered port network port sub-address defined within internet protocol range 1024–49151 assigned internet assigned numbers authority iana internet corporation assigned names numbers icann march 21 2001 usc/isi 1998 use certain protocol application ports numbers 0–1023 called system well-known ports ports numbers 1024-49151 called user registered ports ports numbers 49152-65535 called dynamic and/or private ports system user ports used transport protocols tcp udp dccp sctp indicate application service | [
5472,
6273,
6993,
5652,
11413,
11126
] | Test |
6,651 | 5 | Lightweight_Directory_Access_Protocol:lightweight directory access protocol lightweight directory access protocol ldap open vendor-neutral industry standard application protocol accessing maintaining distributed directory information services internet protocol ip network directory services play important role developing intranet internet applications allowing sharing information users systems networks services applications throughout network examples directory services may provide organized set records often hierarchical structure corporate email directory similarly telephone directory list subscribers address phone number ldap specified series internet engineering task force ietf standard track publications called request comments rfcs using description language asn.1 latest specification version 3 published rfc 4511 road map technical specifications provided rfc4510 common use ldap provide central place store usernames passwords allows many different applications services connect ldap server validate users ldap based simpler subset standards contained within x.500 standard relationship ldap sometimes called x.500-lite telecommunication companies understanding directory requirements well developed 70 years producing managing telephone directories companies introduced concept directory services information technology computer networking input culminating comprehensive x.500 specification suite protocols produced international telecommunication union itu 1980s x.500 directory services traditionally accessed via x.500 directory access protocol dap required open systems interconnection osi protocol stack ldap originally intended lightweight alternative protocol accessing x.500 directory services simpler widespread tcp/ip protocol stack model directory access borrowed dixie directory assistance service protocols protocol originally created tim howes university michigan steve kille isode limited colin robbins nexor wengyik yeong performance systems international circa 1993 successor dixie das mark wahl critical angle inc. tim howes steve kille started work 1996 new version ldap ldapv3 aegis internet engineering task force ietf ldapv3 first published 1997 superseded ldapv2 added support extensibility integrated simple authentication security layer better aligned protocol 1993 edition x.500 development ldapv3 specifications numerous extensions adding features ldapv3 come ietf early engineering stages ldap known lightweight directory browsing protocol ldbp renamed expansion scope protocol beyond directory browsing searching include directory update functions given lightweight name network intensive dap predecessor thus easily implemented internet due relatively modest bandwidth usage ldap influenced subsequent internet protocols including later versions x.500 xml enabled directory xed directory service markup language dsml service provisioning markup language spml service location protocol slp also used basis microsoft active directory client starts ldap session connecting ldap server called directory system agent dsa default tcp udp port 389 port 636 ldaps ldap ssl see client sends operation request server server sends responses return exceptions client need wait response sending next request server may send responses order information transmitted using basic encoding rules ber client may request following operations addition server may send unsolicited notifications responses request e.g connection timed common alternative method securing ldap communication using ssl tunnel default port ldap ssl 636 use ldap ssl common ldap version 2 ldapv2 never standardized formal specification usage deprecated along ldapv2 officially retired 2003 global catalog available default ports 3268 3269 ldaps protocol provides interface directories follow 1993 edition x.500 model dn may change lifetime entry instance entries moved within tree reliably unambiguously identify entries uuid might provided set entry operational attributes entry look like represented ldap data interchange format ldif ldap binary protocol codice_3 distinguished name entry neither attribute part entry codice_4 entry rdn relative distinguished name codice_5 dn parent entry codice_6 denotes 'domain component lines show attributes entry attribute names typically mnemonic strings like codice_7 common name codice_6 domain component codice_9 e-mail address codice_10 surname server holds subtree starting specific entry e.g codice_5 children servers may also hold references servers attempt access codice_12 could return referral continuation reference server holds part directory tree client contact server servers also support chaining means server contacts server returns results client ldap rarely defines ordering server may return values attribute attributes entry entries found search operation order follows formal definitions entry defined set attributes attribute set values sets need ordered add operation inserts new entry directory-server database distinguished name add request already exists directory server add duplicate entry set result code add result decimal 68 entryalreadyexists example codice_13 must exist codice_14 must exist ldap session created ldap client connects server authentication state session set anonymous bind operation establishes authentication state session simple bind sasl plain send user dn password plaintext connections utilizing either simple sasl plain encrypted using transport layer security tls server typically checks password codice_15 attribute named entry anonymous bind empty dn password resets connection anonymous state sasl simple authentication security layer bind provides authentication services wide range mechanisms e.g kerberos client certificate sent tls bind also sets ldap protocol version sending version number form integer client requests version server support server must set result code bind response code protocol error normally clients use ldapv3 default protocol always ldap libraries bind first operation session ldapv2 required ldapv3 ldapv3 successful bind request changes authentication state session unsuccessful bind request resets authentication state session delete entry ldap client transmits properly formed delete request server search operation used search read entries parameters server returns matching entries potentially continuation references may returned order final result include result code compare operation takes dn attribute name attribute value checks named entry contains attribute value modify operation used ldap clients request ldap server make changes existing entries attempts modify entries exist fail modify requests subject access controls implemented server modify operation requires distinguished name dn entry specified sequence changes change sequence must one ldif example adding value attribute replace value existing attribute use replace keyword attribute multi-valued client must specify value attribute update delete attribute entry use keyword delete changetype designator modify attribute multi-valued client must specify value attribute delete also modify-increment extension allows incrementable attribute value incremented specified amount following example using ldif increments employeenumber 5 ldap servers replicated topology ldap clients consider using post-read control verify updates instead search update post-read control designed applications need issue search request update – bad form retrieve entry sole purpose checking update worked replication eventual consistency model ldap client assume connects directory server request architects may placed load-balancers ldap proxies ldap clients servers modify dn move/rename entry takes new rdn relative distinguished name optionally new parent dn flag indicates whether delete value entry match old rdn server may support renaming entire directory subtrees update operation atomic operations see either new entry old one hand ldap define transactions multiple operations read entry modify another client may updated entry meantime servers may implement extensions support though extended operation generic ldap operation define new operations part original protocol specification starttls one significant extensions examples include cancel password modify starttls operation establishes transport layer security descendant ssl connection provide data confidentiality protect data observed third parties and/or data integrity protection protects data tampering tls negotiation server sends x.509 certificate prove identity client may also send certificate prove identity client may use sasl/external using sasl/external client requests server derive identity credentials provided lower level tls though technically server may use identity information established lower level typically server use identity information established tls servers also often support non-standard ldaps secure ldap commonly known ldap ssl protocol separate port default 636 ldaps differs ldap two ways 1 upon connect client server establish tls ldap messages transferred without starttls operation 2 ldaps connection must closed upon tls closure ldaps client libraries encrypt communication check host name name supplied certificate abandon operation requests server abort operation named message id server need honor request neither abandon successfully abandoned operation send response similar cancel extended operation send responses implementations support unbind operation abandons outstanding operations closes connection response name historical origin opposite bind operation clients abort session