node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
7,785
5
Dead_Peer_Detection:dead peer detection dead peer detection dpd method detecting dead internet key exchange ike peer method uses ipsec traffic patterns minimize number messages required confirm availability peer dpd used reclaim lost resources case peer found dead also used perform ike peer failover
[ 3434, 7626, 2644 ]
Validation
7,786
8
JEUS:jeus jeus abbreviation java enterprise user solution korean web application server developed tmaxsoft jeus provides web application server component tmaxsoft middleware-tier framework solution widely adopted korea holds largest 42.1 share market tmaxsoft released jeus 1.0 2000 2001 received j2ee 1.2 certification jeus 3.0. 2013 received world ’ first java ee 7 certification jeus 8 jeus launched april 2000 following table shows list versions release dates jeus 7 provides following features domain architecture jeus 7 supports massive scale computing environment lightweight speedy distributed clustering dynamic clustering core function enables rapid elasticity allows administrator easily add delete idle resources needed graceful redeployment application redeployment needed operation continuous service environment provided guaranteeing completion processing session requests prior redeployment superior performance provided large-scale requests improved caching function memory managed efficiently use optimized lru processing algorithm improves performance connected webtob server stable large-scale transaction processing ability exhibited due multiplexing i/o request queuing dynamic load balancing stream pipe communication reloading modified class instead entire class function modified development productivity dramatically improved webtob web server component complements jeus tmaxsoft middleware-tier solution webtob uses multi-thread architecture allows address multiple requests single process features include disk memory caching load balancing clustering dynamic queuing ability add additional nodes without interrupting operations help improve server speed stability webtob uses secure sockets layer operates without open firewall ports inherently provides stronger data security administrators also configure access control lists following shows minimum installation requirements jeus windows 2000 2003 xp vista solaris hp-ux aix linux two editions jeus available
[ 3168, 5369, 1349, 5206, 5820, 5214, 2646, 1640, 1834, 2291, 6270, 8182, 6536, 26, 5571, 7544, 7988, 4701, 5666, 1392, 417, 3135, 2506, 1686, 3408, 3915, 1602, 6061, 7411, 7952, 2807 ]
Validation
7,787
2
Fedora_version_history:fedora version history fedora popular linux distribution developed community-supported fedora project sponsored red hat fedora attempts maintain six-month release schedule offering new versions may november although releases experienced minor delays releases red hat linux listed fedora 30 released april 30 2019 fedora 29 released october 30 2018. notable new features fedora modularity across variants new optional package repository called modular also referred application stream appstream gnome 3.30 zram arm images fedora scientific vagrant images fedora 28 released may 1 2018 red hat enterprise linux 8 derivatives based fedora 28. notable new features modular software repository curated 3rd-party software repositories fedora 27 released november 14 2017 workstation edition fedora 27 features gnome 3.26 display network configuration panels updated along overall settings panel appearance improvement system search shows results including system actions release also features libreoffice 5.4 fedora 26 released july 11 2017 fedora 25 released november 22 2016 notable changes see use wayland display system unicode 9 php 7.0 node.js 6 ibus emoji typing fedora 24 released june 21 2016 notable system wide changes see use gnome 3.20 gcc 6 python 3.5 fedora 23 released november 3 2015 see also fedora 22 released may 26 2015 major features include fedora 21 first version without codename released december 9 2014 fedora 20 codenamed heisenbug released december 17 2013 features fedora 20 include fedora 19 codenamed schrödinger cat released july 2 2013 red hat enterprise linux 7 derivatives based fedora 19 features fedora 19 include fedora 18 codenamed spherical cow released january 15 2013 features fedora 18 include next release operating system fedora 17 codenamed beefy miracle released may 29 2012 features fedora 17 include fedora 16 codenamed verne released november 8 2011 fedora 16 also dedicated memory dennis ritchie died month release features fedora 16 included fedora 15 codenamed lovelock released may 24 2011 features fedora 15 include fedora 14 codenamed laughlin released november 2 2010 features fedora 14 include fedora 13 codenamed goddard released may 25 2010 early development fedora project-leader paul frields anticipated looking fit finish issues tended build really tight ship fedora want make décor cabins little sumptuous polish deck chairs railings features fedora 13 include fedora 12 codenamed constantine released november 17 2009 red hat enterprise linux 6 derivatives based fedora 12 features fedora 12 fedora 11 codenamed leonidas released june 9 2009 first release whose artwork determined name instead users voting themes features fedora 11 fedora 10 codenamed cambridge released november 25 2008 flaunts new solar artwork features include fedora 9 codenamed sulphur released may 13 2008 new features fedora 9 included fedora 9 featured new artwork entitled waves like infinity fedora 8 changes wallpaper reflect time day fedora 8 codenamed werewolf released november 8 2007 new features updates fedora 8 included fedora 8 also included new desktop artwork entitled infinity new desktop theme called nodoka unique feature infinity wallpaper change day reflect time day february 2008 new xfce live cd spin announced x86 x86-64 architectures live cd version uses xfce desktop environment aims fast lightweight still visually appealing easy use like gnome kde spins xfce spin installed hard disk fedora 7 codenamed moonshine released may 31 2007 biggest difference fedora core 6 fedora 7 merging red hat core community extras repositories dropping core name fedora core new build system put place manage packages release used entirely new build compose tools enabled user create fully customized fedora distributions could also include packages third party provider three official spins available fedora 7 fedora 7 featured gnome 2.18 kde 3.5 new theme entitled flying high openoffice.org 2.2 firefox 2.0 fast user switching fully integrated enabled default also number updates selinux including new setroubleshoot tool debugging selinux security notifications new comprehensive system-config-selinux tool fine-tuning selinux setup two core releases introduced specific artwork defined trend continued later fedora versions fedora core 5 released march 20 2006 codename bordeaux introduced fedora bubbles artwork first fedora release include mono tools built beagle f-spot tomboy also introduced new package management tools pup pirut see yellowdog updater modified also first fedora release include long deprecated kept compatibility linuxthreads replaced native posix thread library fedora core 6 released october 24 2006 codenamed zod release introduced fedora dna artwork replacing fedora bubbles artwork used fedora core 5 codename derived infamous villain general zod superman dc comic books version introduced support compiz compositing window manager aiglx technology enables gl-accelerated effects standard desktop shipped firefox 1.5 default web browser smolt tool allows users inform developers hardware use fedora core 1 first version fedora released november 6 2003 codenamed yarrow fedora core 1 based red hat linux 9 shipped version 2.4.19 linux kernel version 2.4 gnome desktop environment k desktop environment 3.1 fedora core 2 released may 18 2004 codenamed tettnang shipped linux 2.6 gnome 2.6 kde 3.2 selinux selinux disabled default due concerns radically altered way fedora core ran xfree86 replaced newer x.org merger previous official x11r6 release additionally included number updates xrender xft xcursor fontconfig libraries significant improvements fedora core 3 released november 8 2004 codenamed heidelberg first release fedora core include mozilla firefox web browser well support indic scripts release also saw lilo boot loader deprecated favour grub selinux also enabled default new targeted policy less strict policy used fedora core 2 fedora core 3 shipped gnome 2.8 kde 3.3 first release include new fedora extras repository fedora core 4 released june 13 2005 codename stentz shipped linux 2.6.11 kde 3.4 gnome 2.10 version introduced new clearlooks theme inspired red hat bluecurve theme also shipped openoffice.org 2.0 office suite well xen high performance secure open source virtualization framework also introduced support powerpc cpu architecture 80 new policies selinux
[ 2091, 292, 644, 4685, 6011, 1100, 6117, 2143, 8122, 1878, 5884, 6663, 6572, 3489, 3666, 5965, 6056, 6586, 352, 174, 788, 5890 ]
Test
7,788
7
Oracle_RAC:oracle rac database computing oracle real application clusters rac — option oracle database software produced oracle corporation introduced 2001 oracle9i — provides software clustering high availability oracle database environments oracle corporation includes rac enterprise edition provided nodes clustered using oracle clusterware oracle rac allows multiple computers run oracle rdbms software simultaneously accessing single database thus providing clustering non-rac oracle database single instance accesses single database database consists collection data files control files redo logs located disk instance comprises collection oracle-related memory background processes run computer system oracle rac environment 2 instances concurrently access single database allows application user connect either computer access single coordinated set data instances connected interconnect enables instances sync accessing data main aim oracle rac implement clustered database provide performance scalability resilience high availability data instance level oracle rac depends infrastructure component oracle clusterware coordinate multiple servers sharing data storage fan fast application notification technology detects down-states rac administrators use codice_1 tool manage rac configurations prior oracle 9 network-clustered oracle databases used storage device data-transfer medium meaning one node would write data block disk another node would read data disk inherent disadvantage lackluster performance oracle 9i addressed issue rac uses dedicated network connection communications internal cluster since computers/instances rac access database overall system must guarantee coordination data changes different computers whenever computer queries data receives current version — even another computer recently modified data oracle rac refers functionality cache fusion cache fusion involves ability oracle rac fuse in-memory data cached physically separately computer single global cache oracle grid naming service gns handles name resolution cluster registry trace file analyzer tfa aids collecting rac diagnostic data relative single-instance oracle database oracle rac adds additional complexity database automation makes sense single-instance databases becomes even necessary clustered databases increased complexity oracle real application clusters rac introduced oracle 9i 2001 supersedes oracle parallel server ops database option whereas oracle9i required external clusterware known vendor clusterware like trucluster veritas cluster server sun cluster unix flavors except linux windows oracle provided free clusterware called cluster ready services crs oracle 10g oracle clusterware product available operating systems release oracle database 10g release 2 10.2 cluster ready services renamed oracle clusterware using oracle 10g higher oracle clusterware clusterware need platforms oracle rac operates except tru cluster case need vendor clusterware still use clusterware vendors clusterware certified oracle rac rac write-transaction must take ownership relevant area database typically involves request across cluster interconnection local ip network transfer data-block ownership another node one wishing write takes relatively long time tens milliseconds compared single database-node using in-memory operations many types applications time spent coordinating block access across systems low relative many operations system rac scale comparably single system moreover high read-transactional databases data-warehousing applications work well rac need ownership-transfer exists oracle 11g made many enhancements area performs lot better earlier versions read-only workloads overhead resource mastering ownership-transfer minimal fewer three nodes request resource cluster obtained maximum three hops owner-master-requestor makes oracle rac horizontally scalable many nodes application vendors sap use oracle rac demonstrate scalability application biggest oltp benchmarks oracle rac oracle rac 11g supports 100 nodes applications rac may require careful application partitioning enhance performance application scales linearly smp machine may scale linearly rac however application scale linearly smp scale ported rac short application scalability based well application scales single instance shared-nothing shared-everything architectures advantages dbms vendors industry analysts regularly debate matter example microsoft touts comparison sql server 2005 oracle 10g rac oracle corporation offered shared nothing architecture rdbms advent ibm sp sp2 release 7.x mpp editions virtual shared drives vsd used create shared everything implementation shared nothing architecture shared-everything architectures share data disk data memory nodes cluster contrast shared-nothing architectures share none commercially available databases offer shared-everything architecture ibm db2 z/os ibm mainframe operating-system provided high-performance data-sharing option since mid-1990s ibm released mainframe hardware software-clustering infrastructure late 2009 ibm announced db2 purescale shared-disk clustering scheme db2 9.8 aix mimics parallel sysplex implementation behind db2 data sharing mainframe february 2008 sybase released adaptive server enterprise cluster edition resembles oracle rac shared-everything design although technically shared-everything sybase also provides column-based relational database focused analytic datawarehouse applications called sybase iq configured run shared disk mode shared-nothing architectures share neither data disk data memory nodes cluster contrast shared-everything architectures share competitive products offering shared-nothing architectures include
[ 5717, 6252, 6878, 187, 7334, 10, 7248, 7715, 8079, 5735, 6817, 3542, 4527, 3396, 2054, 5337, 7213, 4457, 5447 ]
Test
7,789
2
IPSW:ipsw ipsw ipod software file format used itunes install ios firmware apple devices share ipsw file format ios firmware allowing users flash devices itunes macos windows .ipsw file compressed archive file similar zip archive containing three apple disk image files one containing root file system ios two ram disks restore update file also holds firmware folder contains ibss ibec dfu battery images low full charging also baseband firmware files .bbfw format baseband firmware two files named build manifest restore manifest apple property list .plist format checks compatibility holds hashes base64 format instructs device find specific firmware parts restore buildmanifest.plist sent apple tss server checked order obtain shsh blob every restore without shsh blobs firmware refuse restore thus making downgrades impossible official fashion due apple limitation archive password-protected dmg images inside encrypted aes apple release keys extracted using different iboot bootloader exploits limera1n created george hotz commonly known geohot since many tools created decryption modification root file system 2015 san bernardino attack fbi recovered shooter iphone 5c belonged san bernardino county department public health fbi recovered icloud backups one half months shooting wanted access encrypted files device u.s. government ordered apple produce ipsw file would allow investigators brute force passcode iphone order used writs act originally created judiciary act 1789 demand firmware way smartphone manufacturers ordered comply tim cook responded company webpage outlining need encryption arguing produce backdoor one device would inevitably used compromise privacy iphone users
[ 6788, 7816, 7584, 74, 6628, 1471, 5661 ]
Test
7,790
4
VPNFilter:vpnfilter vpnfilter malware designed infect routers certain network attached storage devices 24 may 2018 estimated infected approximately 500,000 routers worldwide though number at-risk devices larger steal data contains kill switch designed disable infected router command able persist user reboot router fbi believes created russian fancy bear group vpnfilter malware infecting number different kinds network routers storage devices seems designed part target serial networking devices using modbus protocol talk control industrial hardware factories warehouses malware special dedicated code target control systems using scada initial infection vector still unknown cisco talos security group hypothesizes malware exploits known router security vulnerabilities infect devices software installs multiple stages vpnfilter uses multiple third stage operations initial infection one function vpnfilter sniff network data network connected infected device gather credentials supervisory control data data encrypted exfiltrated via tor network also serve relay point hide origin subsequent attacks cisco symantec suggest people affected devices factory reset typically accomplished using small pointed object straightened paperclip push small reset button back unit 10 30 seconds time varies model remove malware also restores router original settings router remote management enabled factory reset often disable default setting many routers remote management thought one possible vector initial attack connecting factory-reset router internet device default passwords changed prevent reinfection initial worm installs vpnfilter attack devices running embedded firmware based busybox linux compiled specific processors include non-embedded linux devices workstations servers manufacturer-provided firmware following router models known risk vpnfilter described cisco talos infected many 500,000 devices worldwide perhaps 54 different countries though proportionately focus ukraine fbi taken high-profile role addressing malware conducting investigation resulted seizure domain name toknowall.com ostensibly used redirect queries stage 1 malware allowing locate install copies stages 2 3 us justice department also compelled site photobucket disable known urls used distribute malware stage 2 25 may 2018 fbi recommended users reboot at-risk devices would temporarily remove stages 2 3 malware stage 1 would remain leading router try re-downloading payload infecting router however prior recommendation us justice department seized web endpoints malware uses stage 2 installation without urls malware must rely fallback socket listener stage 2 installation method requires threat actor command control systems contact system install stage 2 increasing threat actor risk identified fbi recommended users disable remote management devices update firmware firmware update removes stages malware though possible device could reinfected fbi said would help find servers distributing payload
[ 6272, 3511, 578 ]
Test
7,791
9
Expression_problem:expression problem expression problem term used discussing strengths weaknesses various programming paradigms programming languages philip wadler coined term response discussion rice university programming languages team plt expression problem new name old problem goal define datatype cases one add new cases datatype new functions datatype without recompiling existing code retaining static type safety e.g. casts ecoop '98 krishnamurthi et al presented design pattern solution problem simultaneously extending expression-oriented programming language tool-set dubbed expressivity problem thought programming language designers could use problem demonstrate expressive power creations plt problem shown construction drscheme drracket solved via rediscovery mixins avoid using programming language problem paper programming languages krishnamurthi et al used old geometry programming problem explain pattern-oriented solution conversations felleisen krishnamurthi ecoop presentation wadler understood pl-centric nature problem pointed krishnamurthi solution used cast circumvent java type system discussion continued types mailing list corky cartwright rice kim bruce williams showed type systems oo languages might eliminate cast response wadler formulated essay stated challenge whether language solve expression problem salient indicator capacity expression label expression problem puns expression much language express expression terms trying represent language expressions others co-discovered variants expression problem around time rice university plt particular thomas kühne dissertation smaragdakis batory parallel ecoop 98 article follow-up work used expression problem showcase power programming language designs expression problem also fundamental problem multi-dimensional software product line design particular application special case fosd program cubes various solutions expression problem solution varies amount code user must write implement language features require
[ 7152, 1889, 260, 6428 ]
Test
7,792
8
Leaf_Group:leaf group leaf group formerly demand media inc american content company operates online brands including ehow livestrong.com marketplace brands saatchi art society6 company also provides social media platforms existing large company websites distributes content bundled social media tools outlets around web demand media created 2006 former private equity investor shawn colo former chairman myspace richard rosenblatt company employs algorithm identifies topics high advertising potential based search engine query data bids advertising auctions topics typically advice how-to field commissions freelancers produce corresponding text video content content posted variety sites including youtube company sites ehow livestrong.com demand media content media service offering includes leading owned operated online properties publish content text video photography designed visual formats content published across several key categories ehow.com how-to reference do-it-yourself destination livestrong.com health healthy living destination certain niche properties focused specific interests also owns operates leaftv lifestyle resource women produces short-form how-to videos covering stylish living food fashion additionally studiod business develops executes content marketing strategies creates custom content third-party brands agencies publishers marketplaces service offering demand media operates two art design marketplaces large communities artists market sell original artwork original designs printed wide variety products society6.com acquired june 2013 provides artists online commerce platform feature sell original images designs consumer products art prints phone tablet cases t-shirts mugs blankets tapestries wall clocks duvet covers shower curtains throw pillows saatchiart.com acquired august 2014 online art gallery featuring wide selection original paintings drawings sculptures photography provides global community artists curated environment exhibit sell work directly consumers around world 2017 leaf group acquired deny designs modern home furnishings company original designs based colorado demand media co-founded may 2006 richard rosenblatt shawn colo. rosenblatt long history building selling internet media companies chief executive officer intermix media chairman myspace.com rosenblatt one innovators internet social networking colo financial acquisition specialist worked 10 years private equity industry principal spectrum equity investors specializing media communications companies demand media raised 355 million financing first two years investors oak investment partners spectrum equity investors generation partners goldman sachs june 2007 demand media hired charles hilliard former morgan stanley investment banker netzero/united online senior executive initial public offering ipo specialist president chief financial officer acquired byron reese how-to website expertvillage.com austin tx 20 million reese became company chief innovation officer developed algorithm company uses identify topics high advertising potential 2008 demand media acquired 30 domain-name portfolios owned 65 destination websites said 2009 revenue nearly 200 million making profit later reported company never profitable july 2008 reported yahoo interested buying demand media 1.5 billion 2 billion sources close companies said yahoo executives attracted demand media ’ generation advertising impressions ability create niche social networks media sites demand media ceo richard rosenblatt later said company sale deal never got past talking stage reported rosenblatt wanted price closer 3 billion demand media august 2014 demand media acquired online art-gallery marketplace saatchi art named startup top executive sean moriarty new ceo demand media inc company changed name 2016 reflect focus marketplaces media content lifestyle platforms since 2006 demand media acquired collection relatively unknown sites relaunched social networking features video capabilities serve specific niche interests company ’ first six months made nine acquisitions including purchase major registrars enom bulkregister november 6 2008 shawn colo head demand media mergers acquisitions said company would continue buy niche well-trafficked sites company profitable still lot cash bank 2008 demand media acquired pluck company providing social networking commenting solutions websites reported 75 million cash indieclick rss graffiti acquired august 2011 name.com domain name registrar acquired january 7 2013 society6 acquired june 25 2013 saatchi online acquired august 11 2014 august 2014 demand media announced successfully separated rightside group ltd. brands enom name.com online auction site namejet result separation demand media longer provider domain name services april 2016 demand media announced sale brand cracked.com e.w scripps may 2016 demand media announced sale brand trails.com lovetoknow corp owned howard love february 2017 demand media airliners.net site acquired verticalscope majority-owned torstar 2018 leaf acquired website well+good 2018/19 leaf acquired website onlyinyourstate demand media executives say websites content-driven attract visitors showing multiword search-engine queries words typed search engine specific search called long tail search demand media attempts get visitors websites long-tail searches tries retain visitors related content social media tools social media platforms get 3 billion interactions per month clients already well-established brands demand media commissions specific website content distributes websites others advertising revenue sharing agreements demand media owned 135,000 videos 340,000 articles largest contributor youtube uploading 10,000 20,000 new videos per month gets 1.5 million page views per day youtube content generated via process demand media uses algorithms generate titles posts titles screened pool freelance writers video creators list available titles used 100,000 severely curtailed second half 2011 typically writers claim ten titles week submit articles format length dictated guidelines submitted articles go editor also freelancer either clean request rewrite writers submit revised article either accepted rejected payment via paypal twice week demand media ’ acquisition pluck.com 2008 gave means provide specialized content social media platforms website content comes advertising attached website owners get free content sites split advertising revenue demand media april 2010 financial times reported demand media planning initial public offering shares ipo would mean acquisitions would question ipo filing completed august year shares first expected offered december 2010 tender would give demand media value 1.5 billion however result securities exchange commission investigation regarding company novel accounting long-lived content pricing delayed january 12 2011 company announced would price shares 14 16 giving valuation approximately 1.3 billion questions raised demand media claim profitable given ipo filings reported losses past several years demand media attracted criticism internet watchdogs one largest buyers articles videos often commissioning low quality articles cut costs effort mass-produce articles videos appear highly google search results purchasing thousands search-engine-driven content low-paid freelancers use websites attract advertisers israeli startup owned google adsense simpli demand media also criticized methods accounting capitalizing costs content amortizing five years giving appearance profitability
[ 4686, 6092 ]
Validation
7,793
4
Microsoft_Office_password_protection:microsoft office password protection microsoft office password protection security feature protect microsoft office word excel powerpoint documents user-provided password office 2007 uses modern encryption earlier versions used weaker systems considered secure office 2007–2013 employed 128-bit key aes password protection remains secure office 2016 employed 256-bit key aes password protection also remains secure office 97–2003 password protection used 40-bit key rc4 contains multiple vulnerabilities rendering insecure microsoft office applications offer use two main groups passwords set document depending whether encrypt password-protected document passwords encrypt password-protected document different security level features microsoft office applications mentioned lack document encryption passwords mentioned reliably protect document hacker password cracking software remove protection password-protected document little time password encrypts document also restricts user opening document possible set type password microsoft office applications user fails enter correct password field appears attempt open password-protected document viewing editing document possible due encryption document protected password open hacker needs decrypt document get access contents provide improved security microsoft consistently enhancing office encryption algorithm strength excel word 95 prior editions weak protection algorithm used converts password 16-bit key hacking software readily available find 16-bit key decrypt password-protected document instantly excel word 97 2000 key length increased 40 bits protection algorithm also currently considered weak presents difficulties hacking software default protection office xp 2003 changed opportunity use custom protection algorithm added choosing non-standard cryptographic service provider allows increasing key length key used encrypt document ’ found however password-cracking programs enter multiple random passwords speed use csps slow password recovery weak passwords still recovered fast enough even custom csp office 2007 word excel powerpoint protection significantly enhanced since modern protection algorithm named advanced encryption standard used present software break encryption help sha-1 hash function password stretched 128-bit key 50,000 times opening document result time required crack vastly increased excel word 2010 still employ aes 128-bit key number sha-1 conversions doubled 100,000 increasing time required crack password office 2013 access excel onenote powerpoint project word uses 128-bit aes hash algorithm sha-1 default office 2016 access excel onenote powerpoint project word uses 256-bit aes sha-1 hash algorithm cbc cipher block chaining default protection worksheets macros necessarily weaker entire workbook software must able display use excel particularly weak equivalent password easily found form abababababax first 11 chars either b last ascii character number attacks employed find password remove password protection excel word documents password removal done help precomputation tables guaranteed decryption attack attacks target original password set microsoft excel word include dictionary attack rule-based attack brute-force attack mask attack statistics-based attack efficiency attacks considerably enhanced one following means applied multiple cpus distributed attack gpgpu applicable microsoft office 2007–2010 documents cloud computing due weak passwords moment cloud computing facilities capable unlocking many ca 80 files saved office 2007–2010 format passwords sufficient length complexity typically brute-forced office 2013 introduces sha-512 hashes encryption algorithm making brute-force rainbow table attacks slower however noted sha hash algorithms never designed password hashing thus considered secure anymore modern slower thus secure hashes pbkdf2 scrypt kdfs yet implemented office specialized software designed recover lost microsoft office passwords pre-aes encryption ultimately security password-protected document dependent user choosing password sufficient complexity password determined guesswork social engineering underlying cipher important
[ 2961, 5252, 5272, 1861, 5607, 324, 2566, 2823, 6495, 3920, 315 ]
Test
7,794
2
MOS_(operating_system):mos operating system mos signifies 'mobile operating system soviet clone unix 1980s operating system commonly found sm evm minicomputers also ported es evm elbrus mos also used high-end pdp-11 clones several modifications mos named mnos demos etc
[ 4751, 6076, 2630, 4478, 5462, 3690, 900, 2467, 2294, 7079, 5571, 2300, 2118, 6360, 578, 5048, 1288, 6367, 2864, 4447, 2887, 443 ]
Validation
7,795
4
Secureworks:secureworks secureworks inc. united states-based subsidiary provides information security services protecting customers computers networks information assets malicious activity cybercrime company approximately 4,400 customers across 61 countries ranging fortune 100 companies mid-sized businesses variety industries became part dell february 2011 branched become public organization april 2016 still majority-owned dell secureworks founded privately held company 1998 michael pearson joan wilbanks 2002 michael r. cote became president ceo 2005 2006 company named inc. 500 inc. 5000 lists 2006 deloitte ’ fast 500 2006 secureworks merged lurhq corporation new entity continued secureworks corporate name lurhq founded 1996 myrtle beach sc provided managed security services large enterprises similar company cultures leadership secureworks according gartner merger created stronger company merger secureworks able leverage sherlock lurhq portal unify combined customer base onto single integrated security management platform 2009 secureworks acquired managed security services mss business verisign inc. provider internet infrastructure services networked world grew 500 employees worldwide acquisition expanded clients approximately 2,600 50 countries including united kingdom saudi arabia taiwan finland spain brazil mexico includes four fortune 10 also 2009 secureworks acquired 10-year-old dns limited acquisition expanded secureworks operation include uk-based operations center additional offices london edinburgh january 4 2011 dell announced would acquire secureworks part dell services dell secureworks officially began operating dell subsidiary february 7 2011 dell secureworks continued expand portfolio around world may 2013 arrived anz region move australia new zealand put dell ring security services market companies like ibm hp verizon dell secureworks opened operations center sydney meet demands local australia businesses demand services area penetration testing forensic investigations ongoing monitoring environments attacks december 17 2015 dell subsidiary secureworks filed go public april 22 2016 secureworks announced ipo raising 112 million pricing ipo 14 per share however company expecting initial price 15.50- 17.50 first tech ipo u.s. 2016 august 2017 secureworks rebranded logo changed capitalization w name lower case
[ 2106, 5940, 4295, 7795, 3480, 4956, 32, 4979, 972, 5599, 6715, 7415 ]
Test
7,796
2
List_of_Unix_daemons:list unix daemons list unix daemons found various unix-like operating systems unix daemons typically name ending
[ 4382, 2649, 7494, 5826, 1254, 7217, 8066, 2119, 6908, 7893, 3383, 3820 ]
Test
7,797
9
FXScript:fxscript fxscript scripting language final cut pro final cut express fxbuilder scripting utility users able modify existing fcp fxscripts program completely new ones example scale image two lines necessary scale image full size half size first region might rectangle scaled statement scale parameters statement blitrect copies region image changed region origregion new region different sizes final cut pro scales image fit new region statement command accomplishes single action example statements scale blitrect fxbuilder users create test fxscripts optionally multiple windows inside final cut pro/express fxscript three types effects fxscript two parts normally flow script top bottom users take flow control using loops example for/next conditional branches example if/else fxscript also allows breaking scripts subroutines called parts script using names
[]
Test
7,798
3
MSX_character_set:msx character set msx character sets group single- double-byte character sets developed microsoft msx computers based code page 437 since graphic characters corresponding unicode representation portably displayed web browser following table shows msx characters corresponding unicode glyph code point otherwise unicode replacement character u+fffd � hyphen code point control characters non-printing characters represented names character set differences exist depending target market machine variations german din international character sets identical apart style zero 0 character international character set zero slash din character set dotted zero msx terminal compatible vt-52 escape codes plus extra control codes shown brazilian manufacturer gradiente initially included modified msx character set v1.0 machines allow writing correct portuguese differences shown boxed symbol 0x9e 158 currency symbol brazilian cruzado used anymore later brazilian msx models v1.1 higher included standardized character set named brascii solved accentuation incompatibility problems amongst different makers
[ 3764, 2521, 2438, 2621, 1457 ]
Test
7,799
4
Shamoon:shamoon shamoon also known w32.distrack modular computer virus discovered 2012 targeting recent 32-bit nt kernel versions microsoft windows virus noted behavior differing malware attacks due destructive nature cost attack recovery known years later biggest hack history virus apparently intended cyber warfare shamoon spread infected machine computers network system infected virus continues compile list files specific locations system upload attacker erase finally virus overwrites master boot record infected computer making unusable virus used cyber warfare national oil companies saudi arabia saudi aramco qatar rasgas discovery announced 16 august 2012 symantec kaspersky lab seculert similarities highlighted kaspersky lab seculert shamoon flame malware malware unique used target saudi government causing destruction state owned national oil company saudi aramco attackers posted pastie pastebin.com hours prior wiper logic bomb occurring citing oppression al-saud regime reason behind attack attack well-staged according chris kubecka former security advisor saudi aramco attack group leader security aramco overseas unnamed saudi aramco employee information technology team opened malicious phishing email allowing initial entry computer network around mid-2012 kubecka also detailed black hat usa talk saudi aramco placed majority security budget ics control network leaving business network risk major incident behalf anti-oppression hacker group fed crimes atrocities taking place various countries around world especially neighboring countries syria bahrain yemen lebanon egypt ... also dual approach world community nations want hit main supporters disasters action one main supporters disasters al-saud corrupt regime sponsors oppressive measures using muslims oil resources al-saud partner committing crimes hands infected blood innocent children people first step action performed aramco company largest financial source al-saud regime step penetrated system aramco company using hacked systems several countries sended malicious virus destroy thirty thousand computers networked company destruction operations began wednesday aug 15 2012 11:08 local time saudi arabia completed within hours shamoon attack designed two things replace data hard drives image burning american flag report addresses infected computers back computer inside company ’ network virus consisted three components dropper wiper reporter dropper main component source infection component drops wiper reporter onto infected computer copies network shares executes creates service start whenever windows starts wiper destructive component component gathers files locations infected computers erases sends information files attacker erased files overwritten corrupted files recovered reporter component sends infected information back attacker 15 august 11:08 local time 30,000 windows based systems began overwritten symantec found affected systems image american flag whilst data deleted overwritten saudi aramco announced attack facebook page went offline company statement issued 25 august 2012 statement falsely reported normal business resumed 25 august 2012 however middle eastern journalist leaked photographs taken 1 september 2012 showing kilometers petrol trucks unable loaded due backed business systems still inoperable saudi aramco restored main internal network services impacted august 15 2012 malicious virus originated external sources affected 30,000 workstations workstations since cleaned restored service precaution remote internet access online resources restricted saudi aramco employees returned work august 25 2012 following eid holidays resuming normal business company confirmed primary enterprise systems hydrocarbon exploration production unaffected operate isolated network systems production plants also fully operational control systems also isolated august 29 2012 attackers behind shamoon posted another pastie pastebin.com taunting saudi aramco proof still retained access company network post contained username password security network equipment new password aramco ceo khalid al-falih attackers also referenced portion shamoon malware proof pastie internet service routers three info follows core router sa-ar-co-1 password telnet c1sc0p ss-ar-cr-tl enable c1sc0p ss-ar-cr-bl backup router sa-ar-co-3 password telnet c1sc0p ss-ar-bk-tl enable c1sc0p ss-ar-bk-bl middle router sa-ar-co-2 password telnet c1sc0p ss-ar-st-tl enable c1sc0p ss-ar-st-bl khalid a. al-falih ceo email info follows khalid.falih aramco.com password kal ram sa1960 security appliances used according kubecka order restore operations saudi aramco used large private fleet aircraft available funds purchase much world hard drives driving price new hard drives required quickly possible oil prices affected speculation september 1 2012 gasoline resources dwindling public saudi arabia 17 days august 15th attack rasgas also affected different variant crippling similar manner unclear attacker may interest actually destroying infected pc kaspersky labs hinted 900 kb malware could related wiper used cyber attack iran april 2-day analysis company erroneously concluded malware likely come scriptkiddies inspired wiper later blog post eugene kaspersky clarified use shamoon categorizing cyber warfare virus hit companies within oil energy sectors group named cutting sword justice claimed responsibility attack 35,000 saudi aramco workstations causing company spend week restoring services group later indicated shamoon virus used attack computer systems rasgas also knocked offline unidentified computer virus security experts attributing damage shamoon shamoon made surprise comeback november 2016 according symantec involved new attack 23 january 2017 malware logic bomb triggered master boot record data wiping payload 11:08am local time wednesday august 15 attack occurred month ramadan 2012 would appear attack timed occur staff gone holiday reducing chance discovery maximum damage could caused hampering recovery shamoon uses number components infect computers first component dropper creates service name ‘ ntssrv ’ remain persistent infected computer spreads across local network copying computers drop additional components infected computers dropper comes 32-bit 64-bit versions 32-bit dropper detects 64-bit architecture drop 64-bit version malware also contains disk wiping component utilizes eldos-produced driver known rawdisk achieve direct user-mode access hard drive without using windows apis component overwrites files portions image 2012 attack used image burning u.s. flag 2016 attack used photo body alan kurdi
[ 704, 3932, 2912, 376, 3277, 2923, 2209, 5401, 2587, 3323, 5779, 4017, 7600, 5452, 4025, 1528, 4759, 2991, 1173, 6526, 2290, 5485, 6904, 6541, 6194, 6922, 2678, 3038, 3047, 6569, 2693, 862, 7307, 6589, 5187, 1996, 7328, 1254, 2733, 208, ...
