node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
5,185
4
John_Herivel:john herivel john william jamieson herivel 29 august 1918 – 18 january 2011 british science historian former world war ii codebreaker bletchley park codebreaker concerned cryptanalysis enigma herivel remembered chiefly discovery soon dubbed herivel tip herivelismus herivelismus consisted idea herivel tip m...
[ 6372, 1641, 3241, 1353, 5185, 5796 ]
Validation
5,186
4
TIMEnavigator:timenavigator atempo time navigator also known tina backup recovery solution atempo major unix linux windows mac os platforms supported
[ 2390, 1254 ]
Test
5,187
4
Carbanak:carbanak carbanak apt-style campaign targeting limited financial institutions claimed discovered 2014 russian/uk cyber crime company kaspersky lab said used steal money banks microsoft windows malware said introduced targets via phishing emails hacker group said stolen 900 million dollars 140 billion dollars r...
[ 704, 5452, 4025, 7328, 1528, 4759, 2991, 7799, 7066, 376, 1173, 6526, 998, 3528, 3277, 2923, 7818, 5922, 3864, 6628, 6904, 1376, 6541, 6194, 1383, 2854, 3875, 7600, 2587, 2678, 3038, 4531, 2054, 600, 1307, 3047, 6569, 2693, 1043, 3323, ...
Test
5,188
7
GlobalEnglish:globalenglish globalenglish corporation american technology company founded 1997 reece duca stephen patrick martin rice used owned pearson plc bought back management globalenglish provides on-demand enterprise solutions support global business performance effective business english communication company h...
[ 330 ]
Test
5,189
4
Icy_(application):icy application icy discontinued package manager jailbroken iphone ipod touch originally created maintained ripdev allows users browse download mobile apps range sources apps available download free requiring purchase downloading including software created ripdev kate apps downloaded directly iphone i...
[ 6788, 3940, 3612, 4320, 4690, 734, 6125, 2954, 1123, 6847, 6142, 2609, 1895, 5091, 4749, 7601, 3342, 2284, 1940, 2300, 3025, 2665, 2327, 6565, 2331, 3050, 4820, 6582, 1234, 889, 2368, 552, 7335, 3445, 3107, 5571, 5579, 1654, 1656, 1657, ...
Validation
5,190
3
Machine_code:machine code machine code computer program written machine language instructions executed directly computer central processing unit cpu instruction causes cpu perform specific task load store jump alu operation one units data cpu registers memory machine code strictly numerical language intended run fast p...
[ 3930, 708, 5012, 4662, 6078, 6079, 1445, 7515, 3944, 6428, 3623, 7533, 5381, 7541, 2567, 3966, 1102, 1854, 4703, 4705, 5055, 7557, 6118, 410, 5771, 421, 4361, 4003, 2251, 74, 4009, 6497, 6498, 6159, 6507, 1908, 2630, 458, 2633, 4397, 51...
Test
5,191
2
Uniform_Type_Identifier:uniform type identifier uniform type identifier uti text string used software provided apple inc. uniquely identify given class type item apple provides built-in utis identify common system objects – document image file types folders application bundles streaming data clipping data movie data – ...
[ 7517, 3940, 713, 4690, 734, 2214, 405, 6832, 3989, 2597, 3322, 1502, 7584, 5786, 4740, 1897, 6505, 2627, 7609, 1171, 5109, 2284, 1178, 6188, 1187, 1562, 6909, 6548, 1955, 502, 6557, 2679, 510, 6565, 2329, 6221, 3050, 163, 6582, 169, 553...
Train
5,192
6
Archivemount:archivemount archivemount fuse-based file system unix variants including linux purpose mount archives e.g tar tar.gz etc mount point read written file system makes accessing contents archive may compressed transparent programs without decompressing
[ 8092, 1435, 5571 ]
Test
5,193
4
Black_bag_operation:black bag operation black bag operations black bag jobs covert clandestine entries structures obtain information human intelligence operations usually entails breaking entering denied areas tactics techniques procedures associated black bag operations lock picking safe cracking key impressions finge...
[ 4184, 1071, 104 ]
Test
5,194
4
Cain_and_Abel_(software):cain abel software cain abel often abbreviated cain password recovery tool microsoft windows recover many kinds passwords using methods network packet sniffing cracking various password hashes using methods dictionary attacks brute force cryptanalysis attacks cryptanalysis attacks done via rain...
[ 5272, 4759, 2823, 7715, 1928, 7626, 7170, 3700, 7534, 726, 5571, 2408, 7207, 3486, 6574, 1593, 2337, 6157, 7868, 4746, 4208 ]
Test
5,195
2
Asus_Zen_UI:asus zen ui asus zen ui stylized asus zenui front-end touch interface developed asus partners featuring full touch user interface current version zenui 6 zenui used asus android phones tablet computers available licensing external parties zenui also comes asus-made apps preloaded like zenlink pc link share ...
[ 3933, 5372, 6427, 1095, 740, 4340, 42, 3310, 2591, 5771, 5775, 7956, 5473, 474, 6183, 822, 136, 6209, 1582, 6937, 6232, 4116, 2003, 195, 6978, 7346, 561, 201, 2017, 5919, 7357, 5571, 2398, 2037, 2756, 7007, 7749, 2417, 2054, 3816, 2788,...
Validation
5,196
4
Kaō:kaō kaō huāyā stylized signature mark used east asia place true signature kaō first appeared china tang dynasty began used japan heian period though use became far less widespread edo period continue used even contemporary politicians famous people reading identification individual kaō often requires specialist kno...