simply closing connection use unbind unbind allows server gracefully close connection free resources would otherwise keep time discovering client abandoned connection also instructs server cancel operations canceled send responses operations canceled ldap uniform resource identifier uri scheme exists clients support varying degrees servers return referrals continuation references see rfc 4516 components described optional example codice_28 refers user attributes john doe entry codice_29 codice_30 searches entry default server note triple slash omitting host double question mark omitting attributes urls special characters must percent-encoded similar non-standard codice_31 uri scheme ldap ssl confused ldap tls achieved using starttls operation using standard codice_32 scheme contents entries subtree governed directory schema set definitions constraints concerning structure directory information tree dit schema directory server defines set rules govern kinds information server hold number elements including attributes elements responsible storing information directory schema defines rules attributes may used entry kinds values attributes may clients may interact values clients may learn schema elements server supports retrieving appropriate subschema subentry schema defines object classes entry must objectclass attribute containing named classes defined schema schema definition classes entry defines kind object entry may represent e.g person organization domain object class definitions also define list attributes must contain values list attributes may contain values example entry representing person might belong classes top person membership person class would require entry contain sn cn attributes allow entry also contain userpassword telephonenumber attributes since entries may multiple objectclasses values entry complex optional mandatory attribute sets formed union object classes represents objectclasses inherited single entry multiple objectclasses values define available required attributes entry parallel schema objectclass class definition instance object-oriented programming representing ldap objectclass ldap entry respectively directory servers may publish directory schema controlling entry base dn given entry subschemasubentry operational attribute operational attribute describes operation directory rather user information returned search explicitly requested server administrators add additional schema entries addition provided schema elements schema representing individual people within organizations termed white pages schema lot server operation left implementor administrator decide accordingly servers may set support wide variety scenarios example data storage server specified server may use flat files databases gateway server access control standardized though work commonly used models users passwords may stored entries elsewhere server may refuse perform operations wishes impose various limits parts ldap extensible examples one define new operations controls may modify requests responses e.g request sorted search results new search scopes bind methods defined attributes options may modify semantics ldap gained momentum vendors provided access protocol services implementation recasts data mimic ldap/x.500 model closely model followed varies example software access sql databases ldap even though ldap readily lend x.500 servers may support ldap well similarly data previously held types data stores sometimes moved ldap directories example unix user group information stored ldap accessed via pam nss modules ldap often used services authentication and/or authorization actions given already-authenticated user service example active directory kerberos used authentication step ldap used authorization step example data model glue schema used distributed information system based ldap enable users applications services discover services exist grid infrastructure information structure state ldap server may return referrals servers requests fulfill requires naming structure ldap entries one find server holding given distinguished name dn concept defined x.500 directory also used ldap another way locating ldap servers organization dns server record srv organization domain example.org may use top level ldap dn codice_33 dc means domain component ldap server also named ldap.example.org organization top level ldap url becomes codice_34 primarily two common styles naming used x.500 2008 ldapv3 documented itu specifications ietf rfcs original form takes top level object country object codice_35 codice_36 domain component model uses model described example country based naming could codice_37 us codice_38 | [
514,
10242,
1030,
3592,
6161,
8211,
6681,
6682,
10269,
10271,
6689,
35,
9251,
2085,
7208,
4140,
7214,
8238,
562,
1586,
9269,
6710,
11321,
1594,
2556,
3133,
1086,
4158,
5181,
7231,
6723,
7753,
8265,
9290,
8781,
4687,
8788,
5723,
2143,
6756... | None |
6,652 | 2 | THE_multiprogramming_system:multiprogramming system multiprogramming system os computer operating system designed team led edsger w. dijkstra described monographs 1965-66 published 1968 dijkstra never named system simply abbreviation technische hogeschool eindhoven name dutch eindhoven university technology netherlands system primarily batch system supported multitasking designed multi-user operating system much like sds 940 set processes system static system apparently introduced first forms software-based paged virtual memory electrologica x8 support hardware-based memory management freeing programmers forced use actual physical locations drum memory using modified algol compiler programming language supported dijkstra system automatically generate calls system routines made sure requested information memory swapping necessary paged virtual memory also used buffering i/o device data significant portion operating system code well nearly algol 60 compiler system semaphores used programming construct first time design multiprogramming system significant use layered structure higher layers depend lower layers constraint higher layers depend lower layers imposed designers order make reasoning system using quasi-formal methods tractable also facilitate building testing system incrementally layers implemented order layer 0 first thorough testing abstractions provided layer turn division kernel layers similar ways multics later ring-segmentation model several subsequent operating systems used layering extent including windows nt macos although usually fewer layers code system written assembly language dutch electrologica x8 computer computer word size 27 bits 32 kilowords core memory 512 kilowords drum memory providing backing store lru cache algorithm paper tape readers paper tape punches plotters printers | [
512,
2179,
6403,
9224,
8976,
6675,
11539,
1952,
10016,
2339,
2345,
7983,
5040,
8262,
3529,
1610,
9294,
5457,
5585,
6868,
2012,
477,
2399,
7775,
4201,
11242,
2283,
11625,
5363,
6772
] | Test |
6,653 | 4 | Stegomalware:stegomalware stegomalware type malware uses steganography hinder detection steganography practice concealing file message image video within another file message image video network traffic type malware operates building steganographic system hide malicious data within resources extracts executes dynamically considered one sophisticated stealthy ways obfuscation term stegomalware introduced researchers context mobile malware presented inscrypt conference 2014 however fact mobile malware could potentially utilize steganography already presented earlier works use steganography malware first applied botnets communicating probabilistically unobservable channels mobile malware based covert channels proposed year steganography later applied components malware engineering return-oriented programming compile-time obfuscation among others europol-supported cuing initiative monitors use steganography malware | [
8171,
1103,
3924,
7515,
10141
] | Test |
6,654 | 1 | Bento_(database):bento database bento database application mac os x made filemaker inc. bento differs significantly company flagship product filemaker pro relies heavily templates integration applications default bento data sources include apple address book calendar previously called ical applications modify directly filemaker announced july 31 2013 would discontinue bento september 30 2013 bento compatible mac os x 10.5 later due reliance features available previous versions operating system certain actions switching templates use core animation animate transition also includes integration time machine backing requires ical 3.0 later renamed calendar live data editing public preview made available along initial product announcement november 13 2007 first final version released january 8 2008 bento template pre-made library forms necessary catalog items within certain context release bento 2 october 14 2008 bento users could import export share templates june 16 2009 filemaker launched template sharing site users download variety templates well share couple user-created template sharing sites also exist october 14 2008 filemaker released bento 2.0 bug fixes new features including integration apple mail new version offer upgrade pricing cost version 1 many customers expressed disappointment official bento user forums filemaker responded using pricing model companies products apple iwork ilife suites additionally november 25 filemaker provided official statement indicating would discontinue revisions bug fixes version 1 product.given interest revision neither quick easy decision come to. br br bento 1 received extensive beta testing like every software product issues discovered shipment followed bento 1.0.2 address critical issues discovered. br br addressing product issues discovered 1.0.2 2.0 release reworked product significant sometimes architectural ways simply put means way easily migrate fixes 2.0 backwards 1.0 would reengineer 1.0 effectively became 2.0 would strongly delayed 2.0.3 version bento releasing free update bento 2.0.1/2.0.2 week continued development bento product line may 20 2012 price bento 4 49 single license 99 'family pack five licenses filemaker announced july 31 2013 would completely discontinue bento product line september 30 2013 technical support bento products finally ending july 30 2014 | [