Test
7,800
2
General_Comprehensive_Operating_System:general comprehensive operating system general comprehensive operating system gcos originally gecos general electric comprehensive operating supervisor family operating systems oriented toward 36-bit ge/honeywell mainframe computers original version gcos developed general electric 1962 operating system still used today recent versions gcos 7 gcos 8 servers mainframes produced groupe bull primarily emulation provide continuity legacy mainframe environments note gcos 7 gcos 8 separate branches operating system continue developed alongside gecos-ii operating system developed general electric 36-bit ge-635 1962-1964 bore close resemblance architecturally ibsys ibm 7094 less dos/360 system/360 however ge-635 architecture different ibm system/360 gecos ambitious dos/360 gecos-ii supported time-sharing tss batch processing dynamic allocation memory ibm fixed partitions time making true second-generation operating system honeywell acquired ge computer division gecos-iii renamed gcos 3 heart 24-bits ge-400 series hardware line renamed h-6000 adding eis enhanced instruction set character oriented instead word oriented later honeywell marketing created series 60 renamed h-6000 level 66 later dps 8 honeywell along european affiliate cii-honeywell bull launched new 32-bit product line called level 64 later became dps 7 name gcos extended operating systems honeywell-marketed product lines gcos-64 completely different 32-bit operating system level 64 series similar parallel development called multics designed honeywell honeywell bull developers france boston gcos-62 operating system another 32-bit low-end line machines level 62 series designed italy gcos-61 operating system new version small system made france model 58 later level 61/58 operating system new 16-bit minicomputer line massachusetts billerica level 6 got name gcos 6 another renaming hardware product lines occurred 1979 level 6 becoming dps 6 level 62 becoming dps 4 level 64 becoming dps 7 level 66 becoming dps 8 operating systems retained gcos brand-name gcos 6 gcos 4 gcos 7 gcos 8 introduced gcos 8 extensive rewrite gcos 3 changes made support true virtual memory management demand paging changes also required new hardware gcos 3 supported maintenance several years announcement renaming gcos 3 later gcos 7 gcos 8 featured good codasyl relational database called integrated data store ids model successful idms several transaction processing monitors designed gcos 3 gcos 8 early attempt tp gcos 3 transaction processing executive assumed unix new process started handle transaction enjoyed limited success another tp system transaction driven system tds soon developed gcos 3 using single process potentially multiple threads service transactions tds essentially honeywell development later replaced backward-compatible transaction processing 8 tp8 gcos 8 profited overhaul gcos system architecture came gcos 8 make full use virtual memory concepts tp8 used multiple static processes way similar unix daemons handle incoming transactions multiplexed way tds tp8 successor commercially successful tds predated ibm cics similar architecture similar product also called tds developed gcos-7 internal architecture completely different dps 6 dps 4 ex-level 62 superseded motorola 68000- later powerpc minicomputers running unix product lines discontinued though gcos 6 ran emulator top aix dps 7 line along gcos 7 continued evolve dps 7000 hardware base late 1980s honeywell sold computer business joint venture initially included nec bull honeywell still holding stake time couple years bull took company nec supplied several generations mainframe hardware high end would run gcos 8 acos-4 operating system bull used nomenclature dps-9000 entire gcos 8-based mainframe line included models designed bull nec late 1990s early 2000s bull desire center development single hardware base running commodity intel chips bull value-adds platform called novascale based itanium 2 processors runs windows linux natively however instruction set simulators dps 7000 dps 9000 allowed gcos 7 gcos 8 run platform gcos 7 also ported lower-end xeon-based platform bull publicly stated gcos 8 continue developed itanium systems bull continues invest development money support gcos 7 gcos 8 still customers countries around world support gcos 7 gcos 8 bull planned least 2025 including regular hardware software upgrades trace gcos influence remains today modern unix systems early unix systems bell labs used gcos machines print spooling various services field added /etc/passwd carry gcos id information called gecos field survives today pw_gecos member used user full name human-id information due historically important far-reaching influence gcos sometimes known king operating systems gcos multithreading multiprogramming operating system originally oriented towards batch processing although later versions incorporated enhancements timesharing online transaction processing environments systems running gcos today use mainly batch oltp backend enterprise server although gcos basic architecture similar ibm 360 earlier ibm 7090 series abandoned ibm 360 subsequent operating systems competed also heavily influenced projects medinet multics wwmccs inherited strong security structure consequence hardware software features combine render operating system unusually secure operating system generation class multics influenced design hardware gate-oriented secure transfer-of-control instructions hardware-enforced system security levels similar famous multics rings operational environments wwmccs drove development special security features allow secure hosting classified information compartmentalization time separate versions gcos system special security features turned maintained specifically government customers gcos process-oriented os process hosts one execution threads executes virtual memory space virtual memory divided segments arbitrary size reminiscent multics segments second level address translation converts pure virtual addresses pageable addresses converted real addresses main memory backing store segments pages constructs include hardware-enforced security parameters top-level virtual memory architecture also simplifies sharing code data secure fashion way reminiscent multics gcos requires specific hardware designed operating system although recent machines capable running os emulation hardware originally much common multics hardware much mainframe equipment could switched gcos mode multics mode turn dial much peripheral equipment used gcos shared great deal multics although front-end network processors different two systems program languages available gcos included gcos algol algol-68 cobol snobol jovial apl fortran 68 coral 66 fortran 77 b become accustomed almost universal terminology units storage modern terminology applies across various operating systems computer vendors part everyday conversation terms like megabyte gigabyte mean much everyone terms like mebibyte gibibyte formally standardised however gcos8 system pre-dates mono-culture colourful units follows note system byte contains 9 bits values ranging 000 777 0–511 unlike usual 8-bit-bytes values ranging 00 ff 0-255 due 36-bit cpu architecture permanent file sizes specified llinks 1280 bytes temporary file sizes specified links 15,360 bytes since early 1970s gcos 3 gcos 8 disk drives used logical block addressing lba
[ 1522, 7331, 4759, 3849, 4670, 3951, 5571, 578, 7003, 1855, 3557, 2769, 7383, 1774, 6570, 2431, 5079, 7036 ]
Test
7,801
4
Disaster_recovery_and_business_continuity_auditing:disaster recovery business continuity auditing given organizations increasing dependency information technology run operations business continuity planning covers entire organization disaster recovery focuses auditing documents covering organization business continuity disaster recovery plans provides third-party validation stakeholders documentation complete contain material misrepresentations lack completeness result overlooking secondary effects vastly increased work-at-home overloads incoming recovery site telecommunications capacity bi-weekly payroll critical within first 48 hours causing perceived problems ever recovering complicated governmental possibly union reaction often used together terms business continuity disaster recovery different business continuity refers ability business continue critical functions business processes occurrence disaster whereas disaster recovery refers specifically information technology data-centric functions business subset business continuity primary objective protect organization event part operations and/or computer services rendered partially completely unusable minimizing downtime data loss disaster recovery measured terms two concepts auditor examines assess maximize effectiveness disaster recovery plans effective updated frequently adequate records need retained organization auditor examines records billings contracts verify records kept one record current list organization hardware software vendors list made periodically updated reflect changing business practice copies stored site made available accessible require auditor tests procedures used meet objective determine effectiveness disaster recovery plan drp documented process set procedures execute organization disaster recovery processes recover protect business infrastructure event disaster comprehensive statement consistent actions taken disaster disaster could natural environmental man-made man-made disasters could intentional example act terrorist unintentional accidental breakage man-made dam although one-size-fits-all plan three basic strategies latter may include securing proper insurance policies holding lessons learned brainstorming session business continuity plan bcp comprehensive organizational plan includes disaster recovery plan consists five component plans first three business resumption occupant emergency continuity operations plans deal infrastructure incident management plan imp deal infrastructure since establishes structure procedures address cyber attacks organization ’ systems generally represent agent activating disaster recovery plan leaving disaster recovery plan bcp component interest like every insurance plan benefits obtained proper planning including according geoffrey h. wold disaster recovery journal entire process involved developing disaster recovery plan consists 10 steps initial testing plan done sections normal business hours minimize disruptions subsequent tests occur normal business hours types tests include checklist tests simulation tests parallel tests full interruption tests due high cost various plans without critics dell identified five common mistakes organizations often make related bcp/dr planning auditor determines adequacy company insurance coverage particularly property casualty insurance review company insurance policies research among items auditor needs verify scope policy including stated exclusions amount coverage sufficient cover organization ’ needs policy current force auditor also ascertains review ratings assigned independent rating agencies insurance company companies providing coverage financial viability cover losses event disaster effective dr plans take account extent company responsibilities entities ability fulfill commitments despite major disaster good dr audit include review existing moa contracts ensure organization legal liability lack performance event disaster unusual circumstance minimized agreements pertaining establishing support assisting recovery entity also outlined techniques used evaluating area include examination reasonableness plan determination whether plan takes factors account verification contracts agreements reasonableness documentation outside research auditor must verify planning ensures management recovery team effective communication hardware contact information internal communication external issues business partners key customers audit techniques include procedures sustain staff round-the clock disaster recovery effort included good disaster recovery plan procedures stocking food water capabilities administering cpr/first aid dealing family emergencies clearly written tested generally accomplished company good training programs clear definition job responsibilities review readiness capacity plan often includes tasks inquires personnel direct physical observation examination training records certifications auditor must review procedures take account possibility power failures situations non-it nature
[ 6391, 4212, 3932, 2390, 4386, 4554, 972, 5135 ]
Test
7,802
4
NTP_server_misuse_and_abuse:ntp server misuse abuse ntp server misuse abuse covers number practices cause damage degradation network time protocol ntp server ranging flooding traffic effectively ddos attack violating server access policy ntp rules engagement one incident branded ntp vandalism open letter poul-henning kamp router manufacturer d-link 2006 term later extended others retroactively include incidents however evidence problems deliberate vandalism usually caused shortsighted poorly chosen default configurations deliberate form ntp server abuse came note end 2013 ntp servers used part amplification denial-of-service attacks ntp servers would respond single monlist udp request packet packets describing 600 associations using request spoofed ip address attackers could direct amplified stream packets network resulted one largest distributed denial-of-service attacks known time troublesome problems involved ntp server addresses hardcoded firmware consumer networking devices major manufacturers oems produced hundreds thousands devices using ntp coupled customers almost never upgrading firmware devices ntp query storms problems persist long devices service one particularly common ntp software error generate query packets short less five second intervals response received might technically reasonable send initial packets short intervals essential health network client connection re-attempts generated logarithmically exponentially decreasing rates prevent denial service protocol exponential logarithmic backdown applies connectionless protocol extension many portions connection-based protocols examples backing method found tcp specification connection establishment zero-window probing keepalive transmissions october 2002 one earliest known cases time server misuse resulted problems web server trinity college dublin traffic ultimately traced misbehaving copies program called tardis thousands copies around world contacting web server obtaining timestamp via http ultimately solution modify web server configuration deliver customized version home page greatly reduced size return bogus time value caused clients choose different time server updated version tardis later released correct problem first widely known case ntp server problems began may 2003 netgear hardware products flooded university wisconsin–madison ntp server requests university personnel initially assumed malicious distributed denial service attack took actions block flood network border rather abating ddos attacks flow increased reaching 250,000 packets-per-second 150 megabits per second june subsequent investigation revealed four models netgear routers source problem found sntp simple ntp client routers two serious flaws first relies single ntp server university wisconsin–madison whose ip address hard-coded firmware second polls server one second intervals receives response total 707,147 products faulty client produced netgear released firmware updates affected products dg814 hr314 mr814 rp614 query netgear servers poll every ten minutes give five failures update fixes flaws original sntp client solve larger problem consumers never update router firmware particularly device seems operating properly university wisconsin–madison ntp server continues receive high levels traffic netgear routers occasional floods 100,000 packets-per-second netgear donated 375,000 university wisconsin–madison division information technology help identifying flaw also 2003 another case forced ntp servers australian commonwealth scientific industrial research organisation csiro national measurement laboratory close public traffic shown come bad ntp implementation smc router models ip address csiro server embedded firmware smc released firmware updates products 7004vbr 7004vwbr models known affected 2005 poul-henning kamp manager danish stratum 1 ntp server available general public observed huge rise traffic discovered 75 90 originating d-link router products stratum 1 ntp servers receive time signal accurate external source gps receiver radio clock calibrated atomic clock convention stratum 1 time servers used applications requiring extremely precise time measurements scientific applications stratum 2 servers large number clients home networking router meet either criteria addition kamp server access policy explicitly limited servers directly connected danish internet exchange dix direct use stratum 1 servers d-link routers resulted huge rise traffic increasing bandwidth costs server load many countries official timekeeping services provided government agency nist u.s. since danish equivalent kamp provides time service pro bono publico return dix agreed provide free connection time server assumption bandwidth involved would relatively low given limited number servers potential clients increased traffic caused d-link routers dix requested pay yearly connection fee approximately kamp contacted d-link november 2005 hoping get fix problem compensate time money spent tracking problem bandwidth charges caused d-link products company denied problem accused extortion offered amount compensation kamp asserted cover expenses 7 april 2006 kamp posted story website story picked slashdot reddit news sites going public kamp realized d-link routers directly querying stratum 1 time servers violating access policies least 43 process april 27 2006 d-link kamp announced amicably resolved dispute 20 years eth zurich provided open access time server swisstime.ethz.ch operational time synchronization due excessive bandwidth usage averaging upwards 20 gb day become necessary direct external usage public time server pools ch.pool.ntp.org misuse caused mostly it-providers synchronizing client infrastructures made unusually high demands network traffic thereby causing eth take effective measures availability swisstime.ethz.ch changed closed access access server blocked entirely ntp protocol december 2016 operator community ntppool.org noticed significant increase ntp traffic starting december 13 investigation showed snapchat application running ios prone querying ntp servers hardcoded third party ios ntp library request snapchat-owned domain followed ntp request flood snap inc. contacted developers resolved problem within 24 hours notification update application apology assist dealing load generated snap also contributed timeservers australia south america ntp pools positive side effect ntp library used open source error-prone default settings improved feedback ntp community firmware tp-link wi‑fi extenders 2016 2017 hardcoded five ntp servers including fukuoka university japan australia new zealand ntp server pools would repeatedly issue one ntp request five dns requests every five seconds consuming 0.72 gb per month per device excessive requests misused power internet connectivity check displayed device connectivity status web administration interface issue acknowledged tp-link branch japan pushed company redesign connectivity test issue firmware updates addressing issue affected devices affected devices unlikely install new firmware wifi extenders tp-link install firmware updates automatically notify owner firmware update availability tp-link firmware update availability also varies country even though issue affects wifi range extenders sold globally servers fukuoka university reported shutdown sometime february april 2018 removed ntp public time server lists incidents became clear apart stating server access policy technical means enforcing policy needed one mechanism provided extending semantics reference identifier field ntp packet stratum field 0 january 2006 rfc 4330 published updating details sntp protocol also provisionally clarifying extending related ntp protocol areas sections 8 11 rfc 4330 particular relevance topic kiss-o'-death packet good network citizen best practices security considerations section 8 introduces kiss-o'-death packets new requirements ntp protocol work retroactively old clients implementations earlier version protocol recognize kod act time good technical means counteract misuse ntp servers 2015 possible attacks network protocol time network time security ntp internet draft codice_1 proposed using transport layer security implementation june 21 2019 cloudflare started trial service around world based previous internet draft
[ 7217, 1691, 7637, 6477, 6046 ]
Test
7,803
4
RiskIQ:riskiq riskiq cyber security company based san francisco california provides cloud-based software service saas organizations detect phishing fraud malware online security threats company co-founded 2009 lou manousos chris kiernan david pon received 10 million series funding summit partners february 2013 25 million series b funding battery ventures may 2014 riskiq member cloud security alliance csa isaca riskiq monitors advertising networks malware malvertising spyware also provides mobile app security services may 2018 standard bank deployed riskiq software automate threat analysis brand infringement cybercrime web-based attacks digital presence
[ 7486, 2961, 688, 5099, 330 ]
Test
7,804
9
Link_time:link time computer science link time refers period time creation computer program linker applied program link time occurs compile time runtime program executed common speak link time operations operations performed linker link time requirements programming language requirements must met compiled source code successfully linked operations performed link time usually include fixing addresses externally referenced objects functions various kinds cross module checks e.g type checks externally visible identifiers languages instantiation templates optimizing compilers delay code generation link time information complete program available resolving external variables program also done link time definition programming language may specify link time requirements source code must meet successfully compiled e.g maximum number characters externally visible identifier must considered significant programming languages may necessary compilation linking occur runtime
[ 7071, 1339, 4662, 1673, 1989, 1854, 6982 ]
Test
7,805
5
Apache_Avro:apache avro avro row-oriented remote procedure call data serialization framework developed within apache hadoop project uses json defining data types protocols serializes data compact binary format primary use apache hadoop provide serialization format persistent data wire format communication hadoop nodes client programs hadoop services avro uses schema structure data encoded two different types schema languages one human editing avro idl another machine-readable based json similar thrift protocol buffers require running code-generation program schema changes unless desired statically-typed languages apache spark sql access avro data source avro object container file consists file header consists data blocks avro specifies two serialization encodings binary json applications use binary encoding smaller faster debugging web-based applications json encoding may sometimes appropriate avro schemas defined using json schemas composed primitive types null boolean int long float double bytes string complex types record enum array map union fixed simple schema example data avro might stored corresponding schema meaning serialized item read without knowing schema ahead time serialization import avro.schema avro.datafile import datafilereader datafilewriter avro.io import datumreader datumwriter schema avro.schema.parse open user.avsc rb .read need know schema write according 1.8.2 apache avro writer datafilewriter open users.avro wb datumwriter schema writer.append name alyssa favorite_number 256 writer.append name ben favorite_number 7 favorite_color red writer.close file users.avro contain schema json compact binary representation data od -v -t x1z users.avro 0000000 4f 62 6a 01 04 14 61 76 72 6f 2e 63 6f 64 65 63 obj ... avro.codec 0000020 08 6e 75 6c 6c 16 61 76 72 6f 2e 73 63 68 65 6d .null.avro.schem 0000040 61 ba 03 7b 22 74 79 70 65 22 3a 20 22 72 65 63 a.. type rec 0000060 6f 72 64 22 2c 20 22 6e 61 6d 65 22 3a 20 22 55 ord name u 0000100 73 65 72 22 2c 20 22 6e 61 6d 65 73 70 61 63 65 ser namespace 0000120 22 3a 20 22 65 78 61 6d 70 6c 65 2e 61 76 72 6f example.avro 0000140 22 2c 20 22 66 69 65 6c 64 73 22 3a 20 5b 7b 22 fields 0000160 74 79 70 65 22 3a 20 22 73 74 72 69 6e 67 22 2c type string 0000200 20 22 6e 61 6d 65 22 3a 20 22 6e 61 6d 65 22 7d name name 0000220 2c 20 7b 22 74 79 70 65 22 3a 20 5b 22 69 6e 74 type int 0000240 22 2c 20 22 6e 75 6c 6c 22 5d 2c 20 22 6e 61 6d null nam 0000260 65 22 3a 20 22 66 61 76 6f 72 69 74 65 5f 6e 75 e favorite_nu 0000300 6d 62 65 72 22 7d 2c 20 7b 22 74 79 70 65 22 3a mber type 0000320 20 5b 22 73 74 72 69 6e 67 22 2c 20 22 6e 75 6c string nul 0000340 6c 22 5d 2c 20 22 6e 61 6d 65 22 3a 20 22 66 61 l name fa 0000360 76 6f 72 69 74 65 5f 63 6f 6c 6f 72 22 7d 5d 7d vorite_color 0000400 00 05 f9 a3 80 98 47 54 62 bf 68 95 a2 ab 42 ef ... gtb.h ... b. 0000420 24 04 2c 0c 41 6c 79 73 73 61 00 80 04 02 06 42 ..alyssa ... b 0000440 65 6e 00 0e 00 06 72 65 64 05 f9 a3 80 98 47 54 en ... red ... gt 0000460 62 bf 68 95 a2 ab 42 ef 24 b.h ... b. 0000471 deserialization reader datafilereader open users.avro rb datumreader need know schema read user reader reader.close outputs though theoretically language could use avro following languages apis written addition supporting json type protocol definitions avro includes experimental support alternative interface description language idl syntax known avro idl previously known genavro format designed ease adoption users familiar traditional idls programming languages syntax similar c/c++ protocol buffers others apache avro logo defunct british aircraft manufacturer avro originally a.v roe company football team avro f.c uses logo
[ 6506, 5983, 7238, 894, 4303, 1333, 5728, 993, 6428, 2740, 2741, 7444, 7896, 917, 3463, 3542, 3204, 1286, 6821, 5054, 6029, 7916, 840, 1392, 3031, 5408, 3558, 5677, 3479, 5506, 5419, 5863, 6387, 5075, 6137, 7299, 7488, 7857, 5874, 5965, ...