[ 6672 ]
Test
5,197
2
LinuxLive_USB_Creator:linuxlive usb creator linuxlive usb creator free microsoft windows program creates live usb systems installed images supported linux distributions
[ 6549, 4496, 3626, 4759, 5129, 5571, 2728, 4207, 3271, 3738 ]
Test
5,198
4
Offline_private_key_protocol:offline private key protocol offline private key protocol opkp cryptographic protocol prevent unauthorized access back archive data protocol results public key used encrypt data offline private key later used decrypt data protocol based three rules regarding key offline private key comply r...
[ 5199, 2390 ]
Test
5,199
4
Offline_private_key:offline private key offline private key cryptographic key stored network-connected medium key used decrypt archive backup data key result offline private key protocol printed form key trusted paper key
[ 5198, 2390 ]
Test
5,200
2
Source_Mage:source mage source mage linux distribution package installed source code automatically downloaded compiled installed source mage descended sorcerer source mage name suggests source-based linux distribution instead delivering binaries users source code compiled method allows greater control software precompi...
[ 361, 2179, 6789, 5017, 2187, 2909, 5724, 5726, 6086, 4675, 7894, 2935, 6453, 2581, 7555, 2585, 2228, 1487, 2594, 58, 3996, 7587, 4008, 1893, 781, 7954, 5092, 1909, 6884, 7969, 7619, 6175, 7251, 4400, 7253, 3696, 474, 1179, 3366, 7635, 6...
Test
5,201
4
Vulnerability_Discovery_Model:vulnerability discovery model vulnerability discovery model vdm uses discovery event data software reliability models predicting thorough presentation vdm techniques available numerous model implementations available mcmcbayes open source repository several vdm examples include
[ 2513, 429, 3932, 1805 ]
Test
5,202
4
Khalil_Sehnaoui:khalil sehnaoui khalil sehnaoui belgian-lebanese information security consultant specialises middle-east founder managing partner beirut-based krypton security also member chaos computer club ccc europe largest association hackers co-founded managing partner security firm krypton security helps test com...
[ 2566, 1651, 3486, 1805 ]
Validation
5,203
9
Array_access_analysis:array access analysis computer science array access analysis compiler analysis used decide read write access patterns elements portions arrays major data type manipulated scientific programs array define/use analysis whole array insufficient aggressive compiler optimizations auto parallelization a...
[ 5082, 2460, 1854 ]
Train
5,204
5
Light_(web_browser):light web browser light formerly known firefox light free open-source web browser based firefox light available windows os x linux operating systems differs firefox built performance achieves removing several firefox built components including crash reporter safe browsing spell checker development t...
[ 6368, 4759, 5571, 84, 578 ]
Test
5,205
4
Byzantine_Foothold:byzantine foothold byzantine foothold unclassified code name related united states department defense effort within larger cyber initiative framework specifically aimed curbing preventing foreign intrusions computer networks us federal agencies said threat related ongoing efforts chinese hackers peop...
[ 5444, 3575 ]
Validation
5,206
8
Mongrel2:mongrel2 mongrel2 open-source language agnostic web server written zed shaw successor shaw mongrel server server supports http flash xmlsockets websockets long polling connections mongrel2 described language agnostic meaning prefer specific programming language another server documentation says shaw began work...
[ 3168, 5369, 1349, 5820, 5214, 2646, 6270, 1834, 2291, 8182, 6536, 26, 5571, 7544, 7988, 4701, 1392, 7786, 417, 3135, 2506, 1686, 3408, 3915, 1602, 6061, 7411, 7952, 1435, 2807 ]
Validation
5,207
2
Interpreter_directive:interpreter directive interpreter directive computer language construct systems better described aspect system executable file format used control interpreter parses interprets instructions computer program unix linux unix-like operating systems first two bytes file characters constitute magic num...
[ 6017, 1047, 1524, 5571, 8142, 6778, 7246, 6016, 578 ]
Test
5,208
3
PIC_microcontrollers:pic microcontrollers pic usually pronounced pick family microcontrollers made microchip technology derived pic1650 originally developed general instrument microelectronics division name pic initially referred peripheral interface controller currently expanded programmable intelligent computer first...
[ 2903, 708, 5012, 6074, 7519, 7533, 7541, 7905, 4336, 5055, 1867, 7569, 5423, 7581, 5079, 771, 4365, 4368, 4370, 4372, 6865, 7960, 5804, 804, 2997, 809, 3365, 1556, 7990, 7654, 6919, 6583, 1237, 536, 4846, 551, 5208, 5917, 7730, 2036, 62...
Test
5,209
1
Concurrency_control:concurrency control information technology computer science especially fields computer programming operating systems multiprocessors databases concurrency control ensures correct results concurrent operations generated getting results quickly possible computer systems software hardware consist modul...
[ 1449, 3951, 6430, 4318, 740, 6462, 1861, 6128, 7205, 5419, 2961, 7213, 6144, 1891, 4010, 5447, 784, 2265, 7248, 3005, 3011, 6543, 4798, 3041, 517, 7303, 4457, 6593, 7322, 1254, 1624, 5209, 7715, 3776, 5580, 927, 3801, 4159, 2411, 2767, ...
Test
5,210
3
Seqlock:seqlock seqlock short sequential lock special locking mechanism used linux supporting fast writes shared variables two parallel operating system routines semantics stabilized version 2.5.59 present 2.6.x stable kernel series seqlocks developed stephen hemminger originally called frlocks based earlier work andre...
