node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
4,585
4
Windows_Metafile_vulnerability:windows metafile vulnerability windows metafile vulnerability—also called metafile image code execution abbreviated mice—is security vulnerability way versions microsoft windows operating system handled images windows metafile format permits arbitrary code executed affected computers without permission users discovered december 27 2005 first reports affected computers announced within 24 hours microsoft released high-priority update eliminate vulnerability via windows update january 5 2006 attacks using vulnerability known wmf exploits vulnerability located gdi32.dll existed versions microsoft windows windows 3.0 windows server 2003 r2 however attack vectors exist nt-based versions windows windows nt windows 2000 windows xp windows server 2003 exploits taking advantage vulnerability windows nt-based systems facilitated propagation various types malware typically drive-by downloads due extreme impact bug 2007 pwnie award mass 0wnage breaking internet versions microsoft windows operating system support windows metafile graphics standard versions windows 3.0 windows server 2003 r2 contain security flaw however windows nt 4.0 windows xp unless patched vulnerable earlier versions default installation enables windows metafile code execution source vulnerability later versions windows vulnerability according computer security expert steve gibson windows nt 4 vulnerable known exploits image preview enabled windows operating systems image preview enabled hardware-based data execution prevention dep active applications susceptible exploit operating systems windows e.g. macos unix linux etc directly affected however non-windows system could become vulnerable runs software view windows wmf files could include software incorporates clones windows native graphics device interface gdi dynamic-link library dll run windows windows programs emulator compatibility layer unix-like system uses wine emulate windows example could exploited gibson wrote program mousetrap company distributes freeware detect windows metafile vulnerability systems running windows windows emulators according assessments f-secure vulnerability inherent defect design wmf files underlying architecture files previous era includes features allow actual code executed whenever wmf file opens original purpose mainly handle cancellation print jobs spooling according secunia vulnerability caused due error handling windows metafile files '.wmf containing specially crafted codice_1 'escape records records allow arbitrary user-defined function executed rendering wmf file fails according windows 3.1 sdk documentation codice_1 escape obsoleted replaced function name windows 3.1 long wmf vulnerability discovered however obsoleted escape code retained compatibility 16 bit programs written least backwards compatible windows 3.0 change happened approximately time microsoft creating 32 bit reimplementation gdi windows nt likely vulnerability occurred effort 'escape mechanism question allows applications metafiles access output device features yet abstracted gdi hardware accelerated bézier curves encapsulated postscript support etc done passing opcode size pointer data call usually pass driver escape calls produce actual graphics general escape mechanism allowed metafiles little thought originally given possibility using things like setabortproc modern non-vulnerable metafile interpreters checks opcode blacklist whitelist keeping full set opcodes available regular code calls gdi escape functions directly code already running way code could make gdi call security risk case worth noting 16 bit windows except rarely used real mode windows 3.0 immune vulnerability pointer specified metafile point data within metafile 16 bit windows always full no-execute-data enforcement mandated segmented architecture 16 bit protected mode windows nt cpu architectures 32 bit x86 mips powerpc alpha itanium x86_64 required return-oriented programming exploit architectures no-execute functionality missing older x86 processors vulnerability cve-2005-4560 common vulnerabilities exposures database us-cert reference vu 181038 microsoft knowledge base article 912840 first observed wild researchers sunbelt software december 28 2005 announced publicly company president alex eckelberry computers affected via spread infected e-mails carry hacked wmf file attachment infection may also result methods may also used propagate infection problem within operating system using non-microsoft browsers firefox opera provide complete protection users typically prompted download view malicious file infecting computer infected files may downloaded automatically opens possibility infection disk indexing accidental previewing according assessments mcafee antivirus company vulnerability used propagate bifrost backdoor trojan horse forms malware also exploited vulnerability deliver various malicious payloads mcafee claims first generation exploits encountered 6 customer base 31 december 2005 microsoft released official patch address problem 5 january 2006 patch may applied lieu corrective measures official patch available windows 2000 windows xp microsoft windows server 2003 windows nt 4 older operating systems receive patch longer supported microsoft steve gibson stated security podcast 20 company gibson research corporation would make patch available windows 9x systems microsoft research steve gibson stated later security podcast 23 windows 9x vulnerable need patching windows 9x/me users run mouse trap utility see free downloadable patch windows nt provided paolo monti future time italian distributor eset nod32 anti-virus system patch works older operating systems supplied without warranty reports official patch automatically installed even windows automatic update configured ask installing automatically downloaded updates causes automatic reboot cause loss data user program open unsaved changes measures historical interest systems updated 5 january 2006 workaround patch available 28 december 2005 microsoft advised windows users unregister dynamic-link library file shimgvw.dll done executing command codice_3 run menu command prompt invokes previewing image files exploited attacks dll re-registered patching running codice_4 workaround blocks common attack vector eliminate vulnerability third party patch released ilfak guilfanov 31 december 2005 temporarily disable vulnerable function call gdi32.dll unofficial patch received much publicity due unavailability official one microsoft receiving recommendation sans institute internet storm center f-secure large amount publicity including indirectly slashdotted guilfanov website received visitors could cope suspended 3 january 2006 patch still available download number mirrors including internet storm center website guilfanov website went back online 4 january much-reduced state longer providing patch on-site due bandwidth issues homepage provided list mirrors user could download patch associated vulnerability-checker md5 checksum file could checked downloaded file probably genuine microsoft released patch guilfanov withdrew microsoft says patch removes flawed functionality gdi32 allowed wmf vulnerability computers running unpatched version windows defence depth approach recommended mitigate risk infection various sources recommended mitigation efforts include according sans institute internet storm center article using web browser internet explorer may offer additional protection vulnerability depending settings browsers may ask user opening image .wmf extension reduces chance opening maliciously crafted windows metafile protect vulnerability exploited browsers still open metafile masquerading another format better entirely disable image loading browser used 2006 steve gibson suggested peculiar nature 'bug indication vulnerability actually backdoor intentionally engineered system accusation became assertion spread internet rumor technology news website slashdot picked gibson speculation rumor widely debunked thomas greene writing register attributed gibson mistake lack security experience called popinjay expert
[ 4115, 3932, 5984, 4759, 6256, 113, 7729, 5485, 5571, 3967, 578, 496, 6644, 2769, 755, 1128, 3407, 2885, 74, 6492, 2891, 3157, 1992 ]
Test
4,586
2
ILIOS:ilios ilios acronym interlink internet operating system attempt create router-only operating system one specifically oriented towards computer networking purposes especially routing supports ipv4 routing good educational os though single tasking everything via interrupts released bsd license author research os rink springer also responsible porting freebsd xbox
[ 1522, 3819, 5571 ]
Test
4,587
9
Scene_description_language:scene description language scene description language description language used describe scene rendered 3d renderer ray tracer scene written text editor may include syntax highlighting opposed modeled graphical way scene description language may include variables constants conditional statements loops loops 3dmlw x3d xml-based scene description languages tao presentations application uses xl dynamic document description language pov-ray 3dmlw x3d tao presentations
[ 7299, 7069 ]
Test
4,588
9
MSWLogo:mswlogo mswlogo programming language interpreted based language logo graphical user interface gui front end developed george mills massachusetts institute technology mit core ucblogo brian harvey free open-source software source code available borland c++ mswlogo supports multiple turtle graphics 3d computer graphics allows input ports com lpt also supports windows interface input/output i/o available gui keyboard mouse events trigger interrupts simple gif animations may also produced mswlogo version 6.5 command codice_1 program also used educational software jim muller wrote great logo adventure complete logo manual using mswlogo demonstration language mswlogo evolved fmslogo educational programming environment free open source implementation language logo microsoft windows released gnu general public license gpl mainly developed maintained david costanzo mswlogo version 6.5b supports many functions including
[ 7878, 1445, 5019, 1820, 6796, 6087, 2915, 5734, 1478, 2218, 4704, 5757, 6116, 45, 1116, 6471, 7573, 2600, 5077, 1885, 1889, 795, 6876, 4759, 6888, 1557, 5494, 5501, 6210, 144, 4074, 4085, 7298, 5515, 8025, 3749, 6949, 5883, 6955, 4837, ...
Validation
4,589
9
Modula-2:modula-2 modula-2 computer programming language designed developed 1977 1985 niklaus wirth swiss federal institute technology zurich eth zurich revision pascal serve sole programming language operating system application software personal workstation lilith principal concepts wirth viewed modula-2 successor earlier programming languages pascal modula language design also influenced mesa language new programming possibilities early personal computer xerox alto xerox wirth saw 1976 sabbatical year xerox parc computer magazine byte devoted august 1984 issue language surrounding environment modula-2 general purpose procedural language sufficiently flexible systems programming much broader application particular designed support separate compilation data abstraction straightforward way much syntax based wirth earlier better-known language pascal modula-2 designed broadly similar pascal elements syntactic ambiguities removed important addition module concept direct language support multiprogramming language allows compilation single pass compiler gutknecht wirth four times faster earlier multi-pass compilers example source code hello world program modula-2 module may used encapsulate set related subprograms data structures restrict visibility portions program module design implemented data abstraction feature modula-2 clean way modula-2 programs composed modules made two parts definition module interface portion contains parts subsystem exported visible modules implementation module contains working code internal module language strict scope control particular scope module considered impenetrable wall except standard identifiers object outer world visible inside module unless explicitly imported internal module object visible outside unless explicitly exported suppose module m1 exports objects b c p enumerating identifiers explicit export list objects b c p module m1 become known outside module m1 m1.a m1.b m1.c m1.p exported qualified manner universe assumed module m1 global exporting module name i.e m1 used qualifier followed object name suppose module m2 contains following import declaration means objects exported module m1 universe enclosing program used inside module m2 referenced qualified manner like m1.a m1.b m1.c m1.p example qualified export avoids name clashes instance another module m3 would also export object called p still distinguish two objects since m1.p differs m3.p thanks qualified export matter objects called p inside exporting modules m1 m3 alternative technique available wide use modula-2 programmers suppose module m4 formulated means objects exported module m1 universe used inside module m4 mere references exported identifiers unqualified manner like b c p. example technique unqualifying import allows use variables objects outside exporting module exactly simple i.e unqualified manner inside exporting module walls surrounding modules become irrelevant objects explicitly allowed course unqualifying import usable name clashes export import rules may seem unnecessarily restrictive verbose safeguard objects unwanted access also pleasant side-effect providing automatic cross-referencing definition every identifier program identifier qualified module name definition comes module otherwise occurs unqualified simply search backwards either encounter declaration identifier occurrence import statement names module comes property becomes useful trying understand large programs containing many modules language provides limited single-processor concurrency monitors coroutines explicit transfer control hardware access absolute addresses bit manipulation interrupts uses nominal type system two major dialects modula-2 first pim named book programming modula-2 niklaus wirth three major editions pim second third corrected fourth editions describing slight variants language second major dialect iso standardization effort international organization standardization differences amongst several supersets modula-2 language extensions specific application domains several derivative languages resemble modula-2 closely new languages right different languages different purposes strengths weaknesses many current programming languages adopted features modula-2 pim 2,3,4 defines following 40 reserved words pim 3,4 defines following 29 built-in identifiers cambridge modula-2 cambridge microprocessor systems based subset pim4 language extensions embedded development compiler runs dos generates code m68k based embedded microcontrollers running minos operating system mod51 mandeno granville electronics based iso modula-2 language extensions embedded development following iec1131 industry standard programmable logic controllers plc closely related modula-2 mod51 compiler generates standalone code 80c51 based microcontrollers delco electronics subsidiary gm hughes electronics developed version modula-2 embedded control systems starting 1985 delco named modula-gm first high level language used replace machine language code embedded systems delco engine control units ecus significant delco producing 28,000 ecus per day 1988 gm world largest producer ecus first experimental use modula-gm embedded controller 1985 antilock braking system controller based motorola 68xxx microprocessor 1993 gen-4 ecu used cart championship auto racing teams irl indy racing league teams first production use modula-gm use gm trucks starting 1990 model year vcm vehicle control module used manage gm powertrain vortec engines modula-gm also used ecus gm 90° buick v6 family 3800 series ii used 1997-2005 model year buick park avenue modula-gm compilers associated software management tools sourced delco intermetrics modula-2 selected basis delco high level language many strengths alternative language choices 1986 delco electronics spun gm component divisions form delphi 1997 global sourcing required non-proprietary high-level software language used ecu embedded software developed delphi compiled commercial c compilers serious rumors soviet space program many soviet satellites programmed modula-2 according russian wikipedia article modula-2 satellites russian gps framework glonass programmed modula-2 turbo modula-2 compiler integrated development environment modula-2 programming language running ms-dos developed borland never released instead group including borland cofounder niels jensen acting jensen partners bought unreleased codebase redeveloped released topspeed modula-2 topspeed eventually sold clarion owned softvelocity still offers modula-2 compiler part clarion product line z80 cp/m version turbo modula-2 briefly marketed echelon inc. license borland companion release hitachi hd64180 marketed micromint inc. development tool sb-180 single-board computer
[ 6507, 3930, 7700, 5986, 2005, 5901, 7333, 5639, 3944, 6340, 7970, 5730, 3955, 3368, 304, 5571, 6277, 3968, 4423, 5937, 1019, 666, 3214, 5948, 5621, 7394, 154, 7761, 5424, 8027, 2881, 8137, 3915, 1989, 2530, 3069, 5006, 2803, 783 ]
Test
4,590
4
Prelude_SIEM_(Intrusion_Detection_System):prelude siem intrusion detection system prelude siem security information event management siem tool driving security prelude siem collect centralize information company security offer single point view manage thanks logs flows analyzer prelude siem create alerts intrusions security threats network real time prelude siem provide multiple tools forensic reporting big data smart data identify weak signals advanced persistent threat apt finally prelude siem embeds tools exploitation phase make works easier operators help risk management malicious user software may able evade detection single ids nids hids etc becomes exponentially difficult get around defenses multiple protection mechanisms prelude siem comes large set sensors monitoring different kind events prelude siem permits alert collection wan scale whether scope covers city country continent world prelude siem siem system capable inter-operating systems available market implement natively intrusion detection message exchange format idmef rfc 4765 format start demanded around world way natively idmef compatible opensource ids auditd nepenthes nufw ossec pam samhain sancp snort suricata kismet etc anyone write ids use 3rd party sensors available given prelude siem open apis libraries since 2016 prelude idmef partner program prelude siem also idmef compatible many commercial ids prelude siem provides siem functions three modules alert sem analyze ans archive sim one true siem alternative market plus prelude siem promotes use ietf security standards secef project prelude idmef partner program prelude siem collects normalizes sorts aggregates correlates displays security events regardless types surveillance equipment beyond capacity processing types event logs system logs syslog flat files etc prelude siem natively compatible many ids prelude siem main characteristics following prelude siem oss designed scalable way simply adapt environment free public open-source version gplv2 small infrastructures tests educational purposes open-source version composed following main modules modules base alert module commercial version commercial version also add many functionalities modules scale performances architecture possibilities prelude siem commercial version scalable professionally usable high performance version prelude real-world environments prelude soc fully scaled version mainly soc security operations center usage commercial versions organized like
[ 5454, 7536, 5571, 848, 578, 6220, 8123, 3383, 2466 ]
Validation
4,591
4
NCP_Engineering:ncp engineering ncp engineering styled 'ncp engineering nuremberg-based company produces software remote access industrial internet things security information security ncp products use virtual private network vpn technologies like encryption personal firewalls electronic certificates public key infrastructure pki secure data communication ncp made ipsec vpn client compatible windows 8 windows 10 ios os x linux android operating systems ncp abbreviation network communications products supplement engineering describes company produces software in-house data processing ncp engineering founded nuremberg germany 1986 company produces software secure data communication internet networks via 3g/4g wireless lans core ncp business provisioning secure communication connections stationary mobile end-devices well affiliate branch networks company headquarters 2007 ncp partnered watchguard technologies january 2010 ncp-e established north american affiliate ncp engineering inc february 2010 ncp engineering awarded us patent 8811397 b2 system method data communication user terminal gateway via network node ncp engineering involved esukom project development real-time security solution protects corporate networks using integrated security solutions based unified metadata format since 2010 simu project partner security information event management small smes ncp engineering focused optimizing security corporate networks many years working together 2017 ncp engineering juniper networks intensified collaboration technology partnership
[ 2723, 2476, 7567, 6795, 6107, 4014, 578, 8123 ]
Test
4,592
4
Application_permissions:application permissions application permissions widespread coarse-grained way limit applications access sensitive information example sound recorded microphone valuable resources like battery internet traffic account balance implemented major state art pda operation systems android ios windows web browsers web services providing oauth api list available permissions usually contains accessing android 6 permissions usually revokable though appops mechanism oses usually present vanilla android aftermarket oses usually removed stock oses allowing deprive apps access personal data android ≥6 apps request permissions run time requires app developer collaboration developer free use non-runtime permissions app likely crash permission granted ones granting permission target audience app permissions marked permissions previous versions os like internet access non-revocable even show apps installation fixed xprivacy ios usage permissions regulated using guidelines android ecosystem usage permissions often abused order spy users many applications require much permissions monetize integrating libraries advertising networks showing ads spying users better target webpermissions permission system web browsers web application needs data behind permission must request first user sees window asking make choice choice remembered cleared lately currently following resources controlled cases permissions implemented 'all-or-nothing approach user either grant requested permissions app unable use app even user revoke permission app blackmail user refusing operate example crashing solutions xprivacy instead providing access requested data instead throwing exception crashing app returning disinformation make app operate permission granted also possible use static analysis analyze requested permissions
[ 3933 ]
Test
4,593
4
Knowledge-based_authentication:knowledge-based authentication knowledge-based authentication commonly referred kba method authentication seeks prove identity someone accessing service financial institution website name suggests kba requires knowledge private information individual prove person providing identity information owner identity two types kba static kba based pre-agreed set shared secrets dynamic kba based questions generated wider base personal information static kba also referred shared secrets shared secret questions commonly used banks financial services companies e-mail providers prove identity customer allowing account access fall-back user forgets password point initial contact customer business using static kba must collect information shared provider customer—most commonly questions corresponding answers data must stored retrieved customer comes back access account weakness static kba demonstrated incident 2008 unauthorised access gained e-mail account former alaska governor sarah palin yahoo account password could reset using shared secret questions including meet spouse along date birth zip code former governor answers easily available online identity verification providers recently introduced secret sounds pictures effort help secure sites information tactics require methods data storage retrieval secret questions dynamic kba high level authentication uses knowledge questions verify individual identity require person provided questions answers beforehand questions compiled public private data marketing data credit reports transaction history initiate process basic identification factors name address date birth must provided consumer checked identity verification service identity verified questions generated real time data records corresponding individual identity provided typically knowledge needed answer questions available person wallet companies call out-of-wallet questions making difficult anyone actual identity owner know answer obtain access secured information generally period time person given respond questions number attempts limited prevent answers researched dynamic kba employed several different industries verify identities customers means fraud prevention compliance adherence type kba based existing relationship consumer gives businesses way higher identity assurance customer identity account origination
[ 2360, 7865, 1078, 661, 6092 ]
Validation
4,594
4
Remote_backup_service:remote backup service remote online managed backup service sometimes marketed cloud backup backup-as-a-service service provides users system backup storage recovery computer files online backup providers companies provide type service end users clients backup services considered form cloud computing online backup systems typically built client software program runs given schedule systems run day usually night computers n't use newer cloud backup services run continuously capture changes user systems nearly real-time online backup system typically collects compresses encrypts transfers data remote backup service provider servers off-site hardware many products market – offering different feature sets service levels types encryption providers type service frequently target specific market segments high-end lan-based backup systems may offer services active directory client remote control open file backups consumer online backup companies frequently beta software offerings and/or free-trial backup services fewer live support options mid-1980s computer industry great state change modems speeds 1200 2400 baud making transfers large amounts data slow 1 mb 72 minutes faster modems secure network protocols development tape backup systems gained popularity period need affordable reliable online backup system becoming clear especially businesses critical data online/remote backup services came existence heyday dot-com boom late 1990s initial years large industry service providers capturing market share understanding importance role online backup providers playing web services arena today service providers online backup services position services using saas software service paas platform service strategy relevance predicted increase exponentially years come personal enterprise data storage needs rise last years also witnessed healthy rise number independent online backup providers enterprise-class cloud backup solution must include on-premises cache mitigate issues due inconsistent internet connectivity hybrid cloud backup works storing data local disk backup captured high speed either backup software d2d2c disk disk cloud appliance encrypts transmits data service provider adds protection local disasters recent backups retained locally speed data recovery operations number cloud storage appliances market used backup target including appliances ctera networks storsimple twinstrata hybrid cloud backup also beneficial enterprise users security concerns storing data locally sending cloud backup users perform necessary encryption operations incl technologies like data encryption additionally applied choose public cloud service provider important compression backup data local backup cache used compress data sending cloud order lower network bandwidth load improve backup speed becomes critical enterprises backup huge databases like oracle ms sql huge files like virtual machine images mail server databases edb files exchange recent improvements cpu availability allow increased use software agents instead hardware appliances enterprise cloud backup software-only approach offer advantages including decreased complexity simple scalability significant cost savings improved data recovery times online backup services usually priced function following things vendors limit number versions file kept system services omit restriction provide unlimited number versions add-on features plug-ins like ability back currently open locked files usually charged extra services provide built remote backup services reduce amount data sent wire backing changed files approach backing means customers total stored data reduced reducing amount data sent also stored drastically reduced transmitting changed data bits binary block level incremental backups solutions transmit changed binary data bits waste bandwidth transmitting file data small amounts change remote backup advantages traditional backup methods remote backup disadvantages traditional backup methods services provide expert backup management services part overall offering services typically include three distinct types backup modes scheduled manual event-based