Test
7,806
4
VPN_blocking:vpn blocking vpn blocking technique used block encrypted protocol tunneling communications methods used virtual private network vpn systems often used large organizations national governments corporations act tool computer security internet censorship preventing use vpns bypass network firewall systems blocking vpn access done different ways ports used common vpn tunneling protocols pptp l2tp establish connections transfer data closed system administrators prevent use certain networks similarly website prohibit access content blocking access ip addresses known belong vpn providers governments known block access overseas ip addresses since vpn use involve connecting remote hosts operate government jurisdiction organizations ramped efforts block vpn access bypasses firewalls vpn providers responded utilizing sophisticated techniques make connections less conspicuous instance chinese government began using deep packet inspection identify vpn protocols golden frog began scrambling openvpn packet metadata popular vyprvpn service attempt avoid detection chinese internet users started reporting unstable connections may 2011 using vpns connect overseas websites services apple app store universities businesses began issuing notices stop using tools circumvent firewall late 2012 companies providing vpn services claimed great firewall china became able learn discover block encrypted communications methods used number different vpn systems 2017 telecommunications carriers china instructed government block individuals use vpns february 2018 government iran began blocking access non-government sanctioned vpns march 2013 months prior 2013 elections prosecute users violating state laws take offenders national courts supervision judiciary service use vpns approved government reportedly led surveillance inspection private data july 2017 state duma passed bill requiring internet providers block websites offer vpns order prevent spreading extremist materials internet.. unclear exactly russia plans implement new regulation though seems like federal security service fsb isps tasked identifying cracking vpns russian internet users also reported block expressvpn vpn service november 2017 bbc made clear russia banned vpn usage entirely vpn usage banned attempting access sites already blocked roskomnadzor russia governing body telecommunications mass media communications using vpn business personal reasons access legal sites russia permitted government syria activated deep packet inspection uprising 2011 order block vpn connections censorship targeted different vpn protocols like openvpn l2tp pptp government egypt activated deep packet inspection egyptian revolution 2011 order block vpn connections block access objection media newspaper sites censorship targeted different vpn protocols like openvpn l2tp ikev2 pptp sites government turkey using deep packet inspection detecting possible openvpn connections attempt stop unauthorized access users outside us hulu began blocking users accessing site ip addresses linked vpn services april 2014 however company also restricted access legitimate u.s.-based users using vpns security reasons vpn providers vikingvpn nordvpn torguard stated would seek ways address issue customers speaking directly hulu resolution rolling dedicated ip addresses respectively netflix came pressure major film studios september 2014 block vpn access 200,000 australian subscribers using netflix despite available yet australia vpn access netflix like streaming services allowed users view content securely country netflix users also used vpns means bypassing throttling efforts made service providers verizon also important note vpns might slow internet connection trying stream netflix however cases using vpn might improve connection isp throttling netflix traffic june 2018 netflix vpn proxy ban still active ceo netflix reed hastings made comment 2016 vpn market whole “ ’ small quite vocal minority ’ really inconsequential us. ” bbc started blocking users connecting via vpns october 2015 bbc able detect vpn connections monitoring number simultaneous connections coming ip address number connections ip becomes abnormal bbc block future connections offending ip address iplayer remains unavailable uk tv licence holders connecting eu countries bbc said interested able allow uk licence fee payers access bbc iplayer holiday welcome european union regulation help make feasible wikipedia often blocks editing vpns many vpns use open proxies wikipedia allow open proxies however still view articles vpns use proxies use closed proxies usually still edit wikipedia
[ 6879, 2644, 5488, 1559, 5847, 4162, 8008, 5157, 3572, 6487, 6312, 7867, 4014, 2356, 1805 ]
Test
7,807
4
GTUBE:gtube gtube generic test unsolicited bulk email 68-byte test string used test anti-spam systems particular based spamassassin spamassassin carries antispam score 1000 default would sufficient trigger installation contents string follows placed message body rfc 5322 compliant email message without linebreaks whitespaces exist varieties notably naitube carry variable weight gtphish trigger specifically phishing mail used mcafee implementation spamassassin
[ 496, 622, 21, 3031, 5401, 1828 ]
Validation
7,808
4
Warchalking:warchalking warchalking drawing symbols public places advertise open wi-fi network inspired hobo symbols warchalking marks conceived group friends june 2002 publicised matt jones designed set icons produced downloadable document containing within days jones publishing blog entry warchalking articles appeared dozens publications stories appeared several major television news programs around world word formed analogy wardriving practice driving around area car detect open wi-fi nodes term turn based wardialing practice dialing many phone numbers hoping find modem found wi-fi node warchalker draws special symbol nearby object wall pavement lamp post offering wi-fi service might also draw symbol advertise availability wi-fi location whether commercial personal
[ 768, 6987, 5046, 4699, 37 ]
Validation
7,809
4
Norman_Safeground:norman safeground norman safeground develops sells data security software anti-virus anti-spam anti-spyware backup local support company headquarters oslo norway norman safeground global partner-network main market europe norman competes antivirus industry avira bullguard f-secure frisk kaspersky mcafee panda security sophos symantec trend micro among others norman founded 1 october 1984 oslo company pioneer proactive security software solutions forensics malware tools utilizing patented sandbox technology 1995 norman acquired 50 percent ibas norwegian data recovery company company listed oslo stock exchange 11 august 1997 norman asa bought remaining 50 percent stake ibas 1999 2004 two companies de-merged ibas listed separate entity oslo stock exchange norman de-listed oslo stock exchange october 2009 acquired private equity fund fsn capital partners late 2012 norman asa split two companies br norman safeground focusing consumers smes norman shark focusing enterprise market intrusion prevention solutions services november 2014 norman safeground acquired avg technologies
[ 2268, 7809, 2390, 1838, 496, 6644, 5144, 142, 1395, 6305, 3495, 88 ]
Test
7,810
4
SuEXEC:suexec apache suexec feature apache web server allows users run common gateway interface cgi server side includes ssi applications different user normally web server processes run default web server user often wwwrun www-data apache nobody suexec feature consists module web server binary executable acts wrapper suexec introduced apache 1.2 often included default apache package provided linux distributions client requests cgi suexec activated call suexec binary wraps cgi scripts executes user account server process virtual host defined virtual host directive additionally suexec perform multi-step check executed cgi ensure security server including path-checks limit permitted commands etc user alice website including common gateway interface script files codice_1 common web root directory name folder accessed codice_2 user bob views alice webpage requires apache run one cgi scripts instead running scripts wwwrun results need scripts readable executable wwwrun group file owned group users otherwise scripts codice_3 wrapped using suexec run alice user id resulting higher security eliminating need make scripts readable executable users everyone wwwrun group instead alice needs able run script
[]
Validation
7,811
4
Kronos_(malware):kronos malware kronos type banking malware first reported 2014 sold 7,000 similar zeus focused stealing banking login credentials browser sessions 2015 attacks focused british banks august 2017 british security researcher marcus hutchins aka 'malwaretech previously notable involvement stopping may 2017 wannacry ransomware attack arrested fbi whilst visiting united states alleged created software 2014 sold 2015 via alphabay forums
[ 7186, 6526 ]
Test
7,812
3
ES_PEVM:es pevm es pevm ес пэвм soviet clone ibm pc 1980s es pevm models lineup also included analogues ibm pc xt ibm pc ibm xt/370 computers software adapted minsk belarus scientific research institute electronic computer machines нии эвм manufactured minsk well minsk production group computing machinery минское производственное объединение вычислительной техники мпо вт first models es pevm es-1840 es-1841 es-1842 unlike ibm pc two units system unit floppy drives unit models used backplane instead main board although system bus compatible isa bus used different type connector ibm pc expansion cards could installed es pevm later models es-1843 es-1849 etc fully compatible ibm pc xt ibm pc unlike ibm pc using intel 8088 processor early es pevm models used k1810vm86 processor 16-bit bus clock frequency 5 mhz processor placed separate board early versions board socket floating point coprocessor following boards produced es-1840 es-1841 volume production number models computers shipped alphados entirely russified version ms-dos/pc-dos 2.x 3.x commands entered russian example сменкат chdir files file extensions also russian атриб.исп attrib.exe operating system used main code page hardwired display rom compatible neither cp 866 cp 855 although partially iso/iec 8859-5 early models es pevm prone failures due manufacturing defects mean time failures mtbf around 350 hours
[ 6872, 1052, 4479, 3755, 2194 ]
Test
7,813
4
Caller_ID:caller id caller id caller identification cid also called calling line identification clid calling line identification cli calling number delivery cnd calling number identification cnid calling line identification presentation clip call display telephone service available analog digital telephone systems including voip transmits caller telephone number called party telephone equipment call set caller id service may include transmission name associated calling telephone number service called cnam service first defined 1993 international telecommunication union telecommunication standardization sector itu-t recommendation q.731.3 recipient may inspect information answering call display telephone set separately attached device digital displays cable television sets telephone television service provided vendor caller id information may inaccurate false forged hence caller id information fully relied upon identify caller.. root cause lack authenticity accountability transmission telephone identities countries terms caller display calling line identification presentation clip call capture calling line identity used call display predominant marketing name used canada although customers still refer colloquially caller id idea cnid service pots subscribers originated automatic number identification ani part toll free number service united states however cnid ani thing ani originally term given system identified telephone number placing call non-electronic central office switch previous calling number could identified electronically caller id made two separate pieces information calling number billing subscriber name available call made given name name passed number different methods example caller name may datafilled originating switch case sent along number commonly database accessed receiving switch order match number name name exist city state province designation may sent databases may shared among several companies paying every time name extracted reason mobile phone callers appear wireless caller location phone number registered e.g cell phone ga cell phone registered georgia u.s.a. vary based company owns block numbers provider number may ported additionally nothing ensures number sent switch actual number call originated telephone switch initiating call may send digit string desired caller id telephone switch therefore operating entity must also trusted provide secure authentication displayed caller id also depends equipment originating call call originates pots line standard loop start line caller id provided service provider local switch since network connect caller callee phone answered generally caller id signal altered caller service providers however allow caller block caller id presentation vertical service code *67 call placed behind private branch exchange pbx options typical telephony environment pbx connects local service provider primary rate interface pri trunks generally although absolutely service provider simply passes whatever calling line id appears pri access trunks transparently across public switched telephone network pstn opens opportunity pbx administrator program whatever number choose external phone number fields ip phone services itsps internet telephony service providers support pstn gateway installations throughout world gateways egress calls local calling area thus avoiding long distance toll charges itsps also allow local user number located foreign exchange new york caller could los angeles number example user places call calling line id would los angeles number although actually located new york allows call return without incur long distance calling charges cellphones biggest issue appears passing calling line id information network cellphone companies must support interconnecting trunks significant number wireline pstn access carriers cli localisation describes process presenting localised cli calling line identity recipient telephone call cli localisation utilised various organisations including call centres debt collectors insurance companies cli localisation allows companies increase contact rate increasing chance called party answer phone call localised cli displayed called party device call perceived local recognisable caller rather withheld unknown premium rate number presented telephone number adjusted depending area code dialed number 1968 theodore george ted paraskevakos working communications engineer sita athens greece began developing system automatically identify telephone caller call recipient several attempts experiments developed method caller number transmitted receiver device method basis modern-day caller id technology 1969 1975 paraskevakos issued twenty separate patents related automatic telephone line identification since significantly predated similar patents appear prior art later united states patents issued kazuo hashimoto carolyn a. doughty 1971 paraskevakos working boeing huntsville alabama constructed reduced practice transmitter receiver representing world first prototypes caller-identification devices installed peoples telephone company leesburg alabama demonstrated several telephone companies original historic working models still possession paraskevakos patents related devices paraskevakos also proposed send alphanumeric information caller name receiving apparatus make banking telephone feasible also proposed identify calling telephone special code e.g. pf public phone ho home phone office phone pl police may 1976 kazuo hashimoto prolific japanese inventor one thousand patents worldwide first built prototype caller id display device could receive caller id information work caller id devices early prototypes received smithsonian institution national museum american history 2000 u.s. patent 4,242,539 filed originally may 8 1976 resulting patent re-examined patent office successfully licensed major telecommunications computer companies world initially operating telephone companies wanted caller id function performed central office voice announcement charged per-call basis john harris employee northern telecom telephone set manufacturing division london ontario promoted idea caller id telephone set display telephone coded eccs enhanced custom calling services video prototype used leverage feature central office telephone set 1977 brazilian inventor valdir bravo salinas filed patent application caller id device brazilian patent trademarks office inpi patent issued 1982 patent pi7704466 first patent ever issued caller id equipment brazil later 1980 two brazilian inventors joão da cunha doya nélio josé nicolai filed different patent applications caller id devices doya ’ application filed may 2 1980 issued patent pi8003077 nicolai ’ application filed july 2 1980 rejected copy salinas invention 1981 another application caller id equipment filed inpi josé daniel martin catoira afonso feijó da costa ribeiro neto application granted patent issued patent pi8106464 first market trial caller id custom local area signaling services conducted bell atlantic may 1984 bell communications research bellcore named service caller id regional bell operating companies later adopted name eventually became generally accepted name united states planning trial initiated team bell laboratories western electric bell system divestiture participation bell atlantic purpose trials assess revenue potential services depend deployment common channel signaling network needed transmit calling number originating terminating central offices trial results analyzed bellcore members original team 1987 bell atlantic verizon communications conducted another market trial hudson county new jersey followed limited deployment bellsouth first company deploy caller id december 1988 memphis tennessee full deployment nine-state region next four years bell atlantic second local telephone company deploy caller id new jersey hudson county followed us west communications centurylink 1989 1995 bellcore released another type modulation similar bell 202 became possible transmit caller id information even provide call-disposition options user already telephone service became known markets call waiting id combined call-disposition options call waiting deluxe technically referred analog display services interface call waiting deluxe bellcore telcordia technologies term type ii caller id disposition options class-based pots-telephone calling feature works combining services call waiting caller id also introduces options feature conjunction certain screen-based telephones capable equipment gives telephone user option data checksum united states caller id information sent called party telephone switch analog data stream similar data passed two modems using bell 202 modulation first second rings telephone unit still hook telephone call answered quickly first ring caller id information transmitted recipient two types caller id number name+number number-only caller id called single data message format sdmf provides caller telephone number date time call name+number caller id called multiple data message format mdmf addition information provided sdmf format also provide directory listed name particular number caller id readers compatible mdmf also read simpler sdmf format sdmf caller id reader recognize mdmf data stream act caller id information present e.g line equipped caller id instead sending caller id first second ring systems uk use line reversal announce caller id caller id signals simply sent without announcement instead bell 202 european alternative v.23 sometimes used without 75-baud reverse channel data sent using dtmf signalling general cid transmitted origin call calling party full phone number including area code including international access code country code international call calling party name added consumer terminating central office consumer subscribed service calling name delivery automatic ss7 signalling system 7 tcap query may launched called party central office order retrieve information calling name delivery caller id equipment consumer location caller name already associated calling party line originating central office canadian systems using ccs7 automatically cases send calling name call set-up routing information time call look name associated phone number carrier instances access information third-party database database providers charge small fee access databases cnam dip fee small – less penny per call starts negotiations cnam dip fees .004 per lookup opencnam fees bit expensive .0048 per lookup avoid charges carriers report name unavailable report name city state based phone number particularly wireless callers toll-free numbers may report string tollfree number name available database smartphones use third-party mobile app name lookup third-party database telemarketing organisations often spoof caller id instances done provide central number consumers call back toll-free number rather consumers call back outbound call centre call actually originated however telemarketers block fraudulently spoof caller id prevent traced united states federal law telemarketers block send false caller id individuals bring civil suits federal communications commission fcc fine companies individuals illegally spoofing blocking caller id telemarketers used caller id marketing using toll-free number registering text string free money free plane tickets name displayed caller id internet service providers isps providing dial-up access require customer use cnid prevent abuse account unauthorised callers systems dial-up access programmed accept calls specific caller id strings mobile phone providers used caller id automatically connect voice mail call voice mail number made associated mobile phone number bypassing need enter password convenient many users spoofing practice replaced secure authentication many carriers caller id transmission implemented using different technologies standards countries united states bellcore fsk standard prevalent whereas taiwan uses etsi fsk sometimes individual service providers within country use different standards caller id converters used translate one standard another telephone equipment usually displays clid information difficulty modems notoriously problematic modems support british telecom standard hardware drivers often errors prevent clid information recognised uk telephone companies use slight variations bellcore standard clid support hit miss cnd currently available australia subscribers integrated services digital network isdn legislation section 276 australia industry code calling number display acif c522 february 2003 united states telemarketers required transmit caller id requirement went effect january 29 2004 courts ruled caller id admissible providers required fcc rules offer per-call blocking caller id customers legislation united states made caller id spoofing illegal fraudulent purposes starting mid-2017 intended culmination 2019 fcc pushed forward caller id certification implemented via methodology shaken/stir caller id blocking common term service caller prevent display calling number recipient telephone blocking number formally referred calling line identification restriction clir telecommunications regulators vary requirements use effectiveness assorted technologies prevent numbers displayed generally unlisted numbers always blocked non-published regular listed numbers usually blocked varying treatment determination call display blocking many factors desired customers inquire carefully make sure number displayed telephone service provider may also vertical service codes dialed configure blocking active calls call-by-call basis locations united states regulations allow require blocking automatic transparent caller blocking applied call-by-call basis time call made subscribers block caller id dialing special code vertical service code vsc making call north america regions code *67 1167 rotary dial united kingdom ireland 141 special code block information companies using call capture technology means equipment caller id simply display word private withheld cnid blocked caller request number actually transmitted entire telephone network presentation withheld flag set destination co expected honor flag sometimes not—especially destination phone number served isdn pri alternatively cases caller id blocked automatically released call-by-call basis dialing special code *82 north america 1470 uk see enabling similarly countries offer anonymous caller rejection rejects calls subscriber name number blocked telephone companies protect clients receiving blocked information routing anonymous calls service privacy manager caller required announce service asks called party want accept reject call telephone companies play recording caller advising called party rejection configuration often offer advice prefixing dialing *82 get call intended called party emergency services likely able show restricted number using service called calling line identification restriction override cliro using general ani services features create cat-and-mouse game type situation whereby subscribers must purchase additional services order cancel services prefixing telephone number following codes disables caller id per-call basis countries networks vary however gsm mobile networks callers may dial 31 number wish call disable countries network providers allow caller id blocking based domestic telecommunications regulations clir available external app value-added service depending operator country number prefix codes unblock caller id gsm mobile networks callers may dial *31 enable caller id subsequent calls caller id spoofing practice causing telephone network display number recipient caller id display different actual originating station many telephone services isdn pri based pbx installations voice ip services permit caller configure customized caller id information corporate settings permits announcement switchboard number customer service numbers caller id spoofing may illegal countries certain situations consumer telephone company must pay small fee caller id text transmitted call fee called cnam dip fee named dip fee consumer carrier pays fee dip originating telephone company database get caller id information several companies engage generating dip fees catering companies make large number outbound calls callerid4u pacific telecom communications group cater telemarketers generate revenue fees caller id information telemarketers enter agreement companies like callerid4u pacific telecom communications group share revenue produced telemarketing call consumers face significant barriers exiting call list often removed list calling opt-out numbers often results fast-busy call never completes consumer remains list according reports companies like callerid4u thousands phone numbers thousands ftc complaints filed month violating call registration large number phone numbers dilute number complaints company phone number
[ 5714, 6788, 8171, 1358, 3018, 5045, 740, 3546, 320, 2944, 768, 6668, 5175, 1321, 1055, 6240 ]
Test
7,814
2
System_6:system 6 system 6 also referred system software 6 graphical user interface-based operating system macintosh computers released 1988 apple computer inc. part classic mac os series operating systems system 6 included new macintosh computers succeeded system 7 1991 boxed version system 6 cost 49 introduced system 6 classed monolithic operating system features improved multifinder allows co-operative multitasking new utility called macromaker included system 6 enabled allowed users record mouse keyboard input macros macromaker unique user interface aimed look act like tape recorder macromaker criticized lack features compared microsoft automac iii already available commercially macromaker recorded locations mouse-clicks inside windows clicked exactly users soon found could used automate sophisticated programs pre-recorded clicks would miss buttons moved failed appear upon playback addition macromaker limitations recorded start end locations mouse movements precise path movements macros handle situations required macro wait period time action macromaker compatible system 7 marked introduction applescript alternative cooperative multitasking made macintosh debut march 1985 program called switcher andy hertzfeld allowed user launch multiple applications switch many programs features function correctly switcher also switcher display windows applications beside selected one included operating system available apple separate purchase system 5 system 6 feature called multifinder instead much mature widely used system 6 multifinder could enabled disabled reboot disabled finder would quit user launched another application thus freeing ram enabled system behaved nowadays familiar multitasking tradition desktop windows applications screen background system 6 included support apple imagewriter lq postscript laser printers new software drivers allowed imagewriter lq used appletalk local area networks supports use tabloid b size paper system 6 also included quickergraf originally called quickerdraw piece system software used accelerate drawing color screen images macintosh ii licensed apple radius inc programmer andy hertzfeld system 6 apple menu used launch applications current application icon upper right-hand corner menu bar cycles open applications menu system 6 supports 24 bits addressable ram random access memory allowed maximum 8 megabytes ram provision virtual memory limitations fixed system 7 version hfs file system used system 6 also volume size limit supports 2 gigabytes gb 65,536 files volume limitation increased system 7.5 first increased limit 4 gb trash known wastebasket british versions empties finder terminates multifinder running occurs soon application launches icons desktop system 6 organized single folder later operating systems instead system records whether file desktop inefficient confusing user browse desktop applications besides finder even within standard open save dialog boxes furthermore dialogs primitive mostly unchanged since 1984 lack aliases shortcuts files another limitation file management system 6 custom file folder icons also supported problems remedied system 7 maximum 15 desk accessories may installed one time including chooser scrapbook control panel system 6 uses control panel desk accessory access installed control panels imposes severe user interface limitations desk accessories installed removed within finder requires font/da mover utility system 7 also fixed control panels however contained separate files methods exist interface personalization finder allows icon assigned color desktop background limited 8x8 pixel color tiled pattern color patterns introduced system 5 standard window frames black white however many init extension files existed add color customization system 7 later allowed user change color various aspects user interface 1989 system 6 user interface need change comparison nextstep operating system time system 6 make use sound user interface presented several limitations terms file management way windows displayed initial releases system 6 unstable many third party software developers receive copies release resulting widespread compatibility problems first many common software programs microsoft excel microsoft works 4th dimension fully compatible system 6 also software bugs color manager script manager sound manager extension files apple announced 66 bugs fixed 6.0.1 update released september 1988 however major bug involving text spacing screen fonts found 6.0.1 distribution began led quick release 6.0.2 solved problem customers waited longer moving system 6 poor reputation already gained system 6 officially supported apple many different machines shipped system 6 may apple computers system 6 officially supported may nevertheless able run perhaps limitations
[ 6788, 1069, 2547, 4670, 4320, 5037, 6814, 1103, 6113, 405, 6119, 1123, 6479, 2609, 4373, 7226, 5091, 3346, 5101, 102, 5469, 4768, 2294, 2300, 838, 3387, 502, 3390, 1964, 149, 2327, 4453, 3412, 3751, 8043, 2357, 8066, 5916, 3459, 5571, 5...
Validation
7,815
4
HMG_Infosec_Standard_No.1:hmg infosec standard no.1 hmg information assurance standard no.1 usually abbreviated is1 security standard applied government computer systems uk standard used assess – suggest responses – technical risks confidentiality integrity availability government information modelling technique used standard adaptation domain based security confidentiality terms is1 apply information protectively marked may still used assess risks integrity availability information uk cabinet office security policy framework requires ict systems manage government information interconnected assessed identify technical risks is1 standard method mandated previous versions security policy framework methods may used results is1 assessment responses risks recorded using hmg information assurance standard no.2 usually abbreviated is2 concerns risk management relevant accreditation government computer systems cesg provides is1 risk assessment tools hmg is2 full accreditation statement based hmg is1 itshc security health check deloitte subsequent remediation recipero interface recipero nmpr uk government pnc systems used track mobile devices law enforcement purposes posted publicly public hmg is2 full accreditation statement based actual itshc deloitte case puts auditor reputation line way confidential statement
[ 7560, 5568, 5766, 3241, 6998, 5402, 1805 ]
Test
7,816
2
UDID:udid udid acronym unique device id udid feature apple ios devices unique identifier single device fetched apple servers user tries activate device using icloud setup app id also used itunes detect phone communicate restoring ipsw firmware unique id formatted two ways devices introduced 2007 2018 represented 40-digit lowercase hex code device models introduced 2018 25-digit uppercase hex code written device cover imei retrieved itunes normal mode apple usually uses id assign apple id icloud id device also holds find iphone activation status udid calculated follows verizon iphone 4 devices use
[ 7789, 6788, 889, 2368, 4575, 6971, 552, 3445, 2464, 3001, 4376, 120, 4690, 3107, 2300, 3025, 318, 405, 4653, 1025, 7601, 2679, 327, 2954, 2327, 6040, 2331, 3050, 4537, 2880, 4820, 163, 6142, 1599, 2609, 1234, 3412, 5450, 6312, 7404, 500...
Test
7,817
2
Pieter_Van_den_Abeele:pieter van den abeele pieter van den abeele computer programmer founder powerpc-version gentoo linux foundation connected distribution linux computer operating system founded gentoo os x received scholarship apple computer 2004 pieter invited opensolaris pilot program assisted sun microsystems building development eco-system around solaris pieter nominated opensolaris community advisory board managed team developers make gentoo available solaris operating system well pieter co-author gentoo handbook teams managed pieter van den abeele shaped powerpc landscape several firsts gentoo/powerpc first distribution introduce powerpc live cds gentoo also beat apple releasing full 64-bit powerpc userland environment ibm powerpc 970 g5 processor gentoo-based home media communication system based freescale semiconductor powerpc 7447 processor best show award inaugural 2005 freescale technology forum orlando florida pieter also member power.org consortium participates committees workgroups focusing disruptive business plays around power architecture
[ 5652, 2458, 578 ]
Test
7,818
4
RSA_SecurID:rsa securid rsa securid formerly referred securid mechanism developed security dynamics later rsa security rsa security division emc performing two-factor authentication user network resource rsa securid authentication mechanism consists token — either hardware e.g key fob software soft token — assigned computer user creates authentication code fixed intervals usually 60 seconds using built-in clock card factory-encoded almost random key known seed seed different token loaded corresponding rsa securid server rsa authentication manager formerly ace/server tokens purchased on-demand tokens also available provide tokencode via email sms delivery eliminating need provision token user token hardware designed tamper-resistant deter reverse engineering software implementations algorithm software tokens appeared market public code developed security community allowing user emulate rsa securid software access current rsa securid code original 64-bit rsa securid seed file introduced server later 128-bit rsa securid algorithm published part open source library rsa securid authentication scheme seed record secret key used generate one-time passwords newer versions also feature usb connector allows token used smart card-like device securely storing certificates user authenticating network resource—say dial-in server firewall—needs enter personal identification number number displayed moment rsa securid token though increasingly rare systems using rsa securid disregard pin implementation altogether rely password/rsa securid code combinations server also real-time clock database valid cards associated seed records authenticates user computing number token supposed showing moment time checking user entered older versions securid duress pin may used—an alternate code creates security event log showing user forced enter pin still providing transparent authentication using duress pin would allow one successful authentication token automatically disabled duress pin feature deprecated available currently supported versions rsa securid system adds layer security network difficulty occur authentication server clock becomes sync clock built authentication tokens normal token clock drift accounted automatically server adjusting stored drift value time sync condition result normal hardware token clock drift correcting synchronization authentication manager server clock sync token tokens accomplished several different ways server clock drifted administrator made change system clock tokens either resynchronized one-by-one stored drift values adjusted manually drift done individual tokens bulk using command line utility rsa security pushed forth initiative called ubiquitous authentication partnering device manufacturers ironkey sandisk motorola freescale semiconductor redcannon broadcom blackberry embed securid software everyday devices usb flash drives cell phones reduce cost number objects user must carry token codes easily stolen mutual-authentication exists anything steal password also steal token code significant since principal threat users believe solving technology simplest practical vulnerability password container losing special key device activated smart phone integrated key function vulnerability healed single token container device within preset time span activation consideration presumes loss prevention e.g additional electronic leash body sensor alarm rsa securid tokens offer level protection password replay attacks designed offer protection man middle type attacks used alone attacker manages block authorized user authenticating server next token code valid able log server risk-based analytics rba new feature latest version 8.0 provides significant protection type attack user enabled authenticating agent enabled rba rsa securid prevent man browser mitb based attacks securid authentication server tries prevent password sniffing simultaneous login declining authentication requests two valid credentials presented within given time frame documented unverified post john g. brainard attacker removes user ability authenticate however securid server assume user actually authenticating hence allow attacker authentication attack model system security improved using encryption/authentication mechanisms ssl although soft tokens may convenient critics indicate tamper-resistant property hard tokens unmatched soft token implementations could allow seed record secret keys duplicated user impersonation occur hard tokens hand physically stolen acquired via social engineering end users small form factor makes hard token theft much viable laptop/desktop scanning user typically wait one day reporting device missing giving attacker plenty time breach unprotected system could occur however users userid pin also known risk-based analytics provide additional protection use lost stolen tokens even users userid pin known attackers batteries go flat periodically requiring complicated replacement re-enrollment procedures 2003 rsa securid commanded 70 two-factor authentication market 25 million devices produced date number competitors vasco make similar security tokens mostly based open oath hotp standard study otp published gartner 2010 mentions oath securid competitors network authentication systems opie s/key sometimes generally known otp s/key trademark telcordia technologies formerly bellcore attempt provide something level authentication without requiring hardware token 17 march 2011 rsa announced victims extremely sophisticated cyber attack concerns raised specifically reference securid system saying information could potentially used reduce effectiveness current two-factor authentication implementation however formal form 8-k submission indicated believe breach would material impact financial results breach cost emc parent company rsa 66.3 million taken charge second quarter earnings covered costs investigate attack harden systems monitor transactions corporate customers according emc executive vice president chief financial officer david goulden conference call analysts breach rsa network carried hackers sent phishing emails two targeted small groups employees rsa attached email excel file containing malware rsa employee opened excel file malware exploited vulnerability adobe flash exploit allowed hackers use poison ivy remote administration tool gain control machines access servers rsa network hints breach involved theft rsa database mapping token serial numbers secret token seeds injected make one unique reports rsa executives telling customers ensure protect serial numbers tokens lend credibility hypothesis barring fatal weakness cryptographic implementation token code generation algorithm unlikely since involves simple direct application extensively scrutinized aes-128 block cipher circumstance attacker could mount successful attack without physical possession token token seed records leaked rsa stated release details extent attack give potential attackers information could use figuring attack system 6 june 2011 rsa offered token replacements free security monitoring services 30,000 securid customers following attempted cyber breach defense customer lockheed martin appeared related securid information stolen rsa spite resulting attack one defense customers company chairman art coviello said believe still believe customers protected april 2011 unconfirmed rumors cited l-3 communications attacked result rsa compromise may 2011 information used attack lockheed martin systems however lockheed martin claims due aggressive actions company information security team customer program employee personal data compromised significant tenacious attack department homeland security us defense department offered help determine scope attack
[ 704, 3932, 2543, 6795, 2912, 376, 3277, 2923, 740, 2587, 6842, 3323, 5779, 7214, 1505, 7600, 4025, 1528, 2991, 1173, 6526, 1544, 113, 6904, 6541, 6194, 2678, 3038, 3047, 6569, 2693, 862, 7307, 6589, 5187, 4838, 3426, 1996, 7328, 208, 20...