[ 5580, 5571, 578 ]
Test
5,211
2
Can4linux:can4linux can4linux open source linux-kernel device driver development started mid 1990s philips 82c200 controller stand alone chip isa board at-can-mini 1995 first version created use bus linux laboratory automation project linux lab project fu berlin increasing spread field bus technology automation especia...
[ 3755 ]
Test
5,212
4
Mixed_threat_attack:mixed threat attack mixed threat attack attack uses different tactics infiltrate computer user environment mixed threat attack might include infected file comes way spam received way internet download mixed threat attacks generally try exploit multiple vulnerabilities get system launching multiple d...
[ 429 ]
Test
5,213
2
List_of_Windows_10_Mobile_devices:list windows 10 mobile devices list devices coming natively microsoft windows 10 mobile operating system list also includes devices running two additional flavours windows 10 mobile devices windows 10 mobile enterprise windows 10 iot mobile enterprise devices come sd card support proce...
[ 3076, 8054, 6874, 4759, 3263, 7247, 7619, 8076, 5563, 8085, 306, 4697, 6110, 3028, 6294, 7660, 7848, 8118, 1977, 432, 6054, 7682, 5442 ]
Validation
5,214
8
Boa_(web_server):boa web server boa discontinued since 2005 open-source small-footprint web server suitable embedded applications originally written paul phillips previously maintained larry doolittle jon nelson slashdot fotolog use boa serve images january 2006 boa following limitations
[ 3168, 5369, 1349, 5206, 5820, 2646, 6270, 1834, 2291, 8182, 6536, 26, 5571, 7544, 7988, 4701, 1392, 7786, 417, 3135, 2506, 1686, 3408, 3915, 1602, 6061, 7411, 7952, 1435, 2807 ]
Validation
5,215
4
Forensic_corporate_collections:forensic corporate collections forensic corporate collections refer type debt collection recovery tactics apply computer forensics scientific knowledge debt collection process engaging consistently updated computer software debt collection process forensic corporate collection agencies ab...
[ 6488 ]
Test
5,216
2
UNIX_System_III:unix system iii unix system iii system 3 discontinued version unix operating system released unix support group usg announced system iii late 1981 first released outside bell labs 1982 unix system iii mix various unixes version 7 unix pwb/unix 2.0 cb unix 3.0 unix/rt unix/32v system iii supported dec pd...
[ 5268, 1522, 4751, 4478, 900, 2467, 6267, 5481, 2294, 5571, 2300, 2118, 6360, 578, 6367, 4068, 1493, 8117, 4447, 6577, 5964, 6583, 5348, 1426, 443 ]
Test
5,217
7
Database-centric_architecture:database-centric architecture database-centric architecture data-centric architecture several distinct meanings generally relating software architectures databases play crucial role often description meant contrast design alternative approach example characterization architecture database-...
[ 1710, 1905, 5014, 6604, 7330, 7341, 1730, 3951, 3776, 6345, 5561, 906, 3531, 6098, 5571, 4054, 1102, 2663, 6636, 2124, 6737, 6739, 3119, 3801, 7999, 4159, 5943, 2054, 6932, 6386, 684, 6390, 7937, 7213, 7303, 6144, 4457, 6320, 1902, 5447, ...
Test
5,218
9
Translator_(computing):translator computing translator programming language processor generic term could refer compiler assembler interpreter anything converts code one language another include translations high-level human-readable computer languages c++ java intermediate-level languages java bytecode low-level langua...
[ 5012, 1718, 6982, 1361, 6002, 3623, 572, 1854, 6118, 4525, 7474, 2420, 5771, 6567, 336, 4361, 5429, 5606, 8137, 6778, 6498, 1990, 5008, 5190 ]
Test
5,219
3
Tickless_kernel:tickless kernel tickless kernel operating system kernel timer interrupts occur regular intervals delivered required linux kernel s390 2.6.6 i386 release 2.6.21 configured turn timer tick tickless dynamic tick idle cpus using codice_1 3.10 codice_2 extended non-idle processors codice_3 xnu kernel mac os ...
[ 3751, 2332, 5571 ]
Test
5,220
4
Anomaly_Detection_at_Multiple_Scales:anomaly detection multiple scales anomaly detection multiple scales adams 35 million darpa project designed identify patterns anomalies large data sets darpa information innovation office began 2011 project intended detect prevent insider threats soldier good mental health becoming ...
[ 429, 8012, 5113 ]
Test
5,221
4
Astalavista.box.sk:astalavista.box.sk astalavista.box.sk founded 1994 one first search engines computer security information practice turned used search engine security exploits software hacking cracking different keygenerators software cracks site also known referencing things spyware viruses website known possibly co...
[ 5401, 3486, 1805 ]
Test
5,222
9
CS-4_(programming_language):cs-4 programming language cs-4 programming language operating system interface developed early 1970s intermetrics cambridge massachusetts first published manual released december 1973 entitled cs-4 language reference manual operating system interface document three parts cs-4 base language c...
[]
Test
5,223
4
Open_Vulnerability_and_Assessment_Language:open vulnerability assessment language open vulnerability assessment language oval international information security community standard promote open publicly available security content standardize transfer information across entire spectrum security tools services oval includ...