[ 1710, 3837, 4750, 4386, 5903, 3943, 5552, 289, 7715, 7165, 7343, 644, 4495, 2390, 7821, 2566, 6996, 7083, 6906, 3711, 2850, 1750, 2666, 5496, 7013, 2682, 5160, 2687, 7756, 1589, 8020, 2961, 3328, 3827, 2700, 168, 4554, 6403, 5889 ]
Test
4,595
2
Stack_(Haskell):stack haskell stack tool build haskell projects manage dependencies uses cabal library together default curated version hackage repository stack competes cabal binary cabal-install created result overall criticism dependency problems however provide package format uses existing codice_1 files complements projects additional codice_2 file
[ 7555, 2740, 5923, 4759, 5571, 3042 ]
Test
4,596
5
NetCache:netcache netcache former web cache software product owned developed netapp 1997 2006 hardware product family incorporating netcache software netcache software started commercial fork harvest object cache developed internet middleware corporation imc consisted former harvest project developers including peter b. danzig professor university southern california late 1996 software named internet middleware object cache referred cached 2 later cached 3 1997 imc acquired netapp software renamed netcache danzig becoming chief architect cto netcache division 2006 netapp sold netcache business technology blue coat systems similar line proxysg appliances became expensive product existing netapp customers hardware netcache appliance included netapp data ontap microkernel write anywhere file layout file system achieving four times throughput software equivalents available time according netapp comparisons starting ontap version 9.5 similar functionality introduced flexcache name november 2005 three hardware models offered former models include
[ 2488, 7122, 7762, 4828, 4284 ]
Test
4,597
3
VGA-compatible_text_mode:vga-compatible text mode implementation computer monitor text mode vga-compatible hardware quite complex use pc-compatible computers widespread 1980s–1990s particularly dos systems persists today applications even modern desktop computers main features vga text mode colored programmable 16 color palette characters background blinking various shapes cursor block/underline/hidden static/blinking loadable fonts various glyph sizes linux console traditionally uses hardware vga-compatible text modes win32 console environment ability switch screen text mode text window sizes screen character actually represented two bytes aligned 16-bit word accessible cpu single operation lower character byte actual code point current character set higher attribute byte bit field used select various video attributes color blinking character set forth byte-pair scheme among features vga inherited ega cga ultimately mda colors assigned way 4-bit indexed color graphic modes see vga color palette vga modes need mda reverse bright attributes foreground background colors set explicitly vga hardware ability enable underline character attribute bit 0 set however since mda-compatible feature attribute bits used mda must set zero underline shown means bits 3 intensity 7 blink set concurrently bit 0 underline default vga palette setting bit 0 enable underline also change text colour blue means text two colors underlined light blue dark blue default palette despite underline normally visible color modes location underline defaults scanline character glyph rendering invisible underline location set visible scanline default switching mda-compatible monochrome text mode underline appear screen fonts used ega vga monospace raster fonts containing 256 glyphs glyphs font size size changed typically glyphs 8 dots wide 8–16 dots high however height value maximum 32 row glyph coded 8 bit byte high bits left glyph low bits right along several hardware-dependent fonts stored adapter rom text mode offers 8 loadable fonts two active font pointers font font b select two available fonts although usually point font point different fonts attribute bit 3 see acts font selection bit instead foreground color bit real vga hardware overrides bit use color selection many clones emulators color selection remains — meaning one font displayed normal intensity high-intensity error overcome changing palette registers contain two copies 8-color palette modes character box width 9 dots e.g default 80×25 mode however 9th column used spacing characters content changed always blank drawn current background colour exception line graphics enable mode causes code points 0xc0 0xdf inclusive 8th column repeated 9th code points cover box drawing characters must extend way right side glyph box reason placing letter-like characters code points 0xc0–0xdf avoided box drawing characters 0xb0 0xbf extended point right require extending shape cursor restricted rectangle full width character box filled foreground color character cursor current location height position may arbitrary within character box ega many vga clones allowed split-box cursor appearing two rectangles one top character box one bottom setting end cursor start however done original vga cursor completely hidden instead vga standard provide way alter blink rate although common workarounds involve hiding cursor using normal character glyph provide so-called software cursor mouse cursor tui implemented usually thing hardware cursor moving rectangle altered background special glyph text-based interfaces impulse tracker went even greater lengths provide smoother graphic-looking mouse cursor done constantly re-generating character glyphs real-time according cursor on-screen position underlying characters generally two ways access vga text-mode application video bios interface directly accessing video ram i/o ports latter method considerably faster allows quick reading text buffer reason preferred advanced tui programs vga text buffer located physical memory address 0xb8000 since usually used 16-bit x86 processes operating real-mode first half memory segment 0xb800 text buffer data read written bitwise operations applied part text buffer memory scope current mode accessible shown physical addresses used protected mode applications may either part memory mapped address space access via operating system application modern multitasking os control console accesses part system ram instead actual text buffer computers 1980s fast manipulation text buffer hardware generating individual pixels fast could displayed extremely useful fast ui even relatively modern hardware overhead text mode emulation via hardware apa graphics modes program generates individual pixels stores video buffer may noticeable monitor side difference input signal text mode apa mode size text mode signal may timings vesa standard modes registers used adapter side set parameters text mode apa modes text mode output signal essentially graphic modes source text buffer character generator framebuffer apa depending graphics adapter used variety text modes available ibm pc compatible computers listed table vga compatible cards support mda cga ega modes colored modes design text attributes mda modes specific features see — text could emphasized bright underline reverse blinking attributes far common text mode used dos environments initial windows consoles default 80 columns 25 rows 80×25 16 colors mode available practically ibm compatible personal computers two vga text modes 80×43 80×50 exist rarely used 40 column text modes never popular used demonstration purposes old hardware character sizes graphical resolutions extended vesa-compatible super vga text modes manufacturer dependent cards e.g s3 supported custom large text modes like 100×37 even 160×120 like graphic modes graphic adapters 2000s commonly capable set arbitrarily-sized text mode reasonable limits instead choosing parameters list poor software support deters widespread use custom modes linux dos systems named svga cards program called svgatextmode used set better looking text modes ega vga standard ones particularly useful large ≥ 17 monitors normal 80×25 vga text mode 720×400 pixel resolution far lower typical graphics mode would svgatextmode allows setting pixel clock higher refresh rate larger font size cursor size etc. allows better use potential video card monitor non-windows systems use svgatextmode alternative options linux framebuffer obtain sharp text critical lcd monitors 1280×1024 higher resolution none named standard text modes fits matrix size svgatextmode also allows fine tuning video signal timings despite name program supported modes conform svga i.e vesa standards vga text modes hardware-imposed limitations appear restrictive hardware text mode vga compatible video adapters limited use
[ 4341, 93, 5571, 4277, 352, 4810, 578, 3905, 858 ]
Test
4,598
1
Australian_Plant_Census:australian plant census australian plant census apc provides online interface currently accepted published scientific names vascular flora australia one output interfaces national government integrated biodiversity information system ibis – oracle co. relational database management system australian national herbarium australian national botanic gardens australian biological resources study council heads australasian herbaria coordinate system australian plant census interface provides currently accepted scientific names synonyms illegitimate misapplied excluded names well state distribution data item output hyperlinks online interfaces information system including australian plant name index apni australian plant image index apii outputs australian plant census interface provide information native naturalised vascular plant taxa australia including offshore islands excludes taxa known australia cultivation yet naturalised classification plant families based angiosperm phylogeny group iii system 2009
[ 394, 7336 ]
Test
4,599
6
Mkdosfs:mkdosfs mkdosfs one applications included dosfstools package used create dos file system linux data storage device usually disk partition mkdosfs options device may specify number blocks device allow mkdosfs guess mkdosfs support creating boot-able partitions
[]
Validation
4,600
8
Web_analytics:web analytics web analytics measurement collection analysis reporting web data purposes understanding optimizing web usage however web analytics process measuring web traffic used tool business market research assess improve effectiveness website web analytics applications also help companies measure results traditional print broadcast advertising campaigns helps one estimate traffic website changes launch new advertising campaign web analytics provides information number visitors website number page views helps gauge traffic popularity trends useful market research web analytics processes come four essential stages steps another essential function developed analysts optimization websites experiments goal a/b testing identify suggest changes web pages increase maximize effect statistically tested result interest stage impacts impact i.e. drives stage preceding following sometimes data available collection impacts online strategy times online strategy affects data collected least two categories web analytics off-site on-site web analytics historically web analytics used refer on-site visitor measurement however meaning become blurred mainly vendors producing tools span categories many different vendors provide on-site web analytics software services two main technical ways collecting data first traditional method server log file analysis reads logfiles web server records file requests browsers second method page tagging uses javascript embedded webpage make image requests third-party analytics-dedicated server whenever webpage rendered web browser desired mouse click occurs collect data processed produce web traffic reports fundamental goal web analytics collect analyze data related web traffic usage patterns data mainly comes four sources web servers record transactions log file soon realized log files could read program provide data popularity website thus arose web log analysis software early 1990s website statistics consisted primarily counting number client requests hits made web server reasonable method initially since website often consisted single html file however introduction images html websites spanned multiple html files count became less useful first true commercial log analyzer released ipro 1994 two units measure introduced mid-1990s gauge accurately amount human activity web servers page views visits sessions page view defined request made web server page opposed graphic visit defined sequence requests uniquely identified client expired certain amount inactivity usually 30 minutes page views visits still commonly displayed metrics considered rather rudimentary emergence search engine spiders robots late 1990s along web proxies dynamically assigned ip addresses large companies isps made difficult identify unique human visitors website log analyzers responded tracking visits cookies ignoring requests known spiders extensive use web caches also presented problem log file analysis person revisits page second request often retrieved browser cache request received web server means person path site lost caching defeated configuring web server result degraded performance visitor bigger load servers concerns accuracy log file analysis presence caching desire able perform web analytics outsourced service led second data collection method page tagging 'web bugs mid-1990s web counters commonly seen — images included web page showed number times image requested estimate number visits page late 1990s concept evolved include small invisible image instead visible one using javascript pass along image request certain information page visitor information processed remotely web analytics company extensive statistics generated web analytics service also manages process assigning cookie user uniquely identify visit subsequent visits cookie acceptance rates vary significantly websites may affect quality data collected reported collecting website data using third-party data collection server even in-house data collection server requires additional dns lookup user computer determine ip address collection server occasion delays completing successful failed dns lookups may result data collected increasing popularity ajax-based solutions alternative use invisible image implement call back server rendered page case page rendered web browser piece ajax code would call back server pass information client aggregated web analytics company ways flawed browser restrictions servers contacted xmlhttprequest objects also method lead slightly lower reported traffic levels since visitor may stop page loading mid-response ajax call made logfile analysis programs page tagging solutions readily available companies wish perform web analytics cases web analytics company offer approaches question arises method company choose advantages disadvantages approach main advantages log file analysis page tagging follows main advantages page tagging log file analysis follows logfile analysis almost always performed in-house page tagging performed in-house often provided third-party service economic difference two models also consideration company deciding purchase solution cheaper implement depends amount technical expertise within company vendor chosen amount activity seen websites depth type information sought number distinct websites needing statistics regardless vendor solution data collection method employed cost web visitor analysis interpretation also included cost turning raw data actionable information use third party consultants hiring experienced web analyst training suitable in-house person cost-benefit analysis performed example revenue increase cost savings gained analyzing web visitor data companies produce solutions collect data log-files page tagging analyze kinds using hybrid method aim produce accurate statistics either method early hybrid solution produced 1998 rufus evison ip geolocation possible track visitors locations using ip geolocation database api visitors geolocated city region country level ip intelligence internet protocol ip intelligence technology maps internet categorizes ip addresses parameters geographic location country region state city postcode connection type internet service provider isp proxy information first generation ip intelligence referred geotargeting geolocation technology information used businesses online audience segmentation applications online advertising behavioral targeting content localization website localization digital rights management personalization online fraud detection localized search enhanced analytics global traffic management content distribution click analytics special type web analytics gives special attention clicks commonly click analytics focuses on-site analytics editor website uses click analytics determine performance particular site regards users site clicking also click analytics may happen real-time unreal -time depending type information sought typically front-page editors high-traffic news media sites want monitor pages real-time optimize content editors designers types stakeholders may analyze clicks wider time frame help assess performance writers design elements advertisements etc data clicks may gathered least two ways ideally click logged occurs method requires functionality picks relevant information event occurs alternatively one may institute assumption page view result click therefore log simulated click led page view customer lifecycle analytics visitor-centric approach measuring falls umbrella lifecycle marketing page views clicks events api calls access third-party services etc tied individual visitor instead stored separate data points customer lifecycle analytics attempts connect data points marketing funnel offer insights visitor behavior website optimization methods data collection sometimes used packet sniffing collects data sniffing network traffic passing web server outside world packet sniffing involves changes web pages web servers integrating web analytics web server software also possible methods claim provide better real-time data methods globally agreed definitions within web analytics industry bodies trying agree definitions useful definitive time main bodies input area iab interactive advertising bureau jicwebs joint industry committee web standards uk ireland daa digital analytics association formally known waa web analytics association us however many terms used consistent ways one major analytics tool another following list based conventions useful starting point off-site web analytics based open data analysis social media exploration share voice web properties usually used understand market site identifying keywords tagged site either social media websites using http referer webpage owners able trace referrer sites helps bring traffic site hotel problem generally first problem encountered user web analytics problem unique visitors day month add total unique visitors month appears inexperienced user problem whatever analytics software using fact simple property metric definitions way picture situation imagining hotel hotel two rooms room room b table shows hotel two unique users day three days sum totals respect days therefore six period room two unique users sum totals respect rooms therefore four actually three visitors hotel period problem person stays room two nights get counted twice count day counted looking total period software web analytics sum correctly chosen time period thus leading problem user tries compare totals historically vendors page-tagging analytics solutions used third-party cookies sent vendor domain instead domain website browsed third-party cookies handle visitors cross multiple unrelated domains within company site since cookie always handled vendor servers however third-party cookies principle allow tracking individual user across sites different companies allowing analytics vendor collate user activity sites provided personal information activity sites thought anonymous although web analytics companies deny companies companies supplying banner ads done privacy concerns cookies therefore led noticeable minority users block delete third-party cookies 2005 reports showed 28 internet users blocked third-party cookies 22 deleted least month vendors page tagging solutions moved provide least option using first-party cookies cookies assigned client subdomain another problem cookie deletion web analytics depend cookies identify unique visitors statistics dependent persistent cookie hold unique visitor id users delete cookies usually delete first- third-party cookies done interactions site user appear first-time visitor next interaction point without persistent unique visitor id conversions click-stream analysis metrics dependent activities unique visitor time accurate cookies used ip addresses always unique users may shared large groups proxies cases ip address combined user agent order accurately identify visitor cookies available however partially solves problem often users behind proxy server user agent methods uniquely identifying user technically challenging would limit trackable audience would considered suspicious cookies selected option reach lowest common denominator without using technologies regarded spyware may good aware third-party information gathering subject network limitations security applied countries service providers private networks prevent site visit data going third parties methods described methods mentioned like sampling central problem vulnerable manipulation inflation deflation means methods imprecise insecure reasonable model security issue addressed number papers to-date solutions suggested papers remain theoretical possibly due lack interest engineering community financial gain current situation provides owners big websites details consult aforementioned papers
[ 2902, 711, 7880, 5375, 3273, 2570, 7910, 2577, 1485, 49, 3654, 3999, 80, 3338, 5791, 7233, 6889, 7984, 497, 6214, 6233, 5891, 1250, 5907, 3092, 5560, 3460, 578, 8101, 2759, 2043, 6296, 591, 247, 3821, 7405, 620, 2810, 6689, 4570, 2451, ...
Validation
4,601
4
SSL-Explorer:_Community_Edition:ssl-explorer community edition ssl-explorer community edition open-source ssl vpn product developed 3sp ltd company acquired barracuda networks licensed gnu general public license gpl aimed primarily smaller businesses need remote access internal network resources product designed installed standalone server allows user connect remotely internal corporate resources intranet websites network file shares ‘ fat client ’ applications data via regular web browser gives end users access applications would use every day work simple web browser without necessity installing dedicated vpn client software product first released sourceforge.net website august 2004 since 275,000 downloads main product distribution december 2007 versions core community edition product licensed gpl commercial enterprise edition product built upon community edition additional functionality licensed separately commercial license fork last gpl release created named adito later renamed openvpn als around march 2008 3sp ltd announced discontinued development community edition ssl-explorer known install function following operating systems product previously licensed gpl source code still available via sourceforge.net however future updates source code pre-built binaries forthcoming 3sp ltd. november 18 2008 3sp ltd. part barracuda networks technology behind ssl-explorer incorporated barracuda ssl vpn ssl-explorer application written java contains database web server used serve secure web pages order access back-end network resources product ideally installed upon standalone server may installed service run background processes desired product acts web-based proxy mediates requests resources external users also providing means authenticating users identities querying number user databases including microsoft active directory access rights enforced principle role based access control secondary access control measures ntfs filesystem permissions also affect resources user may access resources e.g remote desktop access require use port forwarding operate successfully purpose lightweight java applet known 'ssl-explorer agent downloaded launched client browser applet intercepts tcp/ip requests certain configurable ports forwards ssl-explorer server turn routes appropriate endpoint network using combination various techniques web proxying port forwarding corporate applications continue function unimpeded data tunneled transparently end point client via ssl-explorer using https protocol network resources may externalized ssl-explorer include following actual vpn server may placed inside either dmz within trusted network incoming connections port 443 forwarded directly ssl-explorer firewall rules one main advantages associated ssl vpn products lies fact correctly set technically possible close firewall ports apart https/ssl port 443 often lumped together similar solutions ssl-explorer conceptually different openvpn provides controlled authenticated access services applications within network rather full unchallenged network access ssl-explorer ssl vpn products whole beneficial many people number distinct groups benefit greatly usage community edition ssl-explorer provided number security features features one-time-password support hardware token authentication offered via commercial implementation barracuda ssl vpn february 2007 3sp ltd conducted performance benchmarking ssl-explorer solution using test bed platform three systems using different specifications hardware benchmarking conducted assumption minimum 256 kbit/s data throughput rate would realistic value place upon responsive vpn tunnel use remote desktop access bea jrockit jre used tests microsoft windows linux systems results obtained indicated ssl-explorer known operate successfully using ncipher nfast ln1200 ssl accelerator card ssl-explorer built using number open source software components frameworks notable projects summarized june 2007 secunia published advisory stating versions ssl-explorer prior 0.2.13 vulnerable cross-site scripting attacks http header injection attacks 3sp ltd fixed vulnerability later versions product advised users upgrade servers currently us-cert advisory notice unresolved potential security flaw affecting whole class url-rewriting clientless ssl vpn products including versions ssl-explorer derivatives many similar utilities see
[ 623, 4759, 1534, 644, 7075, 5571, 1559, 578, 2034, 3794, 1019, 2680, 2506, 3338 ]
Test
4,602
1
Plants_of_the_World_Online:plants world online plants world online online database published royal botanic gardens kew launched march 2017 ultimate aim enable users access information world known seed-bearing plants 2020 initial focus tropical african floras particularly flora zambesiaca flora west tropical africa flora tropical east africa
[ 394, 7336, 845, 518 ]
Test
4,603
2
Slackpkg:slackpkg slackpkg software tool installing upgrading packages automatically network internet slackware slackpkg included main tree slackware 12.2 previously included extras/ since slackware 9.1 licensed gnu general public license gpl slackpkg automated package management tool written slackware shell script like swaret designed make slackware system administrator job easier allowing routine package management tasks accomplished single command slackpkg replace slackware package management tools installpkg upgradepkg rather uses features slackpkg include automated package installation upgrading searching many features package deinstallation performed directly using slackware package tools though incorporation slackpkg provides consistent user interface slackpkg resolve dependencies packages like rpm fedora opensuse third-party applications slapt-get automated package relation management
[ 8055, 1621, 5366, 2091, 5200, 5017, 5545, 6609, 1723, 462, 7246, 1260, 5726, 7619, 4675, 5912, 5116, 7075, 3366, 5480, 4778, 5571, 2034, 4059, 7092, 2581, 7555, 6743, 3559, 2771, 326, 7018, 2594, 4441, 1406, 6663, 1684, 952, 4991, 523, ...