10755,
9732,
4614,
1549,
4111,
7697,
11289,
6186,
6700,
1074,
8754,
9784,
8253,
576,
5696,
8783,
4180,
10838,
1623,
3167,
3681,
9826,
5733,
8806,
3691,
2676,
6264,
7292,
7806,
2686,
6783,
10878,
8842,
5784,
1177,
4251,
3228,
2207,
10406,
... | Test |
6,655 | 0 | Translation_memory:translation memory translation memory tm database stores segments sentences paragraphs sentence-like units headings titles elements list previously translated order aid human translators translation memory stores source text corresponding translation language pairs called “ translation units ” individual words handled terminology bases within domain tm software programs use translation memories sometimes known translation memory managers tmm translation memory systems tm systems confused translation management system tms another type software focused managing process translation translation memories typically used conjunction dedicated computer assisted translation cat tool word processing program terminology management systems multilingual dictionary even raw machine translation output research indicates many companies producing multilingual documentation using translation memory systems survey language professionals 2006 82.5 874 replies confirmed use tm usage tm correlated text type characterised technical terms simple sentence structure technical lesser degree marketing financial computing skills repetitiveness content program breaks source text text translated segments looks matches segments source half previously translated source-target pairs stored translation memory presents matching pairs translation candidates translator accept candidate replace fresh translation modify match source last two cases new modified translation goes database translation memory systems search 100 matches say retrieve segments text match entries database exactly others employ fuzzy matching algorithms retrieve similar segments presented translator differences flagged important note typical translation memory systems search text source segment flexibility robustness matching algorithm largely determine performance translation memory although applications recall rate exact matches high enough justify 100 -match approach segments match found translated translator manually newly translated segments stored database used future translations well repetitions segment current text translation memories work best texts highly repetitive technical manuals also helpful translating incremental changes previously translated document corresponding example minor changes new version user manual traditionally translation memories considered appropriate literary creative texts simple reason little repetition language used however others find value even non-repetitive texts database resources created value concordance searches determine appropriate usage terms quality assurance empty segments simplification review process source target segment always displayed together translators work two documents traditional review environment translation memory managers suitable translating technical documentation documents containing specialized vocabularies benefits include main problems hindering wider use translation memory managers include use tm systems might effect quality texts translated main effect clearly related so-called error propagation translation particular segment incorrect fact likely incorrect translation reused next time source text similar source text translated thereby perpetuating error.traditionally two main effects quality translated texts described sentence-salad effect bédard 2000 cited ’ hagan 2009 50 peep-hole effect heyn 1998 first refers lack coherence text level text translated using sentences tm translated different translators different styles according latter translators may adapt style use tm system order contain intratextual references segments better reused future texts thus affecting cohesion readability o'hagan 2009 potential present probably unconscious effect translated text different languages use different sequences logical elements within sentence translator presented multiple clause sentence half translated less likely completely rebuild sentence consistent empirical evidences martín-mor 2011 show translators likely modify structure multiple clause sentence working text processor rather tm system also potential translator deal text mechanically sentence-by-sentence instead focusing sentence relates around text whole researchers dragsted 2004 identified effect relates automatic segmentation feature programs necessarily negative effect quality translations note effects closely related training rather inherent tool according martín-mor 2011 use tm systems effect quality translated texts especially novices experienced translators able avoid pym 2013 reminds translators using tm/mt tend revise segment go along allowing little time final revision whole text end might fact ultimate cause effects described following summary main functions translation memory function used transfer text translation text file tm import done raw format external source text available importing tm along translation sometimes texts reprocessed user another format used import native format format one uses tm save translation memories file process analysis involves following steps export transfers text tm external text file import export inverses translating one main purposes tm retrieve useful matches memory translator choose best one tm must show source target text pointing identities differences several different types matches retrieved tm tm updated new translation accepted translator always updating database question previous contents database tm modified changing deleting entries tm systems allow translators save multiple translations source segment translation memory tools often provide automatic retrieval substitution networking enables group translators translate text together faster working isolation sentences phrases translated one translator available others moreover translation memories shared final translation opportunity mistakes one translator corrected team members text memory basis proposed lisa oscar xml tm standard text memory comprises author memory translation memory unique identifiers remembered translation target language document 'exactly aligned text unit level source document subsequently modified text units changed directly transferred new target version document without need translator interaction concept 'exact 'perfect matching translation memory xml tm also provide mechanisms in-document leveraged fuzzy matching 1970s infancy stage tm systems scholars carried preliminary round exploratory discussions original idea tm systems often attributed martin kay proper place paper details fully given paper shown basic concept storing system translator might start issuing command causing system display anything store might relevant ... going examine past future fragments text contain similar material observation kay actually influenced suggestion peter arthern translators use similar already translated documents online 1978 article gave fully demonstration call tm systems today new text would typed word processing station typed system would check text earlier texts stored memory together translation official languages european community ... one advantage machine translation proper would passages retrieved would grammatically correct effect operating electronic 'cut stick process would according calculations save least 15 per cent time translators employ effectively producing translations idea incorporated alps automated language processing systems tools first developed researcher brigham young university time idea tm systems mixed tool call repetitions processing aimed find matched strings long time concept so-called translation memory come real exploratory stage tm systems would 1980s one first implementation tm system appeared sadler vendelmans bilingual knowledge bank bilingual knowledge bank syntactically referentially structured pair corpora one translation translation units cross-coded corpora aim bilingual knowledge bank develop corpus-based general-purpose knowledge source applications machine translation computer-aided translation sadler vendelman 1987 another important step made brian harris bi-text defined bi-text single text two dimensions 1988 source target texts related activity translator translation units made similar echoes sadler bilingual knowledge bank harris work proposed something like tm system without using name database paired translations searchable either individual word whole translation unit latter case search allowed retrieve similar rather identical units tm technology became commercially available wide scale late 1990s efforts made several engineers translators note first tm tool called trados sdl trados nowadays tool opening source file applying translation memory 100 matches identical matches fuzzy matches similar identical matches within text instantly extracted placed within target file matches suggested translation memory either accepted overridden new alternatives translation unit manually updated stored within translation memory future use well repetition current text similar way segments target file without match would translated manually automatically added translation memory 2000s online translation services began incorporating tm machine translation services like google translate well professional hybrid translation services provided sites like gengo ackuna incorporate databases tm data supplied translators volunteers make efficient connections languages provide faster translation services end-users one recent development concept 'text memory contrast translation memory also basis proposed lisa oscar standard text memory within xml tm comprises 'author memory 'translation memory author memory used keep track changes authoring cycle translation memory uses information author memory