Test
7,819
1
Integrated_manufacturing_database:integrated manufacturing database integrated database system used small large businesses means incorporate manufacturing process updates stores records information view rapid retrieval examples could include capable performing searches particular part may present many different products
[]
Validation
7,820
4
Microsoft_Exchange_Hosted_Services:microsoft exchange hosted services microsoft exchange hosted services also known frontbridge email filtering system owned microsoft acquired 2005 frontbridge inc. frontbridge technologies began 2000 bigfish communications marina del rey california service sold directly partnership sprint nextel 30 march 2006 microsoft announced new branding new licensing model road map microsoft exchange hosted services ehs formerly known frontbridge technologies inc. microsoft exchange hosted services ehs four new products introduced ehs filtering filter actively help protect inbound outbound e-mail spam viruses phishing scams e-mail policy violations ehs archive message archiving system e-mail instant messages ehs continuity security-enhanced web interface allowed ongoing access e-mail unplanned outages on-premises e-mail environment ehs encryption preserve e-mail confidentiality allowing users send receive encrypted e-mail
[ 5452, 1357 ]
Test
7,821
4
Backblaze:backblaze backblaze data storage provider offers two products founded 2007 backblaze raised total 5.3 million capital profitable backblaze first product computer backup offering allows user back data continuously manually computer idle hourly schedule service makes use aes encryption security uses data compression bandwidth optimization reduce upload download times files need restored delivered form digital download external usb hard drive 8 tb usb flash drive 256 gb september 2015 backblaze launched new product b2 cloud storage infrastructure service iaas targeted software integration though web frontend apis also available directly competes similar services amazon s3 microsoft azure google cloud april 2018 backblaze announced cloud computing partnerships directly connect backblaze data centers partners packet servercentral offering high-performance cloud computing data stored b2 cloud storage transfer fees data uploaded onto backblaze data center sharded 17 data shards plus three parity shards file parity shard bits computed reed–solomon error correction algorithm shards stored 20 storage pods separate cabinet increase resilience power loss entire cabinet backblaze states vault architecture designed 99.999999999 eleven 9s annual durability computer backup backblaze uses combination aes ssl encryption protect user data data stored backblaze storage pods vaults using reed-solomon erasure coding encrypted user private key secured user password username default encryption private keys done server side unlikely protect government subpoena serious data breach users desiring additional security privacy use optional private encryption key pek backblaze b2 cloud storage data stored backblaze storage pods vaults using reed-solomon erasure coding encryption handled entirely user client software used manage stored data making immune government subpoena data breach protecting data transfer ultimate storage backblaze data centers 2009 2011 backblaze released cad drawings computer case used storage servers datacenters commercial off-the-shelf components x64 processors disks motherboards high-density storage servers built lower cost commercial ones february 2013 version 3.0 pod introduced increased storage capacity upgrades march 2014 version 4.0 pod introduced faster simpler less expensive tweaked version 4.5 march 2015 november 2015 version 5.0 storage pod released motherboard cpu sata cards upgraded memory increased 32gb april 2016 version 6.0 storage pod released
[ 3837, 7838, 2961, 4594, 2390, 4759, 5571, 1750, 2687, 5889 ]
Test
7,822
6
Mdadm:mdadm mdadm linux utility used manage monitor software raid devices used modern gnu/linux distributions place older software raid utilities raidtools2 raidtools mdadm free software maintained copyrighted neil brown suse licensed terms version 2 later gnu general public license name derived md multiple device device nodes administers manages replaced previous utility mdctl original name mirror disk changed functions added name understood short multiple disk device management linux software raid configurations include anything presented linux kernel block device includes whole hard drives example partitions example raid 10 distinct raid 0+1 consists top-level raid 1 mirror composed high-performance raid 0 stripes directly across physical hard disks single-drive failure raid 10 configuration results one lower-level mirrors entering degraded mode top-level stripe performing normally except performance hit single-drive failure raid 0+1 configuration results one lower-level stripes completely failing top-level mirror entering degraded mode two setups preferable depends details application question whether spare disks available spun original standard form names md devices number 0 99 recent kernels support names 2.4.x kernels earlier two options non-partitionable since 2.6.x kernels new type md device introduced partitionable array device names modified changing partitions identified adding partition number thus example since version 2.6.28 linux kernel mainline non-partitionable arrays partitioned partitions referred way partitionable arrays example since version 3.7 linux kernel mainline md supports trim operations underlying solid-state drives ssds linear raid 0 raid 1 raid 5 raid 10 layouts since support md found kernel issue using kernel running specifically present boot loader either e lilo grub legacy although normally present may present grub 2 order circumvent problem filesystem must used either without md support else raid1 latter case system boot treating raid1 device normal filesystem system running remounted md second disk added result catch-up filesystems usually small recent bootloaders possible load md support kernel module initramfs mechanism approach allows filesystem inside raid system without need complex manual configuration besides formats raid volumes metadata linux software raid also supports external metadata formats since version 2.6.27 linux kernel version 3.0 userspace utility allows linux use various firmware- driver-based raid volumes also known fake raid two supported formats external metadata mdmpd daemon used monitoring md multipath devices developed red hat part mdadm package program used monitor multipath raid devices usually started boot time service afterwards running daemon enterprise storage requirements often include desire one way talk single disk drive event failure talk disk drive via one controller system automatically switch another controller keep going called multipath disk access linux kernel implements multipath disk access via software raid stack known md multiple devices driver kernel portion md multipath driver handles routing i/o requests proper device handling failures active path try find path previously failed might working daemon upon startup reads current state md raid arrays saves state waits kernel tell something interesting happened wakes checks see paths multipath device failed starts poll failed path every 15 seconds starts working starts working daemon add path back multipath md device originally part new spare path one using filesystem lists active md devices information mdmpd requires find arrays monitor paths get notification interesting events
[ 1315, 6051, 1391, 1394, 5571, 5996, 6586, 6892, 4199, 578, 5447, 1435 ]
Validation
7,823
3
GNU_Mach:gnu mach gnu mach implementation mach microkernel default microkernel gnu hurd gnu mach runs ia-32 machines gnu mach maintained developers gnu project distributed terms gnu general public license gpl early versions hurd developed top cmu mach 3.0 1994 cmu stopped working mach gnu project switched university utah mach 4 kernel known gnu mach derived mach 4 utah stopped development first changelog entry thomas bushnell rather utah researcher 16 december 1996 2002 roland mcgrath branched oskit-mach branch gnu mach 1.2 intending replace device drivers hardware support code oskit release gnu mach 1.3 branch intended become gnu mach 2.0 main line however 2006 oskit-mach developed gnu mach 1.4 released 27 september 2013 eleven years 1.3
[ 1523, 8158, 5275, 3174, 1351, 5021, 4399, 2559, 5571, 3868, 3544, 6365, 7554, 7463, 7559, 3981, 1959, 4070, 6921, 4175, 6385, 2599, 1406, 6048, 6674, 5787, 966, 3751, 7775 ]
Test
7,824
5
Time-division_multiple_access:time-division multiple access time-division multiple access tdma channel access method shared-medium networks allows several users share frequency channel dividing signal different time slots users transmit rapid succession one using time slot allows multiple stations share transmission medium e.g radio frequency channel using part channel capacity tdma used digital 2g cellular systems global system mobile communications gsm is-136 personal digital cellular pdc iden digital enhanced cordless telecommunications dect standard portable phones tdma first used satellite communication systems western union westar 3 communications satellite 1979 used extensively satellite communications combat-net radio systems passive optical network pon networks upstream traffic premises operator usage dynamic tdma packet mode communication see tdma type time-division multiplexing tdm special point instead one transmitter connected one receiver multiple transmitters case uplink mobile phone base station becomes particularly difficult mobile phone move around vary timing advance required make transmission match gap transmission peers 2g cellular systems notable exception is-95 based tdma gsm d-amps pdc iden phs examples tdma cellular systems gsm combines tdma frequency hopping wideband transmission minimize common types interference gsm system synchronization mobile phones achieved sending timing advance commands base station instructs mobile phone transmit earlier much compensates propagation delay resulting light speed velocity radio waves mobile phone allowed transmit entire time slot guard interval end time slot transmission moves guard period mobile network adjusts timing advance synchronize transmission initial synchronization phone requires even care mobile transmits way actually know offset required reason entire time slot dedicated mobiles attempting contact network known random-access channel rach gsm mobile attempts broadcast beginning time slot received network mobile located next base station time delay succeed however mobile phone less 35 km base station time delay mean mobile broadcast arrives end time slot case mobile instructed broadcast messages starting nearly whole time slot earlier would expected otherwise finally mobile beyond 35 km cell range gsm rach arrive neighbouring time slot ignored feature rather limitations power limits range gsm cell 35 km special extension techniques used changing synchronization uplink downlink base station however limitation overcome although major 3g systems primarily based upon cdma time-division duplexing tdd packet scheduling dynamic tdma packet oriented multiple access schemes available 3g form combined cdma take advantage benefits technologies popular form umts 3g system uses cdma frequency division duplexing fdd instead tdma tdma combined cdma time-division duplexing two standard umts utra itu-t g.hn standard provides high-speed local area networking existing home wiring power lines phone lines coaxial cables based tdma scheme g.hn master device allocates contention-free transmission opportunities cftxop slave devices network one device use cftxop time thus avoiding collisions flexray protocol also wired network used safety-critical communication modern cars uses tdma method data transmission control radio systems tdma usually used alongside frequency-division multiple access fdma frequency division duplex fdd combination referred fdma/tdma/fdd case gsm is-136 example exceptions include dect personal handy-phone system phs micro-cellular systems umts-tdd umts variant china td-scdma use time-division duplexing different time slots allocated base station handsets frequency major advantage tdma radio part mobile needs listen broadcast time slot rest time mobile carry measurements network detecting surrounding transmitters different frequencies allows safe inter frequency handovers something difficult cdma systems supported is-95 supported complex system additions universal mobile telecommunications system umts turn allows co-existence microcell layers macrocell layers cdma comparison supports soft hand-off allows mobile phone communication 6 base stations simultaneously type same-frequency handover incoming packets compared quality best one selected cdma cell breathing characteristic terminal boundary two congested cells unable receive clear signal often negate advantage peak periods disadvantage tdma systems create interference frequency directly connected time slot length buzz sometimes heard tdma phone left next radio speakers another disadvantage dead time time slots limits potential bandwidth tdma channel implemented part difficulty ensuring different terminals transmit exactly times required handsets moving need constantly adjust timings ensure transmission received precisely right time move base station signal take longer arrive also means major tdma systems hard limits cell sizes terms range though practice power levels required receive transmit distances greater supported range would mostly impractical anyway dynamic time-division multiple access dynamic tdma scheduling algorithm dynamically reserves variable number time slots frame variable bit-rate data streams based traffic demand data stream dynamic tdma used
[ 7052, 1618, 6071, 1443, 6524, 3006, 3956, 823, 5387, 1375, 2117, 8108, 3724, 4801, 3314, 2236, 2061, 2062, 1974, 4093, 255, 1988, 3240, 6679, 3834 ]
Test
7,825
4
EnCase:encase encase shared technology within suite digital investigations products guidance software acquired opentext software comes several products designed forensic cyber security security analytics e-discovery use encase traditionally used forensics recover evidence seized hard drives encase allows investigator conduct depth analysis user files collect evidence documents pictures internet history windows registry information company also offers encase training certification data recovered encase used various court systems cases btk killer murder danielle van dam additional encase forensic work documented cases evidence provided casey anthony unabomber mucko wakefield massacre cases encase originally created shawn mccreight founder guidance software 1997 home 1998 encase forensic officially released originally named expert witness windows time gui forensic tools available 2002 encase enterprise released allowing first network enabled digital forensic tool used forensic investigative security matters 2005 encase ediscovery released enabled network abilities encase allow identification collection preservation analysis esi litigation investigative purposes 2007 encase airs automated incident response suite released discontinued evolved encase endpoint security automate scanning documenting remediation abilities encase enterprise also 2007 release encase information assurance encase data audit policy enforcement also effectively integrated encase endpoint security 2008 encase cybersecurity released combined many tools automation previous security functions streamlined workflow incident response 2015 encase endpoint security released evolution endpoint security user friendly web interface well integration many security tools expedite shorten response time attack event 2016 encase enterprise needed face lift distributed agent formerly referred servlet given abilities redesign encase endpoint investigator also 2016 release encase risk manager data risk assessment audit dlp-like services compliance 2017 guidance software acquired opentext company name guidance software longer used encase technology available within number products currently including encase forensic encase endpoint investigator encase ediscovery includes encase legal hold encase endpoint security encase portable guidance software also runs training courses foundations computer forensics several expert series courses include enscripting course automate various functions within encase certification os offered train toward prove knowledge within various fields include ence encase certified examiner encep encase certified ediscovery practitioner cfsr certified forensic security responder encase training team trained 100000 individuals date encase contains tools several areas digital forensic process acquisition analysis reporting software also includes scripting facility called enscript various api interacting evidence encase contains functionality create forensic images suspect media images stored proprietary expert witness file format compressible file format prefixed case data information consists bit-by-bit i.e exact copy media inter-spaced crc hashes every 64k data file format also appends md5 hash entire drive footer encase v7 mobile phone analysis possible addition add-ons available guidance software
[ 2717, 1715, 4759, 3517, 3179, 2195, 5561, 4316, 3700, 5571, 7181, 6020, 1756, 5150, 4523, 7105, 1300, 3823, 5254, 6488, 8148 ]
Test
7,826
3
Socket_FM2+:socket fm2+ socket fm2+ fm2b cpu socket used amd desktop steamroller-based godavari apus steamroller-based connect motherboard fm2+ slightly different pin configuration socket fm2 two additional pin sockets socket fm2+ apus compatible socket fm2 motherboards due aforementioned additional pins however socket fm2 apus richland trinity compatible fm2+ socket pcie links capable supporting pcie 2.x data rates addition gfx link capable supporting pcie 3.x data rate available chipsets consult fusion controller hubs fch mobile counterpart socket fp3 µbga906 4 holes fastening heatsink motherboard placed rectangle lateral lengths 48 mm 96 mm amd sockets socket am2 socket am2+ socket am3 socket am3+ socket fm2 cooling solutions therefore interchangeable
[ 2539, 6599, 2541, 5895, 4221, 4931, 7163, 2997, 5559, 1735, 3362, 2016, 5377, 6351, 913, 4694, 2751, 6545, 6373, 1961, 5063, 6655, 6562, 7484, 6307, 3145, 4090, 866, 5436, 780, 1143, 7782 ]
Test
7,827
2
Comparison_of_operating_systems:comparison operating systems tables provide comparison operating systems computer devices listing general technical information number widely used currently available pc handheld including smartphone tablet computer operating systems article usage share operating systems provides broader general comparison operating systems includes servers mainframes supercomputers large number variety available linux distributions grouped single entry see comparison linux distributions detailed comparison also variety bsd dos operating systems covered comparison bsd operating systems comparison dos operating systems information views operating system see operating system advocacy posix compliant partly compliant systems like freebsd linux macos solaris basic commands standardized note linux systems may vary distribution specific program even 'command called via posix alias function example wanted use dos dir give directory listing one detailed file listing per line could use alias dir='ls -lahf e.g session configuration file
[ 1807, 4297, 7881, 2547, 1077, 4670, 5021, 5726, 6085, 13, 3271, 6431, 3276, 5735, 3626, 2568, 5041, 7546, 5396, 1849, 3636, 7550, 740, 4336, 405, 1855, 5055, 6117, 2226, 4347, 3990, 1128, 65, 7581, 2246, 4733, 6489, 5783, 6853, 5784, 36...
Test
7,828
8
Embedded_HTTP_server:embedded http server embedded http server component software system implements http protocol examples usage within application might advantages using http perform natural limitations platforms embedded http server runs contribute list non-functional requirements embedded precise embeddable http server requirements every specific project requirements vary significantly example rom ram footprints serious constraint limit choices system designer c++ jvm availability system another constraint frequently performance issue typical embedded systems run multiple simultaneous tasks http server one may configured low priority task
[ 6986, 1602, 1670, 5571, 1730, 3383 ]
Test
7,829
7
Coda.io:coda.io coda cloud-based document editor founded shishir mehrotra alex deneui software provides word-processing spreadsheet database functions 2017 coda reported raised 60 million capital
[]
Test
7,830
4
Sqlmap:sqlmap sqlmap open source software used detect exploit database vulnerabilities provides options injecting malicious codes penetration testing tool automates process detecting exploiting sql injection flaws providing user interface terminal software run command line available download different operating systems linux distributions windows mac os operating systems addition mapping detecting vulnerabilities software enables access database editing deleting data viewing data tables users passwords backups phone numbers e-mail addresses credit cards confidential sensitive information sqlmap full support multiple dbmss including mysql oracle postgresql microsoft sql server microsoft access ibm db2 sqlite firebird sap maxdb full support injection techniques boolean error stack time union standard use software unix environment follows sqlmap -u http //172.16.0.0/files/file.php id=1 additional values combined help file prompted command sqlmap -h
[ 623, 5252, 7213, 3863, 6538, 5577, 7715, 578, 7848, 5956, 3140 ]
Validation
7,831
5
Wireless_Internet_Protocol:wireless internet protocol wireless internet protocols suite wireless protocols wireless application protocol 2.0 wap includes xhtml basic nokia xhtml mobile profile future developments wap open mobile alliance wireless internet protocols able deliver xhtml pages appropriate wireless devices without need http wap proxies using wireless internet protocols web pages rendered differently web browsers handhelds without need two different versions page
[ 4101 ]
Validation
7,832
3
Daedalian_Opus:daedalian opus game essentially series 36 jigsaw puzzles pentominos must assembled specific shape puzzles start rectangular shapes simple solutions puzzles quickly grow complex odder shapes like rocket ship gun even enlarged versions pentominoes level timed timer started stopped level finished one starts game three pentomino pieces completion early level new piece awarded player final level player given 2x2 square tetromino must complete 8x8 square puzzle completing level player given password access level later time password common english four-letter word guessing common four-letter words players could potentially access levels actually reached playing game name game inspired daedalus mythical character greek legend created labyrinth faithful fan version later coded msx computer system karoshi corporation 2006 game development contest msxdev'06 game ported different platforms pc gp2x
[]
Test
7,833
4
Shawn_Carpenter:shawn carpenter shawn carpenter american navy veteran whistleblower previously employed sandia national laboratories tracked chinese cyberespionage ring code-named titan rain fbi came national attention story reported september 5 2005 issue time magazine carpenter employee sandia national laboratories investigating security breaches networks however upon tracking several breaches sandia lockheed martin corporation redstone arsenal even nasa dating back 2003 carpenter noticed patterns began appear link attacks single group impressed meticulous voracious incredibly fast manner sometimes completed less 30 minutes hackers operated observations led alert federal government findings titan rain hacking operation first reported august 25 2005 washington post article bradley graham n't mention carpenter graham listed anonymous governmental officials sources informing supervisors breaches told concern sandia computers drop issue employment later terminated carpenter disobeyed management communicated information security breaches first united states army cyber counterintelligence special agents verified information later brought fbi fbi requested senior dac counterintelligence agent known counterintelligence community nickname doc handle carpenter lead operation behalf fbi carpenter confidential informant fbi almost half year sandia discovered actions carpenter reportedly felt betrayed termination viewed actions service country similar previous military service according carpenter termination hearing sandia bruce held sandia chief counterintelligence yelled 're lucky understanding management ... worked would decapitate would least blood office subsequent court case held testified use word decapitate recall using word blood would contest also apologized carpenter sued sandia national laboratories wrongful termination defamation jury awarded almost 4.7 million compensatory punitive damages february 13 2007 jury doubled punitive damages requested carpenter attorneys thad guyer stephani ayers philip davis 13-person new mexico state district court jury determined sandia handling shawn carpenter termination malicious willful reckless wanton fraudulent bad faith juror ed dzienis said sandia interest protecting us certainly n't show way handled shawn ms. alex scott jury forewoman said jurors upset lack documentation process reckless behavior part sandia adequate policies place employees hacking cavalier attitude national security global security carpenter wife dr. jennifer jacobs testified trial dr. jacobs former sandia scientist nuclear engineer west point graduate army reserve major said sandia management questioned loyalty company husband fired dr. jacobs left sandia later appointed white house fellow director united states national security council interview albuquerque journal dr. jacobs stated point us along bad country contractors like sandia corporation behaving way -- impunity citizens n't beginning end country kept coming back expect others sandia corporation private entity manages sandia national laboratories behalf national nuclear security administration department energy federal government united states wholly owned subsidiary for-profit lockheed martin corporation ironic twist carpenter testified trial found hundreds pages detailed schematics sensitive documents labeled lockheed martin proprietary information export controlled regarding mars reconnaissance orbiter stashed foreign server south korea helping fbi investigate stolen lockheed martin information along hundreds network breaches military united states defense contractors sandia officials fired carpenter employed netwitness corporation startup headed amit yoran former director national cyber security division within united states department homeland security march 2007 sandia national laboratories retained three additional attorneys international corporate defense firm baker botts post-trial motions sandia attorneys unsuccessfully argued throw jury verdict reduce judgment zero new trial carpenter attorneys successfully argued motion post-judgment interest sandia ordered pay interest rate 15 per year final judgment 4,742,146.66 plus attorney fees appeals process april 2007 sandia attorneys filed motion appeal jury verdict sandia national laboratories posted 5.8 million supersedeas bond prevent carpenter seizing sandia assets appeals process interest amount almost 60,000 month accumulates sandia pursues appeals according news reports sandia plans appeal new mexico supreme court necessary could take years october 14 2007 albuquerque journal published story analyst sandia settle suit stated sandia dropped appeal verdict according story judgment accumulating 15 percent interest since verdict favor february 2007 piece also related carpenter continues work national security area clients intelligence community federal agencies military
[ 129, 6756, 3575 ]
Test
7,834
2
ZOC_(software):zoc software zoc popular computer-based terminal emulator telnet software client microsoft windows apple macintosh macos operating systems supports telnet modem ssh 1 2 isdn serial tapi rlogin means communication terminal emulator supports xterm emulation full colors meta-keys local printing vt102 vt220 several types ansi well wyse tvi tn3270 sun cde supports full keyboard remapping scripting rexx languages support named pipes zoc commercial software developed markus schmidt emtec innovative software germany firm produces software various aspects communications via telephone pc isdn like price us 80 free evaluation period 30 days zoc downloaded evaluation emtec several shareware distribution sites emtec produce two associated independent telecommunications programmes use tcp/ip modem isdn etc pyrotrans ftp package including client server pyrobatchftp programmable ftp tool zoc first released os/2 october 1993 v0.95 windows november 1996 v3.02 1997 selected runner-up os/2 e-zine readers choice awards zoc released version 3.11 january 1999 support os/2 discontinued release version 5 mac os x supported version 6
[ 768, 7214, 7765, 4759, 5571, 7569, 6840, 5933, 7272 ]
Test
7,835
4
Beast_(Trojan_horse):beast trojan horse beast windows-based backdoor trojan horse commonly known hacking community remote administration tool rat capable infecting versions windows 95 10 written delphi released first author tataye 2002 became quite popular due unique features used typical client–server model client would operation attacker server would infect victim beast one first trojans feature reverse connection victims established gave attacker complete control infected computer virus would harmless opened opened virus would use code injection method inject applications machine running windows xp removal three files safe mode system restore turned would disinfect system default ports used direct reverse connections 6666 9999 respectively though attacker option changing beast came built-in firewall bypasser ability terminating anti-virus firewall processes also came file binder could used join two files together one executable
[ 5847, 3486, 3172, 74, 4759, 1554, 5571, 3835 ]
Test
7,836
4
Cyber_self-defense:cyber self-defense cybersecurity cyber self-defense refers self-defense cyberattack generally emphasizes active cybersecurity measures computer users sometimes used refer self-defense organizations whole corporate entities entire nations surveillance self-defense variant cyber self-defense largely overlaps active passive cybersecurity measures provide defenders higher levels cybersecurity intrusion detection incident handling remediation capabilities various sectors organizations legally obligated adhere cyber security standards organizations may conduct penetration test via internal team hire third-party organization audit organization systems larger organizations may conduct internal attacker-defender scenarios red team attacking blue team defending defenders namely threat hunters system administrators programmers proactively manage information systems remediate vulnerabilities gather cyber threat intelligence harden operating systems code connected devices networks blue teams may include information physical security personnel employed organization physical security may tested weaknesses employees may target social engineering attacks security audits digital physical systems may audited varying degrees knowledge relevant systems simulate realistic conditions attackers employees frequently trained security practices measures full-knowledge test scenarios known white box tests attacking party knows available information regarding client systems black box tests attacking party provided information regarding client systems gray box tests provide limited information attacking party cybersecurity researcher jeffrey carr compares cyber self-defense martial art one computer network attack surface may shrunk reduce risk exploitation legal theorists policy makers increasingly considering authorizing private sector take active measures hacking-back also known hackbacks contrast active attack measures passive defense measures present reduced risk cyberwarfare legal political economic fallout contemporary topic debate research question 'when cyber-attack threat thereof give rise right self-defense march 2017 tom graves proposed active cyber defense certainty act acdc would enhance computer fraud abuse act cfaa allow individuals private sector use certain tools currently restricted cfaa identify attackers prevent attacks hacking presents chicken egg problem wherein everyone allowed hack anyone everyone would hack everyone skilled resourced would remain brad maryman warns unintended consequences stating view notion legislate accept level undocumented unmonitored cyber actions anyone thinks hacked unfathomable
[ 3932, 2626, 5982, 5806, 4759, 803, 2727, 1078, 3855, 2644, 6526, 2390, 651, 7359, 2566, 5571, 1337, 5046, 578, 3794, 3383, 5051, 6022, 7836, 1489, 760, 4440, 6756, 5773, 3821, 860, 2789, 7125, 163, 1321, 7865, 3338, 4014, 3680, 1805 ]
Validation
7,837
3
Red_Pitaya_(hardware):red pitaya hardware red pitaya open-source hardware project intended alternative many expensive laboratory measurement control instruments core selling point inclusion 2x 125ms/s rf input 2x 125ms/s rf outputs 50 mhz analogue bandwidth 14 bit analog-to-digital digital-to-analog converters software includes oscilloscope spectrum analyzer signal generator lcr meter lcr add costs additional 400 euros 50 mhz 2x2 mimo pid controller re-programmed become devices io ports connected common field-programmable gate array fpga also auxiliary adc 250ks/s digital io three usb 2.0 ports wifi ethernet connector internally uses linux operating system mass storage device operating system micro-sd card due wide bandwidth adc dac red pitaya used software defined radio receiver transmitter radio frequency applications hamlab fully featured sdr hf tranceiver output power 10 w based red pitaya board expected released amateur radio market october 2016 although software including hdl source code project made freely available device fully open source hardware project device electrical schematics made openly available
[ 5405, 578, 5571, 1237, 1284 ]
Test
7,838
6
Amazon_S3:amazon s3 amazon s3 amazon simple storage service service offered amazon web services aws provides object storage web service interface amazon s3 uses scalable storage infrastructure amazon.com uses run global e-commerce network amazon s3 employed store type object allows uses like storage internet applications backup recovery disaster recovery data archives data lakes analytics hybrid cloud storage service-level agreement amazon s3 guarantees 99.9 monthly uptime works less 43 minutes downtime per month aws launched amazon s3 united states march 14 2006 europe november 2007 although amazon web services aws publicly provide details s3 technical design amazon s3 manages data object storage architecture aims provide scalability high availability low latency 99.999999999 durability 99.95 99.99 availability though service-level agreement durability basic storage units amazon s3 objects organized buckets object identified unique user-assigned key buckets managed using either console provided amazon s3 programmatically using aws sdk amazon s3 rest application programming interface api objects managed using aws sdk amazon s3 rest api five terabytes size two kilobytes metadata additionally objects downloaded using http get interface bittorrent protocol requests authorized using access control list associated object bucket support versioning disabled default note since buckets typically size entire file system mount systems access control scheme coarse-grained i.e unique access controls associated individual files bucket names keys chosen objects addressable using http urls amazon s3 used replace significant existing static web-hosting infrastructure http client accessible objects amazon aws authentication mechanism allows bucket owner create authenticated url valid specified amount time every item bucket also served bittorrent feed amazon s3 store act seed host torrent bittorrent client retrieve file drastically reduce bandwidth cost download popular objects use bittorrent reduce bandwidth aws provide native bandwidth limiting users access automated cost control lead users free-tier amazon s3 small hobby users amassing dramatic bills aws representatives stated bandwidth limiting feature design table 2006 2010 2011 feature longer development bucket configured save http log information sibling bucket used data mining operations various user mode file system fuse -based file systems unix-like operating systems linux etc used mount s3 bucket file system s3ql semantics amazon s3 file system posix file system file system may behave entirely expected amazon s3 provides option host static html websites index document support error document support support added result user requests dating least 2006 example suppose amazon s3 configured cname records host codice_5 past visitor url would find xml-formatted list objects instead general landing page e.g. index.html accommodate casual visitors however websites hosted s3 may designate default page display another page display event partially invalid url 404 error amazon s3 allows users enable disable logging enabled logs stored amazon s3 buckets analyzed logs contain useful information logs analyzed managed using third-party tools like s3stat cloudlytics qloudstat awstats splunk amazon s3 provides api developers aws console provides tools managing uploading files capable managing large buckets editing files third-party websites like s3edit.com software like cloudberry explorer forklift webdrive capability edit files amazon s3 amazon s3 offers four different storage classes offer different levels durability availability performance requirements broad adoption amazon s3 related tooling given rise competing services based s3 api services use standard programming interface however differentiated underlying technologies supporting business models cloud storage standard like electrical networking standards enables competing service providers design services clients using different parts different ways yet still communicate provide following benefits examples competing amazon s3-compliant storage implementations amazon web services introduced amazons3 2006 amazon s3 reported store 2 trillion objects 10 billion objects october 2007 14 billion objects january 2008 29 billion objects october 2008 52 billion objects march 2009 64 billion objects august 2009 102 billion objects march 2010
[ 10, 7165, 3953, 6806, 3627, 2212, 5064, 2961, 7213, 6860, 5447, 1514, 4387, 2988, 7613, 7969, 4045, 7984, 1550, 6906, 5135, 3383, 3028, 840, 842, 2682, 5160, 2687, 6219, 8020, 518, 2700, 6233, 5184, 5889, 5894, 5903, 1634, 3091, 6262, 7...