Train
4,604
8
Open_Mashup_Alliance:open mashup alliance open mashup alliance oma non-profit consortium promotes adoption mashup solutions enterprise evolution enterprise mashup standards like emml enterprise mashup usage expected grow tenfold next five years initial members oma include large technology companies adobe systems hewlett-packard intel major technology users bank america capgemini according information technology industry analyst dion hinchcliffe ultimately oma creates standardized approach enterprise mashups creates open vibrant market competing runtimes mashups array important aftermarket services development/testing tools management administration appliances governance frameworks education professional services initial focus oma developing emml declarative mashup domain-specific language dsl aimed creating enterprise mashups emml language provides comprehensive set high-level mashup-domain vocabulary consume mash variety web data-sources diverse ways emml provides uniform syntax invoke heterogeneous service styles rest wsdl rss/atom rdbms pojo emml also provides ability mix match diverse data-formats xml json jdbc javaobjects primitive types oma web site provides emml specification emml schema reference runtime implementation capable running emml scripts sample emml mashup scripts technical documentation oma developing emml creative commons attribution derivatives license license means emml users allowed copy distribute emml however emml altered users ownership emml oma must made clear redistribution eventual objective oma submit emml specification oma specifications recognized industry standards body
[ 3764 ]
Test
4,605
2
Dreamshell:dreamshell dreamshell unix-like operating system designed sega dreamcast video game console based kallistios libraries originally command line interface ability run third-party applications later versions dreamshell gained gui xml-module support applications written lua-scripts ability enhance functionality using functions klf-modules analogous dll kallisti os fixed modules mp3 ogg loaded console commands appear play formats well support implemented file manager internal external commands added facilitate ds kernel first application appeared dreamshell version 4.0 allows install operating system directly dreamcast bios lets change console regional setting video output format pal ntsc without flashing bios application relies consoles modified motherboard
[ 3368, 1052, 169, 5571, 3219, 6857, 178 ]
Test
4,606
9
Java_APIs_for_Bluetooth:java apis bluetooth java apis bluetooth wireless technology jabwt j2me specification apis allows java midlets running embedded devices mobile phones use bluetooth short-range wireless communication jabwt developed jsr-82 java community process jsr 82 implementations java 2 platform standard edition j2se also available original java specification request jsr-82 submitted motorola sun microsystems approved executive committee j2me september 2000 jsr-82 provided first standardized java api bluetooth protocols allowing developers write applications using bluetooth work devices conforming specification first version jsr-82 released march 2002 recent update jsr-82 maintenance draft review 4 released march 2010 specification reference implementation technology compatibility kit tck maintained motorola open source jabwt provides support discovery nearby bluetooth devices java applications use api scan discoverable devices identify services provided discovered devices search devices device frequently contacts jabwt provides object exchange api transfer data objects devices example two devices conforming obex protocol could exchange virtual business cards calendar appointments jabwt allows management local device ’ state jabwt applications able access information host device bluetooth address mark host device discoverable bluetooth devices register provide services jabwt supports connections different levels security applications using apis pass parameters connector.open method indicating level security required establish connection another device hundreds mobile devices different manufacturers comply jsr-82 specification google maintains list devices conform jsr-82 specification several open-source implementations jsr-82 specification available
[ 2520, 6280 ]
Validation
4,607
5
SDES:sdes sdes session description protocol security descriptions media streams way negotiate key secure real-time transport protocol proposed standardization ietf july 2006 see rfc 4568 keys transported sdp attachment sip message means sip transport layer must make sure no-one else see attachment done using tls transport layer methods like s/mime using tls assumes next hop sip proxy chain trusted take care security requirements request main advantage method extremely simple key exchange method picked several vendors already even though vendors use secure mechanism transport key helps get critical mass implementation make method de facto standard illustrate principle example phone sends call proxy using sips scheme indicates call must made secure key base-64 encoded sdp attachment phone receives answer proxy two-way secure call common problem secure media key exchange might finished first media packet arrives order avoid initial clicks packets must dropped usually short period time 100 ms major problem sdes method address end-to-end media encryption example user talking user b via proxy p sdes allows negotiation keys p b p b end-to-end media security must first establish trust relationship side use trusted intermediate call setup delay significantly increase makes applications like push-to-talk difficult peer-to-peer might difficult identify side example operator might implement b2bua architecture play role side still n't end-to-end security newer modern protocols like zrtp offer end-to-end encryption sip/rtp calls
[ 7168, 7170 ]
Test
4,608
4
Protection_Profile:protection profile protection profile pp document used part certification process according iso/iec 15408 common criteria cc generic form security target st typically created user user community provides implementation independent specification information assurance security requirements pp combination threats security objectives assumptions security functional requirements sfrs security assurance requirements sars rationales pp specifies generic security evaluation criteria substantiate vendors claims given family information system products among others typically specifies evaluation assurance level eal number 1 7 indicating depth rigor security evaluation usually form supporting documentation testing product meets security requirements specified pp national institute standards technology nist national security agency nsa agreed cooperate development validated u.s. government pps pp states security problem rigorously given collection system products known target evaluation toe specify security requirements address problem without dictating requirements implemented pp may inherit requirements one pps order get product evaluated certified according cc product vendor define security target st may comply one pps way pp may serve template product st although eal easiest laymen compare simplicity deceptive number rather meaningless without understanding security implications pp st used evaluation technically comparing evaluated products requires assessing eal functional requirements unfortunately interpreting security implications pp intended application requires strong security expertise evaluating product one thing deciding product cc evaluation adequate particular application quite another obvious trusted agency possesses depth security expertise needed evaluate systems applicability common criteria evaluated products problem applying evaluations new problem addressed decades ago massive research project defined software features could protect information evaluated strength mapped security features needed specific operating environment risks results documented rainbow series rather separating eal functional requirements orange book followed less advanced approach defining functional protection capabilities appropriate assurance requirements single category seven categories defined way yellow book defined matrix security environments assessed risk established precisely security environment valid orange book categories approach produced unambiguous layman cookbook determine whether product usable particular application loss application technology seems unintended consequence superseding orange book common criteria
[ 6208, 4095, 5568, 4617, 3037, 3611, 1326, 698, 3003 ]
Validation
4,609
9
Logo_(programming_language):logo programming language logo educational programming language designed 1967 wally feurzeig seymour papert cynthia solomon logo acronym name coined feurzeig bolt beranek newman derives greek logos meaning word thought general-purpose language logo widely known use turtle graphics commands movement drawing produced line vector graphics either screen small robot termed turtle language conceived teach concepts programming related lisp later enable papert called body-syntonic reasoning students could understand predict reason turtle motion imagining would turtle substantial differences among many dialects logo situation confused regular appearance turtle graphics programs named logo logo multi-paradigm adaptation dialect lisp functional programming language standard logo ucblogo best facilities handling lists files i/o recursion scripts used teach computer science concepts uc berkeley lecturer brian harvey computer science logo style trilogy logo usually interpreted language although developed compiled logo dialects lhogho liogo logo case-sensitive retains case used formatting logo created 1967 bolt beranek newman bbn cambridge massachusetts research firm wally feurzeig cynthia solomon seymour papert intellectual roots artificial intelligence mathematical logic developmental psychology first four years logo research development teaching work done bbn first implementation logo called ghost written lisp pdp-1 goal create mathematical land children could play words sentences modeled lisp design goals logo included accessible power informative error messages use virtual turtles allowed immediate visual feedback debugging graphic programming first working logo turtle robot created 1969 display turtle preceded physical floor turtle modern logo changed much basic concepts first turtle first turtle tethered floor roamer radio-controlled wireless bbn paul wexelblat developed turtle named irving touch sensors could move forwards backwards rotate ding bell earliest year-long school users logo 1968-69 muzzey jr high lexington virtual physical turtles first used fifth-graders bridge school lexington 1970-71 logo most-known feature turtle derived originally robot name on-screen cursor showed output commands movement small retractable pen together producing line graphics traditionally displayed either triangle turtle icon though represented icon turtle graphics added logo language seymour papert late 1960s support papert version turtle robot simple robot controlled user workstation designed carry drawing functions assigned using small retractable pen set attached robot body practical matter use turtle geometry instead traditional model mimics actual movement logic turtle robot turtle moves commands relative position left 90 means spin left 90 degrees logo implementations particularly allow use concurrency multiple turtles support collision detection allow user redefine appearance turtle cursor essentially allowing logo turtles function sprites multiple turtles supported mswlogo well 3d graphics input com ports lpt ports also allowed mswlogo windows gui interrupts triggered via keyboard mouse events simple gif animations may also produced mswlogo version 6.5 gifsave command turtle geometry also sometimes used environments logo alternative strictly coordinate-addressed graphics system instance idea turtle graphics also useful lindenmayer system generating fractals modern derivatives logo allow thousands independently moving turtles two popular implementations massachusetts institute technology starlogo northwestern university center connected learning ccl netlogo allow exploring emergent phenomena come many experiments social studies biology physics areas netlogo widely used agent-based simulation biological social sciences although one agreed-upon standard broad consensus core aspects language march 2009 197 implementations dialects logo strengths 197 longer wide use many still active development commercial logos still widely used schools include microworlds logo imagine logo logo primary influence smalltalk programming language also main influence etoys educational programming environment language essentially logo written squeak variant smalltalk logo influenced procedure/method model agentsheets agentcubes program agents similar notion turtle logo logo provided underlying language boxer boxer developed university california berkeley mit based literacy model making easier use nontechnical people kturtle variation logo implemented qt kde environment loosely based logo another result logo influence kojo variant scala scratch educational programming language runs squeak variant smalltalk inspired logo 2015 cubetto education robotics system children 3 years older developed crowd-source funding cubetto influenced logo montessori cubetto features small cubic turtle turns 90 degrees cubetto described update button-box mit logo system tortis
[ 7878, 1816, 1445, 5019, 1820, 6796, 6087, 2915, 5734, 1478, 2218, 4704, 5757, 6116, 6826, 45, 1116, 6471, 7573, 2600, 5077, 1885, 1889, 6507, 1908, 795, 6876, 4759, 6888, 1557, 5494, 5501, 6210, 144, 4074, 154, 4085, 7298, 5515, 8025, 6...
Validation
4,610
7
Digital_omnivore:digital omnivore digital omnivore descriptive term meant capture indiscriminate seamless modalities consumers use access world wide web cultural meme reflects popularization smartphones introduction tablets web-enabled devices allow consumers access media content several touch-points course daily digital lives mobile web users increasingly mobile devices cross-platform multimedia consumption continue re-shape digital landscape terms type media content consume consume according new 2011 survey comscore smartphones tablets driving nearly 7 digital traffic united states two-thirds growth attributed smartphones alone today half u.s. mobile population uses mobile media 19 past year 116 million people growth expected increase 36.1 americans age 13 smartphone digital omnivores global phenomenon driving 5 non-computer device internet traffic august 2011 singapore leads way 7.2 u.s united kingdom score 6.8 australia canada complete top five global markets 5.3 4.4 respectively looking deeper 6.8 non-pc web-browsing done u.s. find 64.4 comes mobile phones 28.1 tablets 7.5 devices game consoles e-readers means u.s. 4 overall web browsing comes smartphones 1.6 tablets small figures point way people beginning toggle devices across various day-parts analysis way consumers u.s. viewed news content different devices throughout day demonstrates influence devices way people consume content typical weekend morning digital omnivores access news using tablet favor computer working day return tablet use evening peaking hours 9pm midnight mobile phones used web-browsing throughout day users away personal computer increased wi-fi availability mobile broadband adoption changing way people going online today august 2011 third 37.2 u.s. digital traffic coming mobile phones occurred via wi-fi connection tablets traditionally required wi-fi connection access internet increasingly driving traffic using mobile broadband access tablets yet widely adopted already contribute nearly 2 web browsing traffic united states traffic driven almost exclusively ipad accounted 97 tablet traffic second half 2011 period ipads also began account higher share internet traffic iphones 46.8 vs. 42.6 ios device traffic u.s. tablet users largely display demographic characteristics early technology adopters younger males 49.5 age 34 average incomes 45.9 belong households earning 100,000 year point time half tablet users report used tablet least previous month activities social networking online shopping consuming news viewing videos entertainment current trend content providers optimizing sites tablets creating tablet-specific apps continues likely tablet owners interact devices even messaging set connected consumers move effortlessly online terrestrial lives may seem chaotic complex difficult navigate actually presenting opportunities never thought possible media execution buying quickly becoming new creativity levers marketers smartphone tablet connected device represents unique canvas media engagement brands strategically manage communication strategy across complementary messaging matrix best positioned create long term loyalty high engagement audiences consumers utilizing full-spectrum digital devices cultural communicators must understand patterns order develop incremental unduplicated reach across entire digital ecosystem
[ 1108, 2961, 4575, 84, 740 ]
Validation
4,611
3
X86_assembly_language:x86 assembly language x86 assembly language family backward-compatible assembly languages provide level compatibility way back intel 8008 introduced april 1972. x86 assembly languages used produce object code x86 class processors like assembly languages uses short mnemonics represent fundamental instructions cpu computer understand follow compilers sometimes produce assembly code intermediate step translating high level program machine code regarded programming language assembly coding machine-specific low level assembly languages typically used detailed time critical applications small real-time embedded systems operating system kernels device drivers x86 assembly instruction represented mnemonic often combined one operands translates one bytes called opcode nop instruction translates 0x90 instance hlt instruction translates 0xf4 potential opcodes documented mnemonic different processors may interpret differently making program using behave inconsistently even generate exception processors opcodes often turn code writing competitions way make code smaller faster elegant show author prowess x86 assembly language two main syntax branches intel syntax originally used documentation x86 platform syntax intel syntax dominant ms-dos windows world syntax dominant unix world since unix created bell labs summary main differences intel syntax syntax many x86 assemblers use intel syntax including nasm fasm masm tasm yasm gas supported syntaxes since version 2.10 via .intel_syntax directive x86 processors collection registers available used stores binary data collectively data address registers called general registers register special purpose addition along general registers additionally ip register points memory offset next instruction code segment points first byte instruction ip register accessed programmer directly x86 registers used using mov instructions example intel syntax mov ax 1234h copies value 1234hex 4660d register ax mov bx ax copies value ax register bx register x86 architecture real virtual 8086 mode uses process known segmentation address memory flat memory model used many environments segmentation involves composing memory address two parts segment offset segment points beginning 64 kb group addresses offset determines far beginning address desired address segmented addressing two registers required complete memory address one hold segment hold offset order translate back flat address segment value shifted four bits left equivalent multiplication 2 16 added offset form full address allows breaking 64k barrier clever choice addresses though makes programming considerably complex real mode/protected example ds contains hexadecimal number 0xdead dx contains number 0xcafe would together point memory address 0xdead 0x10 0xcafe 0xeb5ce therefore cpu address 1,048,576 bytes 1 mb real mode combining segment offset values find 20-bit address original ibm pc restricted programs 640 kb expanded memory specification used implement bank switching scheme fell use later operating systems windows used larger address ranges newer processors implemented virtual memory schemes protected mode starting intel 80286 utilized os/2 several shortcomings inability access bios inability switch back real mode without resetting processor prevented widespread usage 80286 also still limited addressing memory 16-bit segments meaning 2 bytes 64 kilobytes could accessed time access extended functionality 80286 operating system would set processor protected mode enabling 24-bit addressing thus 2 bytes memory 16 megabytes protected mode segment selector broken three parts 13-bit index table indicator bit determines whether entry gdt ldt 2-bit requested privilege level see x86 memory segmentation referring address segment offset notation segment offset used example flat address 0xeb5ce written 0xdead:0xcafe segment offset register pair ds dx special combinations segment registers general registers point important addresses intel 80386 featured three operating modes real mode protected mode virtual mode protected mode debuted 80286 extended allow 80386 address 4 gb memory new virtual 8086 mode vm86 made possible run one real mode programs protected environment largely emulated real mode though programs compatible typically result memory addressing tricks using unspecified op-codes 32-bit flat memory model 80386 extended protected mode may important feature change x86 processor family amd released x86-64 2003 helped drive large scale adoption windows 3.1 relied protected mode since windows could run many applications including dos applications using virtual memory simple multitasking x86 processors support five modes operation x86 code real mode protected mode long mode virtual 86 mode system management mode instructions available others 16-bit subset instructions available 16-bit x86 processors 8086 8088 80186 80188 80286 instructions available real mode x86 processors 16-bit protected mode 80286 onwards additional instructions relating protected mode available 80386 later 32-bit instructions including later extensions also available modes including real mode cpus v86 mode 32-bit protected mode added additional instructions provided modes manage features smm special instructions available intel i386sl i486 later cpus finally long mode amd opteron onwards 64-bit instructions registers also available instruction set similar mode memory addressing word size vary requiring different programming strategies modes x86 code executed processor runs real mode immediately power operating system kernel program must explicitly switch another mode wishes run anything real mode switching modes accomplished modifying certain bits processor control registers preparation additional setup may required switch general features modern x86 instruction set x86 architecture hardware support execution stack mechanism instructions codice_8 codice_9 codice_10 codice_11 used properly set stack pass parameters allocate space local data save restore call-return points codice_11 size instruction useful implementing space efficient fast calling conventions callee responsible reclaiming stack space occupied parameters setting stack frame hold local data recursive procedure several choices high level codice_13 instruction introduced 80386 takes procedure-nesting-depth argument well local size argument may faster explicit manipulation registers codice_14 codice_15 codice_16 whether faster slower depends particular x86-processor implementation well calling convention used compiler programmer particular program code x86 code intended run x86-processors several manufacturers different technological generations processors implies highly varying microarchitectures microcode solutions well varying gate- transistor-level design choices full range addressing modes including immediate base+offset even instructions codice_8 codice_9 makes direct usage stack integer floating point address data simple well keeping abi specifications mechanisms relatively simple compared risc architectures require explicit call stack details x86 assembly standard mathematical operations codice_19 codice_20 codice_21 codice_22 logical operators codice_23 codice_24 codice_25 codice_26 bitshift arithmetic logical codice_27/codice_28 codice_29/codice_30 rotate without carry codice_31/codice_32 codice_33/codice_34 complement bcd arithmetic instructions codice_35 codice_36 codice_37 others x86 assembly language includes instructions stack-based floating-point unit fpu fpu optional separate coprocessor 8086 80386 on-chip option 80486 series standard feature every intel x86 cpu since 80486 starting pentium fpu instructions include addition subtraction negation multiplication division remainder square roots integer truncation fraction truncation scale power two operations also include conversion instructions load store value memory following formats binary-coded decimal 32-bit integer 64-bit integer 32-bit floating-point 64-bit floating-point 80-bit floating-point upon loading value converted currently used floating-point mode x86 also includes number transcendental functions including sine cosine tangent arctangent exponentiation base 2 logarithms bases 2 10 e stack register stack register format instructions usually codice_38 codice_39 codice_40 equivalent codice_41 codice_42 one 8 stack registers codice_41 codice_44 ... codice_45 like integers first operand first source operand destination operand codice_46 codice_47 singled first swapping source operands performing subtraction division addition subtraction multiplication division store comparison instructions include instruction modes pop top stack operation complete example codice_48 performs calculation codice_49 removes codice_41 top stack thus making result codice_44 top stack codice_41 modern x86 cpus contain simd instructions largely perform operation parallel many values encoded wide simd register various instruction technologies support different operations different register sets taken complete whole mmx sse4.2 include general computations integer floating point arithmetic addition subtraction multiplication shift minimization maximization comparison division square root example codice_53 performs 4 parallel 16-bit indicated codice_54 integer adds indicated codice_55 codice_56 values codice_57 stores result codice_56 streaming simd extensions sse also includes floating point mode first value registers actually modified expanded sse2 unusual instructions added including sum absolute differences used motion estimation video compression done mpeg 16-bit multiply accumulation instruction useful software-based alpha-blending digital filtering sse since sse3 3dnow extensions include addition subtraction instructions treating paired floating point values like complex numbers instruction sets also include numerous fixed sub-word instructions shuffling inserting extracting values around within registers addition instructions moving data integer registers xmm used sse /fpu used mmx registers x86 processor also includes complex addressing modes addressing memory immediate offset register register offset scaled register without offset register optional offset another scaled register example one encode codice_59 single instruction loads 32 bits data address computed codice_60 offset codice_61 selector stores codice_62 register general x86 processors load use memory matched size register operating simd instructions also include half-load instructions x86 instruction set includes string load store move scan compare instructions codice_63 codice_64 codice_65 codice_66 codice_67 perform operation specified size codice_68 8-bit byte codice_54 16-bit word codice_70 32-bit double word increments/decrements depending df direction flag implicit address register codice_71 codice_63 codice_73 codice_64 codice_66 codice_65 codice_67 load store scan operations implicit target/source/comparison register codice_78 codice_79 codice_62 register depending size implicit segment registers used codice_61 codice_71 codice_83 codice_73 codice_85 codice_86 register used decrementing counter operation stops counter reaches zero scans comparisons inequality detected stack implemented implicitly decrementing push incrementing pop stack pointer 16-bit mode implicit stack pointer addressed ss sp 32-bit mode ss esp 64-bit mode rsp stack pointer actually points last value stored assumption size match operating mode processor i.e. 16 32 64 bits match default width codice_8/codice_9/codice_10/codice_11 instructions also included instructions codice_13 codice_92 reserve remove data top stack setting stack frame pointer codice_93/codice_1/codice_2 however direct setting addition subtraction codice_96/codice_97/codice_98 register also supported codice_13/codice_92 instructions generally unnecessary code beginning function ... functionally equivalent instructions manipulating stack include codice_101/codice_102 storing retrieving e flags register codice_103/codice_104 instructions store retrieve entire integer register state stack values simd load store assumed packed adjacent positions simd register align sequential little-endian order sse load store instructions require 16-byte alignment function properly simd instruction sets also include prefetch instructions perform load target register used cache loading sse instruction sets also include non-temporal store instructions perform stores straight memory without performing cache allocate destination already cached otherwise behave like regular store generic integer floating point simd instructions use one parameter complex address second source parameter integer instructions also accept one memory parameter destination operand x86 assembly unconditional jump operation codice_105 take immediate address register indirect address parameter note risc processors support link register short immediate displacement jumping also supported several conditional jumps including codice_106 jump zero codice_107 jump non-zero codice_108 jump greater signed codice_109 jump less signed codice_110 jump above/greater unsigned codice_111 jump below/less unsigned conditional operations based state specific bits e flags register many arithmetic logic operations set clear complement flags depending result comparison codice_112 compare codice_113 instructions set flags performed subtraction bitwise operation respectively without altering values operands also instructions codice_114 clear carry flag codice_115 complement carry flag work flags directly floating point comparisons performed via codice_116 codice_117 instructions eventually converted integer flags jump operation three different forms depending size operand short jump uses 8-bit signed operand relative offset current instruction near jump similar short jump uses 16-bit signed operand real protected mode 32-bit signed operand 32-bit protected mode far jump one uses full segment base offset value absolute address also indirect indexed forms addition simple jump operations codice_10 call subroutine codice_11 return subroutine instructions transferring control subroutine codice_10 pushes segment offset address instruction following codice_10 onto stack codice_11 pops value stack jumps effectively returning flow control part program case codice_123 segment base pushed following offset codice_124 pops offset segment base return also two similar instructions codice_125 interrupt saves current e flags register value stack performs codice_123 except instead address uses interrupt vector index table interrupt handler addresses typically interrupt handler saves cpu registers uses unless used return result operation calling program software called interrupts matching return interrupt instruction codice_127 restores flags returning soft interrupts type described used operating systems system calls also used debugging hard interrupt handlers hard interrupts triggered external hardware events must preserve register values state currently executing program unknown protected mode interrupts may set os trigger task switch automatically save registers active task using interrupt 21h output – samples use libc printf print stdout flags heavily used comparisons x86 architecture comparison made two data cpu sets relevant flag flags following conditional jump instructions used check flags branch code run e.g flags also used x86 architecture turn certain features execution modes example disable maskable interrupts use instruction flags register also directly accessed low 8 bits flag register loaded codice_128 using codice_129 instruction entire flags register also moved stack using instructions codice_101 codice_102 codice_125 including codice_133 codice_127 instruction pointer called codice_135 16-bit mode codice_136 32-bit mode codice_137 64-bit mode instruction pointer register points memory address processor next attempt execute directly accessed 16-bit 32-bit mode sequence like following written put address codice_138 codice_62 sequence instructions generates position-independent code codice_10 takes instruction-pointer-relative immediate operand describing offset bytes target instruction next instruction case 0 writing instruction pointer simple — codice_105 instruction sets instruction pointer target address example sequence like following put contents codice_62 codice_136 64-bit mode instructions reference data relative instruction pointer less need copy value instruction pointer another register
[ 708, 364, 5012, 4215, 6969, 1255, 4759, 5988, 6882, 5107, 6171, 4397, 1361, 7533, 1465, 5571, 5305, 5669, 5670, 4425, 7465, 666, 6291, 410, 3557, 1668, 1866, 5680, 4719, 4077, 4810, 6380, 421, 336, 858, 6399, 5784, 3156, 352, 263, 6498,...