implement translation memory matching although primarily targeted xml documents xml tm used document converted xliff format much powerful first-generation tm systems include linguistic analysis engine use chunk technology break segments intelligent terminological groups automatically generate specific glossaries translation memory exchange tmx standard enables interchange translation memories translation suppliers tmx adopted translation community best way importing exporting translation memories current version 1.4b allows recreation original source target documents tmx data termbase exchange lisa standard revised republished iso 30042 allows interchange terminology data including detailed lexical information framework tbx provided three iso standards iso 12620 iso 12200 iso 16642 iso 12620 provides inventory well-defined “ data categories ” standardized names function data element types predefined values iso 12200 also known martif provides basis core structure tbx iso 16642 also known terminological markup framework includes structural meta-model terminology markup languages general universal terminology exchange utx format standard specifically designed used user dictionaries machine translation used general human-readable glossaries purpose utx accelerate dictionary sharing reuse extremely simple practical specification segmentation rules exchange srx intended enhance tmx standard translation memory data exchanged applications used effectively ability specify segmentation rules used previous translation may increase leveraging achieved gilt metrics gilt stands globalization internationalization localization translation gilt metrics standard comprises three parts gmx-v volume metrics gmx-c complexity metrics gmx-q quality metrics proposed gilt metrics standard tasked quantifying workload quality requirements given gilt task open lexicon interchange format olif open xml-compliant standard exchange terminological lexical data although originally intended means exchange lexical data proprietary machine translation lexicons evolved general standard terminology exchange xml localisation interchange file format xliff intended provide single interchange file format understood localization provider xliff preferred way exchanging data xml format translation industry translation web services transws specifies calls needed use web services submission retrieval files messages relating localization projects intended detailed framework automation much current localization process use web services xml tm xml-based text memory approach translation memory based concept text memory comprises author translation memory xml tm donated lisa oscar xml-intl gettext portable object format though often regarded translation memory format gettext po files bilingual files also used translation memory processes way translation memories used typically po translation memory system consist various separate files directory tree structure common tools work po files include gnu gettext tools translate toolkit several tools programs also exist edit po files mere source text files | [
1890,
10724,
717,
9645,
7599,
8688,
9552,
567,
7164
] | None |
6,656 | 3 | Grosch's_law:grosch law grosch law following observation computer performance made herb grosch 1953 believe fundamental rule modestly call grosch law giving added economy square root increase speed — calculation ten times cheaply must hundred times fast adage commonly stated computer performance increases square cost computer costs twice much computer b expect computer four times fast computer b two years grosch statement seymour cray quoted business week august 1963 expressing thought computers obey square law — price doubles get least four times much speed law also interpreted meaning computers present economies scale costly computer price–performance ratio linearly becomes better implies low-cost computers compete market analysis rental cost/performance data computers 1951 1963 knight found grosch law held commercial scientific operations modern analysis data found grosch law applied commercial operations separate study knight found grosch law apply computers 1963-1967 also confirmed modern analysis paul strassmann asserted 1997 never clear whether grosch law reflection ibm priced computers whether related actual costs provided rationale bigger computer always better ibm sales force used grosch rationale persuade organizations acquire computing capacity needed grosch law also became justification offering time-sharing services big data centers substitute distributed computing grosch stated law useful 1960s 1970s today originally intended law means pricing computing services | [
1376,
2273,
5798,
5802,
78,
8367,
785,
1778,
6801,
153,
7006
] | Test |
6,657 | 5 | Lynx_(web_browser):lynx web browser lynx customizable text-based web browser use cursor-addressable character cell terminals oldest web browser still general use active development started 1992 lynx product distributed computing group within academic computing services university kansas initially developed 1992 team students staff university lou montulli michael grobe charles rezac hypertext browser used solely distribute campus information part campus-wide information server browsing gopher space beta availability announced usenet 22 july 1992 1993 montulli added internet interface released new version 2.0 browser garrett blythe created doslynx april 1994 later joined lynx effort well foteos macrides ported much lynx vms maintained time 1995 lynx released gnu general public license maintained group volunteers led browsing lynx consists highlighting chosen link using cursor keys links page numbered entering chosen link number current versions support ssl many html features tables formatted using spaces frames identified name explored separate pages lynx inherently display various types non-text content web images video launch external programs handle image viewer video player unlike web browsers lynx support javascript adobe flash websites require work correctly speed benefits text-only browsing apparent using low bandwidth internet connections older computer hardware may slow render image-heavy content lynx support graphics web bugs track user information fetched therefore web pages read without privacy concerns graphic web browsers however lynx support http cookies also used track user information lynx therefore supports cookie whitelisting blacklisting alternatively cookie support disabled permanently conventional browsers lynx also supports browsing histories page caching raise privacy concerns lynx accepts configuration options either command-line options configuration files 142 command line options according help message template configuration file codice_1 lists 233 configurable features overlap two although command-line options codice_2 matched codice_1 addition pre-set options command-line configuration file lynx behavior adjusted runtime using options menu overlap settings lynx implements many runtime optional features optionally controlled setting configuration file allowing choices saved separate writable configuration file reason restricting options saved originated usage lynx common mid-1990s i.e. using lynx front-end application internet accessed dial-in connections refreshable braille display text-to-speech–friendly interface lynx used internet access visually impaired users lynx substitutes images frames non-textual content text codice_4 codice_5 codice_6 html attributes allows hiding user interface elements browser becomes specifically suitable use cost-effective general purpose screen reading software version lynx specifically enhanced use screen readers windows developed indian institute technology madras lynx also useful accessing websites remotely connected system graphical display available despite text-only nature age still used effectively browse much modern web including performing interactive tasks editing wikipedia since lynx take keystrokes text file still useful automated data entry web page navigation web scraping consequently lynx used web crawlers web designers may use lynx determine way search engines web crawlers see sites develop online services provide lynx view given web page available lynx also used test websites performance one run browser different locations remote access technologies like telnet ssh one use lynx test web site connection performance different geographical locations simultaneously another possible web design application browser quick checking site links lynx originally designed unix-like operating systems though ported vms soon public release systems including dos microsoft windows classic mac os os/2 included default openbsd installation openbsd 2.3 may 1998 5.5 may 2014 main tree prior july 2014 subsequently made available ports tree also found repositories linux distributions well homebrew fink repositories macos ports beos minix qnx amigaos os/2 also available sources built many platforms e.g. mention made google android operating system | [
513,
6657,
9736,
2579,
7188,
7702,
6171,
9757,
7713,
3110,
10791,
9770,
559,
4661,
3639,
10808,
3643,
9275,
64,
576,
5707,
10834,
6231,
8281,
6747,
10341,
1642,
9834,
9841,
115,
9843,
3191,
119,
4728,
124,
637,
1664,
2182,
6797,
3218,
1... | Test |
6,658 | 4 | Digger_gold:digger gold digger gold common slang term gold recovered electronics components board fingers cpus connector pins gold fingers boards circuits often stripping solution used remove gold board material nitric acid also works well regard many gold components soldered boards silver-based solders soluble nitric acid gold dissolving metals solution digger gold recovered dissolution gold aqua regia subsequent selective precipitation gold using ferrous sulfate another selective reducing agent hydrazine | [
1477,
11534,
9499,
3666,
2867,
403,
7579
] | Validation |
6,659 | 3 | ELVEES_Multicore:elvees multicore multicore series 32-bit microprocessors embedded dsp cores developed elvees russia microprocessor mips32 core called riscore32 elvees optionally fpu arm cortex-a9 core processors series radiation hardened rad-hard space applications | [