[ 2185, 2891 ]
Validation
5,224
9
Divergence_(computer_science):divergence computer science computer science computation said diverge terminate terminates unobservable exceptional state otherwise said converge domains computations expected infinite process calculi computation said diverge fails productive always produces action within finite amount tim...
[ 1348, 5224 ]
Test
5,225
3
MMIX:mmix mmix pronounced em-mix 64-bit reduced instruction set computing risc architecture designed donald knuth significant contributions john l. hennessy contributed design mips architecture richard l. sites architect alpha architecture knuth said mmix computer intended illustrate machine-level aspects programming b...
[ 622, 5893, 1252, 7533, 7541, 578, 5055, 2226, 4254, 3557, 6922, 3219, 2266, 154, 1880, 336, 5962, 7777, 1435 ]
Validation
5,226
4
GadgetTrak:gadgettrak gadgettrak company based portland oregon develops theft recovery data protection software name company founded february 2007 ken westin launch first theft recovery product usb mass storage devices tracked stolen devices including ipods flash drives digital cameras devices connected computer compan...
[ 4759, 5571, 578 ]
Test
5,227
4
MSAV:msav microsoft anti-virus msav antivirus program introduced microsoft ms-dos operating system program first appeared ms-dos version 6.0 last appeared ms-dos 6.22 first version antivirus program basic inbuilt update facility updates obtained bbs manually installed user could scan 1,234 different viruses microsoft a...
[ 1620, 1721, 3962, 2746, 5571, 3551, 7564, 6380, 6762, 2784, 7867, 4645 ]
Test
5,228
8
DataNucleus:datanucleus datanucleus formerly known java persistent objects jpox open source project apache 2 license provides software products around data management java datanucleus project started 2008 jpox project started 2003 relaunched datanucleus 2008 broader scope datanucleus access platform fully compliant imp...
[ 4185, 840, 2180, 5455, 7037, 7109, 2660, 3542, 6594, 2623 ]
Test
5,229
4
KidGuard:kidguard kidguard parental monitoring application ios android mobile phones application uses proprietary software help parents monitor children ’ text messages browser history social media activity stored videos photos emails phone gps location kidguard developed los angeles-based team officially released 2016...
[ 330, 5571 ]
Train
5,230
2
Opaque_binary_blob:opaque binary blob opaque binary blob obb term used network engineering computer science refer sizeable piece data looks like binary garbage outside entities know blob denotes carries make sense entities access permission access functions also pejorative term compiled code without source code made av...
[ 1361, 1864, 1435, 5571 ]
Test
5,231
4
HoneyMonkey:honeymonkey honeymonkey short strider honeymonkey exploit detection system microsoft research honeypot implementation uses network computers crawl world wide web searching websites use browser exploits install malware honeymonkey computer snapshot memory executables registry honeypot computer recorded crawl...
[ 4135, 4159, 5571, 80, 2772, 1649, 84, 4858 ]
Validation
5,232
3
Monolithic_kernel:monolithic kernel monolithic kernel operating system architecture entire operating system working kernel space monolithic model differs operating system architectures microkernel architecture alone defines high-level virtual interface computer hardware set primitives system calls implement operating s...
[ 4291, 4297, 4300, 2909, 5724, 13, 7172, 2933, 2935, 42, 4347, 58, 65, 5783, 1521, 1522, 7242, 4397, 7251, 4400, 126, 3023, 4423, 1574, 3041, 4441, 5865, 4453, 7325, 190, 1629, 204, 4496, 1648, 7378, 1663, 1668, 4534, 7396, 5962, 4549, ...
Test
5,233
2
NTLMSSP:ntlmssp ntlmssp nt lan manager ntlm security support provider binary messaging protocol used microsoft security support provider interface sspi facilitate ntlm challenge-response authentication negotiate integrity confidentiality options ntlmssp used wherever sspi authentication used including server message bl...
[ 1460, 3135 ]
Test
5,234
9
QBasic:qbasic qbasic short form quick beginners purpose symbolic instruction code integrated development environment interpreter variety basic programming languages based quickbasic code entered ide integrated development environment compiled intermediate representation ir ir immediately interpreted demand within ide r...
[ 4291, 1812, 4296, 5367, 12, 6088, 2925, 7906, 4697, 2941, 3303, 53, 61, 425, 4003, 5784, 1140, 4012, 4745, 447, 6507, 4387, 4759, 7246, 7619, 7621, 7971, 2283, 2999, 6891, 5480, 5129, 6907, 5137, 5138, 7272, 1213, 2341, 5877, 7308, 4464...
Test
5,235
9
The_Computer_Language_Benchmarks_Game:computer language benchmarks game computer language benchmarks game formerly called great computer language shootout free software project comparing given subset simple algorithms implemented various popular programming languages project consists due resource constraints small subs...
[ 2740, 5983, 1445, 3219, 3753, 7848, 3879 ]
Test
5,236
2
List_of_open-source_mobile_phones:list open-source mobile phones list mobile phones open-source operating systems available mobile phones proprietary baseband chip gsm module open-source baseband project osmocombb project based illicit leaked source code calypso modem called freecalypso android-based devices appear lis...
[ 1066, 2538, 3933, 2, 5718, 6788, 3081, 6515, 2187, 1167, 289, 3524, 4400, 3097, 474, 4317, 2564, 7049, 5391, 2300, 5486, 6443, 5579, 1284, 740, 1202, 1108, 1957, 7919, 5062, 1399, 3039, 1582, 5068, 2503, 2240, 3734, 424, 1973, 7030, 233...