Test
4,612
7
XCAT:xcat xcat extreme cloud administration toolkit open-source distributed computing management software developed ibm used deployment administration linux aix based clusters xcat xcat specific features designed take advantage ibm hardware including xcat achieved recognition june 2008 used ibm roadrunner set computing speed record time xcat default systems management tool ibm intelligent cluster solution xcat used lenovo
[ 4624, 5983, 5965, 1052, 3915, 4759, 7639, 5571, 7064, 2219, 578, 3693, 2601 ]
Train
4,613
9
CyberQuery:cyberquery cyberquery software product cyberscience corporation inc originally developed data handling analysis data general aos aos/vs minicomputers available platforms cyberquery extended major unix platforms vax/vms digital equipment corporation personal computers microsoft windows invented 1980 cyberquery declarative 4gl fourth-generation programming language early design slightly influenced ramis data access analysis languages query language ge time sharing systems cyberquery automates process accessing files tables reading records rows basic operation allows user/developer concentrate details working data within record effect working almost entirely within implicit program loop runs record compared general-purpose programming languages automation allows user/developer ignore technical details data stored concentrate information contained data cyberquery data dictionary describe datasets users wish access removes physical details file structure program user/developer original target customers cyberquery personnel departments ease use non computer specialists early design goal architecture advantage cyberquery portable reports written one database run unmodified provided underlying data logically similar differences hidden data dictionary cyberquery widely deployed industries including manufacturing finance medical retail
[ 2866 ]
Test
4,614
4
Military_Cryptanalytics:military cryptanalytics military cryptanalytics milcryp sometimes known revision lambros d. callimahos series books written william f. friedman title military cryptanalysis may also contain contributions cryptanalysts training manual national security agency military cryptanalysts published government use 1957 1977 though parts ii written 1956 1959 introduction part volume callimahos text represents extensive expansion revision scope content earlier work entitled 'military cryptanalysis part william f. friedman expansion revision necessitated considerable advancement made art since publication previous text callimahos referred parts iii–vi end first volume ... part iii deal varieties aperiodic substitution systems elementary cipher devices cryptomechanisms embrace detailed treatment cryptomathematics diagnostic tests cryptanalysis part iv treat transposition fractioning systems combined substitution-transposition systems part v treat reconstruction codes solution enciphered code systems part vi treat solution representative machine cipher systems however parts iv–vi never completed military cryptanalytics military cryptanalysis subjects foia requests including one john gilmore 1992-1993 two charles varga 2004 2016 four parts military cryptanalysis first two parts military cryptanalytics series declassified third part military cryptanalytics far released severely redacted form n't considered worth reprinting released portions repeat material first two parts 1984 nsa released copies military cryptanalytics parts ii us national archives records administration record group 457 srh-273 srh-274 respectively srh stands special research history declassified books reprinted aegean park press part military cryptanalytics consists two volumes first volume contains tutorial text second volume contains appendices part includes material uniliteral multiliteral ciphers polyalphabetic ciphers part ii includes material repeating-key bipartite systems periodic ciphers part ii volume ii includes zendian problem practical exercise traffic analysis cryptanalysis aegean park press edition wayne g. barker added programs trs-80
[ 6702, 1821, 1353 ]
Test
4,615
7
Social_cloud_computing:social cloud computing social cloud computing also peer-to-peer social cloud computing area computer science generalizes cloud computing include sharing bartering renting computing resources across peers whose owners operators verified social network reputation system expands cloud computing past confines formal commercial data centers operated cloud providers include anyone interested participating within cloud services sharing economy turn leads options greater economies scale bearing additional advantages hosting data computing services closer edge may needed peer-to-peer p2p computing networking enable decentralized cloud computing area research sometime social cloud computing intersects peer-to-peer cloud computing social computing verify peer peer owner reputation thus providing security quality service assurances users demand computing environments may constructed altered statically dynamically across peers internet based available resources verified reputation provide assurances social cloud computing highlighted potential benefit large-scale computing video gaming media streaming tenets social cloud computing famously employed berkeley open infrastructure network computing boinc making service largest computing grid world another service uses social cloud computing subutai social subutai allows peer-to-peer sharing hardware resources well files globally within small network many challenges arise moving traditional cloud infrastructure social cloud environment case traditional cloud computing availability demand essential many cloud customers social cloud computing n't provide availability guarantee p2p environment peers mobile devices may enter leave p2p network time pcs primary purpose override p2p computation time relatively successful use cases recent years require real time results computation power small subset module larger algorithm data set unlike large scale data centers company brand image people may less likely trust peers vs. large company like google amazon running sort computation sensitive information would need encrypted properly overhead encryption may reduce usefulness p2p offloading resources distributed small pieces many peers computations inherent trust must placed client regardless encryption may promised client similar availability reliability computations must consistent uniform computations offloaded client continuously interrupted mechanism detecting must place client may know computation tainted needs completely re-run p2p social computing reliable expected computation power difficult achieve speed client calculation may depend much client using end device ways overcoming may allow computations occur night specified times client resources use
[ 6025, 2961 ]
Train
4,616
6
PGPDisk:pgpdisk pgp virtual disk disk encryption system allows one create virtual encrypted disk within file older versions windows nt freeware example bundled pgp v6.0.2i ckt builds pgp still available download longer maintained today pgp virtual disk available part pgp desktop product family running windows 2000/xp/vista mac os x
[ 4921, 6025, 4990, 6458, 3350, 5808, 5440, 2529, 4014, 2399, 578, 5773 ]
Test
4,617
4
Security_Target:security target common criteria information technology security evaluation version 3.1 part 1 called cc 3.1 cc defines security target st implementation-dependent statement security needs specific identified target evaluation toe words st defines boundary specifies details toe product evaluation process according cc st document provided vendor product st defines information assurance security functional requirements given information system product called target evaluation toe st complete rigorous description security problem terms toe description threats assumptions security objectives security functional requirements sfrs security assurance requirements sars rationales sars typically given number 1 7 called evaluation assurance level eal indicating depth rigor security evaluation usually form supporting documentation testing product meets sfrs st contains detailed implementation-specific information demonstrates product addresses security requirements may refer one protection profiles pps case st must fulfill generic security requirements given pps may define requirements 1 introduction – overview toe including key features purpose 2 conformance claims – identifies conformance claims toe evaluation 3 security problem definition describes threats assumptions operational environment objective demonstrate security problem intended addressed toe operational environment 4 security objectives – concise abstract statement intended solution problem specified security problem definition security objective must trace back least one threat osp 1 aspect security achieve purpose objective using certain mitigation measures confidentiality integrity availability user authenticity access authorisation accountability 2 confidentiality integrity availability required support applicable foundational requirements.- 5 extended components definition – extended components must consist measurable objective elements conformance demonstrated 6 security requirements defines describes sfrs cc part 2 sars cc part 3 7.toe summary specifications enables evaluators potential consumers gain general understanding toe implemented
[ 4608, 6208, 5568, 1326 ]
Test
4,618
4
Rkhunter:rkhunter rkhunter rootkit hunter unix-based tool scans rootkits backdoors possible local exploits comparing sha-1 hashes important files known good ones online databases searching default directories rootkits wrong permissions hidden files suspicious strings kernel modules special tests linux freebsd rkhunter notable due inclusion popular operating systems fedora debian etc tool written bourne shell allow portability run almost unix-derived systems 2003 developer michael boelen released version rootkit hunter several years development early 2006 agreed hand development development team since time eight people working set project properly work towards much-needed maintenance release project since moved sourceforge
[ 5983, 74, 4257, 5571, 578, 6823 ]
Test
4,619
1
Cifas:cifas cifas fraud prevention service united kingdom not-for-profit membership association representing organisations across public private voluntary sectors 2016 cifas 360 member organisations cifas states mission ‘ detect deter prevent fraud society harnessing technology working partnership ’ cifas operates two core fraud prevention databases largest uk national fraud database internal fraud database systems also used banks building societies access home office immigration data specialist portal data cifas members revealed instances identity fraud uk reached record levels 2016 particularly among people aged 30 trend continued 2017 cifas reporting 89,000 cases identity fraud first six months year cifas data 2016 2017 also highlighted growing issue money mules – people allow bank accounts used launder money cifas reported number young people 18-24-year-olds allowing accounts used transfer proceeds crime risen unprecedented 75 per cent last year cifas established 1988 consumer credit trade association ccta acronym cifas credit industry fraud avoidance system although company longer operates acronym remit broadened developed association office fair trading well information commissioner office continue day take active interest development cifas cifas today run board directors includes independent directors chief executive deputy chief executive 1988 2016 majority directors elected participating organisations participate governance organisation advisory board cifas national fraud database allows participating organisations exchange confirmed details applications products services considered fraudulent exchange confirmed information accounts services fraudulently misused confirmed information insurance claims considered fraudulent organisations also exchange information innocent victims fraud protect fraud internal fraud database allows participating organisations exchange details confirmed cases applicant member staff acted fraudulently data protection act individual right make subject access request cifas accordance act disclose data held individual statutory fee cifas credit reference agency 2014 immigration act became law cifas named sole provider home office immigration data launched cifas immigration portal cip december 2014 current account-providing banks building societies uk required use cip access home office data disqualified persons victims identity fraud people risk identity fraud apply cifas protective registration fee protective registration acts warning organisation carry additional checks verify identity applicant customer cifas also operates protecting vulnerable scheme helps local authorities protect individuals subject mental capacity act 2005 care cifas works fraud prevention financial public sector academic charitable organisations law enforcement raise awareness fraud promote best practice fraud prevention collaborative partners include city london police cipfa home office age uk financial fraud action uk cifas member joint fraud taskforce set former home secretary theresa may 2015
[ 3609 ]
Test
4,620
1
Placenames_Database_of_Ireland:placenames database ireland placenames database ireland also known logainm.ie database archive place names ireland created fiontar dublin city university collaboration placenames branch department culture heritage gaeltacht website public resource primarily aimed journalists translators students teachers historians researchers genealogy placenames commission established department finance 1946 advise ordnance survey ireland government irish name places placenames commission ceased 11 october 2012 placenames committee took place 19 september 2013 placenames branch branch department culture heritage gaeltacht established official languages act 2003 supports placenames commission/committee investigating historical irish-language names places although 1922 constitution irish free state current constitution adopted 1937 make irish national language law regard placenames carried 19th-century uk statutes established ordnance survey griffith valuation english-language name official status irish-language names adopted place english-language names 1920 e.g king county became laois kells county meath became ceannanus mór department posts telegraphs adopted irish names ad-hoc sometimes inconsistent disputed locals irish-language scholars 1973 oireachtas passed act codify official assignment irish names alongside rather instead english names 1975 first statutory instrument made 1973 gave official irish names post towns names chosen advice placenames branch differed adopted previous decades cases causing controversy 1973 act replaced 2003 act terms placenames committee continues advise minister prior issuing statutory instruments database website www.logainm.ie european language label 2010 category winner 2011 2016 irish egovernment awards
[ 2054 ]
Test
4,621
0
Semantometrics:semantometrics semantometrics tool evaluating research functionally extension tools bibliometrics webometrics altmetrics instead evaluating citations – entails relying outside evidence – uses semantic evaluation full text research paper evaluated
[ 1314 ]
Validation
4,622
5
IGMP_snooping:igmp snooping igmp snooping process listening internet group management protocol igmp network traffic control delivery ip multicasts network switches igmp snooping listen igmp conversation hosts routers maintain map links need ip multicast transmission multicasts may filtered links need conserving bandwidth links switch default flood multicast traffic ports broadcast domain vlan equivalent multicast cause unnecessary load host devices requiring process packets solicited purposefully exploited form basis denial-of-service attack igmp snooping designed prevent hosts local network receiving traffic multicast group explicitly joined provides switches mechanism prune multicast traffic links contain multicast listener igmp client essentially igmp snooping layer 2 optimization layer 3 igmp igmp snooping takes place internally switches protocol feature igmp snooping allows switch forward multicast traffic links solicited snooping therefore especially useful bandwidth-intensive ip multicast applications iptv igmp snooping although important technique overlaps two standards organizations namely ieee standardizes ethernet switches ietf standardizes ip multicast means clear standards body responsible technique igmp snooping carries informational status despite actually referred standards work normative order igmp thus igmp snooping function multicast router must exist network generate igmp queries without querier igmp membership reporting may incomplete tables associating member ports multicast groups potentially incomplete snooping work reliably igmp snooping implementations include full querier capability igmpv2 igmpv3 contain provision selecting querier multiple available querier lowest ip address given role igmp general queries querier must unconditionally forwarded switches involved igmp snooping igmp snooping proxy reporting report suppression actively filters igmp packets order reduce load multicast router joins leaves heading upstream router filtered minimal quantity information sent switch trying ensure router single report group regardless many active listeners two active listeners group first one leaves switch determines router need information since affect status group router point view next time routine query router switch forward reply remaining host presence proxy reporting router generally know recently joined member group
[ 7297, 1691, 979 ]
Train
4,623
4
Attack_Surface_Analyzer:attack surface analyzer attack surface analyzer tool created analysis changes made attack surface operating systems since windows vista beyond tool recommended microsoft sdl guidelines verification stage development according microsoft sdl team one tool checking changes made attack surface windows operating system attack surface analyzer developed problem check verify effects various software installations system way back since windows server 2003 developed back use multiple tools every type change made attack surface painful process check everything using multiple tools problem made microsoft create application developers could analyze changes made windows attack surface first used developers microsoft later january 18 2011 beta version version 5.1.3.0 tool named attack surface analyzer released public testers administrators attack surface analyzer compare two scan data system called baseline scan product scan 32-bit 64-bit versions software available windows vista windows 7 respective server editions news windows xp version released attack surface analyzer one tool analysis changes made various parts attack surface windows 6 series operating system includes windows vista windows 7 using one tool analyze changes made registry file permissions windows iis server gac assemblies lot done according microsoft tool use engineers security team microsoft analyze effects software installation windows operating system would possible one tool would use different software different parts windows combine effects logically tool enlists various elements enumerates running system scan elements list comprehensive set elements possible well important elements changed new software installed system software might change elements list change different elements system attack surface analyzer combines easier analyze parts attack surface analyzer tell changes sure cases also able tell particular change configuration causing threat tool enlist threats categories parts operating system scans noticeable issues services configurations file system acls issues related processes running system getting list threats system great thing software released microsoft one knows windows better microsoft improved concerns security shown microsoft important severity threat also known team enterprise attack surface analyzer also shows severity threats finds however seems report severity every threat instead shows severity threat category example severity threat caused “ executables weak acls ” threat severity level 1 less caused “ processes impersonation tokens ” threat severity level 2 surely desirable feature enlist level severity caused threat rather category belongs however news might available every organization experts various domains security may case network security expert organization aware details terminology domain say windows services however two issues may connected possible case important experts two security expert teams know everything terms use might required cases brief description along link technet library describing term detail threats changes attack surface enlisted report generated attack surface analyzer brief description usually enough experts might needed cases microsoft made easy find right resource term rather relying upon web search engines attack surface windows operating system concerns various parts operating system would difficult anyone understand report changes listed serial order attack surface analyzer makes easy user browse report listing threats categories providing table contents html page attack surface analyzer compare two scan data generated two different scans generate report viewed html format also possible run scans one system generate another system using tool good windows vista clients possible generate report using current version attack surface analyzer windows vista case attack surface analyzer used run scans windows vista client transfer scan result files computer running windows 7 generate browse report windows 7 based computer attack surface analyzer works windows 6.x series operating systems report generation done 6.1 version operating systems following system requirements attack surface analyzer official download page installable windows vista windows 7 windows server 2008 windows server 2008 r2 collection attack surface data windows vista windows 7 windows server 2008 windows server 2008 r2 analysis attack surface data report generation windows 7 windows server 2008 r2 microsoft .net 3.5 sp1 microsoft enlisted hardware requirements separately tool able perform job machine meeting hardware requirements installed operating system note however running time generation scan data report depends hardware capabilities better hardware would get work done faster attack surface analyzer list two types scans namely baseline scan product scan strict technical terms scans difference logical technical scan run user run generate data initial system data compared product scan running baseline scan product whose effect attack surface operating system checked installed installation changes system configuration possibly installing services changing firewall rules installing new .net assemblies baseline scan logical scan run user using attack surface analyzer generates file containing configuration system software installed product scan signifies state system ‘ product ’ installed context product software whose effects system upon installation checked generate report two scans required minimum product scan would capture changes made system installation software product testing scan data generated scan compared baseline scan data find changes made system configurations different points worth note one system state captured using attack surface analyzer combination used report generation however ‘ baseline scan ’ one taken automatically called product scan
[ 5847, 2885, 4759, 1670, 5571, 2530, 3135 ]
Validation
4,624
7
Warewulf:warewulf warewulf computer cluster implementation toolkit facilitates process installing cluster long term administration changing administration paradigm make slave node file systems manageable one point automate distribution node file system node boot allows central administration model slave nodes includes tools needed build configuration files monitor control nodes totally customizable adapted type cluster software administration perspective make much difference running 2 nodes 500 nodes procedure still warewulf scalable admins perspective also uses standard chroot'able file system every node extremely configurable lends custom environments easily warewulf designed hpc system hpc system warewulf along lines distributed linux distribution specifically system replicating managing small lightweight linux systems one master using warewulf hpc packages lam/mpi/mpich sun grid engine pvm etc easily deployed throughout cluster warewulf solves problem slave node management rather strict hpc specific system even though designed hpc mind flexible home grown cluster administratively scales well result flexibility ease customization warewulf used production hpc implementations also development systems like kasy0 first system break one hundred dollar per gflops barrier non hpc systems web server cluster farms intrusion detection clusters high-availability clusters
[ 4612, 578, 1923, 2776, 3042 ]
Test
4,625
2
Proportional_set_size:proportional set size computing proportional set size pss portion main memory ram occupied process composed private memory process plus proportion shared memory one processes unshared memory including proportion shared memory reported pss example since pss defined sum unshared memory process proportion memory shared processes pss two processes follows concept mostly related unique linux operating system proposed matt mackall complications arose trying count real memory used process concepts resident set size virtual memory size vmsize n't helping developers tried know much memory programs using
[ 4579, 705, 1670, 578 ]
Test
4,626
4
Crypt_(Unix):crypt unix unix computing crypt utility program used encryption due ease breaking considered obsolete cryptographer robert morris wrote crypt first appeared version 3 unix encourage codebreaking experiments morris managed break crypt hand dennis ritchie automated decryption method james reeds improved version appeared version 7 reeds peter j. weinberger also broke also unix password hash function name crypt though used encrypting data sense otherwise essentially unrelated distinguish two writers often refer utility program crypt 1 documented section 1 unix manual pages refer password hash function crypt 3 documentation section 3 manual crypt 1 simple command encrypt decrypt data usually used filter traditionally implemented using algorithm based enigma machine considered cryptographically far weak provide security brute-force attacks modern commodity personal computers versions unix shipped even weaker version crypt 1 command order comply contemporaneous laws regulations limited exportation cryptographic software simply implementations caesar cipher effectively secure rot13 implemented caesar cipher well-known key linux distributions generally include unix compatible version crypt command largely due combination three major factors source code several old versions crypt command available unix heritage society unix archive recent crypt source code available opensolaris project enhanced symmetric encryption utilities available linux also portable unix-like system including mcrypt ccrypt provide support much sophisticated modern algorithms used encrypt decrypt files compatible traditional crypt 1 command providing correct command line options programs breaking crypt 1 encryption widely available bob baldwin crypt breaker workbench written 1984-1985 interactive tool provides successive plaintext guesses must corrected user peter selinger unixcrypt-breaker uses simple statistical model guess plausible plaintexts require user interaction
[ 4447, 6180, 6577, 5571, 6470, 217, 6477 ]
Test
4,627
7
Plug_computer:plug computer plug computer external device often configured use home office compact computer consists high-performance low-power system-on-a-chip processor several i/o ports usb ports ... typically runs number linux distributions versions provisions connecting display best suited running media server back-up services file sharing remote access functions thus acting bridge in-home protocols digital living network alliance dlna server message block smb cloud based services however plug computer offerings analog vga monitor and/or hdmi connectors along multiple usb ports permit use display keyboard mouse thus making full-fledged low-power alternatives desktop notebook computers name plug computer derived small configuration devices plug computers often enclosed ac power plug ac adapter plug computers typically consume little power inexpensive one manufacturer claims 119 plug computer draws 1.2 watts cost 2 year run number devices type began appear 2009 consumer electronics show chippc another one
[ 1066, 2538, 2988, 7613, 632, 1167, 7520, 289, 1634, 3091, 6262, 3524, 7165, 4317, 203, 3627, 6806, 7049, 392, 5927, 2212, 6443, 578, 5135, 1284, 740, 1202, 745, 1757, 3028, 842, 1023, 7919, 5064, 2498, 330, 3734, 7484, 1973, 2961, 2338,...