9861,
7687,
1425,
6033,
2838,
4386,
426,
6957,
8625,
1461,
2490,
11580,
5825,
7234,
7745,
2503,
2523,
9309,
5358,
1776,
499,
1399
] | Test |
6,660 | 3 | Commodore_PC_compatible_systems:commodore pc compatible systems commodore pc compatible systems range ibm pc compatible personal computers introduced 1984 home computer manufacturer commodore business machines incompatible commodore prior commodore 64 amiga architectures generally regarded good serviceable workhorse pcs nothing spectacular well-established commodore name seen competitive asset 1984 commodore signed deal intel second source manufacture intel 8088 cpu used ibm pc along license manufacture computer based dynalogic hyperion unknown whether systems produced sold 1987 first model released pc-10 sold 559 without monitor sold alongside commodore amiga commodore 64c/128 lines home graphics computers pc10 comparable market blue chip pc leading edge model tandy 1000 line pc compatibles line consists following models | [
6129,
4642,
1461,
2159
] | Test |
6,661 | 2 | Stormy_Peters:stormy peters stormy peters information technology industry analyst prominent free open source software foss advocate promoting business use foss advocates consultant conference speaker co-founded later appointed executive director gnome foundation previously worked mozilla cloud foundry works red hat peters birth name robyn however gone name since childhood peters completed bachelor arts major computer science rice university initially worked software engineer hewlett-packard unix development team approximately 1999 peters managing hp-ux desktop development became aware gnome project team decided provide gnome hpux peters role explaining open source business intellectual property models hewlett-packard management later founded hewlett-packard open source program office 2000 became one founding members gnome foundation advisory board december 2005 peters became director product management openlogic open source services company july 2008 peters left openlogic became executive director gnome foundation role coordinating sponsors business development marketing november 2010 left mozilla since august 2011 member gnome board directors peters given keynote talks many open source conferences including open source business conference linux.conf.au 2008 2009 gnome.asia summit beijing ho chi minh city respectively ohio linuxfest 2010 | [
1304,
5384,
5492,
9455
] | Validation |
6,662 | 0 | Mark_Steedman:mark steedman mark jerome steedman fba frse born 18 september 1946 computational linguist cognitive scientist steedman graduated university sussex 1968 b.sc experimental psychology university edinburgh 1973 ph.d. artificial intelligence dissertation formal description musical perception gained 1972 advisor prof. h.c. longuet-higgins frs held posts lecturer psychology university warwick 1977–83 lecturer reader computational linguistics university edinburgh 1983-8 associate full professor computer information sciences university pennsylvania 1988–98 held visiting positions university texas austin max planck institute psycholinguistics nijmegen university pennsylvania philadelphia steedman currently holds chair cognitive science school informatics university edinburgh 1998- works computational linguistics artificial intelligence cognitive science generation meaningful intonation speech artificial agents animated conversation communicative use gesture tense aspect combinatory categorial grammar ccg also interested computational musical analysis combinatory logic | [
1890,
10890,
7724,
4916,
10102,
1783
] | Test |
6,663 | 3 | IBM_Rivina:ibm rivina rivina experimental 64-bit powerpc microprocessor built ibm 2000 successor guts gigahertz unit test site purpose build processor able reach high frequencies first microprocessors reach surpass 1 ghz mark project work conducted fewer twenty engineers course two years idea use aggressive circuit design techniques carefully crafted floorplan microarchitecture keeping short six stage pipeline guts supported subset 100 mainly integer instructions powerpc instruction set rivina used complete 64-bit powerpc specification including dual precision floating point address translation guts small single cycle 4 kb l1 cache rivina used two-cycle two set associative 64 kb cache instead processor comprised 19 million transistors manufactured using ibm cmos 7s 0.22 μm copper fabrication process able reach 1.15 ghz dissipating 112 watts 101 °c | [
6914,
4868,
10501,
3846,
4743,
5642,
1548,
1933,
398,
3472,
1563,
1309,
3493,
6949,
6311,
8102,
1321,
9391,
10543,
4017,
5297,
8120,
9020,
1725,
1983,
10180,
8523,
8530,
3540,
342,
9302,
11613,
6878,
1635,
10214,
10985,
10734,
3185,
4211,
... | Validation |
6,664 | 9 | Linker_(computing):linker computing computing linker link editor computer utility program takes one object files generated compiler assembler combines single executable file library file another 'object file simpler version writes output directly memory called loader though loading typically considered separate process computer programs typically composed several parts modules parts/modules need contained within single object file cases refer means symbols addresses modules mapped memory addresses linked execution typically object file contain three kinds symbols compilers object file result compiling one input source code file program comprises multiple object files linker combines files unified executable program resolving symbols goes along linkers take objects collection called library runtime library linkers include whole library output include files referenced object files libraries library linking may thus iterative process modules included requiring additional modules linked libraries exist diverse purposes one system libraries usually linked default linker also takes care arranging objects program address space may involve relocating code assumes specific base address another base since compiler seldom knows object reside often assumes fixed base location example zero relocating machine code may involve re-targeting absolute jumps loads stores executable output linker may need another relocation pass finally loaded memory execution pass usually omitted hardware offering virtual memory every program put address space conflict even programs load base address pass may also omitted executable position independent executable unix variants sintran iii process performed linker assembling object files program called loading loading executable code onto file additionally operating systems program handles jobs linking loading program dynamic linking many operating system environments allow dynamic linking deferring resolution undefined symbols program run means executable code still contains undefined symbols plus list objects libraries provide definitions loading program load objects/libraries well perform final linking approach offers two advantages also disadvantages static linking result linker copying library routines used program executable image may require disk space memory dynamic linking portable since require presence library system runs static linking also prevents dll hell since program includes exactly versions library routines requires conflict programs program using routines library require entire library installed compiler information layout objects final output take advantage shorter efficient instructions place requirement address another object example jump instruction reference absolute address offset current location offset could expressed different lengths depending distance target generating conservative instruction usually largest relative absolute variant depending platform adding relaxation hints possible substitute shorter efficient instructions final link step performed input objects read assigned temporary addresses linker relaxation pass subsequently reassigns addresses may turn allow relaxations occur general substituted sequences shorter allows process always converge best solution given fixed order objects case relaxations conflict linker needs weigh advantages either option instruction relaxation typically occurs link-time inner-module relaxation already take place part optimising process compile-time cases relaxation also occur load-time part relocation process combined dynamic dead-code elimination techniques ibm system/360 mainframe environments os/360 including z/os z/architecture mainframes type program known linkage editor name implies linkage editor additional capability allowing addition replacement and/or deletion individual program sections operating systems os/360 format executable load-modules containing supplementary data component sections program individual program section replaced parts program updated relocatable addresses references corrected linkage editor part process one advantage allows program maintained without keep intermediate object files without re-compile program sections n't changed also permits program updates distributed form small files originally card decks containing object module replaced systems object code form format 80-byte punched-card images updates introduced system using medium later releases os/360 subsequent systems load-modules contain additional data versions components modules create traceable record updates term linkage editor construed implying program operates user-interactive mode like text editor intended batch-mode execution editing commands supplied user sequentially organized files punched cards dasd magnetic tape tapes often used initial installation os | [
515,
9733,
9735,
2573,
11279,
3603,
5154,
4645,
4151,
2620,
2627,
3659,
1100,
4173,
9291,
1106,
2138,
4712,
7273,
8301,
2672,
3186,
9331,
2168,
5759,
10883,
4750,
2198,
6812,
3744,
7847,
8874,
1724,
7356,
9921,
1730,
1219,
5833,
7881,
994... | Test |