Validation
5,237
8
Optimizely:optimizely optimizely american company makes customer experience optimization software companies optimizely platform technology provides a/b testing tools two versions web page compared performance multivariate testing optimizely also enables personalization may used making data-driven decisions personalizat...
[ 7037, 330, 5237, 479 ]
Validation
5,238
2
Outline_of_iOS:outline ios following outline provided overview topical guide ios ios – mobile operating system developed distributed apple inc originally released 2007 iphone ipod touch since extended support apple devices ipad apple tv unlike windows ce mobile phone android apple license ios installation non-apple har...
[ 6788, 3940, 7890, 4320, 2926, 4690, 734, 5752, 6125, 2954, 1123, 6847, 6142, 1895, 4749, 7601, 2284, 1940, 2300, 3025, 2665, 1582, 2327, 6565, 2331, 3050, 4820, 1599, 6582, 1234, 5189, 889, 6971, 552, 7335, 3445, 3107, 5579, 1654, 1656, ...
Test
5,239
3
Paxos_(computer_science):paxos computer science paxos family protocols solving consensus network unreliable processors processors may fail consensus process agreeing one result among group participants problem becomes difficult participants communication medium may experience failures consensus protocols basis state ma...
[ 1906, 5455, 5106, 5476, 3101, 1550, 3542, 43, 5408, 5602, 8124, 2359, 2701, 86, 2536 ]
Train
5,240
5
LysKOM:lyskom lyskom kom-based conferencing system developed lysator academic computer society linköping university linköping institute technology seen cross news e-mail presence speed irc im-networks common client lyskom emacs lisp client among others www-based client also exists server clients released terms gnu gene...
[ 5983, 5965, 2281, 2600 ]
Test
5,241
3
XLink_Kai:xlink kai xlink kai method developed team-xlink online play video games support lan multiplayer modes enables players nintendo gamecube nintendo switch playstation 2 playstation 3 playstation 4 playstation portable playstation vita xbox xbox 360 xbox one play games across internet using network configuration ...
[ 7534, 5876, 4759, 6879, 5571, 5488, 578, 7049 ]
Test
5,242
4
Data_Security_Council_of_India:data security council india data security council india dsci premier industry body data protection india setup nasscom® committed making cyberspace safe secure trusted establishing best practices standards initiatives cyber security privacy dsci brings together national governments agenci...
[ 1613, 1805 ]
Test
5,243
3
Pipeline_stall:pipeline stall design pipelined computer processors pipeline stall delay execution instruction order resolve hazard decoding stage control unit determine decoded instruction reads register instruction currently execution stage writes condition holds control unit stall instruction one clock cycle also sta...
[ 5012, 1447, 5371, 3948, 7527, 7529, 7533, 5737, 2567, 4694, 5042, 1854, 1481, 5055, 2226, 1867, 2248, 6148, 441, 2266, 4047, 5483, 1556, 5487, 1947, 6198, 1568, 1570, 6922, 7666, 515, 8024, 5521, 3747, 1237, 6236, 534, 2351, 7314, 1252, ...
Validation
5,244
2
CP/CMS:cp/cms cp/cms control program/cambridge monitor system discontinued time-sharing operating system late 60s early 70s known excellent performance advanced features three distinct versions implementation substantial redesign predecessor evolutionary step forward cp-67/cms first widely available virtual machine arc...
[ 4293, 4295, 2182, 4670, 5021, 13, 3271, 3626, 5041, 7546, 5396, 7550, 402, 405, 3978, 5064, 65, 6849, 4366, 5783, 5088, 6500, 785, 1516, 2266, 788, 1522, 7605, 4759, 6518, 4397, 5116, 1547, 2300, 4786, 839, 4428, 6922, 850, 5161, 5865, ...
Test
5,245
3
Model-specific_register:model-specific register model-specific register msr various control registers x86 instruction set used debugging program execution tracing computer performance monitoring toggling certain cpu features introduction 80386 processor intel began introducing experimental features would necessarily pr...
[ 4845, 2989, 5988, 352, 4810, 1335, 2014 ]
Test
5,246
2
Usage_share_of_desktop_operating_systems:usage share desktop operating systems usage share desktop operating systems percentage operating systems os used computers approximately market share so-called retronym desktop operating system also run e.g laptops originally computers running operating systems desktop computers...
[ 1522, 7325, 7605, 280, 2818, 4759, 190, 4670, 5021, 8066, 8167, 4397, 13, 5644, 3271, 5116, 6984, 299, 3626, 7142, 5571, 2300, 5041, 7827, 4786, 578, 7550, 4244, 5232, 1992, 405, 6367, 6922, 8115, 1582, 5161, 5865, 7396, 65, 861, 5962, ...
Train
5,247
9
Trace_tree:trace tree trace tree data structure used runtime compilation programming code trace trees used type 'just time compiler traces code executing hotspots compiles hotspots entered compiled code run instead traces statement executed including within function calls entire execution path compiled different compil...
[ 1854 ]
Test
5,248
1
DBIx::Class:dbix :class dbix :class often abbreviated dbic object-relational mapper perl used map relational database table rows perl objects generates sql queries transparently application developer also implements active record pattern popular web application frameworks catalyst dancer
[ 3683, 5983, 2180, 1277, 3106, 2660, 3031, 6462, 5416, 8122, 8029, 1598, 6233, 6594, 2713 ]
Validation
5,249
4
Elie_Bursztein:elie bursztein elie bursztein born 1 june 1980 leads anti-abuse research team google best known research anti-fraud abuse novel attacks web service video games work applied cryptography prior google bursztein post-doctoral fellow computer science stanford university focused captchas security usability el...