Test
4,628
7
UKCloud:ukcloud ukcloud previously named skyscape cloud services british public cloud company headquartered farnborough united kingdom one largest uk cloud providers company founded 2011 rebranding ukcloud august 2016 ukcloud cloud provider several customers including genomics england ministry justice cabinet office amongst others company established 2011 co-founders jeff thomas jeremy sanders phil dawson simon hansford skyscape cloud services changed name ukcloud ltd five years later following legal wrangle sky ukcloud services provided partnership qinetiq vmware cisco dell emc ark data centres ukcloud focuses changing uk government purchases uses services detailed march 2011 uk government ict strategy company since sold government g-cloud frameworks digital marketplace since first iteration framework 2012 offer multi-cloud platform consisting vmware oracle openstack microsoft azure ukcloud subject regular audits assessments inspections certification bodies regulators accreditors firm recently achieved iso27017 iso27018 also certified iso9001 iso20000 iso27001 ukcloud carbon neutral company offers customers carbon neutral hosting achieved independent assessment co2 emissions produced direct indirect sources required deliver followed offset-inclusive emissions reduction programme ukcloud also completely sovereign cloud provider meaning applications data hosted uk datacentres company incorporated british company uk legal jurisdiction 2016 ukcloud communications deloitte technology fast 500 emea award also cloudex 20:20 award uk industry award 2013. winners sunday times hiscox tech track 100 2016 ukcloud winners tech track 100 ranking number 1 league table 2016 2017 ukcloud announced recipients prestigious queen ’ awards enterprise innovation 2018 ukcloud award g-cloud public sector provider year second year consecutively company also featured one future fifty ’ fastest growing technology companies addition founding alliance partners ukcloud since announced cloud native cloud platform based upon redhat openstack oracle cloud platform
[ 4295 ]
Test
4,629
4
Bicycle_attack:bicycle attack tls bicycle attack refers method discovering password length encrypted packets transmitted via ssl https term first coined december 30 2015 guido vranken wrote premise bicycle attack makes brute-forcing passwords much easier length passwords known moreover refutes idea ssl-encrypted http packets obscure length
[ 1805 ]
Validation
4,630
4
ZeroFOX:zerofox zerofox cyber security company based baltimore maryland provides cloud-based software service saas organizations detect risks found social media digital channels phishing malware scams impersonator accounts piracy counterfeit zerofox created 2013 name riskive changed current name months later company began startup 8,000 sq ft. space inside betamore startup incubator baltimore federal hill neighborhood 2015 zerofox raised 27 million series b funding 2016 company outgrown space moved 18,000 sq ft. space inside former pabst brewing facility south baltimore 2017 zerofox raised 40 million funding led redline capital management european venture firm silver lake waterman fund focuses pre-ipo companies prior investors new enterprise associates highland capital partners core capital also contributed investment helped bring zerofox ’ total funding 88 million
[ 330 ]
Validation
4,631
2
DNIX:dnix dnix original spelling d-nix unix-like real-time operating system swedish company dataindustrier ab diab version called abcenix also developed abc1600 computer luxor daisy systems also something called daisy dnix cad workstations unrelated diab product dataindustrier ab literal translation computer industries shareholding company started 1970 lars karlsson single-board computer manufacture sundsvall sweden producing zilog z80-based computer called data board 4680 1978 diab started work swedish television company luxor ab produce home office computer series abc 80 abc 800 1983 diab independently developed first unix-compatible machine diab ds90 based motorola 68000 cpu d-nix made appearance based unix system v license diab however industrial automation company needed real-time operating system company replaced t-supplied unix kernel in-house developed yet compatible real-time variant kernel originally z80 kernel called os8 time company also replaced several unix standard userspace tools implementations point code derived unix machines could deployed independently unix license two years later cooperation luxor computer called abc 1200 developed office market parallel diab continue produce enhanced versions ds90 computer using newer versions motorola cpus motorola 68010 68020 68030 eventually 68040 1990 diab acquired groupe bull continued produce support ds machines brand name diab names diab 2320 diab 2340 etc. still running diabs version dnix isc systems corporation isc purchased right use dnix late 1980s use line motorola 68k-based banking computers isc later bought olivetti turn resold wang bought getronics corporate entity often referred 'isc answered bewildering array names years code branch svr2 compatible version received extensive modification development hands notable features operating system support demand paging diskless workstations multiprocessing asynchronous i/o ability mount processes handlers directories file system message passing real-time support consisted largely internal event-driven queues rather list search mechanisms 'thundering herd static process priorities two classes run completion timesliced support contiguous files avoid fragmentation critical resources memory locking quality orthogonal asynchronous event implementation yet equalled current commercial operating systems though approach concept yet adopted synchronous marshalling point asynchronous activity could asynchronous ad infinitum dnix handled aplomb asynchronous i/o facility obviated need berkeley sockets select svr4 streams poll mechanism though socket emulation library preserved socket semantics backward compatibility another feature dnix none standard utilities ps frequent offender rummaged around kernel memory job system calls used instead meant kernel internal architecture free change required handler concept allowed network protocol stacks outside kernel greatly eased development improved overall reliability though performance cost also allowed foreign file systems user-level processes improved reliability main file system though could external process pulled kernel performance reasons dnix could well considered microkernel though formally developed handlers could appear type 'native unix file directory structure device file i/o requests handler could process could passed handlers including underlying one upon handler mounted handler connections could also exist passed around independent filesystem much like pipe one effect tty-like 'devices could emulated without requiring kernel-based pseudo terminal facility example handler saved day isc diskless workstation support bug implementation meant using named pipes workstation could induce undesirable resource locking fileserver handler created workstation field accesses afflicted named pipes appropriate kernel fixes could developed handler required approximately 5 kilobytes code implement indication non-trivial handler need large isc also received right manufacture diab ds90-10 ds90-20 machines file servers multiprocessor ds90-20 however expensive target market isc designed servers ported dnix isc designed gui-based diskless workstations use file servers ported dnix though isc used daisy workstations running daisy dnix design machines would run diab dnix negligible confusion internally drafting layout staff rarely talked software staff moreover hardware design staff n't use either system running joke went something like isc build computers n't use asynchronous i/o support dnix allowed easy event-driven programming workstations performed well even though relatively limited resources gui diskless workstation 7 mhz 68010 processor usable 512k memory kernel consumed approximately half workstations 1 mb memory though later 2 mb 4 mb versions along 10 mhz processors full-blown installation could consist one server 16 mhz 68020 8 mb ram 200 mb hard disk 64 workstations though slow boot array would perform acceptably bank teller application besides innate efficiency dnix associated diab c compiler key high performance generated particularly good code 68010 especially isc got done isc also retargeted texas instruments tms34010 graphics coprocessor used last workstation diab c compiler course used build dnix one factors contributing efficiency still available form wind river systems systems still use writing 2006 former seattle-first national bank branches branded bank america may probably isc customers still using dnix capacity isc considerable dnix presence central south america dnix native system call dnix 2 library function analogous standard unix unix 2 syscall 2 function took multiple arguments first function code semantically single call provided appropriate unix functionality though syntactically different unix course numerous dnix-only extensions dnix function codes organized two classes type 1 type 2 type 1 commands associated i/o activity anything could potentially cause issuing process block major examples f_open f_close f_read f_write f_iocr f_iocw f_wait f_nap type 2 remainder f_getpid f_gettime etc could satisfied kernel immediately invoke asynchronicity special file descriptor called trap queue created via type 2 opcode f_otq type 1 call would f_nowait bit or-ed function value one additional parameters dnix 2 trap queue file descriptor return value asynchronous call normal value kernel-assigned identifier time asynchronous request completed read 2 f_read trap queue file descriptor would return small kernel-defined structure containing identifier result status f_cancel operation available cancel asynchronous operation n't yet completed one arguments kernel-assigned identifier process could cancel requests currently owned exact semantics cancellation request handler fundamentally meant waiting terminated partially completed operation could returned addition kernel-assigned identifier one arguments given asynchronous operation 32-bit user-assigned identifier often referenced function pointer appropriate subroutine would handle i/o completion method merely convention entity read trap queue elements responsible interpreting value note asynchronous events gathered via normal file descriptor read operations reading capable made asynchronous implications semi-autonomous asynchronous event handling packages could exist within single process dnix 5.2 lightweight processes threads also note potentially blocking operation capable issued asynchronously dnix well equipped handle many clients single server process process restricted one trap queue i/o requests could grossly prioritized way addition native dnix 2 call complete set 'standard libc interface calls available open 2 close 2 read 2 write 2 etc besides useful backwards compatibility implemented binary-compatible manner ncr tower computer binaries compiled would run unchanged dnix dnix kernel two trap dispatchers internally one dnix method one unix method choice dispatcher programmer using interchangeably acceptable semantically identical wherever functionality overlapped machines 68000 trap 0 instruction used unix 2 calls trap 4 instruction dnix 2 two trap handlers really quite similar though usually hidden unix 2 call held function code processor d0 register whereas dnix 2 held stack rest parameters dnix 5.2 networking protocol stacks internally except thin x.25-based ethernet protocol stack added isc use diskless workstation support package networking conducted reading writing handlers thus socket mechanism libsocket 3 existed used asynchronous i/o talk tcp/ip handler typical berkeley-derived networking program could compiled run unchanged modulo usual unix porting problems though might efficient equivalent program used native asynchronous i/o dnix process could used handle i/o requests extend filesystem process called handler major feature operating system handler defined process owned least one request queue special file descriptor procured one two ways f_orq f_mount call former invented isolated request queue one end typically handed child process network remote execution programs many used method provide standard i/o paths children latter hooked filesystem file i/o requests could adopted handlers network login programs even used method provide standard i/o paths children semantics logging unix requires way multiple perhaps-unrelated processes horn standard i/o path operator mounted directory filesystem handler received i/o calls point handler would read small kernel-assigned request data structures request queue reading could done synchronously asynchronously handler author desired handler would whatever request required satisfied often using dnix f_uread f_uwrite calls read write request data space would terminate request appropriately using f_termin privileged handler could adopt permissions client individual requests subordinate handlers filesystem via f_t1req call n't need reproduce subordinate permission scheme handler unable complete request f_passrq function could used pass i/o requests one handler another handler could perform part work requested passing rest another handler common handler state-machine oriented requests fielding client done asynchronously allowed single handler field requests multiple clients simultaneously without blocking unnecessarily part request structure process id priority handler could choose work first based upon information requirement work performed order requested aid possible poll request trap queues see work considered buckling actually particular restriction number request queues process could used provide networking facilities chroot jails example give appreciation utility handlers isc handlers existed isc purchased 5.2 svr2 compatible 5.3 svr3 compatible versions dnix time purchase dnix 5.3 still undergoing development diab dnix 5.2 deployed time isc engineers incorporated 5.3 kernel features 5.2 primarily shared memory ipc divergence features diab isc versions dnix diab 5.3 likely went contain svr3 features isc 5.2 ended also diab went dnix 5.4 svr4 compatible os isc developers considerably extended version dnix 5.2 listed features involving kernel based upon needs general trends unix industry dnix development isc effectively ceased 1997 number planned os features left table
[ 1522, 4751, 5097, 7605, 5100, 4478, 4670, 5021, 5110, 900, 1454, 4771, 2467, 7534, 3531, 2294, 4321, 6994, 5571, 2300, 7639, 2118, 6360, 578, 5933, 4336, 6367, 224, 6918, 4890, 6472, 238, 56, 759, 7396, 4447, 3664, 861, 771, 5079, 7765,...
Validation
4,632
2
AppArmor:apparmor apparmor application armor linux kernel security module allows system administrator restrict programs capabilities per-program profiles profiles allow capabilities like network access raw socket access permission read write execute files matching paths apparmor supplements traditional unix discretionary access control dac model providing mandatory access control mac included mainline linux kernel since version 2.6.36 development supported canonical since 2009 addition manually creating profiles apparmor includes learning mode profile violations logged prevented log used generating apparmor profile based program typical behavior apparmor implemented using linux security modules lsm kernel interface apparmor offered part alternative selinux critics consider difficult administrators set maintain unlike selinux based applying labels files apparmor works file paths proponents apparmor claim less complex easier average user learn selinux also claim apparmor requires fewer modifications work existing systems example selinux requires filesystem supports security labels thus provide access control files mounted via nfs apparmor filesystem-agnostic apparmor represents one several possible approaches problem restricting actions installed software may take selinux system generally takes approach similar apparmor one important difference selinux identifies file system objects inode number instead path apparmor inaccessible file become accessible hard link created selinux inode-based model would still deny access newly created hard links hard link would pointing inaccessible inode selinux apparmor also differ significantly administered integrate system isolation processes also accomplished mechanisms like virtualization one laptop per child olpc project example sandboxes individual applications lightweight vserver 2007 simplified mandatory access control kernel introduced 2009 new solution called tomoyo included linux 2.6.30 like apparmor also uses path-based access control apparmor first used immunix linux 1998–2003 time apparmor known subdomain reference ability security profile specific program segmented different domains program switch dynamically apparmor first made available sles opensuse first enabled default sles 10 opensuse 10.1 may 2005 novell acquired immunix rebranded subdomain apparmor began code cleaning rewriting inclusion linux kernel 2005 september 2007 apparmor maintained novell novell suse legal owner trademarked name apparmor apparmor first successfully ported/packaged ubuntu april 2007 apparmor became default package starting ubuntu 7.10 came part release ubuntu 8.04 protecting cups default ubuntu 9.04 items mysql installed profiles apparmor hardening continued improve ubuntu 9.10 ships profiles guest session libvirt virtual machines evince document viewer optional firefox profile apparmor integrated october 2010 2.6.36 kernel release apparmor integrated synology dsm 5.1 beta 2014 apparmor enabled solus release 3 2017/8/15 apparmor enabled default debian 10 buster
[ 3256, 2182, 3613, 7528, 7532, 5744, 6443, 3638, 2942, 6117, 4341, 2585, 5762, 412, 415, 7581, 3666, 5783, 2970, 7956, 5453, 5460, 7242, 1535, 1924, 6892, 1176, 3696, 1933, 5829, 2297, 1208, 6211, 2680, 4435, 5865, 7669, 3404, 1227, 4091, ...
Test
4,633
0
Snack_Sound_Toolkit:snack sound toolkit snack sound toolkit cross-platform library written kåre sjölander swedish royal technical university kth bindings scripting languages tcl python ruby provides audio i/o audio analysis processing functions spectral analysis pitch tracking filtering related graphics functions display sound pressure waveform spectrogram available microsoft windows linux mac os x solaris hp-ux freebsd netbsd irix snack sound toolkit used number linguistic research tools including wavesurfer transcriber sndbite well applications snackamp mp3 music player used academic research delft university technology springer collection perception multimodal dialogue systems includes research essay utilizing snack human-computer speech interaction toolkit included component activestate tcl python distributions
[ 5965, 4759, 486, 7665, 578, 900, 6428 ]
Test
4,634
5
Microsoft_Notification_Protocol:microsoft notification protocol microsoft notification protocol msnp also known mobile status notification protocol instant messaging protocol developed microsoft use microsoft messenger service instant messaging clients connect skype since 2014 earlier windows live messenger msn messenger windows messenger microsoft messenger mac third-party clients pidgin trillian also communicate using protocol msnp first used publicly available product first release msn messenger 1999 major change made protocol new command syntax changes results version-number incremented one format msnp october 2003 microsoft started blocking access messenger service using versions msnp8 starting september 11 2007 microsoft forces current users msn messenger upgrade windows live messenger 8.1 due security considerations msnp1 never public believed used early stages design development msn messenger 1 pre-release version made available developers 1999 internet draft however production version differed published version subtle ways msnp2 msnp3 supported msn messenger 2.0 msnp3 4 5 supported messenger servers july 2000 used msn messenger 3.0 4.0 msnp6 used later versions msn messenger 4.x 2002 msn messenger 5.0 used msnp7 msnp8 introduced different authentication method sending authorization microsoft passport secure servers returning challenge string minimum version protocol accepted .net messenger service microsoft blocked earlier versions security reasons old obsolete clients unable sign forcing users upgrade clients version 5.0 msn messenger one uses msnp version windows messenger uses msnp8 standard version including 4.7 latest 5.1 protocol supports windows messenger-to-windows messenger webcam voice capabilities msnp9 introduced msn messenger 6 adding support type data messages used transferring display pictures custom emoticons clients frame-by-frame web cam rather traditional stream like windows media player wmv format improved voice system well improved nat traversal file transfers employed msn messenger 6.1 microsoft started blocking earlier versions october 2003 however big overhaul obvious change integration hotmail address books employed msn messenger 7.0 employed msn messenger 7.5 employed windows live messenger 8.0 msnp13 features lot changes notably contact list synchronization removed clients must instead send soap request contacts server also known client goes abch abch stands address book clearing house address book service behind msn windows live services client must send contacts data server send presence information msnp14 adds yahoo messenger interoperability msnp15 protocol version introduced windows live messenger 8.1 2006-09-08 based msnp14 uses different authentication mechanism called rps relying party suite twn tweener authentication used protocol versions 14 sso single sign-on rps authentication used protocol versions 15 addition new authentication mechanism microsoft also planning making properties user roaming user display picture future personal status messages wherever user signs furthermore support user locations added personal status message although feature later removed windows live messenger 8.1 client msnp16 used pre-release version windows live messenger 9.0 leaked december 2007 features multiple points presence mpop ability sign 2 places time chats replicated places uux data extended contain endpoint data also mpop well signature sound msn object data msnp17 identified windows live messenger servers messenger.hotmail.com unused official client released microsoft msnp18 used windows live messenger 2009 14.0 main new addition groups feature much like persistent grouped conversations uux data extended include scene image msn object data employed windows live messenger 2011 wave 4 employed windows live messenger 2012 employed skype since early 2014
[ 7148, 2450, 3762, 3350, 3940, 7967, 2555, 2284, 7170, 2201, 6624, 1369, 6629, 1014, 4337, 4887, 1958, 1210, 2048, 3050, 2880, 6668, 7315, 5535 ]
Test
4,635
8
SPARQL:sparql sparql pronounced sparkle recursive acronym sparql protocol rdf query language rdf query language—that semantic query language databases—able retrieve manipulate data stored resource description framework rdf format made standard rdf data access working group dawg world wide web consortium recognized one key technologies semantic web 15 january 2008 sparql 1.0 became official w3c recommendation sparql 1.1 march 2013 sparql allows query consist triple patterns conjunctions disjunctions optional patterns implementations multiple programming languages exist exist tools allow one connect semi-automatically construct sparql query sparql endpoint example viziquer addition exist tools translate sparql queries query languages example sql xquery sparql allows users write queries loosely called key-value data specifically data follow rdf specification w3c thus entire database set subject-predicate-object triples analogous nosql databases usage term document-key-value mongodb sql relational database terms rdf data also considered table three columns – subject column predicate column object column subject rdf analogous entity sql database data elements fields given business object placed multiple columns sometimes spread across one table identified unique key rdf fields instead represented separate predicate/object rows sharing subject often unique key predicate analogous column name object actual data unlike relational databases object column heterogeneous per-cell data type usually implied specified ontology predicate value also unlike sql rdf multiple entries per predicate instance one could multiple child entries single person return collections objects like children thus sparql provides full set analytic query operations codice_1 codice_2 codice_3 data whose schema intrinsically part data rather requiring separate schema definition however schema information ontology often provided externally allow joining different datasets unambiguously addition sparql provides specific graph traversal syntax data thought graph example demonstrates simple query leverages ontology definition codice_4 friend friend specifically following query returns names emails every person dataset query joins together triples matching subject type predicate codice_5 person codice_6 person one names codice_7 mailboxes codice_8 author query chose reference subject using variable name codice_9 readable clarity since first element triple always subject author could easily used variable name codice_10 codice_11 whatever name chosen must line query signify query engine join triples subject result join set rows – codice_9 codice_13 codice_14 query returns codice_13 codice_14 codice_9 often complex uri rather human-friendly string note codice_9 may multiple mailboxes returned set codice_13 row may appear multiple times mailbox query distributed multiple sparql endpoints services accept sparql queries return results computed results gathered procedure known federated query whether federated manner locally additional triple definitions query could allow joins different subject types automobiles allow simple queries example return list names emails people drive automobiles high fuel efficiency case queries read data database sparql language specifies four different query variations different purposes query forms takes codice_24 block restrict query although case codice_23 query codice_24 optional sparql 1.1 specifies language updating database several new query forms another sparql query example models question country capitals africa variables indicated codice_27 codice_28 prefix bindings codice_29 codice_30 returned triple ends semicolon subject triple implicitly complete following pair entire triple example codice_31 short codice_32 sparql query processor search sets triples match four triple patterns binding variables query corresponding parts triple important note property orientation class matches conducted solely class-attributes properties – see duck typing make queries concise sparql allows definition prefixes base uris fashion similar turtle query prefix codice_33 stands “ nowiki http //example.com/exampleontology /nowiki ” geosparql defines filter functions geographic information system gis queries using well-understood ogc standards gml wkt etc. sparul another extension sparql enables rdf store updated declarative query language adding codice_34 codice_35 methods open source reference sparql implementations see list sparql implementations comprehensive coverage including triplestore apis storages implemented sparql standard
[ 3928, 6507, 8154, 5894, 2087, 5631, 5542, 98, 282, 4303, 4126, 6975, 105, 8174, 2103, 7628, 3363, 6430, 4743, 7537, 7649, 3383, 403, 4067, 6462, 6128, 2054, 6931, 7290, 2872, 684, 6221, 7757, 3330, 8137, 3414, 7411, 2973, 84, 1609, 7315...
Train
4,636
7
Chromebox:chromebox chromebox small form-factor pc running google chrome os operating system device debuted may 2012 chromeboxes like chrome os devices including chromebook laptops primarily support web applications thereby relying heavily internet connection software functionality data storage connection via local area network wireless ethernet port machines classed small form-factor pcs typically feature power switch set connections support keyboard pointing device one monitors solid state drives used storage wireless printers supported first chromebox released samsung may 29 2012 ran dual-core intel celeron processor 867 1.3 ghz featured six usb 2.0 ports two displayport++ slots compatible hdmi dvi vga february 2014 google bundled intel core i7 chromebox business video conferencing package 1080p high definition camera module external microphone/speaker remote control chromebox meetings system retailed 999 plus 250 annual management fee waived first year—a cost thousands dollars less unified videoconferencing systems including cisco polycom system employed google hangouts-like interface 15 participants dedicated url sharing screens management accounts scheduling meetings updated system announced november 2017 featured 4k camera machine learning feature automatically identifies frames participants march 2014 asus established new price low-end chromebox market compact 1.32 pound model retailed 179 featured celeron cpu four usb 3.0 ports yahoo tech columnist david pogue called asus device among smallest least-expensive desktop computers ever sold likening smart car ’ hauling lumber home depot ’ terrific deal—and days ’ get want go may asus released faster model intel core i3 processor hewlett-packard entered market june chromebox powered intel celeron processor optionally bundling keyboard mouse august acer introduced two models could stand vertically provided business-oriented features including encryption fast deletion local data september dell entered market entry-level machine well dell implementation google video conferencing system august 2015 aopen announced family chromeboxes designed principally driving content digital commercial signage models ruggedized on-site operation capability run android apps chrome os devices introduced google 2016 realized certain chromebooks 2017 seemed bypass chromeboxes cluster new chromebox offerings appeared 2018 including acer asus hp oregon-based ctl compute teach learn maker chromebooks since 2014 launched first chromebox march 2018
[ 2902, 5372, 6427, 6092, 6806, 3627, 2212, 2569, 3309, 7924, 2591, 5064, 5775, 2961, 6153, 1514, 5455, 2988, 7613, 4762, 7967, 6176, 5476, 831, 5135, 5141, 3028, 136, 2317, 2673, 842, 7285, 2683, 855, 6937, 2700, 168, 6950, 5534, 2712, 5...
Validation
4,637
9
Temporary_variable:temporary variable computer programming temporary variable variable short lifetime usually hold data soon discarded placed permanent memory location short-lived usually declared local variable i.e. variable local scope formal definition makes variable temporary often-used term programming typical example would swapping contents two variables swap contents variables b one would typically use temporary variable temp follows preserve data overwritten b temporary variables usually named identifiers abbreviate word temporary temp tmp simply common metasyntactic variable names common foo bar baz see also foobar computer hardware designed exploit behaviour temporary data cache register file may contain temporaries internally microprocessor never need committed main memory hence consuming external memory bandwidth
[ 5252, 2248, 7333, 7777, 2079, 5025, 8024 ]
Validation
4,638
2
Reconstructor:reconstructor reconstructor program allows anyone customize iso image ubuntu variants kubuntu xubuntu website longer functioning
[ 5965, 5571, 3919, 578, 682 ]
Test
4,639
4
AdultSwine:adultswine adultswine malware discovered 2018 check point software technologies malware found programmed around 60 apps google play store primarily aimed children bug would display pornographic ads clicked would instruct victims download malicious software attempt steal personal data estimated 3 7 million users may infected according representative google apps removed play store developer accounts associated apps locked check point cautions users extra vigilant installing apps particularly intended use children ”
[ 2727, 6043, 5571 ]
Test
4,640
4
HDIV:hdiv hdiv web application security framework controls information flow server client avoiding many important web risks hdiv extends web applications behaviour adding security functionalities maintaining api framework specification implies hdiv may used applications developed spring mvc grails jstl struts 1 struts 2 javaserver faces symfony transparent way programmer without adding complexity application development
[ 623, 2519, 4345, 2371, 7347 ]
Validation
4,641
6
NTFS_volume_mount_point:ntfs volume mount point ntfs volume mount points specialized ntfs filesystem objects used mount provide entry point volumes mount points created directory ntfs file system gives reference root directory mounted volume empty directory converted mount point mounted volume limited ntfs filesystem formatted file system supported microsoft windows volume mount points supported ntfs 3.0 introduced windows 2000 though quite similar regular posix mount points found unix unix-like systems support local filesystems windows vista later ntfs symbolic links used link local directories remote smb network paths symbolic links work boot impossible redirect e.g nevertheless possible redirect
[ 7879, 3937, 3263, 378, 2198, 6096, 1475, 7553, 7195, 5410, 7564, 2953, 422, 6844, 2245, 435, 5442, 4377, 5090, 3340, 7602, 6164, 4759, 1534, 6885, 7619, 2999, 5475, 6528, 2290, 4774, 1181, 3711, 5134, 7272, 1571, 5850, 140, 6558, 6575, ...