6,665 | 4 | Veracode:veracode veracode application security company based burlington massachusetts founded 2006 company provides automated cloud-based service securing web mobile third-party enterprise applications veracode provides multiple security analysis technologies single platform including static analysis dynamic analysis mobile application behavioral analysis software composition analysis march 9 2017 ca technologies announced acquiring veracode approximately 614 million cash april 3 2017 ca technologies announced completed acquisition veracode july 11 2018 broadcom announced acquiring veracode parent ca technologies 18.9 billion cash november 5 2018 broadcom announced completed acquisition ca technologies thus officially became new owner veracode business day thoma bravo private equity firm headquartered san francisco california announced agreed acquire veracode broadcom 950 million cash veracode founded chris wysopal christien rioux former engineers stake cambridge massachusetts-based security consulting firm known employing former “ white hat ” hackers l0pht heavy industries much veracode software written rioux 2007 company launched securityreview service used test code order find vulnerabilities could lead cybersecurity breaches hacking service intended used alternative penetration testing involves hiring security consultant hack system november 29 2011 company announced appointed robert t. brennan former ceo iron mountain incorporated new chief executive officer company issued report cybersecurity june 2015 report found sectors failed industry-standard security tests web mobile applications government worst performing sector regards fixing security vulnerabilities report issued company december 2015 found four five applications written popular web scripting languages contain least one critical risks industry-standard security benchmark 2014 veracode customers included three top four banks fortune 100 fortune reported march 2015 veracode planned file initial public offering ipo later year order go public major investors company include .406 ventures accomplice starvest partners meritech capital partners funding round announced september 2014 firm raised late-stage investment led wellington management company participation existing investors 2013 veracode ranked 20th forbes list top 100 promising companies america veracode named one 20 coolest cloud security vendors 2014 cloud 100 crn magazine gartner named veracode leader four consecutive years 2013 2014 2015 2016 gartner magic quadrant application security testing | [
9217,
4194,
4549,
584,
5512,
10412,
7228,
5111,
5404
] | Test |
6,666 | 9 | Karl_Lieberherr:karl lieberherr karl j. lieberherr professor computer science northeastern university boston studies eth zurich obtaining m.s 1973 ph.d. 1977 wrote first book adaptive programming work theme one several secondary influences development aspect-oriented programming adaptive programming tries create applications easy maintain evolve creating new abstraction layer design implementation object-oriented applications concept takes encapsulation new level allowing changes way object works without changing interface objects technique solves situations object takes assumptions objects work change object takes assumption creating chain effect rest system aspect oriented programming affects way application created following directives concept one could create separate objects treat data process separated way allows flexible application change evolve easily | [] | Test |
6,667 | 4 | Hit-and-run_DDoS:hit-and-run ddos hit-and-run ddos type denial-of-service ddos attack uses short bursts high volume attacks random intervals spanning time frame days weeks purpose hit-and-run ddos prevent user service using service bringing host server type attack distinguished persistent ddos attack continues attacker stops attack host server able defend ddos attack characterized explicit attempt attackers prevent legitimate users service using service hit-and-run ddos accomplished using high volume network application attacks short bursts attacks last long enough bring server hosting service normally 20 60 minutes attack repeated every 12 24 hours period days weeks causing issues company hosting service hit-and-run ddos sometimes used test ddos attack attacker inject bad packets network test online functioning network verified functioning attacker use persistent ddos attack hit-and-run ddos exploits anti-ddos software services used defend prolonged ddos attacks activating software take longer actual attack allowing denial service ddos protection start defend attack | [
2409,
8930,
6347,
4495
] | Test |
6,668 | 4 | Deputy_Director_of_the_National_Security_Agency:deputy director national security agency deputy director national security agency highest-ranking civilian within national security agency senior civilian nsa deputy director acts agency chief operating officer guiding directing strategies policy serves principal advisor director nsa deputy director reports nsa director required technically experienced civilian current deputy director george c. barnes armed forces security agency afsa predecessor nsa nowiki /nowiki november 1950 april 1951 deputy director service | [
289,
4898,
7137,
10305,
11302,
327,
266,
365,
1838,
4719,
7887,
2897,
1714,
9357,
10832,
4566,
2712,
6749
] | Test |
6,669 | 6 | OCFS2:ocfs2 oracle cluster file system ocfs second version ocfs2 shared disk file system developed oracle corporation released gnu general public license first version ocfs developed main focus accommodate oracle database management system used cluster computing posix-compliant file system version 2 posix features included ocfs2 version 2 integrated version 2.6.16 linux kernel initially marked experimental alpha-test code restriction removed linux version 2.6.19 kernel version 2.6.29 late 2008 features included ocfs2 access control lists quotas ocfs2 used distributed lock manager resembles openvms dlm much simpler oracle announced version 1.6 november 2010 included copy write feature called reflink | [
5120,
2051,
2564,
3598,
10257,
9236,
6677,
5142,
8214,
3611,
9249,
9762,
5158,
7225,
11323,
8772,
1109,
4708,
9836,
7789,
9333,
6263,
9335,
3708,
9343,
5256,
7818,
654,
2193,
2194,
2197,
2199,
11419,
6309,
1190,
5286,
10405,
5293,
7344,
2... | None |
6,670 | 5 | PHY_(chip):phy chip phy abbreviation physical layer electronic circuit usually implemented chip required implement physical layer functions osi model phy connects link layer device often called mac acronym medium access control physical medium optical fiber copper cable phy device typically includes physical coding sublayer pcs physical medium dependent pmd layer functionality ethernet phy component operates physical layer osi network model implements ethernet physical layer portion 1000base-t 100base-tx 10base-t standards specifically ethernet phy chip implements hardware send receive function ethernet frames interfaces analog domain ethernet line modulation digital domain link-layer packet signaling phy usually handle mac addressing link layer job similarly wake-on-lan boot rom functionality implemented network interface card nic may phy mac functionality integrated one chip separate chips examples include microsemi simpliphy synchrophy vsc82xx/84xx/85xx/86xx family marvell alaska 88e1310/88e1310s/88e1318/88e1318s gigabit ethernet transceivers offerings intel ics | [
38,
3847,
9767,
4202,
3883,
8909,
6670,
7698,
4691,
10005,
2998,
7865,
11321
] | Test |
6,671 | 2 | Drakconf:drakconf drakconf mandriva control center computer program written perl configuration mandriva linux linux distribution tool allows easy configuration mandriva licensed open-source gnu general public license also used mageia fork mandriva called mageia control center part so-called drakxtools specifically designed linux distribution running command-line x window system environment however source code available could ported distributions tool key feature mandriva linux puts many configuration tools together one place easier user new linux configuring system instead changing configuration files using text editor | [
8582,
823
] | None |
6,672 | 8 | Contextual_deep_linking:contextual deep linking contextual deep linking form deep linking mobile apps links specific content within app rather generic welcome screen app basic mobile deep linking typically allows deep link content apps ’ already downloaded contextual deep linking allows pass information app store referring information passed app store ios google play bringing user content links within app whether app previously installed | [
1944,
8413,
6469,
9063
] | Test |
6,673 | 9 | George_Springer_(mathematician):george springer mathematician george springer september 3 1924 – february 18 2019 american mathematician computer scientist professor emeritus computer science indiana university bloomington springer perhaps best known coauthor daniel p. friedman widely used textbook scheme art computer programming scheme one two main dialects lisp three pioneering books scheme scheme programming language 1982 r. kent dybvig structure interpretation computer programs 1985 harold abelson gerald jay sussman julie sussman scheme art computer programming 1989 springer friedman springer earned bachelor degree 1945 case western reserve university named case institute technology master degree 1946 brown university earned phd 1949 harvard university thesis coefficient problem univalent mappings exterior unit circle lars ahlfors 1949 1951 springer c.l.e moore instructor massachusetts institute technology 1951 1954 assistant professor northwestern university academic year 1954/1955 fulbright lecturer visiting professor university münster worked heinrich behnke autumn 1955 springer became associate professor subsequently professor university kansas academic year 1961/1962 fulbright lecturer visiting professor university würzburg 1964 professor mathematics 1987 also professor computer science indiana university bloomington academic year 1971/1972 visiting professor imperial college london springer began career working function theory one several complex variables wrote textbook riemann surfaces 1980s turned toward computer science working programming languages springer born cleveland ohio 1924 family jewish immigrants poland met wife annemarie née keiner harvard university married 1950 death 2011 three children springer died february 18 2019 aged 94 | [