[ 4176, 1805 ]
Test
5,250
2
Moused:moused moused mouse daemon freebsd systems works console driver support mouse operations text console user programs first appeared freebsd 2.2 currently located codice_1 mouse daemon listens mouse port default codice_2 supplies mouse data virtual mouse driver sysmouse 4 user process wants use mouse simply opens ...
[ 1523, 1341, 1254, 7514, 191, 6711, 1356, 1547, 4498, 7355, 481, 3457, 732, 2300, 6278, 8194, 8096, 1193, 1013, 3636, 4059, 8001, 6918, 5760, 6211, 3986, 4806, 5065, 594, 4441, 5865, 4534, 6477, 424, 2512, 1315, 1133, 689, 6149, 1793, 21...
Test
5,251
4
Group-IB:group-ib group-ib develops software hardware proactive cyber defence 2015 gartner agency included group-ib top 7 global vendors threat intelligence 2017 company became leader russia threat intelligence security services market analysis conducted idc became one top-5 threat intelligence vendors forrester vendor...
[ 1710, 1505, 7106, 3480, 2727, 2893, 3498, 3875, 8014, 5187, 6043 ]
Test
5,252
1
Microsoft_Access:microsoft access microsoft access database management system dbms microsoft combines relational microsoft jet database engine graphical user interface software-development tools member microsoft office suite applications included professional higher editions sold separately microsoft access stores data...
[ 3255, 367, 4306, 3961, 5736, 3280, 4697, 3975, 6462, 1861, 3307, 53, 425, 7579, 6141, 7213, 7215, 6144, 6495, 4014, 7227, 1902, 448, 1526, 4759, 7618, 7619, 7248, 7621, 7971, 2283, 7978, 5852, 519, 2341, 5882, 8045, 5898, 7715, 3776, 80...
Test
5,253
2
Visual_Basic_Extension:visual basic extension computer programming visual basic extension commonly abbreviated vbx custom control component model used microsoft visual basic versions 1.0 3.0 still supported 16-bit version version 4.0 made obsolete ocxs vbx also supported first 16-bit version borland delphi vbx specific...
[ 3772 ]
Test
5,254
4
Forensic_Toolkit:forensic toolkit forensic toolkit ftk computer forensics software made accessdata scans hard drive looking various information example locate deleted emails scan disk text strings use password dictionary crack encryption toolkit also includes standalone disk imaging program called ftk imager tool saves...
[ 1715, 5272, 1254, 4759, 3517, 3179, 2195, 5561, 4316, 907, 3700, 7825, 5571, 7181, 6020, 1756, 5150, 4523, 7105, 3823, 6488, 8148 ]
Test
5,255
4
Committee_on_National_Security_Systems:committee national security systems committee national security systems cnss united states intergovernmental organization sets policy security us security systems national security telecommunications information systems security committee nstissc established national security dire...
[ 2513, 3932, 690, 6189, 5166, 4036, 943, 7090, 221, 1805 ]
Test
5,256
6
WinAce:winace winace archiving program windows ace compressed archive format built-in support common archive formats types zip rar cab also offer freeware free software command-line interface decompression including listing testing program called unace macos linux beginning version 2.65 winace bundled whenu savenow adw...
[ 4213, 7058, 985, 4759, 1352, 6992, 5571, 658, 578, 4700, 1955, 7746, 3032, 7201, 7387, 3219, 510, 8126, 1127, 2334, 6940, 4732, 3152, 169, 1139, 5349, 4461, 2897, 619 ]
Test
5,257
4
XSA:xsa computer science xsa better known cross-server attack networking security intrusion method allows malicious client compromise security website service server using implemented services server may secure general xsa demonstrated websites yet sometimes used conjunction services located server xsa method allows ma...
[ 6029 ]
Test
5,258
7
ZipBooks:zipbooks zipbooks accounting software company based american fork utah produces software name zipbooks founded tim chaves june 2015 backed venture capital firm peak ventures company secured additional 2 million funding july 2016 2017 awarded 100,000 economic grant utah governor office economic development tech...
[ 3668, 7766, 7332, 5571, 696, 1165, 330 ]
Train
5,259
2
CRUX:crux crux lightweight x86-64-optimized linux distribution targeted experienced linux users delivered tar.gz-based package system bsd-style initscripts based linux distribution also utilizes ports system install upgrade applications although crux latin word cross choice name crux meaning per lidén chose sounded coo...
[ 2179, 2187, 2909, 5724, 6086, 2193, 7894, 2935, 6453, 2585, 2228, 1487, 58, 3996, 7587, 4008, 1893, 7954, 1909, 6884, 7969, 7246, 6175, 7251, 4400, 7253, 3696, 474, 1179, 3012, 7635, 6902, 2297, 1941, 3023, 6549, 1960, 6209, 2680, 4435, ...
Train
5,260
9
Real-time_Cmix:real-time cmix real-time cmix rtcmix one music-n family computer music programming languages rtcmix descended mix program developed paul lansky princeton university 1978 perform algorithmic composition using digital audio soundfiles ibm 3031 mainframe computer synthesis functions added program renamed cm...