Validation
4,642
3
Aleph_kernel:aleph kernel aleph discontinued operating system kernel developed university rochester part rig project 1975 aleph early set road creation first practical microkernel operating system mach aleph used inter-process communications move data programs kernel applications could transparently access resources machine local area network time 3-mbit/s experimental xerox ethernet project eventually petered several years due rapid changes computer hardware market ideas led creation accent carnegie mellon university leading turn mach applications written rig system communicated via ports ports essentially message queues maintained aleph kernel identified machine unique opposed globally unique id consisting process id port id pair processes automatically assigned process number pid startup could ask kernel open ports processes could open several ports read automatically blocking allowing programs run data arrived processes could also shadow another receiving copy every message sent one shadowing similarly programs could interpose another receiving messages essentially cutting original message conversation rig implemented number data general eclipse minicomputers ports implemented using memory buffers limited 2 kb size produced significant overhead copying large amounts data another problem realized retrospect use global id allowed malicious software guess ports thereby gain access resources since ids based program id port ids changed program restarted making difficult write servers clients could rely specific port number service
[ 6019, 5275, 5021, 5571 ]
Validation
4,643
3
Instruction_cycle:instruction cycle instruction cycle also known fetch–decode–execute cycle simply fetch-execute cycle cycle central processing unit cpu follows boot-up computer shut order process instructions composed three main stages fetch stage decode stage execute stage simpler cpus instruction cycle executed sequentially instruction processed next one started modern cpus instruction cycles instead executed concurrently often parallel instruction pipeline next instruction starts processed previous instruction finished possible cycle broken separate steps program counter pc special register holds memory address next instruction executed fetch stage address stored pc copied memory address register mar pc incremented order point memory address next instruction executed cpu takes instruction memory address described mar copies memory data register mdr mdr also acts two-way register holds data fetched memory data waiting stored memory also known memory buffer register mbr eventually instruction mdr copied current instruction register cir acts temporary holding ground instruction fetched memory decode stage control unit cu decode instruction cir cu sends signals components within cpu arithmetic logic unit alu floating point unit fpu alu performs arithmetic operations addition subtraction also multiplication via repeated addition division via repeated subtraction also performs logic operations binary shifts well fpu reserved performing floating-point operations computer cpu different cycles based different instruction sets similar following cycle cycle begins soon power applied system initial pc value predefined system architecture instance intel ia-32 cpus predefined pc value codice_1 typically address points set instructions read-only memory rom begins process loading booting operating system fetch step instruction control unit fetches instruction address memory unit decoding process allows cpu determine instruction performed cpu tell many operands needs fetch order perform instruction opcode fetched memory decoded next steps moved appropriate registers decoding done cpu control unit step evaluates type operation performed memory operation computer checks whether direct indirect memory operation i/o register instruction computer checks type executes instruction function instruction performed instruction involves arithmetic logic alu utilized stage instruction cycle useful perspective end user everything else overhead required make execute step happen
[ 5012, 1447, 5371, 3948, 7527, 7529, 5737, 2567, 4694, 5042, 1481, 5055, 2226, 1867, 2237, 2248, 6148, 441, 2266, 7960, 4047, 5483, 1556, 5487, 6198, 1568, 1570, 6922, 7666, 515, 8024, 5521, 3747, 1237, 6236, 534, 7314, 1992, 1252, 1254, ...
Test
4,644
8
Webtrekk:webtrekk webtrekk gmbh german company offers marketing analytics customer intelligence software webtrekk companies connect analyze activate user marketing data across devices since 2019 webtrekk part marketing technology service provider mapp webtrekk founded 2004 ceo christian sauer cto norman wahnschaff 2009 webtrekk received €1 million venture capital investment corporate finance partners winners awin-sponsored publisher initiative contest 2012 webtrekk frost sullivan award finally bringing ‘ real time ’ online/digital analytics 2014 webtrekk closed third round financing collecting total €25 million dpe deutsche private equity 2018 webtrekk bronze international stevie award category business competitive intelligence “ cross device tracking tool cross device bridge 2019 webtrekk honored german stevie award gold realtime predictions 2019 webtrekk acquired marketing technology service provider mapp webtrekk provides variety products gain insights data trigger marketing activities products services cross-channel campaign reporting ai-enabled marketing intelligence webtrekk customer analytics suite includes user-centric analytics personalized product recommendations customer intelligence dashboards customer journey tracking tag integration web behavior re-targeting webtrekk data streams enable raw data captured processed streamed real time since acquisition webtrekk mapp consolidate offerings webtrekk ’ customers also access mapp ’ cross-channel marketing cloud consulting support another part webtrekk offering consulting unit works customers specific large-scale projects support team available answer questions functions interface webtrekk products access raw first-party data core component webtrekk products data exported real-time data warehouses bi systems used carry in-depth analyses within customer analytics suite suite customizable dashboard engine enables customers display connected external data sources social media channels crm systems webtrekk 400 customers including flixbus ing mytoys focus industries finance publishing e-commerce products privacy certified german tüv association confirm data privacy security webtrekk ’ data servers located european union housed data centres certified international organization standardization
[ 4600 ]
Train
4,645
4
Norton_AntiVirus:norton antivirus norton antivirus anti-virus anti-malware software product developed distributed symantec corporation since 1991 part norton family computer security products uses signatures heuristics identify viruses features included e-mail spam filtering phishing protection symantec distributes product download box copy oem software norton antivirus norton internet security related product held 61 us retail market share security suites first half 2007 competitors terms market share study include antivirus products ca trend micro kaspersky lab norton antivirus runs microsoft windows linux macos windows 7 support development versions 2006 2008 version 2009 windows 7 supported update already versions 2010 2011 2012 natively support windows 7 without needing update version 12 version fully compatible mac os x lion 2015 series products symantec made changes portfolio briefly discontinued norton antivirus action later reversed introduction norton antivirus basic may 1989 symantec launched symantec antivirus macintosh sam sam 2.0 released march 1990 incorporated technology allowing users easily update sam intercept eliminate new viruses including many n't exist time program release august 1990 symantec acquired peter norton computing peter norton norton company developed various dos utilities including norton utilities include antivirus features symantec continued development acquired technologies technologies marketed name norton tagline symantec norton crossed-arm pose registered u.s. trademark traditionally featured norton product packaging however pose later moved spine packaging eventually dropped altogether early 1991 u.s. computers invaded hundreds foreign virus strains corporate pc infection becoming serious problem symantec norton group launched norton antivirus 1.0 nav pc compatible computers ads product suggested retail 129 featured norton crossed-arm pose wearing pink shirt surgical mask covering nose mouth 1998 version 5.0 update sam renamed norton antivirus nav macintosh product activation introduced norton antivirus 2004 addressing estimated 3.6 million counterfeit norton products sold alphanumeric code generated identify computer configuration ties product key users allowed activate product five times product key spyware adware detection removal introduced 2005 version tagline antispyware edition tagline dropped later releases however norton antivirus 2009 classic include spyware adware detection classic edition marketed alongside norton antivirus 2009 include spyware adware detection existing users 2006 2007 2008 2009 versions upgrade latest 2010 version without buying new subscription upgrading preserve number days left user subscription redesigned main graphical user interface aggregates information central user interface cnet reports norton protection center useful attempts advertise additional products facilitate detection zero-day malware bloodhound disassembles variety programming languages scans code malicious instructions using predefined algorithms internet explorer homepage hijacking protection introduced release well however notably missing search engine hijacking protection cnet highlighted norton antivirus 2006 noticeable impact system performance operating system requirements call windows 2000 service pack 3 windows xp 150 mb free space 300 mhz processor required either operating system 128 mb ram required windows 2000 256 mb required windows xp norton antivirus released september 12 2006 symantec revised norton antivirus goal reducing high system resource utilization windows vista compatibility introduced release well despite 80 code rewritten cnet reports mixed results performance testing windows 2000 compatibility dropped release compatibility 32-bit versions windows vista added release patch symantec hardware requirements vista call 150 mb free space 800 mhz processor 512 mb ram requirements windows xp similarly call 150 mb free space 300 mhz processor 256 mb ram norton antivirus 2008 released august 28 2007 emphasizing malware prevention new features include sonar looks suspicious application behavior release adds real-time exploit protection preventing attackers leveraging common browser application vulnerabilities installed 32-bit versions windows xp service pack 2 300 mb free space 300 mhz processor 256 mb ram required installed 32-bit 64-bit versions windows vista 300 mb free space 800 mhz processor 256 mb ram needed norton antivirus 2009 released september 8 2008 addressing performance issues 300 changes made zero-impact goal.benchmarking conducted passmark software pty ltd highlights 47-second install time 32 second scan time 5 mb memory utilization symantec funded benchmark test provided scripts used benchmark participating antivirus software security status settings displayed single main interface cpu usage monitor displays total cpu utilization norton cpu usage main interface features include norton insight whitelisting technology cuts scanning times mapping known safe files using information online database address malware response times updates delivered every 5 15 minutes however updates tested symantec may cause false positives incorrectly identify files malicious exploit scanner found 2007 2008 versions dropped release installed 32-bit versions windows xp service pack 2 150 mb free space 300 mhz processor 256 mb ram required installed 32-bit 64-bit versions windows vista 150 mb free space 800 mhz processor 512 mb ram required two variations norton antivirus 2009 also marketed symantec gaming edition provides finer control norton downloads updates allows components suite disabled either manually automatically computer enters full-screen mode classic edition find remove adware spyware version 17.0 released september 9 2009 several features updated release including sonar dubbed sonar 2 uses information determine application truly malicious norton insight present users information origins activities performance applications along reputation data new feature codenamed autospy helps users understand norton malware found previous releases removed threats sight quietly warned users potentially confusing users deceived downloading rogue security software much information placed back main window toggle button switches sides symantec also added windows 7 support aside symantec also added norton download insight prevent drive drive downloads symantec briefly discontinued standalone norton antivirus product 2015 instead replacing norton security fbi confirmed active development magic lantern keylogger intended obtain passwords encrypted e-mail documents criminal investigations magic lantern first reported media bob sullivan msnbc 20 november 2001 ted bridis associated press fbi intends deploy magic lantern form e-mail attachment attachment opened installs trojan horse suspect computer activated suspect uses pgp encryption often used increase security sent email messages activated trojan log pgp password allows fbi decrypt user communications symantec major antivirus vendors whitelisted magic lantern trojan rendering antivirus products including norton antivirus incapable detecting concerns around whitelisting include uncertainties magic lantern full surveillance potential whether hackers could subvert redeploy purposes outside law enforcement graham cluley technology consultant sophos said way knowing written fbi even ’ know whether used fbi commandeered third party another reaction came marc maiffret chief technology officer co-founder eeye digital security states customers paying us service protect forms malicious code us law enforcement job make exceptions law enforcement malware tools proponents magic lantern argue technology would allow law enforcement efficiently quickly decrypt time-sensitive messages protected encryption schemes implementing magic lantern require physical access suspect computer unlike carnivore predecessor magic lantern since physical access computer would require court order fbi spokesman paul bresson response question whether magic lantern also needed court order deploy would say like technology projects tools deployed fbi would used pursuant appropriate legal process january 28 2010 symantec anti-virus update marked spotify trojan horse disabling software across millions pcs retail customers report slow indifferent service bugs examples include faulty error message stating current subscriptions expired users received error stating virus protection updated error occurred update software refused allow daily updates though bug reported 2004 corrected 2005 2006 versions another incident occurred may 2007 norton antivirus flagged components pegasus email client malicious rendering program corrupted symantec customer service addressed problem running checklist troubleshooting steps always successful july 25 2006 symantec released faulty update norton antivirus 2006 users users reported onscreen message stating norton antivirus 2006 support repair feature please uninstall reinstall. symantec claimed faulty update downloaded customers 1:00 pm 7:00 pm july 25 2006 symantec developed workaround tool listed troubleshooting steps available company released statement stating expected deliver repair patch affected users monday july 31 2006 norton antivirus criticized refusing uninstall completely leaving unnecessary files behind another issue versions prior 2009 installed liveupdate updates norton-branded software separately user must uninstall norton antivirus liveupdate component manually liveupdate component purposely left behind update norton-branded products present response symantec developed norton removal tool symnrt remove leftover registry keys values along files folders however neither route uninstallation remove subscription data preserved prevent users installing multiple trial copies symnrt remove norton programs symnrt started removal process stopped recommended close running programs prior running symnrt act winfax users recommended back databases running symnrt norton antivirus 2007 install alongside zonealarm incompatibility caused annoyance norton customers purchased norton antivirus 2007 prior warning notice incompatibility symantec recommends removing zonealarm reinstalling internet worm protection feature disabled controls applications access internet protocols use march 9 2009 users norton antivirus 2006 2007 experienced firewall warning stating norton-associated file pifts.exe trying connect internet although file revealed harmless diagnostic patch program gained attention media symantec removed posts forum concerning pifts information available purpose program speculation program malware backdoor sans internet storm center claimed spoken symantec employee confirmed program part update process intended harm graham cluley consultant antivirus vendor sophos found pifts connected symantec server forwarding product computer information march 10 symantec made official response pifts program claiming posts support forum deleted due forum spam rules however deletion pifts-related posts began spam attacks symantec stated pifts diagnostic patch cole stated purpose update help determine many customers would need migrated windows 7-compatible versions norton antivirus pifts apparently released without digital signature verify identity causing firewalls prompt permission attempted connect internet symantec criticized consumers perceived ethical violations including allegations support technicians would tell customers systems infected needed technician resolve remotely extra fee refuse refund customers alleged systems actually infected norton antivirus 11 mac introduced support mac os x v10.5 leopard platform capability detect macintosh windows malware features include vulnerability scanner blocks attackers leveraging software exploits norton antivirus 11 also includes ability scan within compressed archived files time capsule volumes operating requirements call mac os x tiger powerpc intel core processor 128 mb ram 100 mb free hard disk space also required norton antivirus dual protection mac intended macintosh users windows running systems using boot camp virtualization software vmware fusion provides license norton antivirus 11 norton antivirus 2009 2009 2012 editions symantec made huge changes products speed performance norton products 2 running processes using 24 mb ram soon virus recognized information regards virus virus signature stored pandemic definitions file contains vital know-how become aware get rid virus according tests sponsored symantec passmark security benchmark 2012 norton antivirus norton internet security lightest suites available av-comparatives.org also tested products gave similar results pcmag recognises 2011 2012 lines fastest strongest protection pcworld tests security software put norton internet security 2009 1st place 2011 test pcworld norton internet security winner dennis technology labs tests sponsored symantec confirms performance effectiveness norton 2011 2012 lines 14th august 2013 prime minister new zealand john key addressed identified misinformation surrounding gcsb amendment bill claiming actions government communications security bureau analogous norton antivirus
[ 1461, 385, 1838, 4689, 5401, 7193, 2241, 5773, 3328, 74, 7597, 88, 5452, 91, 4759, 4398, 1931, 2296, 4783, 7646, 496, 5144, 142, 5856, 157, 4456, 6962, 4115, 5552, 3089, 4492, 4138, 910, 2746, 5571, 5227, 3111, 2032, 578, 7738, 6644, ...
Test
4,646
4
National_Initiative_for_Cybersecurity_Education:national initiative cybersecurity education national initiative cybersecurity education nice partnership government academia private sector focused supporting country ability address current future cybersecurity education workforce challenges standards best practices nice led national institute standards technology nist u.s. department commerce comprehensive national cybersecurity initiative cnci established president george w. bush january 2008 included twelve initiatives one initiative 8 aimed making federal cybersecurity workforce better prepared handle cybersecurity challenges may 2009 cyberspace policy review directed president barack obama elevated cnci initiative 8 initially focused improving federal cybersecurity workforce ability perform cybersecurity work scope expanded beyond federal workforce include private sector workforce truly making national charge march 2010 obama administration declassified limited material regarding cnci making initiative 8 public initiative 8 expand cyber education billions dollars spent new technologies secure u.s. government cyberspace people right knowledge skills abilities implement technologies determine success however enough cybersecurity experts within federal government private sector implement cnci adequately established federal cybersecurity career field existing cybersecurity training personnel development programs good limited focus lack unity effort order effectively ensure continued technical advantage future cybersecurity must develop technologically-skilled cyber-savvy workforce effective pipeline future employees take national strategy similar effort upgrade science mathematics education 1950 ’ meet challenge additionally cnci described training education professional development programs lacking “ unity effort ” cybersecurity enhancement act 2014 title iv established “ national cybersecurity awareness education program ” known national initiative cybersecurity education nice digital economy enabled knowledgeable skilled cybersecurity workforce energize promote robust network ecosystem cybersecurity education training workforce development nice cybersecurity workforce framework nice cybersecurity workforce framework nice framework nist special publication 800-181 national focused resource categorizes describes cybersecurity work publication serves fundamental reference support workforce capable meeting organization cybersecurity needs establishing taxonomy common lexicon describes cybersecurity work workers irrespective work performed nice framework intended applied public private academic sectors although nice framework published nist special publication august 2017 working drafts document use since 2010 publication intended living document updated periodically based change requests nice program office plethora tools resources exist learning implementing nice framework learn nist.gov/nice/framework nice strategic plan cybersecurity enhancement act 2014 requires strategic plan developed implemented every five years current nice strategic plan includes multitude guiding values three primary goals 1 accelerate learning skills development 2 nurture diverse learning community 3 guide career planning workforce development see current past versions nice strategic plan nist.gov/nice supporting growth sustainment nation cybersecurity workforce building foundation secure american future may 2017 president donald trump issued executive order strengthening cybersecurity federal networks critical infrastructure part order states policy united states “ support growth sustainment workforce skilled cybersecurity related fields foundation achieving objectives cyberspace. ” consequently secretary commerce secretary homeland security directed provide report president findings recommendations regarding support growth sustainment nation cybersecurity workforce public private sectors report supporting growth sustainment nation cybersecurity workforce building foundation secure american future response charge nice framework work role capability indicators indicators performing work roles nice framework work role capability indicators indicators performing work roles draft nist interagency report 8193 co-authored representatives u.s. department homeland security national institute standards technology booz allen hamilton inc document helps determine qualities accomplishments indicate someone suitable perform particular job activity qualities defined report “ capability indicators. ” nice headquartered nist facilities gaithersburg maryland nice program office activities organized three categories government engagement industry engagement academic engagement committees nice several committees nice challenge project nice challenge project led california state university san bernardino designed create flexible set challenge environments supporting infrastructure low barrier use one would able perform tasks outlined nice cybersecurity workforce framework used platform instruction well evaluate endeavor part cybersecurity workforce cyberseek cyberseek interactive heat map pathway tool developed comptia partnership burning glass technologies provides data visualization need supply cybersecurity workers guide employers job seekers policy makers education training providers guidance counselors cyberseek includes cybersecurity jobs heat map shows information supply workers relevant credentials project also shows career pathways cybersecurity map opportunities advancement field regional alliances multistakeholder partnerships stimulate cybersecurity education workforce development ramps ramps program provides funding opportunities build multistakeholder workforce partnerships employers schools institutions higher education community organizations
[ 4440, 8086, 6694 ]
Test
4,647
2
DOCS_(software):docs software docs display operator console support software package ibm mainframes cfs inc. enabling access system console using 3270-compatible terminals computer operators communicated ibm mainframe computers using electro-mechanical typewriter-like console came standard ibm 360 370 computer except upper end models offered video consoles model 20 came standard without console majority smaller less expensive ibm 360s 370s came equipped ruggedized selectric keyboard devices selectric major step teletypes tty associated unix smaller systems still clunky video consoles provided certain models considered particularly user friendly ignored two thirds ibm mainframe market dos vse descendants docs replaced supplanted typewriter interface video screen practice worked little like present-day instant messenger programs icq qq aim adium ichat etc data entry line bottom messages scrolling real time screen commands otherwise identical docs available dos dos/vs dos/vse came packaged third party operating systems edos computer software company later acquired nixdorf product ran several dos-related platforms several vendors offered docs part os docs developed cfs inc. brookline massachusetts kayser-roth data center whitman massachusetts dick goran wrote video interface leigh lundin wrote operating system interface transcript recorder docs required dedicated partition dos three partitions dos/vs seven giving partition docs placed crimp practicability leigh lundin designed fx pseudo-partition relieved user relinquishing working partition fx appeared dos/vs version sdi grasp f0 docs sold north america cfs inc brookline overseas sales cfs engaged mail order local vendors product also embedded third party operating system packages edos vdos
[ 607, 5081, 5852, 3233, 7040, 5535, 7661, 2596, 1851, 7783 ]
Validation
4,648
4