10083,
6502,
6767,
9749,
1783
] | Test |
6,674 | 2 | Forfiles:forfiles codice_1 computer software utility microsoft windows selects files runs command file selection criteria include name last modified date command specifier supports special syntax options used directly command-line batch files scripts codice_1 command originally provided add-on windows nt resource kits became standard utility windows vista part new management features codice_1 command several command-line switches switches parameters given outputs name every file current directory command string executed given except noted sequences form 0x literal ff represents two-digit hexadecimal number replaced corresponding single-byte value used embed non-printing ascii characters extended ascii characters sequence replaced literal quotation mark though recommended use instead hide command interpreter several variables provided used command placeholders values file variables technically required must used command vary file date switch /d selects files based last modified date given date argument date argument given literal date mm/dd/yyyy format date formats accepted alternatively date argument given number case taken mean age days i.e. day date days present date date argument begins minus files modified given date selected older file modified earlier otherwise files modified given date selected younger files modified later explicit plus may given default note modes select files given date way select files given date without also either following command selects log files *.log windows directory 30 days older lists date following command would delete files use required examples internal command processor rather external utility programs | [
3970,
8834,
10631,
2568,
6281,
6797,
655,
3856,
8976,
4248,
8729,
155,
4001,
9505,
4771,
7847,
808,
7983,
7088,
10033,
9780,
1978,
7356,
5437,
7486,
10428,
960,
3522,
8517,
1741,
4174,
10068,
1750,
9946,
10727,
6506,
9709,
1647,
9839,
254... | None |
6,675 | 2 | Timeline_of_operating_systems:timeline operating systems article presents timeline events history computer operating systems 1951 current day narrative explaining overall developments see history operating systems | [
2560,
10755,
6148,
1031,
3594,
6155,
4114,
7187,
532,
9751,
10776,
25,
1561,
9756,
4637,
11297,
9762,
4643,
6179,
6180,
6186,
557,
7217,
8754,
10803,
7733,
4151,
9784,
10809,
573,
6207,
576,
2625,
3650,
8767,
1606,
8774,
2120,
1611,
2637,... | Train |
6,676 | 2 | VX-REXX:vx-rexx vx-rexx highly extensible rexx gui development system os/2 developed watcom initially released 1993 much new code ecomstation written using vx-rexx though rexx 3gl vx-rexx interface allows build rexx programs using combination 3gl 4gl techniques drag-and-drop interface inserting code allows quite complex programs built without actually entering code vx-rexx interface written vx-rexx means extended and/or modified using rexx code also number macro hooks used add functionality directly toolbox contains number standard tools static text group box push button radio button check box picture box image push/radio button list box combo box drop-down single multiline entry field slider specialized ones container value-set notebook dde client timer additional controls built using som distributed .dll files anything simple variants existing controls tri-state check box self-validating entry field completely custom-drawn controls example self-contained tic-tac-toe board written c compiled added vx-rexx project | [
4410,
2462
] | Validation |
6,677 | 6 | IBM_Spectrum_Scale:ibm spectrum scale ibm spectrum scale high-performance clustered file system software developed ibm deployed shared-disk shared-nothing distributed parallel modes used many world largest commercial companies well supercomputers top 500 list example filesystem asc purple supercomputer composed 12,000 processors 2 petabytes total disk storage spanning 11,000 disks 2015 spectrum scale known ibm general parallel file system gpfs like typical cluster filesystems spectrum scale provides concurrent high-speed file access applications executing multiple nodes clusters used aix 5l clusters linux clusters microsoft windows server heterogeneous cluster aix linux windows nodes addition providing filesystem storage capabilities spectrum scale provides tools management administration spectrum scale cluster allows shared access file systems remote spectrum scale clusters spectrum scale available ibm aix since 1998 linux since 2001 windows server since 2008 spectrum scale known gpfs began tiger shark file system research project ibm almaden research center early 1993 tiger shark initially designed support high throughput multimedia applications design turned well suited scientific computing another ancestor spectrum scale ibm vesta filesystem developed research project ibm thomas j. watson research center 1992 1995 vesta introduced concept file partitioning accommodate needs parallel applications run high-performance multicomputers parallel i/o subsystems partitioning file sequence bytes rather multiple disjoint sequences may accessed parallel partitioning abstracts away number type i/o nodes hosting filesystem allows variety logically partitioned views files regardless physical distribution data within i/o nodes disjoint sequences arranged correspond individual processes parallel application allowing improved scalability vesta commercialized piofs filesystem around 1994 succeeded gpfs around 1998 main difference older newer filesystems gpfs replaced specialized interface offered vesta/piofs standard unix api features support high performance parallel i/o hidden users implemented hood spectrum scale available ibm aix since 1998 linux since 2001 windows server since 2008 spectrum scale offered part ibm system cluster 1350 today spectrum scale used many top 500 supercomputers listed top 500 supercomputing sites web site since inception spectrum scale successfully deployed many commercial applications including digital media grid analytics scalable file services 2010 ibm previewed version gpfs included capability known gpfs-snc snc stands shared nothing cluster officially released gpfs 3.5 december 2012 known fpo features spectrum scale file systems include high availability ability used heterogeneous cluster disaster recovery security dmapi hsm ilm spectrum scale clustered file system breaks file blocks configured size less 1 megabyte distributed across multiple cluster nodes system stores data standard block storage values includes internal raid layer called spectrum scale raid virtualize volumes redundancy parallel access much like raid block storage system also ability replicate across volumes higher file level features architecture include hadoop hdfs filesystem designed store similar greater quantities data commodity hardware — datacenters without raid disks storage area network san compared spectrum scale storage pools allow grouping disks within file system administrator create tiers storage grouping disks based performance locality reliability characteristics example one pool could high-performance fibre channel disks another economical sata storage fileset sub-tree file system namespace provides way partition namespace smaller manageable units filesets provide administrative boundary used set quotas specified policy control initial data placement data migration data single fileset reside one storage pools file data resides migrated based set rules user defined policy two types user defined policies spectrum scale file placement file management file placement policies direct file data files created appropriate storage pool file placement rules selected attributes file name user name fileset file management policies allow file data moved replicated files deleted file management policies used move data one pool another without changing file location directory structure file management policies determined file attributes last access time path name size file spectrum scale policy processing engine scalable run many nodes allows management policies applied single file system billions files complete hours | [
5120,
2564,
6669,
3598,
10257,
9236,
5142,
8214,
3611,
9249,
9762,
5158,
7225,
11323,
8772,
1109,
4708,
9836,
7789,
9333,
6263,
9335,
9343,
7818,
654,
2193,
2194,
2197,
2199,
5273,
11419,
6309,
1190,
5286,
10405,
5293,
7344,
2230,
5816,
1... | Test |
6,678 | 2 | Resource_Measurement_Facility:resource measurement facility resource measurement facility rmf performance monitor z/os operating system also collects data long-term performance analysis capacity planning product consists following components rmf significantly enhanced every release z/os operating system – approximately year – enhancements occurring support new hardware new processor models | [
909,
9838,
9814,
2168,
5562
] | Test |
6,679 | 4 | SpywareBlaster:spywareblaster spywareblaster antispyware antiadware program microsoft windows designed block installation activex malware spywareblaster prevents download installation execution spyware adware browser hijackers dialers malicious programs based activex spywareblaster works basis blacklists activating killbit clsid known malware programs effectively preventing infecting protected computer approach differs many anti-spyware programs typically offer user chance scan hard drive computer memory remove unwanted software installed spywareblaster also allows user prevent privacy risks tracking cookies another feature ability restrict actions websites known distributors adware spyware spywareblaster supports several web browsers including internet explorer mozilla firefox google chrome spywareblaster currently distributed freeware non-commercial users | [
10026,
6797,
877,
7983,
7515,
4309,
10392,
3739,
4542
] | Test |