[ 6245, 5282, 4853, 7637, 3534, 578, 6287, 2592, 5420, 5266, 263, 6408, 1435, 5450 ]
Validation
5,261
3
Intel_8253:intel 8253 intel 8253 8254 programmable interval timers pits perform timing counting functions using three 16-bit counters 825x family primarily designed intel 8080/8085-processors later used x86 compatible systems 825x chips equivalent circuit embedded larger chip found ibm pc compatibles pc compatibles tim...
[ 4137, 3741, 6872, 2023, 6380, 1237, 4277, 352 ]
Test
5,262
4
Scott_Vanstone:scott vanstone scott a. vanstone mathematician cryptographer university waterloo faculty mathematics member school centre applied cryptographic research also founder cybersecurity company certicom received phd 1974 university waterloo decade worked principally combinatorial design theory finite geometry ...
[ 1455, 6049, 1821, 1243 ]
Test
5,263
9
Mozilla_Raindrop:mozilla raindrop raindrop messaging application building apache couchdb used web interface raindrop works collecting messages currently emails tweets available addons storing json optionally attachments couchdb served users couchdb webserver users view web browsers december 2009 prototype testers offic...
[ 1152, 4755, 893, 5549, 7975, 6802, 562, 5571, 1190, 3548, 6368, 6458, 7015, 2049, 5506, 4352, 7028, 340, 5699, 3915, 7587, 5887, 445, 4287 ]
Train
5,264
2
Services_menu:services menu services menu simply services user interface element computer operating system services programs accept input user selection process optionally put result back clipboard concept originated nextstep operating system carried macos gnustep similar features emulated operating systems apple adver...
[ 405, 6272, 2627, 6295, 5571, 5787, 5931, 2379, 5450 ]
Test
5,265
3
PowerBook_500_series:powerbook 500 series powerbook 500 series codenamed blackbird shared older macintosh iifx range apple macintosh powerbook portable computers first introduced apple computer 540c model may 16 1994 first stereo speakers trackpad ethernet networking built-in first powerbook series use motorola 68lc040...
[ 7890, 5732, 722, 1094, 2926, 5037, 5752, 2954, 7572, 6482, 6142, 4373, 7226, 2978, 7601, 4749, 3346, 5100, 6165, 4389, 5463, 102, 5469, 4768, 3008, 5477, 6200, 6202, 3387, 3390, 1216, 2331, 4820, 1234, 7311, 889, 550, 552, 5916, 3459, 7...
Validation
5,266
9
MUSIC-N:music-n music-n refers family computer music programs programming languages descended influenced music program written max mathews 1957 bell labs music first computer program generating digital audio waveforms direct synthesis one first programs making music actuality sound digital computer certainly first prog...
[ 185, 7331, 5282, 4853, 556, 5911, 1361, 3368, 3370, 3534, 486, 6287, 4970, 2592, 5420, 7032, 4543, 5965, 5260, 6238, 263, 1989, 6408, 1435, 6245 ]
Validation
5,267
5
MSN_Direct:msn direct msn direct fm radio-based digital service allowed 'spot portable devices receive information msn services devices supported msn direct included wristwatches desktop clocks in-car gps satellite navigation units even small appliances coffee makers information available paid channels included weather...
[ 2555 ]
Test
5,268
2
List_of_BSD_operating_systems:list bsd operating systems number unix-like operating systems active development descended berkeley software distribution bsd series unix variants developed originally bill joy university california berkeley electrical engineering computer science department four major bsd operating system...
[ 3838, 1523, 1341, 7514, 6794, 6085, 6711, 3856, 908, 5216, 1092, 8186, 481, 3457, 6011, 1279, 5571, 2118, 1193, 738, 3636, 6367, 6369, 2583, 6918, 5065, 594, 8117, 4441, 4534, 6477, 2512, 424, 689, 6489, 6583, 2161, 4910, 6860, 443 ]
Test
5,269
4
Malumpos_Malware:malumpos malware malumpos point sale malware designed steal scrape customer ’ credit debit card detail point sale system designed way records point sale ’ data running oracle micros payment system restaurant collected data used 333,000 customer sites around world malumpos malware targets hotels us busi...
[ 7194, 4256, 1670, 3480, 4440 ]
Test
5,270
6
NetWare_Core_Protocol:netware core protocol netware core protocol ncp network protocol used products novell inc usually associated client-server operating system novell netware originally supported primarily ms-dos client stations later support platforms microsoft windows classic mac os linux windows nt mac os x variou...
[ 3599, 2547, 7161, 4672, 6431, 3626, 5049, 405, 6117, 759, 6854, 5437, 4375, 6500, 6505, 5457, 4759, 460, 1534, 7976, 4406, 821, 7258, 7637, 5130, 1561, 836, 5843, 2313, 6558, 2683, 5859, 5865, 4444, 5518, 6231, 869, 2704, 1605, 174, 271...
Test
5,271
2
Diskless_Remote_Boot_in_Linux:diskless remote boot linux drbl diskless remote boot linux nfs-/nis server providing diskless systemless environment client machines could used providing drbl-server installation possible machine debian ubuntu mandriva red hat linux fedora centos suse already installed unlike ltsp uses dis...
[ 5540, 5453, 5803, 3174, 1535, 1260, 7528, 1176, 2559, 976, 6725, 5571, 7639, 578, 6736, 5753, 7555, 3559, 7108, 3219, 1227, 6051, 788 ]
Test
5,272
4
Dictionary_attack:dictionary attack cryptanalysis computer security dictionary attack form brute force attack technique defeating cipher authentication mechanism trying determine decryption key passphrase trying hundreds sometimes millions likely possibilities words dictionary dictionary attack based trying strings pre...