UK_cyber_security_community:uk cyber security community cyber security information assurance community united kingdom diverse many stakeholders groups contributing support uk cyber security strategy following list stakeholders according parliamentary committee uk government enough protect nation cyber attack cyber aware cross-government awareness behaviour campaign provides advice simple measures individuals take protect cyber crime department digital culture media sport one lead government departments cyber security policy responsible supporting promoting uk cyber security sector promoting cyber security research innovation working national cyber security centre help ensure uk organisations secure online resilient cyber threats get safe online united kingdom-based campaign national initiative teach citizens basic computer security internet privacy national crime agency nca hosts law enforcement cyber crime unit incorporating child exploitation online protection centre national cyber security centre uk ’ authority cyber security parent organisation gchq absorbed replaced cesg information security arm gchq well centre cyber assessment cca computer emergency response team uk cert uk cyber-related responsibilities centre protection national infrastructure cpni ncsc provides advice support public private sector avoid cyber threats cesg originally communications-electronics security group branch gchq worked secure communications information systems government critical parts uk national infrastructure centre protection national infrastructure cpni provided protective security advice businesses organisations across national infrastructure national security council cabinet committee tasked overseeing issues related national security intelligence coordination defence strategy office cyber security information assurance ocsia supports minister cabinet office rt hon francis maude mp national security council determining priorities relation securing cyberspace unit provides strategic direction coordinates action relating enhancing cyber security information assurance uk ocsia headed james quinault trustworthy software initiative tsi uk public good activity sponsored uk government centre protection national infrastructure aimed 'making software better warning advice reporting points warps provide trusted environment members community share problems solutions uk cyber security forum social enterprise representing cyber sme small medium enterprise uk forum composed 20 regional cyber clusters around uk cluster run subsidiary uk cyber security forum operated groups volunteers provide events around uk engage public cyber security provide continued professional development cyber professionals official clusters ads trade organisation companies operating uk aerospace defence security space industries business continuity institute bci established 1994 enable individual members obtain guidance support fellow business continuity practitioners profit accreditation certification organisation cdf promotes global interests uk crypto development industry information assurance advisory council iaac works across industry government academia towards ensuring uk ’ information society robust resilient secure foundation iaac set baroness neville-jones chaired organisation 2007 handing current chairman sir edmund burton affiliates include bt group northrop grumman qinetiq raytheon pwc o2 uk ultra electronics glaxosmithkline 2012/13 work programme focused consumerisation effects information assurance iacg formed following uk national ia conference 2006 iacg encourages greater collaboration commercial supply base information assurance products services operating within uk public sector stakeholders include cesg bis office cyber security information assurance ocsia cyber security operations centre csoc cpni group maintains uk information assurance community map hosted cesg web site two co-chairs colin robbins nexor ross parsell thales iacg ceased operation 2014 information systems security association issa not-for-profit international professional organization information security professionals practitioners uk chapter institute information security professionals iisp independent non-profit body governed members principal objective advancing professionalism information security practitioners thereby professionalism industry whole isaca international professional association deals governance previously known information systems audit control association isc ² international information systems security certification consortium non-profit organization specializes information security education certifications ndi former government-funded organisation building supply chains mod manufacturers using smes united kingdom techuk formerly known intellect uk trade association technology industry cyber security group focused “ high threat ” areas – including defence national security resilience protection critical national infrastructure intelligence organised crime chaired dr andrew rogoyski roke manor research security resilience group works build strong relationships technology industry policymakers customers end users chaired stephen kingan nexor tigerscheme commercial certification scheme technical security specialists backed university standards covering wide range expertise tigerscheme cesg certified uk candidates subject independent rigorous academic assessment authority tigerscheme founded 2007 principle commercial certification scheme run independent lines would give buyers security testing services confidence hiring recognised reputable company june 2014 operational authority tigerscheme transferred usw commercial services ltd. ukceb not-for-profit membership organisation whose mission transform secure information sharing life collaboration defence acquisition support british computer society bcs professional body learned society represents working information technology united kingdom internationally security data privacy group cyber scheme profit professional examination body contract national cyber security centre provide technical exams support governments assured penetration testing company scheme check exams independent rigorous conducted practitioner team member level team leader levels gchq accredited several academic centres excellence cyber security research accreditations expire july 2017 results re-accreditation process expected mid february 2017 information security research group isrg university south wales multidisciplinary team academics industrial experts focusing upon cyber security particular group focusing upon cyber security centre csc de montfort university multidisciplinary group academics focus wide variety cyber security digital forensics issues centre mission provide full benefits safe secure resilient cyberspace
[ 7055, 6004, 6488, 3454, 7560, 5568, 485, 3241, 7486, 1805 ]
Validation
4,649
5
Link_Control_Protocol:link control protocol computer networking link control protocol lcp forms part point-to-point protocol ppp within family internet protocols setting ppp communications sending receiving devices send lcp packets determine standards ensuing data transmission lcp protocol devices use ppp transmit data network lcp packet determines acceptability link lcp packets embedded ppp packets therefore basic ppp connection established lcp reconfigure lcp ppp packets control code 0xc021 info field contains lcp packet four fields code id length data
[ 5880, 4188 ]
Validation
4,650
5
Registered_port:registered port registered port network port sub-address defined within internet protocol range 1024–49151 assigned internet assigned numbers authority iana internet corporation assigned names numbers icann march 21 2001 usc/isi 1998 use certain protocol application ports numbers 0–1023 called system well-known ports ports numbers 1024-49151 called user registered ports ports numbers 49152-65535 called dynamic and/or private ports system user ports used transport protocols tcp udp dccp sctp indicate application service
[ 3821, 4382, 3945, 7778 ]
Test
4,651
2
THE_multiprogramming_system:multiprogramming system multiprogramming system os computer operating system designed team led edsger w. dijkstra described monographs 1965-66 published 1968 dijkstra never named system simply abbreviation technische hogeschool eindhoven name dutch eindhoven university technology netherlands system primarily batch system supported multitasking designed multi-user operating system much like sds 940 set processes system static system apparently introduced first forms software-based paged virtual memory electrologica x8 support hardware-based memory management freeing programmers forced use actual physical locations drum memory using modified algol compiler programming language supported dijkstra system automatically generate calls system routines made sure requested information memory swapping necessary paged virtual memory also used buffering i/o device data significant portion operating system code well nearly algol 60 compiler system semaphores used programming construct first time design multiprogramming system significant use layered structure higher layers depend lower layers constraint higher layers depend lower layers imposed designers order make reasoning system using quasi-formal methods tractable also facilitate building testing system incrementally layers implemented order layer 0 first thorough testing abstractions provided layer turn division kernel layers similar ways multics later ring-segmentation model several subsequent operating systems used layering extent including windows nt macos although usually fewer layers code system written assembly language dutch electrologica x8 computer computer word size 27 bits 32 kilowords core memory 512 kilowords drum memory providing backing store lru cache algorithm paper tape readers paper tape punches plotters printers
[ 1522, 4469, 6256, 4670, 8066, 1361, 6984, 1640, 5571, 1114, 6466, 3895, 4810, 1408, 336, 1682, 5424, 7863, 1600, 8137, 3751 ]
Test
4,652
4
Stegomalware:stegomalware stegomalware type malware uses steganography hinder detection steganography practice concealing file message image video within another file message image video network traffic type malware operates building steganographic system hide malicious data within resources extracts executes dynamically considered one sophisticated stealthy ways obfuscation term stegomalware introduced researchers context mobile malware presented inscrypt conference 2014 however fact mobile malware could potentially utilize steganography already presented earlier works use steganography malware first applied botnets communicating probabilistically unobservable channels mobile malware based covert channels proposed year steganography later applied components malware engineering return-oriented programming compile-time obfuscation among others europol-supported cuing initiative monitors use steganography malware
[ 755, 2774 ]
Test
4,653
1
Bento_(database):bento database bento database application mac os x made filemaker inc. bento differs significantly company flagship product filemaker pro relies heavily templates integration applications default bento data sources include apple address book calendar previously called ical applications modify directly filemaker announced july 31 2013 would discontinue bento september 30 2013 bento compatible mac os x 10.5 later due reliance features available previous versions operating system certain actions switching templates use core animation animate transition also includes integration time machine backing requires ical 3.0 later renamed calendar live data editing public preview made available along initial product announcement november 13 2007 first final version released january 8 2008 bento template pre-made library forms necessary catalog items within certain context release bento 2 october 14 2008 bento users could import export share templates june 16 2009 filemaker launched template sharing site users download variety templates well share couple user-created template sharing sites also exist october 14 2008 filemaker released bento 2.0 bug fixes new features including integration apple mail new version offer upgrade pricing cost version 1 many customers expressed disappointment official bento user forums filemaker responded using pricing model companies products apple iwork ilife suites additionally november 25 filemaker provided official statement indicating would discontinue revisions bug fixes version 1 product.given interest revision neither quick easy decision come to. br br bento 1 received extensive beta testing like every software product issues discovered shipment followed bento 1.0.2 address critical issues discovered. br br addressing product issues discovered 1.0.2 2.0 release reworked product significant sometimes architectural ways simply put means way easily migrate fixes 2.0 backwards 1.0 would reengineer 1.0 effectively became 2.0 would strongly delayed 2.0.3 version bento releasing free update bento 2.0.1/2.0.2 week continued development bento product line may 20 2012 price bento 4 49 single license 99 'family pack five licenses filemaker announced july 31 2013 would completely discontinue bento product line september 30 2013 technical support bento products finally ending july 30 2014
[ 6788, 3255, 7890, 4320, 4690, 734, 5752, 405, 6125, 2954, 1123, 6847, 4003, 6142, 2609, 1897, 4376, 5091, 5450, 4749, 7601, 6165, 3001, 2284, 7259, 7634, 120, 1940, 2300, 3025, 502, 2679, 2327, 6565, 2331, 3050, 163, 4453, 1599, 6582, 1...
Test
4,654
3
Grosch's_law:grosch law grosch law following observation computer performance made herb grosch 1953 believe fundamental rule modestly call grosch law giving added economy square root increase speed — calculation ten times cheaply must hundred times fast adage commonly stated computer performance increases square cost computer costs twice much computer b expect computer four times fast computer b two years grosch statement seymour cray quoted business week august 1963 expressing thought computers obey square law — price doubles get least four times much speed law also interpreted meaning computers present economies scale costly computer price–performance ratio linearly becomes better implies low-cost computers compete market analysis rental cost/performance data computers 1951 1963 knight found grosch law held commercial scientific operations modern analysis data found grosch law applied commercial operations separate study knight found grosch law apply computers 1963-1967 also confirmed modern analysis paul strassmann asserted 1997 never clear whether grosch law reflection ibm priced computers whether related actual costs provided rationale bigger computer always better ibm sales force used grosch rationale persuade organizations acquire computing capacity needed grosch law also became justification offering time-sharing services big data centers substitute distributed computing grosch stated law useful 1960s 1970s today originally intended law means pricing computing services
[ 949, 1592, 4049, 4051, 48, 5832, 553, 1238, 107, 4899 ]
Test
4,655
5
Lynx_(web_browser):lynx web browser lynx customizable text-based web browser use cursor-addressable character cell terminals oldest web browser still general use active development started 1992 lynx product distributed computing group within academic computing services university kansas initially developed 1992 team students staff university lou montulli michael grobe charles rezac hypertext browser used solely distribute campus information part campus-wide information server browsing gopher space beta availability announced usenet 22 july 1992 1993 montulli added internet interface released new version 2.0 browser garrett blythe created doslynx april 1994 later joined lynx effort well foteos macrides ported much lynx vms maintained time 1995 lynx released gnu general public license maintained group volunteers led browsing lynx consists highlighting chosen link using cursor keys links page numbered entering chosen link number current versions support ssl many html features tables formatted using spaces frames identified name explored separate pages lynx inherently display various types non-text content web images video launch external programs handle image viewer video player unlike web browsers lynx support javascript adobe flash websites require work correctly speed benefits text-only browsing apparent using low bandwidth internet connections older computer hardware may slow render image-heavy content lynx support graphics web bugs track user information fetched therefore web pages read without privacy concerns graphic web browsers however lynx support http cookies also used track user information lynx therefore supports cookie whitelisting blacklisting alternatively cookie support disabled permanently conventional browsers lynx also supports browsing histories page caching raise privacy concerns lynx accepts configuration options either command-line options configuration files 142 command line options according help message template configuration file codice_1 lists 233 configurable features overlap two although command-line options codice_2 matched codice_1 addition pre-set options command-line configuration file lynx behavior adjusted runtime using options menu overlap settings lynx implements many runtime optional features optionally controlled setting configuration file allowing choices saved separate writable configuration file reason restricting options saved originated usage lynx common mid-1990s i.e. using lynx front-end application internet accessed dial-in connections refreshable braille display text-to-speech–friendly interface lynx used internet access visually impaired users lynx substitutes images frames non-textual content text codice_4 codice_5 codice_6 html attributes allows hiding user interface elements browser becomes specifically suitable use cost-effective general purpose screen reading software version lynx specifically enhanced use screen readers windows developed indian institute technology madras lynx also useful accessing websites remotely connected system graphical display available despite text-only nature age still used effectively browse much modern web including performing interactive tasks editing wikipedia since lynx take keystrokes text file still useful automated data entry web page navigation web scraping consequently lynx used web crawlers web designers may use lynx determine way search engines web crawlers see sites develop online services provide lynx view given web page available lynx also used test websites performance one run browser different locations remote access technologies like telnet ssh one use lynx test web site connection performance different geographical locations simultaneously another possible web design application browser quick checking site links lynx originally designed unix-like operating systems though ported vms soon public release systems including dos microsoft windows classic mac os os/2 included default openbsd installation openbsd 2.3 may 1998 5.5 may 2014 main tree prior july 2014 subsequently made available ports tree also found repositories linux distributions well homebrew fink repositories macos ports beos minix qnx amigaos os/2 also available sources built many platforms e.g. mention made google android operating system
[ 4655, 5373, 6802, 5378, 2205, 7537, 6809, 393, 3291, 2574, 2577, 6452, 405, 4352, 4725, 7214, 1136, 6858, 2261, 84, 87, 445, 1152, 1525, 4759, 2281, 7628, 5821, 5127, 6540, 3383, 8006, 8009, 3043, 1970, 6221, 520, 523, 3057, 3060, 3412,...
Test
4,656
4
Digger_gold:digger gold digger gold common slang term gold recovered electronics components board fingers cpus connector pins gold fingers boards circuits often stripping solution used remove gold board material nitric acid also works well regard many gold components soldered boards silver-based solders soluble nitric acid gold dissolving metals solution digger gold recovered dissolution gold aqua regia subsequent selective precipitation gold using ferrous sulfate another selective reducing agent hydrazine
[ 1021, 8061, 2593, 2029, 288 ]
Validation
4,657
3
ELVEES_Multicore:elvees multicore multicore series 32-bit microprocessors embedded dsp cores developed elvees russia microprocessor mips32 core called riscore32 elvees optionally fpu arm cortex-a9 core processors series radiation hardened rad-hard space applications
[ 6872, 5364, 4221, 3098, 6014, 1753, 8102, 4062, 5055, 5405, 1761, 1778, 6480, 3747, 1237, 352, 971 ]
Test
4,658
3
Commodore_PC_compatible_systems:commodore pc compatible systems commodore pc compatible systems range ibm pc compatible personal computers introduced 1984 home computer manufacturer commodore business machines incompatible commodore prior commodore 64 amiga architectures generally regarded good serviceable workhorse pcs nothing spectacular well-established commodore name seen competitive asset 1984 commodore signed deal intel second source manufacture intel 8088 cpu used ibm pc along license manufacture computer based dynalogic hyperion unknown whether systems produced sold 1987 first model released pc-10 sold 559 without monitor sold alongside commodore amiga commodore 64c/128 lines home graphics computers pc10 comparable market blue chip pc leading edge model tandy 1000 line pc compatibles line consists following models
[ 4277, 3275, 1508 ]
Test
4,659
2
Stormy_Peters:stormy peters stormy peters information technology industry analyst prominent free open source software foss advocate promoting business use foss advocates consultant conference speaker co-founded later appointed executive director gnome foundation previously worked mozilla cloud foundry works red hat peters birth name robyn however gone name since childhood peters completed bachelor arts major computer science rice university initially worked software engineer hewlett-packard unix development team approximately 1999 peters managing hp-ux desktop development became aware gnome project team decided provide gnome hpux peters role explaining open source business intellectual property models hewlett-packard management later founded hewlett-packard open source program office 2000 became one founding members gnome foundation advisory board december 2005 peters became director product management openlogic open source services company july 2008 peters left openlogic became executive director gnome foundation role coordinating sponsors business development marketing november 2010 left mozilla since august 2011 member gnome board directors peters given keynote talks many open source conferences including open source business conference linux.conf.au 2008 2009 gnome.asia summit beijing ho chi minh city respectively ohio linuxfest 2010
[ 900, 3764, 6586 ]
Validation
4,660
0
Mark_Steedman:mark steedman mark jerome steedman fba frse born 18 september 1946 computational linguist cognitive scientist steedman graduated university sussex 1968 b.sc experimental psychology university edinburgh 1973 ph.d. artificial intelligence dissertation formal description musical perception gained 1972 advisor prof. h.c. longuet-higgins frs held posts lecturer psychology university warwick 1977–83 lecturer reader computational linguistics university edinburgh 1983-8 associate full professor computer information sciences university pennsylvania 1988–98 held visiting positions university texas austin max planck institute psycholinguistics nijmegen university pennsylvania philadelphia steedman currently holds chair cognitive science school informatics university edinburgh 1998- works computational linguistics artificial intelligence cognitive science generation meaningful intonation speech artificial agents animated conversation communicative use gesture tense aspect combinatory categorial grammar ccg also interested computational musical analysis combinatory logic
[ 1314, 7610, 5388, 1243 ]
Test
4,661
3
IBM_Rivina:ibm rivina rivina experimental 64-bit powerpc microprocessor built ibm 2000 successor guts gigahertz unit test site purpose build processor able reach high frequencies first microprocessors reach surpass 1 ghz mark project work conducted fewer twenty engineers course two years idea use aggressive circuit design techniques carefully crafted floorplan microarchitecture keeping short six stage pipeline guts supported subset 100 mainly integer instructions powerpc instruction set rivina used complete 64-bit powerpc specification including dual precision floating point address translation guts small single cycle 4 kb l1 cache rivina used two-cycle two set associative 64 kb cache instead processor comprised 19 million transistors manufactured using ibm cmos 7s 0.22 μm copper fabrication process able reach 1.15 ghz dissipating 112 watts 101 °c
[ 7327, 2719, 3348, 3936, 1075, 1346, 2458, 1083, 4408, 5652, 912, 7361, 2845, 3708, 5665, 1199, 1386, 7099, 5947, 2501, 239, 6474, 8125, 4815, 1131, 7499, 2257, 3674, 5622 ]
Validation
4,662
9
Linker_(computing):linker computing computing linker link editor computer utility program takes one object files generated compiler assembler combines single executable file library file another 'object file simpler version writes output directly memory called loader though loading typically considered separate process computer programs typically composed several parts modules parts/modules need contained within single object file cases refer means symbols addresses modules mapped memory addresses linked execution typically object file contain three kinds symbols compilers object file result compiling one input source code file program comprises multiple object files linker combines files unified executable program resolving symbols goes along linkers take objects collection called library runtime library linkers include whole library output include files referenced object files libraries library linking may thus iterative process modules included requiring additional modules linked libraries exist diverse purposes one system libraries usually linked default linker also takes care arranging objects program address space may involve relocating code assumes specific base address another base since compiler seldom knows object reside often assumes fixed base location example zero relocating machine code may involve re-targeting absolute jumps loads stores executable output linker may need another relocation pass finally loaded memory execution pass usually omitted hardware offering virtual memory every program put address space conflict even programs load base address pass may also omitted executable position independent executable unix variants sintran iii process performed linker assembling object files program called loading loading executable code onto file additionally operating systems program handles jobs linking loading program dynamic linking many operating system environments allow dynamic linking deferring resolution undefined symbols program run means executable code still contains undefined symbols plus list objects libraries provide definitions loading program load objects/libraries well perform final linking approach offers two advantages also disadvantages static linking result linker copying library routines used program executable image may require disk space memory dynamic linking portable since require presence library system runs static linking also prevents dll hell since program includes exactly versions library routines requires conflict programs program using routines library require entire library installed compiler information layout objects final output take advantage shorter efficient instructions place requirement address another object example jump instruction reference absolute address offset current location offset could expressed different lengths depending distance target generating conservative instruction usually largest relative absolute variant depending platform adding relaxation hints possible substitute shorter efficient instructions final link step performed input objects read assigned temporary addresses linker relaxation pass subsequently reassigns addresses may turn allow relaxations occur general substituted sequences shorter allows process always converge best solution given fixed order objects case relaxations conflict linker needs weigh advantages either option instruction relaxation typically occurs link-time inner-module relaxation already take place part optimising process compile-time cases relaxation also occur load-time part relocation process combined dynamic dead-code elimination techniques ibm system/360 mainframe environments os/360 including z/os z/architecture mainframes type program known linkage editor name implies linkage editor additional capability allowing addition replacement and/or deletion individual program sections operating systems os/360 format executable load-modules containing supplementary data component sections program individual program section replaced parts program updated relocatable addresses references corrected linkage editor part process one advantage allows program maintained without keep intermediate object files without re-compile program sections n't changed also permits program updates distributed form small files originally card decks containing object module replaced systems object code form format 80-byte punched-card images updates introduced system using medium later releases os/360 subsequent systems load-modules contain additional data versions components modules create traceable record updates term linkage editor construed implying program operates user-interactive mode like text editor intended batch-mode execution editing commands supplied user sequentially organized files punched cards dasd magnetic tape tapes often used initial installation os
[ 361, 6789, 1817, 7883, 2549, 3623, 3278, 2933, 1854, 1857, 2589, 6464, 757, 1495, 5082, 5784, 1894, 6498, 4020, 7605, 1537, 5480, 6186, 1198, 5138, 1203, 839, 4070, 5502, 7669, 1236, 3417, 1989, 5190, 3073, 6249, 4843, 6969, 7333, 6256, ...