Test
7,839
2
Minerva_(QDOS_reimplementation):minerva qdos reimplementation written laurence reeves england minerva reimplementation sinclair qdos built-in operating system sinclair ql line personal computers minerva incorporated many bug fixes enhancements qdos superbasic programming language later versions also provided ability multi-task several instances superbasic interpreter something supported qdos minerva distributed rom chip daughterboard replaced ql original rom chips minerva mk ii daughterboard also produced also incorporated i²c interface non-volatile real-time clock version 1.89 minerva source code licensed gnu general public license reimplementations qdos include sms2 smsq/e
[ 1522, 7325, 7605, 280, 2818, 4759, 190, 4670, 5021, 8066, 8167, 4397, 13, 5644, 3271, 5116, 6984, 299, 3626, 7142, 7448, 5571, 2300, 5041, 7827, 4786, 578, 7550, 4244, 5232, 1992, 405, 6367, 6027, 6922, 8115, 5161, 5865, 7396, 65, 861, ...
Test
7,840
2
Livermore_Time_Sharing_System:livermore time sharing system livermore time sharing system ltss supercomputer operating system originally developed lawrence livermore laboratories control data corporation 6600 7600 series supercomputers ltss resulted cray time sharing system network livermore timesharing system nltss
[ 1522, 7325, 7605, 280, 785, 2818, 4759, 190, 4670, 5021, 8066, 8167, 4397, 13, 5644, 3271, 5116, 6984, 299, 3626, 7142, 5571, 2300, 5041, 7827, 4786, 578, 7550, 4244, 5232, 6367, 405, 1023, 6922, 8115, 5161, 8047, 5865, 7396, 65, 861, ...
Test
7,841
9
Scicos:scicos scicos graphical dynamical system modeler simulator users create block diagrams model simulate dynamics hybrid dynamical systems continuous discrete time compile models executable code applications include signal processing systems control queuing systems study physical biological systems scilab includes toolbox called xcos based scicos scicos developed distributed scientific software package scicoslab scicos 4.4.1 released april 2011 book modeling simulation scilab/scicos scicoslab 4.4 campbell chancelier nikoukhah provides overview software
[ 6527, 1908, 3148, 7860, 4759, 5571, 578, 2803, 1435 ]
Validation
7,842
3
Toric_code:toric code toric code topological quantum error correcting code example stabilizer code defined two-dimensional spin lattice simplest well studied quantum double models also simplest example topological order— z topological order first studied context z spin liquid 1991 toric code also considered z lattice gauge theory particular limit introduced alexei kitaev toric code gets name periodic boundary conditions giving shape torus conditions give model translational invariance useful analytic study however experimental realization requires open boundary conditions allowing system embedded 2d surface resulting code typically known planar code identical behaviour toric code cases toric code defined two-dimensional lattice usually chosen square lattice spin-½ degree freedom located edge chosen periodic stabilizer operators defined spins around vertex formula_1 plaquette face formula_2 lattice follows formula_3 use formula_4 denote edges touching vertex formula_1 formula_6 denote edges surrounding plaquette formula_2 stabilizer space code stabilizers act trivially hence formula_8 state formula_9 toric code space four-dimensional used store two qubits quantum information proven considering number independent stabilizer operators occurrence errors move state stabilizer space resulting vertices plaquettes condition hold positions violations syndrome code used error correction unique nature topological codes toric code stabilizer violations interpreted quasiparticles specifically code state formula_10 formula_11 quasiparticle known formula_12 anyon said exist vertex formula_1 similarly violations formula_14 associated called formula_15 anyons plaquettes stabilizer space therefore corresponds anyonic vacuum single spin errors cause pairs anyons created transported around lattice errors create anyon pair move anyons one imagine path connecting two composed links acted upon anyons meet annihilated path describes loop loop topologically trivial effect stored information annihilation anyons case corrects errors involved creation transport however loop topologically non-trivial though re-annihilation anyons returns state stabilizer space also implements logical operation stored information errors case therefore corrected consolidated consider noise model bit phase errors occur independently spin probability p p low create sparsely distributed pairs anyons moved far point creation correction achieved identifying pairs anyons created equivalence class re-annihilating remove errors p increases however becomes ambiguous anyons may paired without risking formation topologically non-trivial loops gives threshold probability error correction almost certainly succeed mapping random-bond ising model critical probability found around 11 error models may also considered thresholds found cases studied far code found saturate hashing bound error models biased errors bit errors occur often phase errors vice versa lattices square lattice must used achieve optimal thresholds thresholds upper limits useless unless efficient algorithms found achieve well-used algorithm minimum weight perfect matching applied noise model independent bit flip errors threshold around 10.5 achieved falls little short 11 maximum however matching work well correlations bit phase errors depolarizing noise means perform quantum computation logical information stored within toric code considered properties code providing fault-tolerance shown extending stabilizer space using 'holes vertices plaquettes stabilizers enforced allows many qubits encoded code however universal set unitary gates fault-tolerantly implemented unitary operations additional techniques required achieve quantum computing example universal quantum computing achieved preparing magic states via encoded quantum stubs called tidbits used teleport required additional gates replaced qubit furthermore preparation magic states must fault tolerant achieved magic state distillation noisy magic states measurement based scheme quantum computation based upon principle found whose error threshold highest known two-dimensional architecture since stabilizer operators toric code quasilocal acting spins located near two-dimensional lattice unrealistic define following hamiltonian formula_16 ground state space hamiltonian stabilizer space code excited states correspond anyons energy proportional number local errors therefore energetically suppressed gap shown stable local perturbations however dynamic effects perturbations still cause problems code gap also gives code certain resilience thermal errors allowing correctable almost surely certain critical time time increases formula_17 since arbitrary increases coupling unrealistic protection given hamiltonian still limits means make toric code planar code fully self-correcting quantum memory often considered self-correction means hamiltonian naturally suppress errors indefinitely leading lifetime diverges thermodynamic limit found possible toric code long range interactions present anyons proposals made realization lab another approach generalization model higher dimensions self-correction possible 4d quasi-local interactions mentioned called formula_12 formula_15 quasiparticles associated vertices plaquettes model respectively quasiparticles described anyons due non-trivial effect braiding specifically though species anyons bosonic respect braiding two formula_12 formula_15 effect full monodromy formula_12 formula_15 yield phase formula_24 result consistent either bosonic fermionic statistics hence anyonic anyonic mutual statistics quasiparticles demonstrate logical operations performed topologically non-trivial loops consider creation pair formula_12 anyons followed transport one around topologically nontrivial loop shown torus blue figure pair reannhilated state returned stabilizer space loop implements logical operation one stored qubits formula_15 anyons similarly moved red loop logical operation also result phase formula_24 resulting braiding anyons shows operations commute rather anticommute may therefore interpreted logical formula_28 formula_29 pauli operators one stored qubits corresponding logical pauli qubit correspond formula_15 anyon following blue loop formula_12 anyon following red braiding occurs formula_12 formula_15 pass parallel paths phase formula_24 therefore arise corresponding logical operations commute expected since form operations acting different qubits due fact formula_12 formula_15 anyons created pairs clear see quasiparticles antiparticles composite particle composed two formula_12 anyons therefore equivalent vacuum since vacuum yield pair pair annihilate vacuum accordingly composites bosonic statistics since braiding always completely trivial composite two formula_15 anyons similarly equivalent vacuum creation composites known fusion anyons results written terms fusion rules case take form formula_39 formula_40 denotes vacuum composite formula_12 formula_15 trivial therefore constitutes another quasiparticle model sometimes denoted formula_43 fusion rule formula_44 braiding statistics anyons see since single exchange two formula_43 involve full monodromy constituent formula_12 formula_15 phase formula_24 result implies fermionic self-statistics formula_43 use torus required form error correcting code surfaces may also used topological properties determining degeneracy stabilizer space general quantum error correcting codes defined two-dimensional spin lattices according principles known surface codes also possible define similar codes using higher-dimensional spins quantum double models string-net models allow greater richness behaviour anyons may used advanced quantum computation error correction proposals include models abelian anyons also non-abelian statistics explicit demonstration properties toric code state based approaches rather attempting realize hamiltonian simply prepare code stabilizer space using technique experiments able demonstrate creation transport statistics anyons recent experiments also able demonstrate error correction properties code realizations toric code generalizations hamiltonian much progress made using josephson junctions theory hamiltonians may implemented developed wide class topological codes experiment also performed realizing toric code hamiltonian small lattice demonstrating quantum memory provided degenerate ground state theoretical experimental works towards realizations based cold atoms toolkit methods may used realize topological codes optical lattices explored
[ 1901 ]
Test
7,843
4
Cure53:cure53 cure53 german cybersecurity firm company found dr.ing mario heidrich client side security researcher report firm south korean security app smart sheriff described security holes catastrophic south korean government ordered app shut
[ 2543, 5700, 4056, 1805 ]
Test
7,844
9
Comparison_of_C_Sharp_and_Visual_Basic_.NET:comparison c sharp visual basic .net c visual basic .net two primary languages used program .net framework c vb.net syntactically different languages different histories name suggests c syntax based core c programming language originally developed dennis ritchie bell labs 1970s java c++ two programming languages whose syntax also based c syntax share common look feel see comparison java c sharp topic basic roots go back dartmouth college basic beginner all-purpose symbolic instruction code developed 60 method overcome difficulties using assembly language written processor specific and/or brand name specific main frames hardware may recall programming hardware dependent design marketing reasons preserve logical composition programming transcend hardware microsoft claim fame operating system free consumers hardware specific devices encapsulating task within operating system code became portable due compiler fact visual basic .net c use clr common language runtime today microsoft hp interested creating iso standard language original goal however hp dropped support iso computer language never materialized international standard vb.net roots basic language '60s name acronym beginner all-purpose symbolic instruction code beginning basic used college community basic language first exposure computer programming acronym represented language accurately '70s language picked microcomputer manufacturers era used simple rom embedded programming language well quasi operating system input/output control early '80s language picked microsoft expanded significantly beyond original intent visual basic language/platform sold throughout 1990s rapid application development rad tool windows programming competed directly rad tools 1990s powerbuilder even though visual basic successful development platform discontinued 6th version vb6 microsoft introduced .net framework related visual studio development platform early 2000s time current c++ vb6 languages used microsoft basis two new programming languages new integrated development environment ide languages named c vb.net february 2017 microsoft communicated intent end co-evolution strategy two languages existed since 2010 allow two languages evolve independently c dominant microsoft-based development language developers notice vb 15 first appearing visual studio 2017 lacks certain language capabilities contained new c 7.3 though c vb.net syntactically different differences mostly end microsoft developed languages part .net framework development platform developed managed supported language development team microsoft compile intermediate language il runs .net framework runtime libraries although differences programming constructs discussed differences primarily syntactic assuming one avoids visual basic compatibility libraries provided microsoft aid conversion vb6 almost every command vb equivalent command c vice versa lastly languages reference base classes .net framework extend functionality result exceptions program written either language run simple syntax converter translate many open source commercially available products task fundamental differences languages found implementation interfaces declaration raising handling events although languages high-level programming languages vb.net maintains slightly higher level abstraction respects one main goals .net multi-language support intent design various microsoft languages level access os features able expose level power usability simplify calling module one language written another language implementation .net programming languages share runtime engine uniform abstract syntax tree common intermediate language additionally .net languages access platform features including garbage collection cross language inheritance exception handling debugging allows output binary produced .net programming language visual studio provides minor differences development environment c vb.net subsequent release visual studio differences development environments languages reduced instance early versions visual studio poor support intellisense c compared visual basic .net offer background compilation c currently main differences development environments additional features visual basic .net originated vb6 including background compilation feature visual studio ide whereby code compiled written programmer purpose identifying compilation errors without requiring solution built feature available visual basic since .net 1.1 present early versions visual studio visual basic .net however background compilation relatively new concept visual c available service pack 1 visual studio 2008 standard edition distinct disadvantage c error list panel update solution rebuilt refactoring large projects c made difficult need frequently rebuild solution order highlight compilation errors case visual basic error list panel synchronized background compiler background compilation less demanding system resources results faster build cycles particular advantage large projects significantly reduce time required start debugging ide bulk differences c vb.net technical perspective syntactic sugar features languages things easier one language another many differences two languages actually centered around ide although default codice_53 backward compatibility reasons recommended microsoft widely considered good practice turn codice_53 due fact increases application performance reduces possibility naming errors programming mistakes visual basic .net terminates block code codice_59 statements codice_60 statements loop familiar programmers experience using t-sql c braces codice_61 used delimit blocks familiar programmers experience widely deployed languages c++ java additionally c block consists single statement braces may omitted c case sensitive visual basic .net thus c possible two variables apparent name example codice_62 codice_63 visual studio correct make uniform case variables typed vb.net cases however case sensitivity useful c programmers typically capitalize type member names leave field variable names lowercase allows example fairly natural naming method arguments codice_64 however cause problems converting c code case-insensitive language visual basic unaccustomed reading case sensitive language visual basic case sensitive means combinations upper lower case letters keywords acceptable visual studio automatically converts visual basic keywords default capitalised forms e.g public c case sensitive c keywords lower cases visual basic c share keywords difference default visual basic keywords capitalised versions c keywords e.g codice_65 vs codice_66 codice_18 vs codice_68 keywords different versions visual basic c c keywords codice_80 represent different things applied methods opposed applied class definitions vb.net hand uses different keywords different contexts c vb.net high adoption rates active developer communities microsoft fully supports communities .net framework developers widely use vb.net c primary languages however c community activity internet books available c may indicate either adoption c users need help examples community industry adoption include c++/cli replacement managed extensions c++ adoption rate c vb.net significant following c++/cli syntactically stylistically culturally closest c however c++/cli stays closer c++ roots c c++/cli directly supports pointers destructors unsafe program concepts supported limited languages allows direct use .net code standard c++ code c++/cli used porting native/legacy c++ applications .net framework cases programmer wants take control code control comes significant cost ease use readability many automated tools come visual studio reduced functionality interacting c++ code reflection provide much information code c vb.net j runs distant fourth terms adoption j language primarily designed ease transition java applications .net framework allows developers leave much java j++ code unchanged still running .net framework thus allowing migrate small pieces another .net language c individually j receive level updates languages level community support example visual studio 2005 team system supports automatic generation unit tests c vb.net c++ excludes j j discontinued included visual studio 2008 newer versions since existing j feature set largely meets customer needs usage j declining .net languages compile common intermediate language cil contains rich metadata functionally logically equivalent original .net language code reasons possible code directly cil rarely done equivalency cil .net language code permits tools .net reflector transform .net assembly source code nearly identical original source code obfuscators often used guard operate directly modifying cil assembly order make difficult impossible de-compile higher level .net language
[ 1345, 4477, 7333, 4302, 2379, 109, 7071, 8085, 4053, 5571, 6277, 2661, 7005, 7460, 4156, 666, 7277, 4164, 1114, 5855, 3898, 5510, 2871, 7394, 3225, 8129, 2881, 6497, 2530, 2619, 1435 ]
Train
7,845
4
High-Tech_Bridge:high-tech bridge high-tech bridge sa web security company based geneva switzerland develops machine learning artificial intelligence technologies application security via ast platform immuniweb ai started december 2007 vendor-neutral penetration testing boutique high-tech bridge named industry leader best service provider among ethical hacking penetration testing companies frost sullivan market research 2012 high-tech bridge founded ilia kolochenko swiss application security expert sc media thought leader forbes technology council member contributing editor sc magazine uk dark reading idg cso online november 2013 international telecommunication union high-tech bridge agreed use immuniweb part itu toolset ensuring websites itu member states secure july 2015 high-tech bridge pricewaterhousecoopers switzerland announced strategic partnership based around immuniweb web penetration testing continuous monitoring vulnerability assessment capabilities partnership afterward expanded pwc global offices including pwc singapore high-tech bridge security research team released 500 security advisories affecting various software issues identified products many well-known vendors sony mcafee novell addition many web vulnerabilities affecting popular open source commercial web applications oscommerce zen cart microsoft sharepoint sugarcrm others high-tech bridge security research lab registered cve cwe compatible mitre high-tech bridge one 24 organizations globally first switzerland able achieve cwe certification company listed among 81 organizations august 2013 include cve identifiers security advisories high-tech bridge launched ssl/tls configuration testing tool october 2015 tool validates email web tls ssl server configuration nist guidelines checks pci dss compliance cited articles covering talktalk data breach discovery vulnerabilities yahoo sites high-tech bridge widely reported leading t-shirt gate affair changes yahoo bug bounty program high-tech bridge identified reported four xss vulnerabilities yahoo domains company awarded two gift vouchers value 25 sparse reward offered security researchers identifying vulnerabilities yahoo criticized sparking came called t-shirt-gate campaign yahoo sending t-shirts thanks discovering vulnerabilities high-tech bridge discovery vulnerabilities subsequent criticism yahoo reward program led yahoo rolling new vulnerability reporting policy offers 150 15,000 reported issues based pre-established criteria december 2013 high-tech bridge research privacy popular social networks email services cited class action lawsuit allegedly violating members privacy scanning private messages sent social network october 2014 high-tech bridge discovered remote code execution vulnerabilities php december 2014 high-tech bridge identified ransomweb attack development ransomware attacks hackers started taking webs servers encrypting data demanding payment unlock files april 2014 discovery sophisticated drive-by download attacks revealed drive-by download attacks used target specific website visitors authentication compromised web resource december 2015 high-tech bridge tested popular free email service providers ssl/tls email encryption hushmail previously considered one secure email providers received failing f grade company updated ssl configuration received score b+ march 2015 immuniweb recognized frost sullivan 2015 market insight 'the complete hybrid offering available april 2016 high-tech bridge selected red herring europe 2016 winner sc media reboot 2016 named immuniweb industry innovator analysis testing category april 2017 frost sullivan research machine learning application security testing ast recognized high-tech bridge innovative player ast marketplace outperforming hpe ibm security may 2017 gartner named high-tech bridge garter cool vendor cool vendors security midsize enterprises 2017 adam hils june 2017 high-tech bridge selected sc awards europe 2017 winner best emerging technology category june 2018 immuniweb named winner “ best usage machine learning ai ” category sc awards europe 2018 outperforming six finalists including ibm watson cybersecurity high-tech bridge member number security-related organizations including
[ 6029, 1134, 501, 5051, 1376, 8014, 4486, 2875, 6092 ]
Validation
7,846
4
Machine_Identification_Code:machine identification code machine identification code mic also known printer steganography yellow dots tracking dots secret dots digital watermark certain color laser printers copiers leave every single printed page allowing identification device document printed giving clues originator developed xerox canon mid-1980s existence became public 2004 2018 scientists developed privacy software anonymize prints order support whistleblowers publishing work mid-1980s xerox pioneered encoding mechanism unique number represented tiny dots spread entire print area xerox developed machine identification code assuage fears color copiers could used counterfeit bills received u.s. patent 5515451 describing use yellow dots identify source copied printed document october 2004 consumers first heard hidden feature used dutch authorities track counterfeiters used canon color laser printer november 2004 pc world broke news machine identification code used decades printers allowing law enforcement identify track counterfeiters central bank counterfeit deterrence group cbcdg denied developed feature 2005 civil rights group electronic frontier foundation eff encouraged public send sample printouts subsequently decoded pattern pattern demonstrated wide range printers different manufacturers models eff stated 2015 documents previously received foia suggested major manufacturers color laser printers entered secret agreement governments ensure output printers forensically traceable 2007 european parliament asked question invasion privacy pattern consists dot-matrix spread yellow dots barely seen naked eye dots diameter tenth millimeter 0.004 spacing one millimeter 0.039 arrangement encodes serial number device date time printing repeated several times across printing area case errors example code consists 8 × 16 dots square hexagonal pattern spreads surface appears sheet size din-a4 paper 150 times thus analyzed even fragments excerpts available printers arrange yellow dots seemingly random point clouds according chaos computer club 2005 color printers leave code matrix 32 × 16 dots thus store 64 bytes data 64×8 xerox one manufacturers draw attention marked pages stating product description digital color printing system equipped anti-counterfeit identification banknote recognition system according requirements numerous governments copy shall marked label necessary allows identification printing system created code visible normal conditions 2018 scientists tu dresden analyzed patterns 106 printer models 18 manufacturers found four different encoding schemes machine identification code made visible printing copying page subsequently scanning small section high-resolution scanner yellow color channel enhanced image processing program make dots mic clearly visible good lighting conditions magnifying glass may enough see pattern uv-light yellow dots clearly recognizable using steganographic process high-quality copies original e.g bank note blue light made identifiable using process even shredded prints restored 2011 shredder challenge initiated darpa solved team called shreds belong u.s. consisting otavio good two colleagues copies printouts documents confidential personal information example health care information account statements tax declaration balance sheets traced owner printer creation date documents revealed traceability unknown many users inaccessible manufacturers publicize code produces patterns unclear data may unintentionally passed copy printout particular mentions technique support materials affected printers exceptions see 2005 electronic frontier foundation eff sought decoding method made available python script analysis 2018 scientists tu dresden developed published tool extract analyze steganographic codes given color printer subsequently anonymize prints printer anonymization works printing additional yellow dots top machine identification code scientists made software available order support whistleblowers efforts publicize grievances methods identification easily recognizable yellow dots example modulation laser intensity variation shades grey texts already feasible unknown whether manufacturers using techniques
[ 7674, 3257, 5806, 5965, 7848 ]
Test
7,847
1
Metadata_repository:metadata repository metadata repository database created store metadata metadata information structures contain actual data metadata often said data data misleading data profiles example actual data data metadata one layer abstraction removed – data structures contain data metadata may describe structure data subject stored format well-designed metadata repository typically contains data far beyond simple definitions various data structures typical repositories store dozens hundreds separate pieces information data structure comparing metadata couple data items one digital one physical help one understand metadata really first digital data stored database one may table called patient many columns containing data describes different attribute patient one columns may named patient_last_name metadata column contains actual surnames patients database already used two items name column contains data patient_last_name name table contains column patient metadata might include maximum length last name may entered whether last name required patient without patient_last_name whether database converts surnames entered lower case upper case metadata security nature may show restrictions limit may view names second physical data stored brick mortar library one many volumes may various media including books metadata books would include isbn binding_type page_count author etc within binding_type metadata would include possible bindings material etc contextual information business data include meaning content policies govern technical attributes specifications transform programs manipulate metadata repository responsible physically storing cataloging metadata data metadata repository generic integrated current historical generic meta model store metadata generic terms instead storing applications-specific defined way data base standard changes one product another physical meta model metadata repository would need change integration metadata repository allows business areas metadata integrated fashion covering domains subject areas organization metadata repository accessible current historical metadata metadata repositories used referred data dictionary transition needs metadata usage business intelligence increased scope metadata repository increased earlier data dictionaries closest place interact technology business data dictionaries universe metadata repository initial stages scope increased business glossary tags variety status flags emerged business side consumption technology metadata lineage linkages made repository source valuable reports bring business technology together helped data management decisions easier well assess cost changes metadata repository explores enterprise wide data governance data quality master data management includes master data reference data integrates wealth information integrated metadata across organization provide decision support system data structures even though reflects structures consumed various systems repository additional functionalities compared registry metadata repository stores metadata like metadata registry also adds relationships related metadata types metadata related flow point entry organization deliverables considered lineage data point metadata related across related metadata types called linkages providing relationships metadata points across organization maintaining integrity architecture handle changes metadata repository provides basic material understanding complete data flow definitions impact also important feature maintain version control though statement contrasting open discussion definitions still evolving accuracy definitions needs refinement purpose registry define metadata element maintained across organization data models data management teams refers registry changes follow metadata repository sources metadata various metadata systems organizations reflects upstream repository never acts upstream registry used upstream metadata changes metadata repository enables structure organizations data containers one integrated place opens plethora resourceful information making calculated business decisions tool uses one generic form data model integrate models thus brings applications programs organization one format top applying business definitions business processes brings business technology closer help organizations make reliable roadmaps definite goals one stop information business control changes impact analysis tool usually business spends lots time money make decisions based discovery research impacts make changes add new data structures remove structures data management organization structured well maintained repository moving product ideation delivery takes least amount time considering variables constant sum database management system dbms database tools language metadata components within database applications already repositories registries expected provide necessary functionality access data stored within vendors want companies capable easily migrating data away products competitors products proprietary way handle metadata case tools dbms dictionaries etl tools data cleansing tools olap tools data mining tools handle store metadata differently metadata repository designed store metadata components tools metadata repositories store metadata four classifications ownership descriptive characteristics rules policies physical characteristics ownership showing data owner application owner descriptive characteristics define names types lengths definitions describing business data business processes rules policies define security data cleanliness timelines data relationships physical characteristics define origin source physical location like building logical data model creating database logical meta model help identify metadata requirements business data metadata repository centralized decentralized distributed centralized design means one database metadata repository stores metadata applications business wide centralized metadata repository advantages disadvantages centralized database easier manage data one database disadvantage bottlenecks may occur decentralized metadata repository stores metadata multiple databases either separated location departments business makes management repository involved centralized metadata repository advantage metadata broken individual departments distributed metadata repository uses decentralized method unlike decentralized metadata repository metadata remains original application xml gateway created acts directory accessing metadata within different application advantages disadvantages distributed metadata repository mirror distributed database design information model include various layers metadata types overlapped create integrated view data various metadata types stitched related metadata elements top model linking business glossary layers metadata metadata repositories designed either entity-relationship model object-oriented design
[]
Test
7,848
7
GitHub:github github american company provides hosting software development version control using git subsidiary microsoft acquired company 2018 7.5 billion offers distributed version control source code management scm functionality git well adding features provides access control several collaboration features bug tracking feature requests task management wikis every project github offers plans free professional enterprise accounts free github accounts commonly used host open source projects january 2019 github offers unlimited private repositories plans including free accounts may 2019 github reports 37 million users 100 million repositories including least 28 million public repositories making largest host source code world github developed chris wanstrath p. j. hyett tom preston-werner scott chacon using ruby rails started february 2008 company github inc. existed since 2007 located san francisco february 24 2009 github team members announced talk yahoo headquarters within first year online github accumulated 46,000 public repositories 17,000 formed previous month alone time 6,200 repositories forked least 4,600 merged july 5 2009 github announced site harnessed 100,000 users july 27 2009 another talk delivered yahoo preston-werner announced github grown host 90,000 unique public repositories 12,000 forked least total 135,000 repositories july 25 2010 github announced hosting 1 million repositories april 20 2011 github announced hosting 2 million repositories june 2 2011 readwriteweb reported github surpassed sourceforge google code total number commits period january may 2011 july 9 2012 peter levine general partner github investor andreessen horowitz stated github growing revenue 300 annually since 2008 profitably nearly entire way january 16 2013 github announced passed 3 million users mark hosting 5 million repositories december 23 2013 github announced reached 10 million repositories june 2015 github opened office japan first office outside u.s. july 29 2015 github announced raised 250 million funding round led sequoia capital round valued company approximately 2 billion 2016 github ranked 14 forbes cloud 100 list february 28 2018 github fell victim second largest distributed denial-of-service ddos attack history incoming traffic reaching peak 1.35 terabits per second june 4 2018 microsoft announced reached agreement acquire github 7.5 billion purchase closed october 26 2018 june 19 2018 github expanded github education offering free education bundles schools june 4 2018 microsoft announced intent acquire github us 7.5 billion deal closed oct. 26 2018 github continue operate independently community platform business microsoft service led xamarin nat friedman reporting scott guthrie executive vice president microsoft cloud ai current ceo chris wanstrath retained technical fellow also reporting guthrie microsoft become significant user github using host open source projects development tools chakra core powershell visual studio code backed open source projects linux developed virtual file system git vfs git formerly git virtual file system gvfs —a git extension managing large-scale repositories adopted github concerns developers kyle simpson javascript trainer author rafael laguna ceo open-xchange microsoft purchase citing uneasiness microsoft handling previous acquisitions nokia mobile business skype saw culmination microsoft recent changes business strategy ceo satya nadella seen larger focus sale cloud computing services main line business alongside development contributions open source software linux opposed microsoft windows operating system harvard business review argued microsoft intending acquire github get access userbase used loss leader encourage use development products services concerns sale bolstered interest competitors bitbucket owned atlassian gitlab commercial open source product also runs hosted service version sourceforge owned bizx llc reported seen spikes new users intending migrate projects github respective services github inc. originally flat organization middle managers words everyone manager self-management employees could choose work projects interested open allocation salaries set chief executive 2014 github inc. introduced layer middle management github.com start-up business first years provided enough revenue funded solely three founders start taking employees july 2012 four years company founded andreessen horowitz invested 100 million venture capital july 2015 github raised another 250 million venture capital series b round investors sequoia capital andreessen horowitz thrive capital venture capital funds august 2016 github making 140 million annual recurring revenue github mascot anthropomorphized octocat five octopus-like arms character created graphic designer simon oxley clip art sell istock website enables designers market royalty-free digital images github became interested oxley work twitter selected bird designed logo illustration github chose character oxley named octopuss since github wanted octopuss logo use istock license disallows negotiated oxley buy exclusive rights image github renamed octopuss octocat trademarked character along new name later github hired illustrator cameron mcefee adapt octocat different purposes website promotional materials mcefee various github users since created hundreds variations character available octodex march 2014 github programmer julie ann horvath alleged founder ceo tom preston-werner wife theresa engaged pattern harassment led leaving company april 2014 github released statement denying horvath allegations however following internal investigation github confirmed claims github ceo chris wanstrath wrote company blog investigation found tom preston-werner capacity github ceo acted inappropriately including confrontational conduct disregard workplace complaints insensitivity impact spouse presence workplace failure enforce agreement spouse work office preston-werner resigned company 2017 allegations made discriminatory unsupportive behavior github developer recruited following commitment github improve diversity inclusivity development github platform began october 19 2007 site launched april 2008 tom preston-werner chris wanstrath p. j. hyett scott chacon made available months prior beta release projects github accessed manipulated using standard git command-line interface standard git commands work github also allows registered non-registered users browse public repositories site multiple desktop clients git plugins also created github third parties integrate platform site provides social networking-like functions feeds followers wikis using wiki software called gollum social network graph display developers work versions forks repository fork branch within fork newest user must create account order contribute content site public repositories browsed downloaded anyone registered user account users able discussions manage repositories submit contributions others repositories review changes code github began offering unlimited private repositories cost january 2019 limited three contributors per project previously public repositories free fundamental software underpins github git written linus torvalds creator linux additional software provides github user interface written using ruby rails erlang github inc. developers wanstrath hyett preston-werner github mostly used code addition source code github supports following formats features github terms service require public software projects hosted github meet open source definition reason essential users developers intending use piece software found github read software license repository usually found top-level file called license license.txt similar determine meets needs terms service state setting repositories viewed publicly agree allow others view fork repositories github enterprise similar github public service designed use large-scale enterprise software development teams enterprise wishes host repositories behind corporate firewall cloud enterprises privately run github cloud premises two environments linked work together github pages static web hosting service offered github since 2008 github users hosting user blogs project documentation even whole books created page github pages content stored git repository either files served visitors verbatim markdown format github seamlessly integrated jekyll static web site blog generator github continuous integration pipelines time content source updated jekyll regenerates website automatically serves via github pages infrastructure rest github includes free paid tiers service instead supported web advertising web sites generated service hosted either subdomains github.io domain custom domains bought third-party domain name registrar github also operates services pastebin-style site called gist hosting code snippets github proper hosting larger projects tom preston-werner presented then-new gist feature punk rock ruby conference 2008 gist builds traditional simple concept pastebin adding version control code snippets easy forking ssl encryption private pastes gist git repository multiple code snippets contained single paste pushed pulled using git forked code pushed back original author form patch gists pastes become like mini-projects github launched new program called github student developer pack give students free access popular development tools services github partnered bitnami crowdflower digitalocean dnsimple hackhands namecheap orchestrate screenhero sendgrid stripe travis ci unreal engine launch program 2016 github announced launch github campus experts program train encourage students grow technology communities universities campus experts program open university students 18 years older across world github campus experts one primary ways github funds student oriented events communities campus experts given access training funding additional resources run events grow communities become campus expert applicants must complete online training course consisting multiple modules designed grow community leadership skills github also provides software service integrations adding extra features projects services include site https //github.community/ github maintains community forum users ask questions publicly answer questions users site https //github.com/sponsors github sponsors allows users make monthly money donations projects hosted github public beta announced may 23 2019 currently project accepts wait list registrations verge said github sponsors works exactly like patreon developers offer various funding tiers come different perks ’ receive recurring payments supporters want access encourage work except zero fees use program furthermore github offer incentives early adopters first year pledges cover payment processing costs match sponsorship payments 5,000 per developer furthermore users still use similar services like patreon open collective link websites july 25th 2019 developer based iran wrote medium github blocked private repositories prohibited access github pages soon github confirmed blocking developers iran crimea cuba north korea syria accessing private repositories however github reopened access github pages days later public repositories regardless location also revealed using github visiting sanctioned countries could result similar action occurring user account github responded complaints media spokesperson saying github subject us trade control laws committed full compliance applicable law time github vision global platform developer collaboration matter developers reside result take seriously responsibility examine government mandates thoroughly certain users customers impacted beyond required law includes keeping public repositories services including open source projects available accessible support personal communications involving developers sanctioned regions developers feel restrictions appeal removal said restrictions including travel reside countries github forbidden use vpns ip proxies access site sanctioned countries purchase history ip addresses flag users among sources december 3 2014 github blacklisted russia github initially refused take user-posted suicide manuals day russia withdrew block december 31 2014 github blocked india along 31 websites pro-isis content posted users january 10 2015 github unblocked march 26 2015 github fell victim massive ddos attack lasted 118 hours attack appeared originate china primarily targeted github-hosted user content describing methods circumventing internet censorship october 8 2016 github access blocked turkish government prevent email leakage hacked account belonging country energy minister july 25 2019 github started blocking developers countries facing us trading sanctions prominent open source organizations projects use github primary place collaboration including
[ 4293, 4296, 4298, 7156, 10, 5728, 5734, 4324, 1474, 7181, 1478, 35, 7187, 4338, 2961, 2966, 7218, 4377, 2986, 99, 1532, 7251, 7258, 1556, 1559, 7267, 4424, 7272, 3028, 134, 4435, 154, 3050, 7298, 3057, 5873, 1598, 7308, 183, 3076, 4500,...