6,680 | 2 | Urpmi:urpmi urpmi package management tool installing removing updating querying software packages local remote networked media wraps around rpm package manager rpm package manager user suffer often-encountered dependency hell works official sources mandriva unofficial sources penguin liberation front graphical front-end rpmdrake made 2 parts addition now-defunct mandriva linux also used urpmi developed experiment pascal rigaux pixel address rpm install limitations maintained françois pons different mandriva employees currently 2010-2013 maintained thierry vignaud maintainer rpmdrake one co-maintainers drakx installer tools mandriva continued job mageia version used mandriva future products based mageia per øyvind karlsen maintains fork urpmi rosa linux backporting fixes improvements thierry vignaud work version used mandriva business server based mageia | [
11525,
2310,
8582,
10760,
2955,
7435,
4493,
7181,
7947,
2448,
9487,
788,
1813,
8213,
10900,
8476,
5670,
4775,
7847,
6828,
6446,
1455,
7983,
1842,
823,
2872,
6583,
3131,
5819,
10172,
190,
3649,
10817,
9671,
5067,
3918,
463,
10192,
3667,
62... | Test |
6,681 | 5 | RS-449:rs-449 rs-449 specification also known eia-449 tia-449 defines functional mechanical characteristics interface data terminal equipment typically computer data communications equipment typically modem terminal server effort replace rs-232c offering much higher performance longer cable lengths emerged unwieldy system requiring dc-37 de-9 connectors effort eventually abandoned favor rs-530 used single db-25 connector full title standard eia-449 general purpose 37-position 9-position interface data terminal equipment data circuit-terminating equipment employing serial binary data interchange late 1970s eia began developing two new serial data standards replace rs-232 rs-232 number issues limited performance practicality among relatively large voltages used signalling +5 -5v mark space supply +12v power supply typically required made somewhat difficult implement market rapidly dominated +5/0v transistor-transistor logic ttl circuitry even lower-voltage cmos implementations high voltages unbalanced communications also resulted relatively short cable lengths nominally set maximum although practice could somewhat longer running slower speeds reason large voltages due ground voltages rs-232 included protective ground signal ground standard define implemented often case protective ground left unconnected signal ground connected ground ends result slight difference ground potential two ends cable voltage signal ground pin might zero large signal voltages needed provide positive signal case address problem new rs-422 rs-423 standards used well-defined grounding always based sender reference made signal 400 mv reference case rs-422 instance every signal second pin operating opposite voltage thereby balancing voltages always providing positive signal process starting decision made unbundle mechanical aspects standard electrical former becoming rs-449 standards track primary difference rs-422 rs-423 former return line every signal later single shared signal ground meant rs-422 double number signal wires along changes number connections began grow point even rs-423 functionally similar rs-232 longer fit db25 connector led use larger dc-37 even enough pins support rs-422 solved adding additional ground wires separate de-9 connector resulted horrendous number wires conclusion 1983 success ... remains seen standard rarely used although could found network communication equipment eia-449-1 rescinded january 1986 superseded eia/tia-530-a final version eia-449-1 withdrawn september 2002 widespread use rs-422/423 early apple macintosh computers used simple 9-pin din connector inter-machine links used three-wire connectors | [
10242,
9860,
3847,
649,
9868,
1297,
3218,
9365,
10005,
11413,
5402,
5531,
3742,
2206,
10271,
9380,
2085,
9381,
3751,
3752,
10924,
562,
2996,
9909,
7865,
10171,
3133,
3006,
4797,
5181,
5437,
7364,
11332,
2887,
8265,
2509,
4687,
5843,
2904,
... | Test |
6,682 | 5 | Aggregate_Server_Access_Protocol:aggregate server access protocol aggregate server access protocol used reliable server pooling rserpool framework communication | [
10242,
6531,
3847,
649,
9868,
3218,
9365,
10005,
11413,
5402,
5531,
3742,
10271,
9380,
2085,
9381,
3751,
3752,
10924,
562,
2996,
9909,
10171,
4797,
5181,
3133,
3006,
5437,
6723,
7364,
2887,
8265,
2509,
6733,
4687,
5843,
6740,
2904,
6746,
... | Test |
6,683 | 4 | PCKeeper:pckeeper pckeeper advertised optimization services package featuring set software utilities windows os owned essentware s.a. company based bratislava slovakia includes 2 separate products windows pckeeper live pckeeper antivirus pckeeper originally developed zeobit llc founded 2009 slava kolomiychuk pckeeper released september 2010 kromtech alliance acquired pckeeper mackeeper zeobit may 2013 2015 pckeeper changed legal owners kromtech alliance corp. essentware s.a. kromtech alliance made decision focus products mac users essentware s.a. office registered panama principal officers developers company remain ukraine two class action lawsuits filed kromtech mac os version pckeeper mackeeper first lawsuit filed illinois alleges contrary zeobit marketing in-software representations however neither free trial full registered versions mackeeper perform credible diagnostic testing user mac instead zeobit intentionally designed mackeeper invariably ominously report consumer mac needs repair at-risk due harmful errors privacy threats problems regardless computer actual condition second complaint filed holly yencha pennsylvania alleges free starter version mackeeper identifies harmless programs critical problems complaint claims mackeeper reporting algorithm even brand new computers 'critical condition require repair purchasing full version pckeeper live sometimes installed users pcs partner programs cause unwanted pop-up windows pckeeper live offers 13 different pc services 4 categories human assistance find fix geek demand live support security anti-theft data hider shredder files recovery cleaning disk cleaner disk explorer duplicates finder uninstaller optimization context menu manager startup manager pckeeper sometimes advertised pop ads many pop ads occur pornography websites pckeeper live rated good 3.5 5 pcmag editor stating improves pc performance great novice users utility wo n't clean pc well iolo system mechanic considering accessibility wallet friendliness one check kromtech pckeeper live human specialists unique price plans make tune-up utility worthy consideration rival applications offer better pc improvement techradar.pro rates 3 5 stars noted overall pckeeper light-weight tool wo n't annoy pop-up windows consider fact pckeeper live optimization features easily found free tools simply useful price kromtech solution seems unreasonably high kromtech 24/7 support elevates pckeeper live overpriced utility program tool even non-geek use optimize his/her computer pckeeper reviewed wide range tech experts reviewed turkish french portuguese spanish german review pcmag thus described pckeeper live improves pc performance multiple price points advice microsoft-certified computer specialists anti-theft technology gained 3,5 5 points pckeeper antivirus integrates avira secure anti-virus api savapi official interface avira ’ anti-malware scanning engine pckeeper antivirus block malware-hosting url phishing url according virus bulletin pckeeper antivirus pro scored 96.1 rap tests set stability level stable pckeeper antivirus got vb100 award pckeeper antivirus version 1.x received 2 opswat gold certifications antispyware antivirus categories german organization av-test.org tested 25 anti-virus programs testers found ahnlab microsoft windows defender pckeeper antivirus lowest performing anti-virus applications windows 8.1 pcmag rated pckeeper antivirus good 3 5 noting pckeeper antivirus streamlined attractive interface easy use non-techies good score hands-on malware blocking testing however scored poorly independent lab testing chat based support soured fact served misinformation pc mag concluded 'd better panda free antivirus 2015 editors choice free antivirus slightly edged pckeeper tests swept field lab tests high marks across board price pckeeper could bitdefender antivirus plus 2015 kaspersky anti-virus 2015 named editors choice paid antivirus better choice may 2013 pckeeper let customers decide much pay software launching pay want campaign | [
5380,
2213,
3342,
7983,
4464,
4889,
1242
] | Train |
6,684 | 4 | Eric_Robi:eric robi eric robi american forensic computer examiner president computer forensic consulting firm university instructor advanced computer forensics eric robi founded federal forensics group 2002 subsequently renamed elluma discovery 2010 reflect expanded range services growth electronic discovery computer forensics marketplace also instructor advanced computer forensics california state university fullerton extended education taught classes computer programming multimedia tools california state university los angeles eric obtained certified computer examiner certification southeast cybercrime institute kennesaw state university 2004 rendered testimony approximately 14 trials nasd arbitration many hearings depositions conducted computer forensic work 250 cases june 2010 eric robi interviewed fox 11 news los angeles computer scareware january 2009 interviewed fox 11 news cell phone spyware may 2009 also interviewed cbs news dallas cell phone spyware technology may 2010 | [
9469,
9319
] | Validation |
6,685 | 2 | Sendo_X:sendo x sendo x sendo first series 60 based high-end phone developed sendo switched microsoft symbian series 60 platforms among unique features sendo x one ability users download new firmware sendo website upgrade phone home computer sendo shunted multiple times sendo z100 new release dates cancelling phone november 2002 announced switch microsoft smartphone 2002 operating system series 60 platform decision resulted 2004q2 release sendo x phone made celestica czech republic however least model number stickers mention made netherlands referring distribution centre arnhem netherlands.. sendo pinball funny farmer sendo licensed opera mobile 6.2 updates worked version 8.0 mobilegazette.com impressed feature richness without over-bloated call phone stylish | [
10658,
11469,
7246,
7983,
2259,
4701
] | None |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.