Test
4,663
4
Veracode:veracode veracode application security company based burlington massachusetts founded 2006 company provides automated cloud-based service securing web mobile third-party enterprise applications veracode provides multiple security analysis technologies single platform including static analysis dynamic analysis mobile application behavioral analysis software composition analysis march 9 2017 ca technologies announced acquiring veracode approximately 614 million cash april 3 2017 ca technologies announced completed acquisition veracode july 11 2018 broadcom announced acquiring veracode parent ca technologies 18.9 billion cash november 5 2018 broadcom announced completed acquisition ca technologies thus officially became new owner veracode business day thoma bravo private equity firm headquartered san francisco california announced agreed acquire veracode broadcom 950 million cash veracode founded chris wysopal christien rioux former engineers stake cambridge massachusetts-based security consulting firm known employing former “ white hat ” hackers l0pht heavy industries much veracode software written rioux 2007 company launched securityreview service used test code order find vulnerabilities could lead cybersecurity breaches hacking service intended used alternative penetration testing involves hiring security consultant hack system november 29 2011 company announced appointed robert t. brennan former ceo iron mountain incorporated new chief executive officer company issued report cybersecurity june 2015 report found sectors failed industry-standard security tests web mobile applications government worst performing sector regards fixing security vulnerabilities report issued company december 2015 found four five applications written popular web scripting languages contain least one critical risks industry-standard security benchmark 2014 veracode customers included three top four banks fortune 100 fortune reported march 2015 veracode planned file initial public offering ipo later year order go public major investors company include .406 ventures accomplice starvest partners meritech capital partners funding round announced september 2014 firm raised late-stage investment led wellington management company participation existing investors 2013 veracode ranked 20th forbes list top 100 promising companies america veracode named one 20 coolest cloud security vendors 2014 cloud 100 crn magazine gartner named veracode leader four consecutive years 2013 2014 2015 2016 gartner magic quadrant application security testing
[ 6412, 2961, 3211, 409, 3842, 7262, 5051, 3592 ]
Test
4,664
9
Karl_Lieberherr:karl lieberherr karl j. lieberherr professor computer science northeastern university boston studies eth zurich obtaining m.s 1973 ph.d. 1977 wrote first book adaptive programming work theme one several secondary influences development aspect-oriented programming adaptive programming tries create applications easy maintain evolve creating new abstraction layer design implementation object-oriented applications concept takes encapsulation new level allowing changes way object works without changing interface objects technique solves situations object takes assumptions objects work change object takes assumption creating chain effect rest system aspect oriented programming affects way application created following directives concept one could create separate objects treat data process separated way allows flexible application change evolve easily
[]
Test
4,665
4
Hit-and-run_DDoS:hit-and-run ddos hit-and-run ddos type denial-of-service ddos attack uses short bursts high volume attacks random intervals spanning time frame days weeks purpose hit-and-run ddos prevent user service using service bringing host server type attack distinguished persistent ddos attack continues attacker stops attack host server able defend ddos attack characterized explicit attempt attackers prevent legitimate users service using service hit-and-run ddos accomplished using high volume network application attacks short bursts attacks last long enough bring server hosting service normally 20 60 minutes attack repeated every 12 24 hours period days weeks causing issues company hosting service hit-and-run ddos sometimes used test ddos attack attacker inject bad packets network test online functioning network verified functioning attacker use persistent ddos attack hit-and-run ddos exploits anti-ddos software services used defend prolonged ddos attacks activating software take longer actual attack allowing denial service ddos protection start defend attack
[ 1691, 6225, 3175 ]
Test
4,666
4
Deputy_Director_of_the_National_Security_Agency:deputy director national security agency deputy director national security agency highest-ranking civilian within national security agency senior civilian nsa deputy director acts agency chief operating officer guiding directing strategies policy serves principal advisor director nsa deputy director reports nsa director required technically experienced civilian current deputy director george c. barnes armed forces security agency afsa predecessor nsa nowiki /nowiki november 1950 april 1951 deputy director service
[ 202, 4988, 7191, 7895, 228, 258, 1278, 3335, 7568, 4727 ]
Test
4,667
5
PHY_(chip):phy chip phy abbreviation physical layer electronic circuit usually implemented chip required implement physical layer functions osi model phy connects link layer device often called mac acronym medium access control physical medium optical fiber copper cable phy device typically includes physical coding sublayer pcs physical medium dependent pmd layer functionality ethernet phy component operates physical layer osi network model implements ethernet physical layer portion 1000base-t 100base-tx 10base-t standards specifically ethernet phy chip implements hardware send receive function ethernet frames interfaces analog domain ethernet line modulation digital domain link-layer packet signaling phy usually handle mac addressing link layer job similarly wake-on-lan boot rom functionality implemented network interface card nic may phy mac functionality integrated one chip separate chips examples include microsemi simpliphy synchrophy vsc82xx/84xx/85xx/86xx family marvell alaska 88e1310/88e1310s/88e1318/88e1318s gigabit ethernet transceivers offerings intel ics
[ 6807, 2967, 2744, 6211, 4667, 3314, 6976, 2121, 5492 ]
Test
4,668
8
Contextual_deep_linking:contextual deep linking contextual deep linking form deep linking mobile apps links specific content within app rather generic welcome screen app basic mobile deep linking typically allows deep link content apps ’ already downloaded contextual deep linking allows pass information app store referring information passed app store ios google play bringing user content links within app whether app previously installed
[ 1355, 4519, 6312 ]
Test
4,669
9
George_Springer_(mathematician):george springer mathematician george springer september 3 1924 – february 18 2019 american mathematician computer scientist professor emeritus computer science indiana university bloomington springer perhaps best known coauthor daniel p. friedman widely used textbook scheme art computer programming scheme one two main dialects lisp three pioneering books scheme scheme programming language 1982 r. kent dybvig structure interpretation computer programs 1985 harold abelson gerald jay sussman julie sussman scheme art computer programming 1989 springer friedman springer earned bachelor degree 1945 case western reserve university named case institute technology master degree 1946 brown university earned phd 1949 harvard university thesis coefficient problem univalent mappings exterior unit circle lars ahlfors 1949 1951 springer c.l.e moore instructor massachusetts institute technology 1951 1954 assistant professor northwestern university academic year 1954/1955 fulbright lecturer visiting professor university münster worked heinrich behnke autumn 1955 springer became associate professor subsequently professor university kansas academic year 1961/1962 fulbright lecturer visiting professor university würzburg 1964 professor mathematics 1987 also professor computer science indiana university bloomington academic year 1971/1972 visiting professor imperial college london springer began career working function theory one several complex variables wrote textbook riemann surfaces 1980s turned toward computer science working programming languages springer born cleveland ohio 1924 family jewish immigrants poland met wife annemarie née keiner harvard university married 1950 death 2011 three children springer died february 18 2019 aged 94
[ 7032, 4543, 4737, 6796, 1243 ]
Test
4,670
2
Timeline_of_operating_systems:timeline operating systems article presents timeline events history computer operating systems 1951 current day narrative explaining overall developments see history operating systems
[ 1807, 4291, 4297, 5021, 6798, 13, 6801, 3271, 7894, 3276, 4320, 391, 5041, 7546, 5396, 2933, 7550, 402, 4336, 405, 1855, 2582, 6113, 1112, 6119, 1866, 4347, 3990, 1123, 6479, 65, 6849, 4366, 4733, 6853, 5784, 5088, 443, 785, 1516, 2266,...
Train
4,671
2
VX-REXX:vx-rexx vx-rexx highly extensible rexx gui development system os/2 developed watcom initially released 1993 much new code ecomstation written using vx-rexx though rexx 3gl vx-rexx interface allows build rexx programs using combination 3gl 4gl techniques drag-and-drop interface inserting code allows quite complex programs built without actually entering code vx-rexx interface written vx-rexx means extended and/or modified using rexx code also number macro hooks used add functionality directly toolbox contains number standard tools static text group box push button radio button check box picture box image push/radio button list box combo box drop-down single multiline entry field slider specialized ones container value-set notebook dde client timer additional controls built using som distributed .dll files anything simple variants existing controls tri-state check box self-validating entry field completely custom-drawn controls example self-contained tic-tac-toe board written c compiled added vx-rexx project
[ 1734 ]
Validation
4,672
6
IBM_Spectrum_Scale:ibm spectrum scale ibm spectrum scale high-performance clustered file system software developed ibm deployed shared-disk shared-nothing distributed parallel modes used many world largest commercial companies well supercomputers top 500 list example filesystem asc purple supercomputer composed 12,000 processors 2 petabytes total disk storage spanning 11,000 disks 2015 spectrum scale known ibm general parallel file system gpfs like typical cluster filesystems spectrum scale provides concurrent high-speed file access applications executing multiple nodes clusters used aix 5l clusters linux clusters microsoft windows server heterogeneous cluster aix linux windows nodes addition providing filesystem storage capabilities spectrum scale provides tools management administration spectrum scale cluster allows shared access file systems remote spectrum scale clusters spectrum scale available ibm aix since 1998 linux since 2001 windows server since 2008 spectrum scale known gpfs began tiger shark file system research project ibm almaden research center early 1993 tiger shark initially designed support high throughput multimedia applications design turned well suited scientific computing another ancestor spectrum scale ibm vesta filesystem developed research project ibm thomas j. watson research center 1992 1995 vesta introduced concept file partitioning accommodate needs parallel applications run high-performance multicomputers parallel i/o subsystems partitioning file sequence bytes rather multiple disjoint sequences may accessed parallel partitioning abstracts away number type i/o nodes hosting filesystem allows variety logically partitioned views files regardless physical distribution data within i/o nodes disjoint sequences arranged correspond individual processes parallel application allowing improved scalability vesta commercialized piofs filesystem around 1994 succeeded gpfs around 1998 main difference older newer filesystems gpfs replaced specialized interface offered vesta/piofs standard unix api features support high performance parallel i/o hidden users implemented hood spectrum scale available ibm aix since 1998 linux since 2001 windows server since 2008 spectrum scale offered part ibm system cluster 1350 today spectrum scale used many top 500 supercomputers listed top 500 supercomputing sites web site since inception spectrum scale successfully deployed many commercial applications including digital media grid analytics scalable file services 2010 ibm previewed version gpfs included capability known gpfs-snc snc stands shared nothing cluster officially released gpfs 3.5 december 2012 known fpo features spectrum scale file systems include high availability ability used heterogeneous cluster disaster recovery security dmapi hsm ilm spectrum scale clustered file system breaks file blocks configured size less 1 megabyte distributed across multiple cluster nodes system stores data standard block storage values includes internal raid layer called spectrum scale raid virtualize volumes redundancy parallel access much like raid block storage system also ability replicate across volumes higher file level features architecture include hadoop hdfs filesystem designed store similar greater quantities data commodity hardware — datacenters without raid disks storage area network san compared spectrum scale storage pools allow grouping disks within file system administrator create tiers storage grouping disks based performance locality reliability characteristics example one pool could high-performance fibre channel disks another economical sata storage fileset sub-tree file system namespace provides way partition namespace smaller manageable units filesets provide administrative boundary used set quotas specified policy control initial data placement data migration data single fileset reside one storage pools file data resides migrated based set rules user defined policy two types user defined policies spectrum scale file placement file management file placement policies direct file data files created appropriate storage pool file placement rules selected attributes file name user name fileset file management policies allow file data moved replicated files deleted file management policies used move data one pool another without changing file location directory structure file management policies determined file attributes last access time path name size file spectrum scale policy processing engine scalable run many nodes allows management policies applied single file system billions files complete hours
[ 3599, 2547, 7161, 6431, 3626, 5049, 6117, 759, 6854, 5437, 4375, 6500, 6505, 5457, 460, 1534, 3693, 7976, 4406, 821, 7258, 5130, 1561, 836, 5843, 2313, 6558, 2683, 5859, 5865, 4444, 5518, 6231, 869, 2704, 1605, 174, 2710, 1624, 5900, 44...
Test
4,673
2
Resource_Measurement_Facility:resource measurement facility resource measurement facility rmf performance monitor z/os operating system also collects data long-term performance analysis capacity planning product consists following components rmf significantly enhanced every release z/os operating system – approximately year – enhancements occurring support new hardware new processor models
[ 630, 6856, 6841, 3874 ]
Test
4,674
4
SpywareBlaster:spywareblaster spywareblaster antispyware antiadware program microsoft windows designed block installation activex malware spywareblaster prevents download installation execution spyware adware browser hijackers dialers malicious programs based activex spywareblaster works basis blacklists activating killbit clsid known malware programs effectively preventing infecting protected computer approach differs many anti-spyware programs typically offer user chance scan hard drive computer memory remove unwanted software installed spywareblaster also allows user prevent privacy risks tracking cookies another feature ability restrict actions websites known distributors adware spyware spywareblaster supports several web browsers including internet explorer mozilla firefox google chrome spywareblaster currently distributed freeware non-commercial users
[ 6991, 4759, 5571, 3042, 2642 ]
Test
4,675
2
Urpmi:urpmi urpmi package management tool installing removing updating querying software packages local remote networked media wraps around rpm package manager rpm package manager user suffer often-encountered dependency hell works official sources mandriva unofficial sources penguin liberation front graphical front-end rpmdrake made 2 parts addition now-defunct mandriva linux also used urpmi developed experiment pascal rigaux pixel address rpm install limitations maintained françois pons different mandriva employees currently 2010-2013 maintained thierry vignaud maintainer rpmdrake one co-maintainers drakx installer tools mandriva continued job mageia version used mandriva future products based mageia per øyvind karlsen maintains fork urpmi rosa linux backporting fixes improvements thierry vignaud work version used mandriva business server based mageia
[ 8055, 1621, 5983, 2091, 5200, 3174, 5017, 5545, 1723, 6609, 1260, 5726, 7619, 5912, 3366, 5480, 4778, 1007, 5571, 578, 2034, 4603, 4059, 7092, 2581, 7555, 6743, 3559, 2771, 326, 7108, 2594, 3042, 4441, 1406, 6663, 1684, 952, 4991, 523, ...
Test
4,676
5
RS-449:rs-449 rs-449 specification also known eia-449 tia-449 defines functional mechanical characteristics interface data terminal equipment typically computer data communications equipment typically modem terminal server effort replace rs-232c offering much higher performance longer cable lengths emerged unwieldy system requiring dc-37 de-9 connectors effort eventually abandoned favor rs-530 used single db-25 connector full title standard eia-449 general purpose 37-position 9-position interface data terminal equipment data circuit-terminating equipment employing serial binary data interchange late 1970s eia began developing two new serial data standards replace rs-232 rs-232 number issues limited performance practicality among relatively large voltages used signalling +5 -5v mark space supply +12v power supply typically required made somewhat difficult implement market rapidly dominated +5/0v transistor-transistor logic ttl circuitry even lower-voltage cmos implementations high voltages unbalanced communications also resulted relatively short cable lengths nominally set maximum although practice could somewhat longer running slower speeds reason large voltages due ground voltages rs-232 included protective ground signal ground standard define implemented often case protective ground left unconnected signal ground connected ground ends result slight difference ground potential two ends cable voltage signal ground pin might zero large signal voltages needed provide positive signal case address problem new rs-422 rs-423 standards used well-defined grounding always based sender reference made signal 400 mv reference case rs-422 instance every signal second pin operating opposite voltage thereby balancing voltages always providing positive signal process starting decision made unbundle mechanical aspects standard electrical former becoming rs-449 standards track primary difference rs-422 rs-423 former return line every signal later single shared signal ground meant rs-422 double number signal wires along changes number connections began grow point even rs-423 functionally similar rs-232 longer fit db25 connector led use larger dc-37 even enough pins support rs-422 solved adding additional ground wires separate de-9 connector resulted horrendous number wires conclusion 1983 success ... remains seen standard rarely used although could found network communication equipment eia-449-1 rescinded january 1986 superseded eia/tia-530-a final version eia-449-1 withdrawn september 2002 widespread use rs-422/423 early apple macintosh computers used simple 9-pin din connector inter-machine links used three-wire connectors
[ 7148, 6871, 456, 6879, 2281, 6521, 6976, 3775, 3855, 2644, 1543, 7170, 6531, 1462, 2650, 7637, 2119, 6908, 5492, 7091, 2219, 3383, 3640, 3797, 7916, 2043, 3312, 2057, 3819, 3820, 3821, 768, 7214, 7217, 7765, 4735, 259, 5880, 4101, 3597, ...
Test
4,677
5
Aggregate_Server_Access_Protocol:aggregate server access protocol aggregate server access protocol used reliable server pooling rserpool framework communication
[ 7148, 4568, 456, 6879, 2281, 6521, 6976, 3775, 3855, 2644, 7170, 6531, 1462, 2650, 7637, 2119, 6908, 7091, 3383, 3640, 2219, 3797, 4709, 2043, 4715, 3312, 4720, 2057, 3819, 3820, 3821, 7214, 7217, 7765, 259, 5880 ]
Test
4,678
4
PCKeeper:pckeeper pckeeper advertised optimization services package featuring set software utilities windows os owned essentware s.a. company based bratislava slovakia includes 2 separate products windows pckeeper live pckeeper antivirus pckeeper originally developed zeobit llc founded 2009 slava kolomiychuk pckeeper released september 2010 kromtech alliance acquired pckeeper mackeeper zeobit may 2013 2015 pckeeper changed legal owners kromtech alliance corp. essentware s.a. kromtech alliance made decision focus products mac users essentware s.a. office registered panama principal officers developers company remain ukraine two class action lawsuits filed kromtech mac os version pckeeper mackeeper first lawsuit filed illinois alleges contrary zeobit marketing in-software representations however neither free trial full registered versions mackeeper perform credible diagnostic testing user mac instead zeobit intentionally designed mackeeper invariably ominously report consumer mac needs repair at-risk due harmful errors privacy threats problems regardless computer actual condition second complaint filed holly yencha pennsylvania alleges free starter version mackeeper identifies harmless programs critical problems complaint claims mackeeper reporting algorithm even brand new computers 'critical condition require repair purchasing full version pckeeper live sometimes installed users pcs partner programs cause unwanted pop-up windows pckeeper live offers 13 different pc services 4 categories human assistance find fix geek demand live support security anti-theft data hider shredder files recovery cleaning disk cleaner disk explorer duplicates finder uninstaller optimization context menu manager startup manager pckeeper sometimes advertised pop ads many pop ads occur pornography websites pckeeper live rated good 3.5 5 pcmag editor stating improves pc performance great novice users utility wo n't clean pc well iolo system mechanic considering accessibility wallet friendliness one check kromtech pckeeper live human specialists unique price plans make tune-up utility worthy consideration rival applications offer better pc improvement techradar.pro rates 3 5 stars noted overall pckeeper light-weight tool wo n't annoy pop-up windows consider fact pckeeper live optimization features easily found free tools simply useful price kromtech solution seems unreasonably high kromtech 24/7 support elevates pckeeper live overpriced utility program tool even non-geek use optimize his/her computer pckeeper reviewed wide range tech experts reviewed turkish french portuguese spanish german review pcmag thus described pckeeper live improves pc performance multiple price points advice microsoft-certified computer specialists anti-theft technology gained 3,5 5 points pckeeper antivirus integrates avira secure anti-virus api savapi official interface avira ’ anti-malware scanning engine pckeeper antivirus block malware-hosting url phishing url according virus bulletin pckeeper antivirus pro scored 96.1 rap tests set stability level stable pckeeper antivirus got vb100 award pckeeper antivirus version 1.x received 2 opswat gold certifications antispyware antivirus categories german organization av-test.org tested 25 anti-virus programs testers found ahnlab microsoft windows defender pckeeper antivirus lowest performing anti-virus applications windows 8.1 pcmag rated pckeeper antivirus good 3 5 noting pckeeper antivirus streamlined attractive interface easy use non-techies good score hands-on malware blocking testing however scored poorly independent lab testing chat based support soured fact served misinformation pc mag concluded 'd better panda free antivirus 2015 editors choice free antivirus slightly edged pckeeper tests swept field lab tests high marks across board price pckeeper could bitdefender antivirus plus 2015 kaspersky anti-virus 2015 named editors choice paid antivirus better choice may 2013 pckeeper let customers decide much pay software launching pay want campaign
[ 5571, 3446 ]
Train
4,679
4
Eric_Robi:eric robi eric robi american forensic computer examiner president computer forensic consulting firm university instructor advanced computer forensics eric robi founded federal forensics group 2002 subsequently renamed elluma discovery 2010 reflect expanded range services growth electronic discovery computer forensics marketplace also instructor advanced computer forensics california state university fullerton extended education taught classes computer programming multimedia tools california state university los angeles eric obtained certified computer examiner certification southeast cybercrime institute kennesaw state university 2004 rendered testimony approximately 14 trials nasd arbitration many hearings depositions conducted computer forensic work 250 cases june 2010 eric robi interviewed fox 11 news los angeles computer scareware january 2009 interviewed fox 11 news cell phone spyware may 2009 also interviewed cbs news dallas cell phone spyware technology may 2010
[ 6595, 6488 ]
Validation
4,680
2
ZAP_File:zap file .zap file zero administration package text file allows publishing application user microsoft windows system windows 2000 xp professional windows vista windows 7 professional applications .msi file exist used active directory domains installed using group policy .zap file simple complicated system administrator wishes make two required fields .zap file application name called friendly name setup command line information optional .zap file begins title line consisting word application inside single square brackets underneath come entry fields two required fields friendlyname name setupcommand \\server\share\setupfile also add optional entries displayversion publisher note displayversion publisher require quotation marks around variables simple example .zap file .zap file restricted .msi file rolled back application fails install correctly use elevated privileges install i.e user needs rights install software usually given group policy install first use install separate feature first use many .zap files require user intervention overcome systems administrator creates batch file runs quiet silent install batch file command however running executable file setup.exe often bypasses quiet passive silent installation switches even specified setupcommand addition .zap files run automatically prior user logon instead user must access add/remove programs within windows control panel select add new programs select installation user must access location .zap file located access location setup files locations different otherwise able install application .zap files assigned computers must published users therefore user moves another computer even temporarily install application machine whether program finally .zap files automatically uninstall user longer requires software instead software remains installed machine permanently unlike .msi installation set uninstall computer removed relevant ou creating .zap file placing accessible share usually creating active directory group access location systems administrator needs create group policy object open editing screen select user configuration software settings software installation create new package location .zap file since gpos default .msi system admin needs ensure search .zap files instead .msi files accepting new package assigning gpo relevant organizational unit ou publish application user need reload group policy server manages gpo done either logging running gpupdate command line
[ 644, 4759 ]
Validation
4,681
5
LAPDm:lapdm lapdm data link layer protocol used gsm cellular networks lapdm forms layer 2 um interface base transceiver station mobile station say used radio link cellular network subscriber handset lapdm derived much older link layer protocol called hdlc specified 3gpp specifications ts 04.05 ts 04.06 lapdm similar isdn layer 2 lapd simplifications another important difference lapdm lapd establishment contention resolution procedure gsm 04.06 section 5.4.1.4 wherein ms sends l3 message information field sabm frame echoed back bts corresponding ua frame procedure required lapdm possibility handset accidentally attempting use wrong channel lapd require contention resolution since hard-wired isdn devices accidentally use wrong channel associated control procedure used layer 2 iden rf interface similar lapdm
[]
Test
4,682
8
SOAP_with_Attachments:soap attachments soap attachments swa mime web services use web services send receive files combination soap mime primarily http note swa new specification rather mechanism using existing soap mime facilities perfect transmission files using web services invocations swa w3c note submitted proposal adopted w3c instead mtom w3c recommendation handling binary data soap messages release soap 1.2 additionally note soap 1.2 attachment feature published
[ 3345, 1468, 7315, 84, 87 ]
Test
4,683
5
Licklider_Transmission_Protocol:licklider transmission protocol licklider transmission protocol point point protocol use deep space links ltp commonly seen standard underlying convergence layer protocol bundle protocol rfc 5050 supporting wide selection networks ltp named honor american computer scientist joseph carl robnett licklider ltp designed run directly data link layer e.g aos also run user datagram protocol udp e.g used sensor network private network bandwidth contestation ’ issue software debug purposes therefore address issues like routing congestion control originally designed support “ long-haul ” transmission interplanetary network design based experiences ccsds file delivery protocol cfdp developed space communication features application divides data send two parts either part may size 0 ltp engine stores data queue checks whether link towards destination available starts transmission link available data remains queue transmission starts soon so-called “ link state cue ” arrives either underlying link layer management information base given red data send last segment red data marked “ end red data ” flag timer started segment absent green data send “ end block ” flag set otherwise green data transmitted last segment part gets marked “ end block ” flag receiver issues report segment sender received “ end red data ” segment data complete report segment transmitted timer started upon arrival report segment sender cancels timer queues report-acknowledgement receiver informs application red data successfully transmitted receiver receives report-acknowledgement cancels timer transmission red data completed transmission completed “ end block ” segment arrived two reference implementations ltp
[ 7148, 456, 6879, 2281, 6521, 6976, 3775, 3855, 2644, 7170, 6531, 1462, 2650, 7637, 2119, 6908, 7091, 3383, 3640, 2219, 3797, 2043, 3312, 2057, 3819, 3820, 3821, 7214, 7217, 7765, 259, 5880 ]
Validation
4,684
4
Replay_4:replay 4 replay 4 proprietary backup disaster recovery software windows application servers developed appassure software released september 9 2009 replay 4 uses image-based approach backup taking snapshot moment time provides application integration mission-critical microsoft applications including microsoft exchange sql sharepoint hyper-v. replay 4 also supports windows small business servers domain controllers file servers web servers blackberry enterprise servers replay 4 provides support advanced features block level snapshots incremental forever data capture integrated data deduplication bare-metal restore dissimilar hardware failover virtual machines offsite cloud recovery etc latest version adds ability replicate data off-site storage also incorporates new technology data deduplication replay 4 named 2009 backup disaster recovery software product year storage magazine february 2010 may 2010 replay 4 named new server software product year 8th annual american business awards
[ 1544, 5516, 2390, 2885, 5571, 4554, 6731 ]
Test