Validation
7,849
3
Lavarand:lavarand lavarand hardware random number generator designed silicon graphics worked taking pictures patterns made floating material lava lamps extracting random data pictures using result seed pseudorandom number generator although secondary part random number generation uses pseudorandom number generator full process essentially qualifies true random number generator due random seed used however applicability limited low bandwidth covered titled method seeding pseudo-random number generator cryptographic hash digitization chaotic system 1997 2001 web site lavarand.sgi.com demonstrating technique landon curt noll one originators went help develop lavarnd use lava lamps despite short life lavarand.sgi.com often cited example online random number source 2017 cloudflare maintains similar system lava lamps securing approximately 10 internet traffic
[ 7010 ]
Test
7,850
5
Tasman_(layout_engine):tasman layout engine tasman discontinued browser engine developed microsoft inclusion macintosh version internet explorer 5 tasman attempt improve support web standards defined world wide web consortium time release tasman seen layout engine best support web standards html css internet explorer mac longer supported newer versions tasman incorporated microsoft products tantek çelik led software team developed tasman engine tasman later became used layout engine msn mac os x office 2004 mac first version tasman referred v0 released internet explorer 5 macintosh edition march 27 2000 upgraded version version 0.1 followed release internet explorer 5.1 mac may 15 2003 microsoft released subscription-only msn mac os x browser used upgraded version tasman version 0.9 layout engine posting mac internet explorer talk list internet explorer mac program manager jimmy grewal listed improvements tasman improved part number tv set-top box projects microsoft reaching version 1.0 tasman engine used microsoft tv mediaroom edition may 11 2004 microsoft started shipping microsoft office 2004 mac incorporates version tasman layout engine email client entourage since microsoft office mac 2011 entourage replaced macintosh version microsoft outlook uses webkit-based layout engine used safari instead
[ 4026, 6696, 5549, 555, 296, 5378, 8183, 6991, 7176, 7734, 2679, 2415, 6381, 1970, 422, 6221, 3584, 6495, 1897, 87 ]
Train
7,851
4
Telecom_network_protocol_analyzer:telecom network protocol analyzer telecom network protocol analyzer protocol analyzer analyze switching signaling telecommunication protocol different nodes pstn mobile telephone networks 2g 3g gsm networks cdma networks wimax mobile telecommunication network analyze traffic msc bsc bsc bts msc hlr msc vlr vlr hlr protocol analyzers mainly used performance measurement troubleshooting devices connect network calculate key performance indicators monitor network speed-up troubleshooting activities
[ 6574 ]
Test
7,852
9
Fexpr:fexpr lisp programming languages fexpr function whose operands passed without evaluated fexpr called body fexpr evaluated evaluations take place except explicitly initiated fexpr contrast ordinary lisp function called operands evaluated automatically results evaluations provided function traditional lisp macro called operands passed unevaluated whatever result macro function returns automatically evaluated early lisp environment mapped symbol association list rather directly value standard keys lists included two keys used store data value looked symbol occurred argument four keys used store function looked symbol occurred operator function keys indicated compiled ordinary function whose operands evaluated passed indicated compiled special form whose operands passed unevaluated indicated user-defined ordinary function indicated user-defined special form difference fexpr expr whether operands automatically evaluated strict original usage fexpr therefore user-defined function whose operands passed unevaluated however later usage term fexpr may describe first-class function whose operands passed unevaluated regardless whether function primitive user-defined simple illustration fexprs work fexpr definition written kernel programming language similar scheme convention kernel names fexprs always start definition provides fexpr called takes three operands fexpr called local environment created extending static environment fexpr defined local bindings created symbols bound three operands call fexpr symbol bound dynamic environment fexpr called body fexpr ... evaluated local environment result evaluation becomes result call fexpr net effect first operand evaluated dynamic environment depending whether result evaluation non-negative either second third operand evaluated result returned operand either third second evaluated example statically scoped local environment extension static environment 1980 lisp languages supported fexprs mainly dynamically scoped local environment extension dynamic environment rather static environment however still sometimes necessary provide local name dynamic environment avoid capturing local parameter names fexpr support continued lisp 1.5 last substantially standard dialect lisp fragmented multiple languages 1970s two dominant lisp languages — maclisp interlisp — supported fexprs 1980 conference lisp functional programming kent pitman presented paper special forms lisp discussed advantages disadvantages macros fexprs ultimately condemned fexprs central objection lisp dialect allows fexprs static analysis determine generally whether operator represents ordinary function fexpr — therefore static analysis determine whether operands evaluated particular compiler tell whether subexpression safely optimized since subexpression might treated unevaluated data run-time since decline maclisp interlisp two lisp languages risen dominance 1993 — scheme common lisp — support fexprs newlisp support fexprs calls macros picolisp built-in functions fsubrs lisp-level functions exprs fexprs lexprs mixture starting brian smith 3-lisp 1982 several experimental lisp dialects devised explore limits computational reflection support reflection lisps support procedures reify various data structures related call — including unevaluated operands call makes procedures fexprs late 1990s fexprs become associated primarily computational reflection theoretical results fexprs obtained 1993 john c. mitchell used lisp fexprs example programming language whose source expressions formally abstract concrete syntax source expression always extracted context operand fexpr 1998 mitchell wand showed adding fexpr device lambda calculus — device suppresses rewriting operands — produces formal system trivial equational theory rendering impossible make source-to-source optimizations without whole-program analysis 2007 john n. shutt proposed extension lambda calculus would model fexprs without suppressing rewriting operands attempt avoid wand result following languages implement fexprs near equivalents
[ 7032, 7878, 4543, 3409, 4070, 144, 1445, 2416, 1820, 6585, 7333, 7113, 4039 ]
Test
7,853
9
TADS:tads text adventure development system tads prototype-based domain-specific programming language set standard libraries creating interactive fiction games original tads 1 released high energy software shareware 1988 followed tads 2 long early 1990s tads established number one development tool interactive fiction place simpler systems like agt adventure game toolkit late 1990s joined inform popular interactive fiction development language tads 2 syntax based c bits pascal tads 2 maintained updated regular intervals creator michael j. roberts even became freeware july 1996 graham nelson creator inform describes inform tads two systems ... widely used last half 1990s tads called second commonly used programming language today multimedia tads introduced 1998 allows games display graphics animation play sounds platform supports 2006 tads received major overhaul release tads 3 complete rewrite tads engine retaining platform-dependent code ease porting tads 3 uses language syntax resembles c++ java many new features efficient dynamic objects automatic garbage collection structured exceptions native utf-8 strings many useful function classes tads 3 compiler interpreter ported dos macintosh unix platforms several tads 3 games released games written tads compiled platform-independent format played computer suitable virtual machine vm exists virtual machines exist several platforms respect tads closely follows example original infocom z-machine well modern languages java c whereas tads 1 2 vms parse commands entered player sending results game tads 3 employs general-purpose virtual machine command-parsing done game code akin inform rationale easier customize parser
[ 1361, 1616, 6507, 5948, 4759, 3547, 5571, 6778, 6886, 578, 1435 ]
Test
7,854
3
Fantasy_Zone:fantasy zone game design main character many similarities earlier twinbee together games credited creation cute 'em subgenre numerous sequels made years space year 1422 6216 master system version fantasy zone cast panic collapse interplanetary monetary system space guild brings light plans planet menon whose forces stealing planets currencies fund huge fortress fantasy zone opa-opa sent stop invading army discover behind end turns leader none opa-opa long lost father revelation leaves opa-opa mixed emotions game player ship placed level number bases destroy bases gone stage boss appears must defeated order move next stage eight stages except final one scroll fixed player move either left right although stage loops final level consists rematch previous bosses succession facing final boss opa-opa uses two different attacks standard weapon initially bullets bombs also move land ground sprouting feet walking around flies possible upgrade opa-opa weapons bombs flying engine increase speed well get extra lives player must get money defeating enemies bases bosses access shop touching marked balloon time new item bought become expensive player chooses exit time runs another screen appears select upgrades opa-opa use one engine weapon bomb equipped time new weapons time limit starts soon shop left bombs used moment limited quantity engine upgrades permanent powerups also reassigned reentering shop touch balloon word select written player loses life upgrades lost fantasy zone originally arcade game later ported sega mark iii/master system game eventually saw ports consoles home computers msx famicom/nes snk neo geo sharp x68000 pc engine/turbografx 16 ports play similarly original version several omissions changes instance master system version lacks features radar indicates location bases gauge indicates much energy left two bosses replaced original ones versions several changes well two different versions released famicom/nes japanese version released 1987 developed published sunsoft american unlicensed version released 1989 developed pixel published tengen 1997 fantasy zone released sega ages label japan sega saturn fantasy zone later remade playstation 2 sega ages label although similar appearance arcade version even incorporating original arcade sounds version used polygons instead sprites added stages including bonus levels game takes view behind opa-opa tries collect coins boss defeated moment game mode similar space harrier unreleased space fantasy zone also even though 2up seen score display version single player mode version released north america along remade classic sega titles sega classics collection compilation fantasy zone released mobile phones 2002 japan august 2003 united states due hardware limitations version game divided three different parts march 11 2008 master system version saw re-release japan virtual console europe australia released april 11 2008 north america april 14 2008 territories released price 500 wii points september 18 year sega released another sega ages disc devoted series title fantasy zone complete collection making final release ages series time instead 3d remake disc compiled games series including spin-offs sega ports also included remake fantasy zone ii created system 16 hardware original arcade release also included sonic ultimate genesis collection unlockable game 3d port game released march 19 2014 nintendo 3ds titled 3d fantasy zone opa-opa bros. new features 3ds port involve stereoscopic 3d visuals adjustable difficulty settings ability save game ability switch japanese versions us versions game stage select feature new mode involves player playing upa-upa opa-opa brother addition satisfying certain conditions game enables player confront two replacement bosses master system release entering boss fight literally replacing standard boss fantasy zone also included minigame yakuza 0 unlocked completing one game friendship sidequests identical original arcade release change addition rapid fire button fantasy zone proved successful japanese arcades helping give rise popular system 16 arcade board despite game largely ignored gaming media arcade games time game reviewed 1988 dragon 136 hartley patricia kirk lesser role computers column reviewers gave game 4 5 stars
[ 5822, 3332, 4759, 3313, 3518, 7735, 7991, 683 ]
Validation
7,855
2
Pamela_Jones:pamela jones pamela jones commonly known pj creator editor groklaw website covered legal news interest free open-source software community jones open source advocate previously trained worked paralegal jones articles appeared linux journal lwn linuxworld magazine linux today linuxworld.com also wrote monthly opinion column uk print publication linux user developer one contributors book open sources 2.0 continuing evolution 2010 electronic frontier foundation awarded pioneer award pamela jones groklaw website legal blogging jones web site groklaw covered open source legal issues notably sco-linux controversies web site started blog grew groklaw covered various lawsuits involving sco group detail also covered general legal news interest free software open source community site numerous awards including electronic frontier foundation pioneer award 2010 american bar association journal blawg 100 2012 groklaw shut august 20 2013 following lavabit email shutdown way groklaw without email inability privately collaborate without ca n't groklaw without input jones also launched grokline unix ownership timeline project february 2004 grokdoc groklaw spinoff whose original goal create useful manual basic linux tasks new linux users find simple clear easy follow using learn study site also supports many collaborative projects benefit wiki-like structure jones reveals little personal information considers private expressed beginning strong preference avoiding fame reasons gave early days using initials originally wanted stay anonymous sense saying pj eventually media attention factors made impossible remain pj would could desire famous one thing creatively influenced scott mccloud work points understanding comics p. 45–51 section iconic representation people respond strongly drawing character simplifies point anyone identify character guess hoping effect words hoping people could assume whatever wanted focus said rather saying reason chose pj could anyone either sex nationality anyone one particular wanted participation anyone interested sco story politics nothing extraneous effort locate provide evidence could useful knew community could answer sco knew needed
[ 5540, 5453, 5803, 3938, 3174, 3084, 462, 7429, 1351, 1535, 1260, 1822, 1824, 7528, 1176, 4401, 5292, 2559, 3780, 5829, 6725, 6357, 126, 1192, 578, 6736, 7740, 7463, 7555, 7559, 5759, 589, 3559, 412, 4435, 3133, 8149, 2689, 3404, 1227, 9...
Test
7,856
7
VCE_(company):vce company vce abbreviation virtual computing environment division emc corporation manufactured converged infrastructure appliances enterprise environments founded 2009 name acadia originally joint venture emc cisco systems additional investments intel emc subsidiary vmware emc acquired 90 controlling stake vce cisco october 2014 giving majority ownership beginning 2016 vce fully integrated emc became converged platform division emc september 7 2016 emc acquired dell converged platform division emc currently known converged platform solutions division dell emc company initially manufactured converged datacenter units known vblock incorporate cisco servers networking hardware emc storage systems vmware virtualization later vxblock added providing ability customers run vmware nsx 2015 vxrack 2016 vxrail added separate products cisco systems emc corporation vmware partially owned emc unveiled joint partnership november 2009 develop cloud computing platforms called vblock infrastructure packages partnership originally called vmware-cisco-emc alliance though name later shortened vce “ virtual computing environment coalition ” emc world trade show cisco emc introduced joint venture named acadia goal acadia originally set separate legal entity build vblock infrastructure packages standardized repeatable fashion customer data centers michael capellas also board member cisco named chairman acadia first chief executive officer ceo may 2010 sales initially encountered confusion among customers often different staffs storage networking example different fiscal quarter sales cycles end 2010 capellas told analysts venture 65 customers average system costing 2.5 million acadia virtual computing environment coalition combined single entity january 2011 called vce virtual computing environment company originally located silicon valley dallas texas expansion announced march 2011 richardson texas investment texas enterprise fund october 2011 another office opened marlboro massachusetts close vce emc-owned manufacturing plant franklin massachusetts july 2012 cisco executive praveen akkiraju appointed ceo frank hauck president estimated vce 1200 employees time undisclosed revenues accumulated losses publicized customers included babson college mississippi community college board press debated venture considered startup company one headline joking vce virtual cash erosion questioning millions dollars executive compensation others considered arrangement wise investment 2012 mixture success speculation layoffs continued confusion due products competing partners netapp flexpod xsigo systems cisco announced framework called cloudverse late 2011 specific vmware august 2012 emc announced vspex reference architecture partnership lenovo distributors seen competing lower-cost option november 2012 report gartner vce 57.4 share integrated infrastructure systems second quarter 2012 based revenue gartner previously tracked server networking external controller-based storage individual markets vce named one “ 2013 virtualization 50 ” crn magazine may 2013 vce estimated 1 billion annual sales rate 1,000 vblock systems sold however us securities exchange commission filings emc accounted cumulative loss 430 million september 2012 cisco loss 457 million early 2013 since revenues recorded owning companies vce emc reported investment 667.2 million cash 13.2 million stock-based compensation vce stake 58 cisco reported gross investment 457 million stake 35 2013 press writers initially criticized vce came view structure vce good business investors press highlighted vce source innovation financial performance investors total vce 2013 reported 1b 50 year-over-year growth rate october 2014 emc announced acquired majority control vce venture cisco maintaining 10 stake january 2016 emc announced vce become converged platform division emc chad sakac president vce marketed converged infrastructure servers known vblocks combine vmware vsphere software running cisco unified computing systems ucs connected cisco nexus switches attached emc symmetrix storage despite block name storage accessed either block device file server vblock systems marketed large-scale datacenters run software applications microsoft exchange server microsoft sharepoint sap erp delivered standard 19-inch rack units aid planning cooling power requirements 2009 virtual computing environment coalition announced three models vblock infrastructure packages vblock 2 intended high-end data centers designed support 3,000 6,000 virtual machines using cisco ucs cisco nexus 1000v multilayer director switches mds well emc symmetrix vmax storage vmware vsphere software vblock 1 intended midmarket designed 800 3,000 virtual machines similar configuration vblock 2 emc clariion storage rather emc symmetrix vmax vblock 0 intended low-end configuration projected release 2010 support 300 800 virtual machines use similar configuration emc celerrastorage term infrastructure package later changed infrastructure platform vblock system vblock brand name vce uses racks containing components data center products prepackaging called converged infrastructure allows customers select preconfigured integrated solutions predictable units power weight cooling geometry data center planning purposes vblock two series based following compositional elements vblock brand naming changed since inception 2009 term vblock infrastructure packages announced acadia technical partnership virtual computing environment coalition well primary investors late 2010 continuing 2011 term packages replaced platforms mid-2012 term infrastructure platforms replaced systems wider circulation arrive simply vblock™ systems meanwhile constituent elements technology included upgrades product lines cisco emc vmware originally combined reference architecture physical logical configuration step initially customer data center colocation data center later within pre-manufacturing environment shipment customer data center colocation data center options limited time marketed sold models named ex fx gx hx later 320 340 350 confirmed numbers announced publicly vce investors 2013 disclosed numbers provided conservatively 800 customers almost 60 countries nearly 2000 vce manufactured vblock systems sold lack manufactured physical logical build actual vce manufacturing floor previous deployments 2009 early 2010 called referred vblock often various use upper lower case spelling considered vblock pundits infrastructure professionals since so-called reference architectures varied greatly project project compared late 2010 manufactured vblock anecdotally institutions companies using vblock involved published testimonials may 2011 vblock system series 300 announced models ex fx gx hx smallest largest vblock 2 renamed 700 series vblock system 700 lx announced emc world may 2012 trade show expensive vblock system supporting thousands virtual machines vce introduced inclusion emc software backup recovery replication business continuity data mobility virtualized environments applications included emc avamar emc data domain emc recoverpoint vblock system 700 included emc vplex workload mobility business continuity software well support new features emc unified infrastructure manager improved vmware integration centralized monitoring multiple vblock systems february 2013 vce announced vblock 300 vblock 700 models increased performance data throughput using upgraded server storage components 2013 vce announced products midrange remote branch office market models included vblock system 100 vblock system 200 vblock 100 designed host 200 virtual machines 24u 42u rack mount space eight cisco c220 m3 blade servers two cisco catalyst 3750-x switches 8 tb storage capacity emc vnxe3150 vnxe3300 array vblock 200 comes configured 12 cisco servers two nexus 5548up unified ethernet san switches cisco catalyst 3750 management switch 105 hard drives via included vnx 5300 array vce introduced specialized system sap hana february 2013 combined vblock system sap hana in-memory computing database application software later september 2013 vce introduced specialized system high performance database oracle well extreme applications vmware citrix vdi environments dell introduced hyperconverged system emc world 2015 february 2015 first model vxrack 1032 based emc scaleio software defined storage second model announced vmware world september 2015 called vxrack 1034 based around vmware vsan models use commodity hardware rumoured sourced quanta attached local disk presented via scaleio vsan software desktop virtualization management software uses vmware view called fastpath announced august 2011 upgraded june 2012 february 2013 vce announced management software application vision intelligent operations software vce vision software enables single management pane components vblock systems manages via plugins third party management automation orchestration tools vmware cisco bmc ca others via restful api snmp unified logging vce provides services partners plan design deploy vblock systems
[ 2961, 4295, 1505, 5276, 8036, 4783, 7143, 88 ]
Validation
7,857
7
Deltacloud:deltacloud deltacloud application programming interface api developed red hat apache software foundation abstracts differences cloud computing implementations announced september 3 2009 infrastructure-as-a-service cloud existing today provides api purpose deltacloud provide one unified rest-based api used manage services cloud particular cloud controlled adapter called driver june 2012 drivers exist following cloud platforms amazon ec2 fujitsu global cloud platform gogrid opennebula rackspace rhev-m rimuhosting terremark vmware vcloud next 'classic front-end also offers cimi ec2 front-ends deltacloud used applications aeolus prevent need implement cloud-specific logic may 17 2010 red hat contributed deltacloud apache incubator project graduated incubator october 26 2011 became apache software foundation tlp top-level project july 2013 fujitsu vmware used deltacloud demonstration cimi management developers conference manage cloud infrastructure im may 2013 redhat announced scaling back sponsorship apache deltacloud project effective immediately july 2015 deltacloud moved apache attic due inactivity
[ 4295, 7238, 894, 4303, 5728, 7805, 6428, 2741, 6806, 7444, 7896, 917, 5571, 737, 578, 3463, 3204, 1286, 3542, 6821, 5054, 840, 1392, 3031, 5408, 3558, 5677, 3479, 5863, 6387, 5075, 6137, 7488, 2961, 5874, 6586, 1511, 1989, 4742, 5007, 1...