[ 5194, 2626, 7793, 2823, 1353, 376, 3088, 1928, 7630, 3364, 2399, 4699, 6018, 2219, 1708, 4517, 4986, 1593, 5254, 6157, 1805 ]
Test
5,273
9
Charity_(programming_language):charity programming language charity experimental purely functional programming language developed university calgary supervision robin cockett based ideas hagino tatsuya completely grounded category theory disregarding interactions outside world charity programs guaranteed terminate stay...
[ 6507, 7658, 7, 5571, 6256, 578, 5164 ]
Test
5,274
4
Malware_analysis:malware analysis malware analysis study process determining functionality origin potential impact given malware sample virus worm trojan horse rootkit backdoor malware malicious software computer software intended harm host operating system steal sensitive data users organizations companies malware may...
[ 5561, 860, 3823, 4115, 5982, 6488, 1319, 3137, 7125, 3495, 4391, 1122, 7093 ]
Test
5,275
3
Mach_(kernel):mach kernel mach kernel developed carnegie mellon university support operating system research primarily distributed parallel computing mach often mentioned one earliest examples microkernel however versions mach microkernels mach derivatives basis modern operating system kernels gnu hurd apple operating ...
[ 3599, 2182, 5021, 7550, 7554, 405, 753, 7581, 6489, 4368, 2900, 2266, 5450, 1522, 4030, 5101, 3001, 4399, 6525, 5125, 6188, 2300, 1959, 6921, 6211, 2327, 7669, 4087, 6583, 1237, 3751, 1989, 4113, 6256, 8066, 6984, 1279, 2026, 5571, 1654, ...
Train
5,276
7
HyTrust:hytrust hytrust american company specialising security compliance control software virtualization information technology infrastructure company founded 2007 based mountain view california hytrust founded 2009 partnered vmware symantec cisco systems citrix systems backed 5.5 million funding trident capital epic ...
[ 496, 2961, 7856, 4295, 1505, 4783, 3756, 88 ]
Validation
5,277
4
United_States_v._Ancheta:united states v. ancheta united states america v. ancheta u.s. vs. ancheta 06-051 c.d cal name lawsuit jeanson james ancheta downey california u.s. government handled united states district court central district california first botnet related prosecution u.s history ancheta violated prohibite...
[ 1691, 3338 ]
Test
5,278
6
Davfs2:davfs2 computer networking davfs2 linux tool connecting webdav shares though local disks open-source gpl-licensed file system mounting webdav servers communicating kernel davfs2 either use fuse file system api coda network file system protocol sockets davfs2 uses neon webdav library communicating web server davf...
[ 3599, 2547, 7161, 4672, 3626, 6117, 6854, 5437, 4375, 6500, 6505, 5457, 460, 1534, 7976, 4406, 821, 7258, 5130, 1561, 836, 5843, 6558, 2683, 5859, 5865, 4444, 5518, 6231, 869, 2704, 1605, 174, 2710, 1624, 5900, 4480, 4855, 7718, 200, 12...
Test
5,279
2
IGUANA_Computing:iguana computing independent group unix-alikes networking activists iguana developers wombat system iguana also operating system os personality provides set services memory management process protection iguana designed base provision operating system services embedded systems among others provides unde...
[ 4751, 6874, 4478, 900, 2467, 2294, 5571, 2300, 2118, 6360, 578, 7554, 6367, 4447, 443 ]
Validation
5,280
4
Outbound_content_compliance:outbound content compliance outbound content compliance outbound content security relatively new segment computer security field aims detect prevent outbound content violates policy organization and/or government regulations deals internal threats opposite traditional security solutions fire...
[ 1805, 5908 ]
Validation
5,281
5
GENA:gena gena stands general event notification architecture gena base defines http notification architecture transmits notifications http resources http resource could object might need send receive notification example distribution list buddy list print job etc defined internet-draft draft-cohen-gena-p-base-01.txt e...
[ 84 ]
Test
5,282
9
Max_(software):max software max also known max/msp/jitter visual programming language music multimedia developed maintained san francisco-based software company cycling '74 thirty-year history used composers performers software designers researchers artists create recordings performances installations max program modul...
[ 6507, 1908, 2451, 4759, 6245, 4853, 3534, 5571, 578, 7010, 2592, 4981, 5420, 5266, 3915, 5260, 1435, 5450 ]
Test
5,283
5
HTTP/3:http/3 http/3 h3 upcoming third major version hypertext transfer protocol used exchange binary information world wide web http/3 draft based previous rfc draft named hypertext transfer protocol http quic quic transport layer network protocol initially developed google user space congestion control used user data...
[ 4655, 6802, 5378, 7537, 6809, 393, 3291, 2574, 2577, 6452, 4352, 4725, 1136, 6858, 84, 445, 1152, 1525, 7628, 5821, 5127, 6540, 3383, 8006, 8009, 3043, 1970, 6221, 520, 3057, 5887, 6966, 5542, 6984, 1276, 7015, 7749, 2049, 4565, 2812, 2...
Test
5,284
2
Larry_McVoy:larry mcvoy larry mcvoy born 1962 concord massachusetts united states ceo bitmover company makes bitkeeper version control system used february 2002 early 2005 manage source code linux kernel earned bs ms degrees computer science 1985 1987 respectively university wisconsin–madison work generally included pe...
[ 2559, 7010, 5571, 6256 ]
Validation