Test
7,858
2
Houston_Automatic_Spooling_Priority:houston automatic spooling priority houston automatic spooling priority program commonly known hasp extension ibm os/360 operating system successors providing extended support job management data management task management remote job entry os/360 included spooling routines called reader/interpreters output writers reader/interpreter responsible reading one input job stream – one input device likewise output writer responsible controlling one printer punch spooled data stored os temporary datasets controlled standard os services reader/interpreter output writer separate operating system task partition region system large number readers printers punches might large number spooling tasks hasp developed ibm federal systems division contractors lyndon b. johnson space center houston developers tom simpson bob crabtree hasp program ran mainframe performed functions scheduling control job flow spooling printing/punching hasp support ibm system/360 operating system remote job entry 360s-rc-536 provided roughly equivalent facilities hasp ii v3 nih created shared spool capability hasp used many mainframe sites allowed hasp system share common spool checkpoint enabled workload balancing multi-mainframe environment hasp ii v4 mellon bank greb dave miko moved shared spool version carried forward jes2 multi-access spool ibm formal support hasp mvs 350 copies hasp ii v4 shared spool mods distributed around world shared spool mellon mods added share distribution process could widely accessed program sometimes referred various names indication ibm ever using official documents program became classified part ibm type-iii library competitor asp attached support processor ran one mainframe controlled scheduling attached mainframes asp later became jes3 mvs hasp became jes2 one two job entry subsystems many years hasp labels removed jes2 source messages issued jes2 still prefixed hasp modified version hasp used provide batch spooling remote job entry services michigan terminal system late 1960s 1970s 1980s hasp bypassed operating system services code specially tailored efficiency hasp operated single operating system task used cooperative multitasking internally run processors perform tasks running card readers printers punches managing spool files communicating system operator driving multiple communication lines remote job entry hasp written entirely system/360 assembler typical hasp system might require 86kb memory could virtual memory os/vs systems much would become jes2 jecl part hasp hasp supported ibm terminals 2770 2780 3780 additionally provided support multi-leaving communication intelligent workstations ibm 1130 system/360 model 20 multi-leaving fully synchronous pseudo-simultaneous bi-directional transmission variable number data streams two computers utilizing binary-synchronous communications facilities third party vendors developed variety 2770/2780/3780 simulators multi-leaving implementations use hasp asp vendors incorrectly referred products hasp emulators products actually terminals talked hasp perform functions hasp rje console operator could enter restricted set hasp console operator commands hasp commands precursor jes2 job entry control language jes2 jecl operands restricted remote site hence dj1-999 would display typically still outstanding operator remote site hasp rje console commands could entered short single letter form spelled command line c rm1.rdr meant cancel rather submit current deck cards read might use card jam made sensible let jobs go ahead one cards replaced nearby keypunch hasp job log output provided summary resources used job output appeared caps
[ 607, 4366, 2769, 4145, 3201, 3297, 5999 ]
Train
7,859
3
Commando_(video_game):commando video game commando released japan run gun vertically scrolling arcade game released 1985 unrelated 1985 film name influence seen various later games shooter game genre versions released various home computers consoles game also appears capcom classics collection activision anthology wii virtual console arcade well capcom arcade cabinet playstation 3 xbox 360 player takes control soldier named super joe starts dropped jungle helicopter fight way singlehandedly fending massive assault enemy soldiers super joe armed sub-machine gun unlimited ammunition well limited supply hand grenades joe fire gun eight directions faces grenades thrown vertically towards top screen irrespective direction joe facing unlike submachine gun bullets grenades thrown clear obstacles explosions well-placed grenades kill several enemies end level screen stops player must fight several soldiers streaming gate fortress ordered cowardly officer immediately runs away although shooting back awards player bonus points along way one attempt free prisoners war transported across screen enemy nes version powerful machine gun upgrade well glasses let player view hidden bunkers unlimited grenade upgrade player lose upgrades losing life extra lives given 10,000 points per 50,000 scored 960,000 thereafter lives home version game developed capcom released nintendo entertainment system activision released port game atari 2600 intv released port intellivision also atari 7800 version sculptured software released 1989 elite released versions many home computers bbc micro acorn electron versions developed contract catalyst coders elite developed amiga atari st acorn electron zx spectrum amstrad cpc commodore 64 versions commodore 64 port theme complex extended version arcade music created less 12 hours rob hubbard started working late night worked night took one listen original arcade version started working c64 version ... time everyone arrived 8:00 morning loaded main tune every c64 building got cheque train home 10:00 arcade version re-released virtual console wolf battlefield commando japan october 5 2010 north america december 6 2010 pal region december 17 2010 atari 8-bit version created sculptured software 1989 intended released atari corporation xe game system however although game appeared atari catalogs time never reached market spite completed 2000s game prototype cartridge found computer gaming world said cartridges equal commando non-stop action nes game award best shooting game year according readers crash magazine also voted best arcade-style game year 1986 golden joystick awards nes version sold 1.1 million copies worldwide commando followed sequel titled mercs 1989 known senjō ōkami ii japan second sequel released downloadable title xbox live arcade playstation network 2008 outside japan arcade version bionic commando marketed sequel commando main character nameless soldier game identified super joe american brochure game super joe would appear actual supporting character later versions bionic commando nintendo entertainment system game boy well 2009 version bionic commando playstation 3 xbox 360 character super joe identified joseph gibson one three player characters mercs game duet elite systems ltd also called first commando '86 commando '87
[ 5928, 2892, 3206 ]
Test
7,860
9
ScicosLab:scicoslab scicoslab software package providing multi-platform environment scientific computation based official scilab 4.x build4 distribution includes modeling simulation tool scicos number toolboxes latest stable version scicoslab scicoslab 4.4.2 possible scilab/scicos currently complete alternative commercial packages dynamic systems modeling simulation packages matlab/simulink matrixx/systembuild scicoslab runs available binary format main available platforms like unix/linux workstations microsoft windows macosx scicoslab based scilab scicos forked currently separated new versions evolution order maintain compatibility among
[ 1908, 5098, 3606, 2820, 4759, 3619, 5288, 5117, 6356, 5571, 4872, 578, 4705, 1569, 4067, 3981, 7841, 4070, 3410, 256, 4999, 1336 ]
Train
7,861
5
WBXML:wbxml wap binary xml wbxml binary representation xml developed wap forum since 2002 maintained open mobile alliance standard allow xml documents transmitted compact manner mobile networks proposed addition world wide web consortium wireless application protocol family standards mime media type application/vnd.wap.wbxml defined documents use wbxml wbxml used number mobile phones usage includes exchange activesync synchronizing device settings address book calendar notes emails syncml transmitting address book calendar data wireless markup language wireless village oma drm rights language over-the-air programming sending network settings phone
[ 5172, 884, 796, 4101, 1900, 87 ]
Test
7,862
4
Ciphertext-only_attack:ciphertext-only attack cryptography ciphertext-only attack coa known ciphertext attack attack model cryptanalysis attacker assumed access set ciphertexts attacker channel providing access plaintext prior encryption practical ciphertext-only attacks attacker still knowledge plaintext instance attacker might know language plaintext written expected statistical distribution characters plaintext standard protocol data messages commonly part plaintext many deployed systems usually guessed known efficiently part ciphertext-only attack systems attack completely successful corresponding plaintexts deduced even better key ability obtain information underlying plaintext beyond pre-known attacker still considered success example adversary sending ciphertext continuously maintain traffic-flow security would useful able distinguish real messages nulls even making informed guess existence real messages would facilitate traffic analysis history cryptography early ciphers implemented using pen-and-paper routinely broken using ciphertexts alone cryptographers developed statistical techniques attacking ciphertext frequency analysis mechanical encryption devices enigma made attacks much difficult although historically polish cryptographers able mount successful ciphertext-only cryptanalysis enigma exploiting insecure protocol indicating message settings advanced ciphertext-only attacks enigma mounted bletchley park world war ii intelligently guessing plaintexts corresponding intercepted ciphertexts every modern cipher attempts provide protection ciphertext-only attacks vetting process new cipher design standard usually takes many years includes exhaustive testing large quantities ciphertext statistical departure random noise see advanced encryption standard process also field steganography evolved part develop methods like mimic functions allow one piece data adopt statistical profile another nonetheless poor cipher usage reliance home-grown proprietary algorithms subject thorough scrutiny resulted many computer-age encryption systems still subject ciphertext-only attack examples include
[ 6372, 7771, 1353, 4014, 7207, 1455, 5776 ]
Test
7,863
9
Ole-Johan_Dahl:ole-johan dahl ole-johan dahl 12 october 1931 – 29 june 2002 norwegian computer scientist dahl professor computer science university oslo considered one fathers simula object-oriented programming along kristen nygaard dahl born mandal norway son finn dahl 1898–1962 ingrid othilie kathinka pedersen 1905–80 seven family moved drammen thirteen whole family fled sweden occupation norway nazi germany end war dahl studied numerical mathematics university oslo dahl became full professor university oslo 1968 gifted teacher well researcher worked hierarchical program structures probably influential publication appeared co-authored c.a.r hoare influential book structured programming 1972 dahl edsger dijkstra hoare perhaps best-known academic book concerning software 1970s career progressed dahl became increasingly interested use formal methods rigorously reason object-orientation example expertise ranged practical application ideas formal mathematical underpinning ensure validity approach dahl widely accepted norway ’ foremost computer scientist kristen nygaard produced initial ideas object-oriented oo programming 1960s norwegian computing center nr part simula 1961–1965 simula 67 1965–1968 simulation programming languages dahl nygaard first develop concepts class subclass allowing implicit information hiding inheritance dynamic object creation etc. important aspects oo paradigm object self-contained component data structure associated procedures methods software system combined form complete system object-oriented approach pervasive modern software development including widely used imperative programming languages java c++ received turing award work 2001 kristen nygaard received 2002 ieee john von neumann medal kristen nygaard named commander royal norwegian order st. olav 2000
[ 6507, 3166, 7707, 1746, 1381, 4651, 7009, 3470, 7999, 43, 7382, 7017, 3895, 1308, 1408, 5424, 6485, 1600, 5621, 1803, 360 ]
Test
7,864
9
Atari_ST_BASIC:atari st basic atari st basic st basic first dialect basic produced atari st line computers bundled new sts early years st lifespan quickly became standard basic platform however many users disliked improved dialects basic quickly came replace atari commissioned metacomco write version basic would take advantage gem environment atari st based version already written digital research called dr-basic bundled dr cp/m-86 operating system result called st basic time st launched st basic bundled new sts port language called abasic ended supplied time amiga commodore quickly replaced microsoft-developed amigabasic user interface consisted four windows edit-window one could enter source code list-window entire source code could browsed command/debug-window instructions entered immediately executed output-window however windows could selected mouse became cumbersome st basic many bugs compute september 1987 reported one flaw described among worst basic bugs time typing codice_1 resulted similar commands codice_2 codice_3 crashed computer magazine described results last command bad crash get st without seeing machine rip free cables drag edge desk leap trash bin citing flaws codice_4 codice_5 equivalent magazine recommended avoid ing st basic serious programming regarding reports metacomco one bug away releasing long-delayed update language jokingly wondered whether atari one bug eliminate st basic one add relatively low quality st basic quickly opened market third-party basics st. fast basic gfa basic two first third-party basics released basics free program written one basics could listed run user basic however compilers run-time executables started appear basics produced executable code could run sts type-in programs became less fashionable longer need standard basic hisoft basic omikron basic stos basic appeared basics even started bundled new sts later years
[ 5367, 1255, 12, 2463, 6891, 1361, 8183, 4139, 5651, 2925, 7448, 5926, 5129, 7906, 5137, 5234, 2941, 3303, 1304, 61, 6394, 4003, 1789, 5877, 4012, 4745, 1064 ]
Test
7,865
4
Multi-factor_authentication:multi-factor authentication multi-factor authentication mfa authentication method computer user granted access successfully presenting two pieces evidence factors authentication mechanism knowledge something user user knows possession something user user inherence something user user two-factor authentication also known 2fa type subset multi-factor authentication method confirming users claimed identities using combination two different factors 1 something know 2 something 3 something good example two-factor authentication withdrawing money atm correct combination bank card something user possesses pin something user knows allows transaction carried two examples supplement user-controlled password one-time password otp code generated received authenticator e.g security token smartphone user possesses two-step verification two-step authentication method confirming user claimed identity utilizing something know password second factor something something example second step user repeating back something sent out-of-band mechanism second step might six digit number generated app common user authentication system use multiple authentication factors prove one identity based premise unauthorized actor unlikely able supply factors required access authentication attempt least one components missing supplied incorrectly user identity established sufficient certainty access asset e.g. building data protected multi-factor authentication remains blocked authentication factors multi-factor authentication scheme may include knowledge factors commonly used form authentication form user required prove knowledge secret order authenticate password secret word string characters used user authentication commonly used mechanism authentication many multi-factor authentication techniques rely password one factor authentication variations include longer ones formed multiple words passphrase shorter purely numeric personal identification number pin commonly used atm access traditionally passwords expected memorized many secret questions born poor examples knowledge factor may known wide group people able researched possession factors something user user used authentication centuries form key lock basic principle key embodies secret shared lock key principle underlies possession factor authentication computer systems security token example possession factor disconnected tokens connections client computer typically use built-in screen display generated authentication data manually typed user connected tokens devices physically connected computer used devices transmit data automatically number different types including card readers wireless tags usb tokens software token a.k.a soft token type two-factor authentication security device may used authorize use computer services software tokens stored general-purpose electronic device desktop computer laptop pda mobile phone duplicated contrast hardware tokens credentials stored dedicated hardware device therefore duplicated absent physical invasion device soft token may device user interacts typically x.509v3 certificate loaded onto device stored securely serve purpose factors associated user usually biometric methods including fingerprint face voice iris recognition behavioral biometrics keystroke dynamics also used increasingly fourth factor coming play involving physical location user hard wired corporate network user could allowed login utilizing pin code network entering code soft token well could required could seen acceptable standard access office controlled systems network admission control work similar ways level network access contingent specific network device connected wifi vs wired connectivity also allows user move offices dynamically receive level network access many multi-factor authentication vendors offer mobile phone-based authentication methods include push-based authentication qr code based authentication one-time password authentication event-based time-based sms-based verification sms-based verification suffers security concerns phones cloned apps run several phones cell-phone maintenance personnel read sms texts least cell phones compromised general meaning phone longer something user major drawback authentication including something user possesses user must carry around physical token usb stick bank card key similar practically times loss theft risks many organizations forbid carrying usb electronic devices premises owing malware data theft-risks important machines usb ports reason physical tokens usually scale typically requiring new token new account system procuring subsequently replacing tokens kind involves costs addition inherent conflicts unavoidable trade-offs usability security two-step authentication involving mobile phones smartphones provides alternative dedicated physical devices authenticate people use personal access codes device i.e something individual user knows plus one-time-valid dynamic passcode typically consisting 4 6 digits passcode sent mobile device sms generated one-time passcode-generator app cases advantage using mobile phone need additional dedicated token users tend carry mobile devices around times sms broadly-adopted multi-factor authentication method consumer-facing accounts notwithstanding popularity sms verification security advocates publicly criticized july 2016 united states nist draft guideline proposed deprecating form authentication year later nist reinstated sms verification valid authentication channel finalized guideline 2016 2017 respectively google apple started offering user two-step authentication push notification alternative method security mobile-delivered security tokens fully depends mobile operator operational security easily breached wiretapping sim cloning national security agencies advances research two-factor authentication mobile devices consider different methods second factor implemented posing hindrance user continued use improvements accuracy mobile hardware gps microphone gyro/acceleromoter ability use second factor authentication becoming trustworthy example recording ambient noise user location mobile device comparing recording ambient noise computer room user trying authenticate one able effective second factor authentication also reduces amount time effort needed complete process payment card industry pci data security standard requirement 8.3 requires use mfa remote network access originates outside network card data environment cde beginning pci-dss version 3.2 use mfa required administrative access cde even user within trusted network second payment services directive require strong customer authentication electronic payments european economic area september 14 2019 details authentication federal employees contractors usa defined homeland security presidential directive 12 hspd-12 existing authentication methodologies involve explained three types basic factors authentication methods depend one factor difficult compromise single-factor methods regulatory standards access federal government systems require use multi-factor authentication access sensitive resources example logging network devices perform administrative tasks accessing computer using privileged login nist special publication 800-63-3 discusses various forms two-factor authentication provides guidance using business processes requiring different levels assurance 2005 united states federal financial institutions examination council issued guidance financial institutions recommending financial institutions conduct risk-based assessments evaluate customer awareness programs develop security measures reliably authenticate customers remotely accessing online financial services officially recommending use authentication methods depend one factor specifically user knows determine user identity response publication numerous authentication vendors began improperly promoting challenge-questions secret images knowledge-based methods multi-factor authentication due resulting confusion widespread adoption methods august 15 2006 ffiec published supplemental guidelineswhich states definition true multi-factor authentication system must use distinct instances three factors authentication defined use multiple instances single factor according proponents multi-factor authentication could drastically reduce incidence online identity theft online fraud victim password would longer enough give thief permanent access information however many multi-factor authentication approaches remain vulnerable phishing man-in-the-browser man-in-the-middle attacks multi-factor authentication may ineffective modern threats like atm skimming phishing malware may 2017 o2 telefónica german mobile service provider confirmed cybercriminals exploited ss7 vulnerabilities bypass sms based two-step authentication unauthorized withdrawals users bank accounts criminals first infected account holder computers attempt steal bank account credentials phone numbers attackers purchased access fake telecom provider set-up redirect victim phone number handset controlled finally attackers logged victims online bank accounts requested money accounts withdrawn accounts owned criminals sms passcodes routed phone numbers controlled attackers criminals transferred money many multi-factor authentication products require users deploy client software make multi-factor authentication systems work vendors created separate installation packages network login web access credentials vpn connection credentials products may four five different software packages push client pc order make use token smart card translates four five packages version control performed four five packages check conflicts business applications access operated using web pages possible limit overheads outlined single application multi-factor authentication solutions virtual tokens hardware token products software must installed end users drawbacks multi-factor authentication keeping many approaches becoming widespread consumers difficulty keeping track hardware token usb plug many consumers technical skills needed install client-side software certificate generally multi-factor solutions require additional investment implementation costs maintenance hardware token-based systems proprietary vendors charge annual fee per user deployment hardware tokens logistically challenging hardware tokens may get damaged lost issuance tokens large industries banking even within large enterprises needs managed addition deployment costs multi-factor authentication often carries significant additional support costs 2008 survey 120 u.s. credit unions credit union journal reported support costs associated two-factor authentication report software certificates software toolbar approaches reported highest support costs research deployments multi-factor authentication schemes shown one elements tends impact adoption systems line business organization deploys multi-factor authentication system examples cited include u.s. federal government employs elaborate system physical tokens backed robust public key infrastructure well private banks tend prefer multi-factor authentication schemes customers involve accessible less expensive means identity verification app installed onto customer-owned smartphone despite variations exist among available systems organizations may choose multi-factor authentication system deployed within organization tends remain place users invariably acclimate presence use system embrace time normalized element daily process interaction relevant information system 2013 kim dotcom claimed invented two-factor authentication 2000 patent briefly threatened sue major web services however european patent office revoked patent light earlier 1998 us patent held several popular web services employ multi-factor authentication usually optional feature deactivated default many internet services among google amazon aws use open time-based one-time password algorithm totp support two-step authentication
[ 3932, 1461, 2566, 5401, 6823, 4346, 7567, 5064, 74, 6501, 3680, 3681, 7603, 6515, 5485, 4056, 835, 2310, 5149, 3726, 4433, 1584, 4440, 2346, 7319, 3426, 1625, 4849, 3448, 2747, 3794, 600, 3486, 8131, 2789, 3490, 623, 6694, 3172, 2105, 4...
Test
7,866
2
Name_Service_Switch:name service switch name service switch nss facility unix-like operating systems provides variety sources common configuration databases name resolution mechanisms sources include local operating system files /etc/passwd /etc/group /etc/hosts domain name system dns network information service nis ldap system administrator usually configures operating system name services using file /etc/nsswitch.conf lists databases passwd shadow group one sources obtaining information examples sources files local files ldap lightweight directory access protocol nis network information service nisplus nis+ wins windows internet name service nsswitch.conf file line entries service consisting database name first field terminated colon list possible source databases mechanisms second field typical file might look like order services listed determines order nss attempt use services resolve queries specified database earlier unix-like systems notable exception ultrix either accessed configuration files hard-coded rules files databases access ultrix offered nearly identical functionality name service switch using configuration file /etc/svc.conf sun microsystems first developed nss solaris operating system subsequently programmers ported many operating systems including freebsd netbsd linux hp-ux irix aix
[ 5519, 2043, 5760, 5571, 578, 900 ]
Train
7,867
4
Microsoft_Forefront_Unified_Access_Gateway:microsoft forefront unified access gateway microsoft forefront unified access gateway uag software suite provides secure remote access corporate networks remote employees business partners services include reverse proxy virtual private network vpn directaccess remote desktop services uag released 2010 successor microsoft intelligent application gateway iag released 2007 uag part microsoft forefront offering microsoft discontinued product 2014 although web application proxy feature windows server 2012 r2 later offers functionalities web application proxy direct feature-for-feature replacement companies like portsys f5 offer direct migration paths uag deployments unified access gateway originally developed startup company named whale communications rosh haayin israel one challenges tried solve 1990s develop remote access solution based vpn mechanism without direct network access remote client corporate network type solution specifically required israeli military government meet national information security standards technology developed called air gap communication external network internal network managed two separate 1u rack-mount servers linked together memory bank accessed scsi interface 18 may 2006 microsoft announced would acquiring whale communications microsoft completed acquisition 26 july 2006 following acquisition product renamed microsoft intelligent application gateway server 2007 version scsi-based air gap dropped product unified single-server appliance instead using air gap security barrier iag used microsoft isa server firewall product iag offered public pre-installed appliance celestix networks ivo networks portsys nappliance 2009 release service pack 2 iag product also offered directly public microsoft form virtual appliance pre-installed vhd could run hyper-v vmware workstation april 2008 microsoft announced next generation iag named forefront unified access gateway product released 24 december 2009 service pack 1 product released 3 december 2010 update 1 service pack 1 released 17 october 2011 service pack 2 product released 6 august 2011 service pack 3 released 19 february 2013 service pack 4 released 27 november 2013 17 december microsoft announced microsoft deliver future full version releases forefront uag product removed price lists 1 july 2014 microsoft uag provides secure socket layer ssl virtual private network vpn web application firewall endpoint security management compliance security enable access control authorization content inspection wide variety line-of-business applications included customized granular access policy security capabilities microsoft exchange server 2003 2007 2010 microsoft sharepoint portal server 2003 2007 2010 microsoft terminal services citrix presentation server product highly customizable almost application published uag box uag server able work many authentication vendors mi-token rsa security onespan gridsure swivel activcard aladdin also works numerous authentication systems protocols active directory radius ldap ntlm lotus domino pki tacacs+ possible customizations include single-sign-on sso well look-and-feel dynamic customization current release uag update 2 product also offers support many third-party systems linux macintosh iphone product also supports mozilla firefox uag performs particularly well providing portal web applications web-based email intranets also provides full ssl vpn network access using either activex using internet explorer java components using firefox opera non windows client red hat mac os components also perform end-point compliance checks allowing access test attributes pc domain name antivirus definitions date running processes inclusion directaccess uag big influence success directaccess provides seamless vpn-like integration high-demand many organizations directaccess part windows uag provides user-friendly configuration interface making easier configure administrators uag also adds two additional components dns64 nat64 make deploying directaccess existing network easier without need deploy ipv6 product sold appliance form vendors ivo networks portsys celestix networks nappliance also offered installable dvd product installed windows server 2008 r2
[ 6788, 1620, 5984, 1721, 3357, 7806, 2644, 5475, 3962, 6991, 5571, 5227, 5488, 1559, 7453, 578, 6731, 3551, 4162, 7564, 8008, 4348, 1670, 5157, 3572, 2784, 6762, 7122, 6487, 1505, 6586, 1237, 4014, 2356 ]
Test
7,868
4
Traceroute:traceroute computing codice_1 codice_2 computer network diagnostic commands displaying route path measuring transit delays packets across internet protocol ip network history route recorded round-trip times packets received successive host remote node route path sum mean times hop measure total time spent establish connection traceroute proceeds unless three sent packets lost twice connection lost route evaluated ping hand computes final round-trip times destination point internet protocol version 6 ipv6 tool sometimes name traceroute6 tracert6 command codice_1 available many modern operating systems unix-like systems freebsd macos linux available command line tool traceroute also graphically accessible macos within network utilities suite microsoft windows reactos provide program named codice_2 performs route-tracing function windows nt-based operating systems also provide pathping similar functionality reactos version developed ged murphy licensed gpl unix-like operating systems traceroute sends default sequence user datagram protocol udp packets destination port numbers ranging 33434 33534 implementations traceroute shipped linux freebsd netbsd openbsd dragonfly bsd macos include option use icmp echo request packets -i arbitrary protocol -p udp tcp using tcp syn packets icmp windows tracert sends icmp echo request packets rather udp packets traceroute sends default time-to-live ttl value also known hop limit used determining intermediate routers traversed towards destination traceroute sends packets ttl values gradually increase packet packet starting ttl value one routers decrement ttl values packets one routing discard packets whose ttl value reached zero returning icmp error message icmp time exceeded first set packets first router receives packet decrements ttl value drops packet ttl value zero router sends icmp time exceeded message back source next set packets given ttl value two first router forwards packets second router drops replies icmp time exceeded proceeding way traceroute uses returned icmp time exceeded messages build list routers packets traverse destination reached returns icmp destination unreachable message udp packets used icmp echo reply message icmp echo messages used timestamp values returned router along path delay latency values typically measured milliseconds packet sender expects reply within specified number seconds packet acknowledged within expected interval asterisk displayed internet protocol require packets take route towards particular destination thus hosts listed might hosts packets traversed host hop n reply hop skipped output network firewall operates windows unix-like systems one protocol must enabled inbound firewall traceroute work receive replies traceroute implementations use tcp packets tcptraceroute layer four traceroute pathping utility introduced windows nt combines ping traceroute functionality mtr enhanced version icmp traceroute available unix-like windows systems various implementations traceroute rely icmp time exceeded type 11 packets sent source linux tracepath utility similar traceroute primary difference requiring superuser privileges cisco implementation traceroute also uses sequence udp datagrams incrementing ttl values invalid port number remote host default udp port 33434 used extended version command known extended traceroute command change destination port number used udp probe messages implementations include least options specify number queries send per hop time wait response hop limit port use invoking traceroute specified options displays list available options man traceroute presents details including displayed error flags simple example linux example selected options wait three seconds instead five send one query hop instead three limit maximum number hops 16 giving instead 30 example.com final host help identify incorrect routing table definitions firewalls may blocking icmp traffic high port udp unix ping site note firewall may permit icmp packets permit packets protocols traceroute also used penetration testers gather information network infrastructure ip ranges around given host also used downloading data multiple mirrors available piece data one trace mirror get good idea mirror would fastest use traceroute manual page states original traceroute program written van jacobson 1987 suggestion steve deering particularly cogent suggestions fixes c. philip wood tim seaver ken adelman author ping program mike muuss states website traceroute written using kernel icmp support earlier coded enable raw icmp sockets first wrote ping program traceroute limitations well known taken account using tool example traceroute discover paths router level interface level another limitation appears routers respond probes routers limit icmp responses presence traffic load balancing traceroute may indicate path actually exist minimize problem traceroute modification called paris-traceroute maintains flow identifier probes avoid load balancing
[ 361, 362, 6789, 1812, 6088, 2589, 1140, 3338, 4020, 4387, 4759, 1537, 2999, 5119, 5480, 5124, 2653, 7637, 5138, 7272, 5847, 1213, 3417, 5181, 4464, 5194, 6256, 3775, 3106, 5571, 6997, 578, 923, 3797, 5234, 5942, 5946, 8119, 3819, 3821, ...
Train
7,869
2
Optimus_UI:optimus ui optimus ui front-end touch interface developed lg electronics partners featuring full touch user interface sometimes incorrectly identified operating system optimus ui used internally lg sophisticated feature phones tablet computers available licensing external parties latest version optimus ui 4.1.2 released optimus k ii optimus neo 3 features refined user interface compared previous version 4.1.1 would include voice shutter quick memo optimus ui used devices based android
[ 3507, 4116, 3933, 5195, 6697, 2003, 3848, 5372, 7431, 195, 6978, 5473, 6427, 7346, 561, 201, 474, 2107, 2017, 5919, 822, 649, 1095, 3863, 4234, 5302, 7357, 2398, 740, 2037, 2756, 7007, 136, 42, 4340, 7749, 6209, 3310, 2591, 1399, 2417, ...
Test
7,870
9
Elliott_ALGOL:elliott algol elliott algol algol 60 compiler elliott 803 computer implemented tony hoare others differed slightly reference version algol particularly supported character set first released february 1962 believed first implementation algol 60 compiler commercial context unexpectedly popular product company
[ 1180, 1114, 1600 ]
Validation
7,871
2
Asphalt_6:_Adrenaline:asphalt 6 adrenaline asphalt 6 adrenaline 2010 racing video game developed published gameloft part asphalt series released ios december 21 2010 mac os x february 17 2011 android june 15 symbian^3 july 20 mobile phones august 31 webos september 3 blackberry playbook october 12 bada 2.0 january 10 2012 gameplay asphalt 6 adrenaline similar asphalt 5 player given option either tilting device touching side screen steer game also multiplayer mode local wi-fi bluetooth global internet connection player acquire five stars race performance based conditions set prior race concerning primary secondary objectives destroying certain number opponents drifting certain amount time new feature asphalt 6 adrenaline mode achieved hitting nitro meter full adrenaline mode player car becomes virtually indestructible ability easily wreck opponents upon slightest contact 42 licensed vehicles available game player starts dmc delorean abarth 500 ss nissan nismo 370z cars motorcycles custom painted tuned vehicles become available player progresses include shelby gt500 ktm x-bow tesla roadster sport audi s5 bmw z4 sdrive35is spyder citroën survolt maserati gran turismo bmw m3 gts ducati hypermotard bentley gt speed lamborghini estoque ferrari california nissan gt-r ducati 1198 ferrari f430 scuderia dodge viper srt10 acr-x ruf rt 12 mercedes-benz slr mclaren stirling moss lamborghini gallardo lp 570-4 superleggera ferrari 458 italia mclaren mp4-12c lamborghini murciélago lp 670-4 sv ruf ctr3 pagani zonda cinque ktm rc8 aston martin one-77 bugatti veyron 16.4 grand sport fastest car available player bentley speed 8 however acceleration bugatti veyron 16.4 grand sport due electronic arts ownership porsche license porsche vehicles although tuned variants ruf locations include nassau chamonix cape town havana new orleans moscow tokyo los angeles reykjavík new york city monte carlo shanghai exclusive android version rio de janeiro detroit hong kong game consists variety events java version asphalt 6 mobile phones consists slightly different gameplay style game consists free play mode well career mode racer must race way across number leagues winning races additional challenges one ultimately become lord asphalt game reaches 100 completion upon release asphalt 6 adrenaline received generally favorable reviews ios version holds aggregate score 79 100 metacritic based thirteen reviews 82 gamerankings based six reviews pocket gamer keith andrew scored game 9 10 arguing overall gameplay second-to-none elements come together – boosting burning bashing racers – asphalt 6 really finds rhythm delivering kind heart-hammering experience usually confined racers adorning big screen living room gameloft limits comes asphalt 6 adrenaline mobile game efforts marry exploits every racing franchise sun ends delivering experience outstrips almost felix xiao appadvice similar reaction praising graphics concluding 're looking action-packed racer pass time look asphalt 6 provide plus much dollars greatly improved artwork another set fantastic rides massive amount gameplay almost guarantee wo n't ever get enough 6.99 asphalt 6 must buy likely remain best arcade racing game time chris hall 148apps also reacted positively awarding score 4.5 5 praising feel game going fast asphalt 6 feels like going really fast engine explodes sound high rpm adrenaline boosts turbo look like straight tron crazy speed effects make game quite entertaining n't go thinking going looking next real racing 2 ... question racing fans get kick asphalt 6 fans arcade racers love bit graphics solid sound good driving mechanics exciting maybe bit forgiving racing sim fans game plain fun like kinds games definitely wo n't regret purchase ign levi buchanan slightly less impressed awarding game score 7.5 10 praising graphics controls arguing asphalt series become somewhat predictable asphalt 6 adrenaline fun arcade racer bunch cars tracks want speed exotic locations game let honest asphalt series starting get really familiar though still reliable fun series needs something next time offer slide play andrew podolsky similar mind ign feeling series become stagnant scoring game 3 4 score awarded asphalt 5 gameloft got us bit bind games consistently push technical limits iphone new iteration long-running series like asphalt looking sounding better one without bit creativity asphalt series starting feel like stuck second gear sixth asphalt game third iphone another brilliant technical achievement environments detailed colorful distinctive detected almost graphical pop-in frame rate slowdown played 4th generation ipod touch time huge leap saw asphalt 5 ... really missing asphalt 6 adrenaline graphical flair well-balanced gameplay progression gameloft found way churn iphone games look good feel viscerally exciting hollywood blockbusters like blockbusters sometimes left looking product lacks basic creativity basically events last game little incentive buy year asphalt
[ 6550, 7030, 6788, 6312, 2520, 4912 ]
Test
7,872
7
IQRF:iqrf iqrf technology wireless packet-oriented communication via radio frequency rf sub-ghz ism bands intended general use wireless connectivity needed either point-to-point complex networks e.g telemetry industrial control automation buildings cities internet things fully open functionality depends solely user-specific application basic iqrf communication device transceiver module tr including mcu built-in operating system os implementing link layer network layer supporting mesh networking utilizing iqmesh protocol application software written directly os c language unlike solution stack used e.g zigbee application program compiled development higher communication level transport layer dpa optional open protocol framework enabling control sending commands receiving responses via standard wired interface uart spi via rf dpa implemented ready-to-use software plug-in called hardware profile hwp uploaded transceiver programming needed however possible modify existing hwp functionality user-specific custom dpa handler programmed c. transceivers supporting dpa called dctr data controlled transceivers iqrf connectivity 3rd party devices programmable c java supported open source development sdk package iqrf sdk gateways datalogger option lan connectivity utilize cloud server providing plug-and-play worldwide access end iqrf wireless devices iqrf alliance international community developers manufacturers system integrators others engaged wireless connectivity based iqrf technology main goal interoperability products dctrs inside
[ 7876, 2087, 5571, 6976, 5889 ]
Test
7,873
2
Linspire:linspire linspire commercial operating system based debian gnu/linux ubuntu currently owned pc/opensystems llc 2001 2008 owned linspire inc. 2008 2017 xandros july 1 2008 linspire stockholders elected change company name digital cornerstone assets acquired xandros august 8 2008 andreas typaldos ceo xandros announced linspire would discontinued favor xandros freespire would change base code ubuntu debian linspire brand would cease exist january 1 2018 announced pc/opensystems llc purchased linspire freespire xandros linspire 7 available 79.99 freespire 3 available free based san diego california lindows inc. founded august 2001 michael robertson goal developing linux-based operating system capable running major microsoft windows applications based windows compatibility wine api company later abandoned approach favor attempting make linux applications easy download install use end program named cnr developed based debian advanced packaging tool provides easy-to-use graphical user interface slightly modified package system annual fee first public release lindows version 1.0 released late 2001 2002 microsoft sued lindows inc. claiming name lindows constituted infringement windows trademark microsoft claims rejected court asserted microsoft used term windows describe graphical user interfaces windows product ever released windowing technique already implemented xerox apple computer many years microsoft sought retrial postponed february 2004 offered settle case part licensing settlement microsoft paid estimated 20 million lindows inc. transferred lindows trademark microsoft changed name linspire inc. 15 june 2005 michael robertson stepped ceo linspire inc continues chairman replaced ceo kevin carmony carmony resigned linspire july 31 2007 linspire became member interop vendor alliance founded 2006 february 8 2007 linspire inc. canonical ltd lead sponsor developer ubuntu operating system announced plans new technology partnership linspire aiming begin basing ... desktop linux offerings ubuntu 13 june 2007 linspire microsoft announced interoperability collaboration agreement focus document format compatibility instant messaging digital media web search patent covenants linspire customers agreement criticised notably groklaw website disingenuously short-lived limited spirit gnu general public license kevin carmony one regular linspire letters asserted agreement would bring even choices desktop linux users ... offer better linux experience linspire bases product code names fish found near headquarters linspire/lindowsos 4.5 code named coho linspire five-0 5.0 5.1 freespire 1.0 marlin freespire 2.0 linspire 6.0 skipjack linspire cnr originally click n'run software distribution service based debian apt designed serve gui-based user-accessible means downloading installing various applications free proprietary service allowed users install available applications using single click cnr also included set click buy cnb software included many commercial applications members discounted rate cnr 38,000 different software packages ranging simple applications major commercial works win4lin staroffice cnr originally subscription-based two tiers basic service cost 20 annually gold featuring discounts commercial applications 50 2006 linspire announced basic service made available free linspire planned port cnr ubuntu distribution company announced april 24 2006 cnr would released open source license release free cnr client planned coincide release freespire 2.0 linspire 6.0 january 23 2007 linspire announced intended provide cnr linux distributions apt- rpm-based including debian fedora opensuse ubuntu support expected appear mid-2007 february 8 2007 linspire inc. announced partnership canonical ltd. publisher ubuntu linux distribution deal would see linspire freespire migrate unpredictable debian release process semiannual ubuntu release cycle intended main ubuntu distribution would become first recipient opening click n'run service linux distributions besides linspire august 2005 andrew betts released freespire live cd based linspire users mistook product linspire inc. linspire inc. offered users free linspire purchase price discounted 0 using coupon code freespire september 9 2005 april 24 2006 linspire announced project named freespire followed model community-oriented releases red hat novell form fedora opensuse freespire community-driven -supported project tied commercial linspire distribution included previously proprietary elements linspire cnr client elements linspire inc. licenses like windows media audio compatibility libraries remain closed-source consequently two versions freespire one closed source libraries one called freespire oss edition includes open-source components freespire 1.0 released august 7 2006 three weeks ahead schedule known freespire change code base ubuntu debian future releases july 10 2007 linspire released linspire 6.0 based freespire 2.0 final release freespire 2.0.8 released 30 november 2007 based ubuntu 7.04 supported 18 months reached end-of-life 19 october 2008 freespire therefore receives security updates upstream present distribution considered discontinued distrowatch linspire inc. sponsored open source projects including pidgin kopete instant messaging clients mozilla firefox web browser reiserfs file system nvu wysiwyg website editor kde-apps.org kde-look.org websites past linspire hosted several linux open source events annual desktop linux summit debconf kde developers conference linspire drawn criticism linux free software community included criticism including proprietary software gnu founder richard stallman commenting gnu/linux distribution backslided far away freedom switching ms windows linspire bring freedom gets different master addition following initial freespire announcement pamela jones groklaw website published article entitled freespire linux distro could n't care less freedom highly critical linspire inc. freespire project including closed-source components advertising favourable point—an action classed ignoring free open-source software foss community values community-driven distribution asserting free software n't proprietary drivers proprietary codecs drivers applications open source open way response linspire inc. ceo kevin carmony stated via journalist linspire website ten years holding foss community made relatively gains many users already using proprietary software although would hold would prefer something works rather nothing also asserted company believed open source software also freedom individuals choose whatever software want
[ 2916, 2585, 3996, 1128, 7587, 1893, 2260, 7954, 788, 4759, 7251, 474, 2297, 1941, 6209, 3738, 4824, 5523, 6586, 5530, 3751, 6951, 6244, 5200, 1629, 3444, 5912, 3780, 2740, 5571, 578, 5232, 2758, 1663, 4165, 2063, 5259, 2074, 6317, 968, ...
Validation
7,874
1
Seabird_Colony_Register:seabird colony register seabird colony register scr database managed british joint nature conservation committee contains counts breeding seabirds british seabird colonies made 1969 1998 used analysing past changes breeding seabird numbers changes colony size britain ireland data included scr include results two complete seabird censuses britain ireland operation seafarer 1969/70 seabird colony register census 1985–1987 well ad hoc counts counts surveys data held 25 species seabird breeding throughout britain ireland scr partially superseded seabird 2000 database
[ 2054 ]
Validation
7,875
9
Mohol_programming_languages:mohol programming languages mohol refers machine oriented high order languages dijkstra terminology
[]
Test
7,876
7
Zigbee:zigbee zigbee ieee 802.15.4-based specification suite high-level communication protocols used create personal area networks small low-power digital radios home automation medical device data collection low-power low-bandwidth needs designed small scale projects need wireless connection hence zigbee low-power low data rate close proximity i.e. personal area wireless ad hoc network technology defined zigbee specification intended simpler less expensive wireless personal area networks wpans bluetooth general wireless networking wi-fi applications include wireless light switches home energy monitors traffic management systems consumer industrial equipment requires short-range low-rate wireless data transfer low power consumption limits transmission distances 10–100 meters line-of-sight depending power output environmental characteristics zigbee devices transmit data long distances passing data mesh network intermediate devices reach distant ones zigbee typically used low data rate applications require long battery life secure networking zigbee networks secured 128 bit symmetric encryption keys zigbee defined rate 250 kbit/s best suited intermittent data transmissions sensor input device zigbee conceived 1998 standardized 2003 revised 2006 name refers waggle dance honey bees return beehive zigbee low-cost low-power wireless mesh network standard targeted battery-powered devices wireless control monitoring applications zigbee delivers low-latency communication zigbee chips typically integrated radios microcontrollers zigbee operates industrial scientific medical ism radio bands 2.4 ghz jurisdictions worldwide though devices also use 784 mhz china 868 mhz europe 915 mhz usa australia however even regions countries still use 2.4 ghz commercial zigbee devices home use data rates vary 20 kb/s 868 mhz band 250 kb/s 2.4 ghz band zigbee builds physical layer media access control defined ieee standard 802.15.4 low-rate wireless personal area networks wpans specification includes four additional key components network layer application layer zigbee device objects zdos manufacturer-defined application objects zdos responsible tasks including keeping track device roles managing requests join network well device discovery security zigbee network layer natively supports star tree networks generic mesh networking every network must one coordinator device within star networks coordinator must central node trees meshes allow use zigbee routers extend communication network level another defining feature zigbee facilities carrying secure communications protecting establishment transport cryptographic keys ciphering frames controlling device builds basic security framework defined ieee 802.15.4 zigbee-style self-organizing ad-hoc digital radio networks conceived 1990s ieee 802.15.4-2003 zigbee specification ratified december 14 2004 zigbee alliance announced availability specification 1.0 june 13 2005 known zigbee 2004 specification september 2006 zigbee 2006 specification announced obsoleting 2004 stack 2006 specification replaces message/key value pair structure used 2004 stack cluster library library set standardised commands organised groups known clusters names smart energy home automation zigbee light link january 2017 zigbee alliance renamed library dotdot announced new protocol represented emoticon || also announced additionally run network types using internet protocol interconnect standards thread since unveiling dotdot functioned default application layer almost zigbee devices zigbee pro also known zigbee 2007 finalized 2007 zigbee pro device may join operate legacy zigbee network vice versa due differences routing options zigbee pro devices must become non-routing zigbee end devices zeds legacy zigbee network legacy zigbee devices must become zeds zigbee pro network operates 2.4 ghz band also sub-ghz band zigbee protocols intended embedded applications requiring low power consumption tolerating low data rates resulting network use little power—individual devices must battery life least two years pass zigbee certification typical application areas include zigbee situations high mobility among nodes hence suitable tactical ad hoc radio networks battlefield high data rate high mobility present needed established 2002 zigbee alliance group companies maintain publish zigbee standard term zigbee registered trademark group single technical standard alliance publishes application profiles allow multiple oem vendors create interoperable products relationship ieee 802.15.4 zigbee similar ieee 802.11 wi-fi alliance years alliance membership grown 500 companies including likes comcast ikea legrand samsung smartthings amazon zigbee alliance three levels membership adopter participant promoter adopter members allowed access completed zigbee specifications standards participant members voting rights play role zigbee development early access specifications standards product development requirements membership zigbee alliance cause problems free software developers annual fee conflicts gnu general public licence requirements developers join zigbee alliance also conflict free software licenses zigbee alliance board asked make license compatible gpl refused bluetooth gpl licensed implementations first zigbee application profile home automation announced november 2 2007 additional application profiles since published specifications define internet protocol monitor control inform automate delivery use energy water enhancement zigbee smart energy version 1 specifications adds services plug-in electric vehicle charging installation configuration firmware download prepay services user information messaging load control demand response common information application profile interfaces wired wireless networks developed partners including zigbee smart energy relies zigbee ip network layer routes standard ipv6 traffic ieee 802.15.4 using 6lowpan header compression 2009 rf4ce radio frequency consumer electronics consortium zigbee alliance agreed deliver jointly standard radio frequency remote controls zigbee rf4ce designed broad range consumer electronics products tvs set-top boxes promised many advantages existing remote control solutions including richer communication increased reliability enhanced features flexibility interoperability line-of-sight barrier zigbee rf4ce specification lifts networking weight support mesh features traded smaller memory configurations lower cost devices remote control consumer electronics introduction second zigbee rf4ce application profile 2012 increased momentum mso market zigbee rf4ce team provides overview current status standard applications future technology radio design used zigbee analog stages uses digital circuits wherever possible though radios inexpensive zigbee qualification process involves full validation requirements physical layer radios derived validated semiconductor mask set would enjoy rf characteristics uncertified physical layer malfunctions could cripple battery lifespan devices zigbee network zigbee radios tight constraints power bandwidth thus radios tested guidance given clause 6 802.15.4-2006 standard products integrate radio microcontroller single module available standard specifies operation unlicensed 2.4 2.4835 ghz worldwide 902 928 mhz americas australia 868 868.6 mhz europe ism bands sixteen channels allocated 2.4 ghz band channel spaced 5 mhz apart though using 2 mhz bandwidth radios use direct-sequence spread spectrum coding managed digital stream modulator binary phase-shift keying bpsk used 868 915 mhz bands offset quadrature phase-shift keying oqpsk transmits two bits per symbol used 2.4 ghz band raw over-the-air data rate 250 kbit/s per channel 2.4 ghz band 40 kbit/s per channel 915 mhz band 20 kbit/s 868 mhz band actual data throughput less maximum specified bit rate due packet overhead processing delays indoor applications 2.4 ghz transmission distance may 10–20 depending construction materials number walls penetrated output power permitted geographical location outdoors line-of-sight range may 1500 depending power output environmental characteristics output power radios generally 0-20 dbm 1-100 mw zigbee devices three kinds current zigbee protocols support beacon non-beacon enabled networks non-beacon-enabled networks unslotted csma/ca channel access mechanism used type network zigbee routers typically receivers continuously active requiring robust power supply however allows heterogeneous networks devices receive continuously others transmit external stimulus detected typical example heterogeneous network wireless light switch zigbee node lamp may constantly receive since connected mains supply battery-powered light switch would remain asleep switch thrown switch wakes sends command lamp receives acknowledgment returns sleep network lamp node least zigbee router zigbee coordinator switch node typically zigbee end device beacon-enabled networks special network nodes called zigbee routers transmit periodic beacons confirm presence network nodes nodes may sleep beacons thus lowering duty cycle extending battery life beacon intervals depend data rate may range 15.36 milliseconds 251.65824 seconds 250 kbit/s 24 milliseconds 393.216 seconds 40 kbit/s 48 milliseconds 786.432 seconds 20 kbit/s however low duty cycle operation long beacon intervals requires precise timing conflict need low product cost general zigbee protocols minimize time radio reduce power use beaconing networks nodes need active beacon transmitted non-beacon-enabled networks power consumption decidedly asymmetrical devices always active others spend time sleeping except smart energy profile 2.0 zigbee devices required conform ieee 802.15.4-2003 low-rate wireless personal area network lr-wpan standard standard specifies lower protocol layers—the physical layer phy media access control portion data link layer dll basic channel access mode carrier sense multiple access/collision avoidance csma/ca nodes talk way humans converse briefly check see one talking start three notable exceptions beacons sent fixed timing schedule use csma message acknowledgments also use csma finally devices beacon-enabled networks low latency real-time requirements may also use guaranteed time slots gts definition use csma software designed easy develop small inexpensive microprocessors detail please use one sources listed references section go directly zigbee alliance web site using external links provided main functions network layer enable correct use mac sublayer provide suitable interface use next upper layer namely application layer capabilities structure typically associated network layers including routing network layer function exactly sounds deals network functions connecting disconnecting setting networks add network allocate addresses add/remove certain devices layer makes use star mesh tree topologies adds interface application layer one hand data entity creates manages network layer data units payload application-layer performs routing according current topology hand layer control used handle configuration new devices establish new networks determine whether neighboring device belongs network discovers new neighbors routers control also detect presence receiver allows direct communication mac synchronization routing protocol used network layer aodv aodv find destination device aodv broadcasts route request neighbors neighbors broadcast request neighbors onward destination reached destination reached sends route reply via unicast transmission following lowest cost path back source source receives reply update routing table destination address next hop path path cost application layer highest-level layer defined specification effective interface zigbee system end users comprises majority components added zigbee specification zdo management procedures together application objects defined manufacturer considered part layer layer binds tables sends messages bound devices manages group addresses reassembles packets also transports data responsible providing service zigbee device profiles zdo zigbee device object protocol zigbee protocol stack responsible overall device management security keys policies responsible defining role device either coordinator end device mentioned also discovery new one-hop devices network identification offered services may go establish secure links external devices reply binding requests accordingly application support sublayer aps main standard component layer offers well-defined interface control services works bridge network layer elements application layer keeps up-to-date binding tables form database used find appropriate devices depending services needed different devices offer union specified layers also routes messages across layers protocol stack application may consist communicating objects cooperate carry desired tasks focus zigbee distribute work among many different devices reside within individual zigbee nodes turn form network said work typically largely local device instance control household appliance collection objects form network communicates using facilities provided aps supervised zdo interfaces application layer data service follows typical request-confirm/indication-response structure within single device 240 application objects exist numbered range 1-240 0 reserved zdo data interface 255 broadcast 241-254 range currently use may future two services available application objects use zigbee 1.0 addressing also part application layer network node consists 802.15.4-conformant radio transceiver one device descriptions basically collections attributes polled set monitored events transceiver base addressing devices within node specified endpoint identifier range 1-240 applications communicate comprising devices must use common application protocol types messages formats sets conventions grouped profiles furthermore binding decided upon matching input output cluster identifiers unique within context given profile associated incoming outgoing data flow device binding tables contain source destination pairs depending available information device discovery may follow different methods network address known ieee address requested using unicast communication petitions broadcast ieee address part response payload end devices simply respond requested address network coordinator router also send addresses devices associated extended discovery protocol permits external devices find devices network services offer endpoints report queried discovering device previously obtained addresses matching services also used use cluster identifiers enforces binding complementary entities using binding tables maintained zigbee coordinators table must always available within network coordinators likely permanent power supply backups managed higher-level layers may needed applications binding requires established communication link exists whether add new node network decided according application security policies communication happen right association direct addressing uses radio address endpoint identifier whereas indirect addressing uses every relevant field address endpoint cluster attribute requires sent network coordinator maintains associations translates requests communication indirect addressing particularly useful keep devices simple minimize need storage besides two methods broadcast endpoints device available group addressing used communicate groups endpoints belonging set devices one defining features zigbee provides facilities carrying secure communications protecting establishment transport cryptographic keys cyphering frames controlling devices builds basic security framework defined ieee 802.15.4 part architecture relies correct management symmetric keys correct implementation methods security policies basic mechanism ensure confidentiality adequate protection keying material trust must assumed initial installation keys well processing security information implementation globally work general conformance specified behaviors assumed keys cornerstone security architecture protection paramount importance keys never supposed transported insecure channel momentary exception rule occurs initial phase addition network previously unconfigured device zigbee network model must take particular care security considerations ad hoc networks may physically accessible external devices also state working environment predicted within protocol stack different network layers cryptographically separated access policies needed conventional design assumed open trust model within device allows key sharing notably decreases potential cost nevertheless layer creates frame responsible security malicious devices may exist every network layer payload must ciphered unauthorized traffic immediately cut exception transmission network key confers unified security layer grid new connecting device zigbee uses 128-bit keys implement security mechanisms key associated either network usable zigbee layers mac sublayer link acquired pre-installation agreement transport establishment link keys based master key controls link key correspondence ultimately least initial master key must obtained secure medium transport pre-installation security whole network depends link master keys visible application layer different services use different one-way variations link key avoid leaks security risks key distribution one important security functions network secure network designate one special device devices trust distribution security keys trust center ideally devices center trust address initial master key preloaded momentary vulnerability allowed sent described typical applications without special security needs use network key provided trust center initially insecure channel communicate thus trust center maintains network key provides point-to-point security devices accept communications originating key supplied trust center except initial master key security architecture distributed among network layers follows security levels infrastructure based ccm* adds encryption- integrity-only features ccm according german computer magazine website zigbee home automation 1.2 using fallback keys encryption negotiation known changed makes encryption highly vulnerable network simulators like ns2 omnet++ opnet netsim used simulate ieee 802.15.4 zigbee networks simulators come open source c c++ libraries users modify way users determine validity new algorithms hardware implementation
[ 7876, 3078, 6077, 6335, 6521, 3956, 6093, 3365, 6987, 5571, 6815, 5492, 38, 1484, 3314, 7119, 3821, 1421, 5181, 7950, 7872, 1435 ]
Test
7,877
7
SimPRO:simpro simpro private saas company provides cloud-based job project management software field service trade contracting industries company customers partners australia new zealand united kingdom united states simpro offices located countries recent opening operation colorado united states simpro founded 2002 electrical business owner steve bradshaw approached software engineering student vaughan mckillop creating website electrical contracting business mckillop explained bradshaw strengths lay writing software rather web design two men created simpro first iteration using web-based php mysql languages initially focused making digital job lists moved building scheduling tool could allocate time technicians mckillop bradshaw continued expand software capability functionality realised new tool could also offered customers company first started trading acorn software service management pty ltd 2003 changed name simpro software 2011 simpro 2017 february 2019 simpro board management executive team five members chief executive officer sean diljore chief operating officer chief financial officer alan bignell chief technology officer jonathan eastgate executive financial controller rhiza lahoylahoy chief learning development officer erika entz peter darley currently general manager simpro australia ricky sevta general manager simpro new zealand 2009 simpro launched united kingdom current general manager richard pratley previously managed new zealand office 2015 company opened location colorado united states effort grow presence local market current president glenn nott october 2016 simpro received usd 31 million capital funding new york-based growth equity firm level equity marked first time company accepted external investment since founding level equity partner benjamin levin principal charles chen sit simpro board directors 2013 simpro acquired vehicle fleet tracking management company simtrac aud 2.5 million designed help business managers monitor work vehicles road real time minimise travel times simpro key features include quoting estimating scheduling service project management inventory management asset maintenance invoicing payment processing integration accounting software designed eliminate double entry data provide transfer financial data assist financial reporting simpro mobile applications used smartphones tablets ios android operation systems keep remote staff connected office simpro connect app field users process payment job complete customer credit card simpro eforms app used digitise company existing paper forms use field simpro ’ add-ons include simpro software integrates range third-party applications cloud accounting software sage xero myob quickbooks among others
[ 2961, 6029, 330, 6015 ]
Test
7,878
9
NewLISP:newlisp newlisp scripting language dialect lisp family programming languages designed developed lutz mueller newlisp free open-source software released gnu general public license version 3 later newlisp design influenced two main lisp dialects common lisp scheme languages like pascal c. newlisp originated 1991 originally developed sun-4 workstation later moved windows 3.0 version 1.3 released compuserve around 1993 became available windows graphical user interface gui graphics-capable application dos console application 16-bit 1995 release windows 95 newlisp moved 32-bit april 1999 newlisp ported linux core algorithms rewritten windows-specific code removed newlisp released open-source software project licensed gpl development windows stopped version 6.0.25 first half 2001 newlisp ported back windows cygwin platform without graphics abilities second half 2001 cross-platform tcl/tk frontend named newlisp-tk released around version 6.3.0 2006 64-bit precision introduced integer arithmetic operations files version 9.0 since release 6.5 mid-2002 development active many new features added newlisp attempts provide fast powerful cross-platform full-featured scripting version language lisp using modest system resources data storage e.g. disk space memory provides lisp features lists symbol processing function mapping anonymous functions lambda expressions s-expressions excluding improper lists macros also provides functions expected modern scripting language including supporting regular expressions xml unicode utf-8 networking via transmission control protocol tcp internet protocol ip user datagram protocol udp matrix array processing advanced math statistics bayesian statistical analysis mathematical finance distributed computing newlisp runs operating systems berkeley software distribution bsd linux macos solaris windows supports mysql sqlite odbc database access common gateway interface cgi simple mail transfer protocol smtp post office protocol pop 3 file transfer protocol ftp xml remote procedure call xml-rpc run server mode daemon newlisp supports namespaces termed contexts assigned variables passed functions associated globally unique symbols limiting use first-class citizens objects prototype-based object-oriented style programming possible newlisp using contexts prototypes construct objects variables inside contexts interfere variables name contexts inside context variables behave according rules dynamic scoping newlisp uses dynamic scoping function called function see variables caller caller caller within context namespace supports explicitly implicitly defined local dynamic variables shadow variables name outer environment thus preventing accidental use change variables caller environment parameter variables called function automatically shadow caller variable environment globally variables grouped separate namespaces newlisp uses method automatic memory management different traditional garbage collection schemes termed one reference oro memory management variable referenced context context referenced globally sharing subobjects among objects cyclic structures multiple variables pointing object unsupported newlisp objects copied stored data structures passed functions except certain built-in functions exceptions symbols contexts shared instead copied thus used indirection symbols contexts globally named deleted explicitly deleting symbol context scans objects replace references codice_1 newlisp graphical user interface gui server newlisp-gs java-based internet protocol suite tcp/ip server providing graphical programming interface newlisp-gs based development environment included newlisp binary distributions gtk-server opengl tcl/tk-based programming interfaces available newlisp version allows building executable files portable applications deployment self-contained need installing newlisp import function allows importing functions dynamic-link library dll windows api win32 shared library linux unix web frameworks available newlisp include dragonfly rockets
[ 1445, 5019, 1820, 6796, 6087, 1825, 2915, 5734, 1478, 2218, 4704, 5757, 6116, 1116, 6471, 7573, 2600, 5077, 1885, 1889, 4017, 6507, 795, 6876, 4759, 6888, 7637, 1557, 486, 6908, 4789, 5494, 5501, 6210, 144, 4074, 154, 4085, 7298, 5515, ...
Test
7,879
2
Windows_DreamScene:windows dreamscene windows dreamscene utility allows videos .gif optimized animations used desktop wallpapers one windows ultimate extras windows vista prior official announcement dreamscene rumored creation names motion desktop borealis several months testing final version released september 25 2007 rendered content included dreamscene animated realization windows aurora background produced stardock photographic content provided discovery channel third-party video content mpeg wmv format may also used addition avi files played altering file extension additionally partnership dell microsoft released separate dreamscene alongside product red version ultimate edition windows vista one purported advantages dreamscene previous methods desktop animation makes use gpu display instead cpu leaving latter free perform user tasks extent achieved specified full-screen program run game window maximized video automatically stop since video seen means uses less gpu cpu video also stopped manually content encoders need strive balance compression file size decompression requires cpu larger files take memory may cause disk accessed frequently running video background would significant impact battery life mobile computers whether rendered gpu dreamscene may display static background computer running batteries software relies heavily desktop window manager dwm part windows aero stardock offers chargeable add-on windows dreamscene called deskscapes software allows implementation dynamic wallpapers .dream files released new version 3.5 makes program compatible non-ultimate editions vista newer versions windows 7 8 windows 7 dreamscene replaced desktop slideshow feature produces slideshow background wallpapers support videos however still enabled via third-party tools
[ 3937, 3263, 378, 2198, 6096, 1475, 7553, 5410, 7564, 422, 6844, 6136, 2245, 435, 5442, 5090, 3340, 7602, 6164, 1534, 6885, 7619, 2999, 6528, 2290, 4774, 1181, 3711, 140, 6558, 6575, 3407, 3057, 1597, 2345, 1237, 7688, 2710, 1248, 8049, ...
Test
7,880
8
RSS_tracking:rss tracking rss tracking methodology tracking rss feeds rss feeds around since 1999 form internet marketing however unlike forms publishing information internet difficult track usage rss feeds feed tracking methods growing popularity currently many methods tracking rss feeds problems terms accuracy transparent 1×1 pixel images images embedded within content rss feed linking image held web server number requests made measured using web server log files give rough estimate many times rss feed viewed problem method rss feed aggregators display images parse html third-party services services available internet syndicate rss feed track requests made syndication rss feed services come free paid forms problem method analytical data feeds controlled service provider easily accessible transferable unique url per feed method requires heavy web server programming auto generate different rss feed url visitor website visitor rss feed activity tracked accurately using standard web analytics applications problem method feed syndicated search engine instance defeat purpose unique urls many people could potentially view rss feed via single url estimating number subscribers log files aggregators example bloglines google reader include number unique users whose behalf feed downloaded http request readers -- web browsers -- counted noting number unique ip addresses retrieve file given period provides estimate actual readership although probably higher real number people may sign accounts multiple aggregators never delete subscriptions may read feeds different computers computer may different ip address different times
[ 2430, 6492, 7063, 4600, 5531, 2379, 84, 8174, 7169 ]
Test
7,881
2
SIS_(file_format):sis file format sis acronym stands software installation script standard software installation package format symbian os sis files archive containing installation instructions application file usually .app .exe file dependencies convention .sisx denotes signed file different ways sis file created basic approach create package definition file .pkg contains information package like vendor package name files include package use makesis signsis utilities processes .pkg file creates actual sis file alternatives use carbide.c++ ide automatically builds sis file part build process graphically define create installation package using packageforge windows utility siscontents able convert various file formats
[ 2919, 6515, 5062, 7827, 656, 5068, 1172, 4726 ]
Test
7,882
4
3wPlayer:3wplayer 3wplayer malware disguises media player infect computers running microsoft windows designed exploit users download video files instructing download install program order view video 3wplayer employs form social engineering infect computers seemingly desirable video files recent movies released via bittorrent distribution channels files resemble conventional avi files engineered display message played media player programs instructing user visit 3wplayer website download software view video 3wplayer infected trojan.win32.obfuscated.en according symantec 3wplayer may download piece adware refer adware.lop adds toolbar search button internet explorer perl script posted online reportedly decrypt 3wplayer files back avi claim tested mixed results intended avi file rarely desired video file developers made application automatically identify 3wplayer encrypted files multiple 3wplayer clones divocodec divo codec x3codec also identified trojan similar 3wplayer users instructed download codec order view play avi/mp4/mp3/wma file often downloaded via p2p programs instead actual codecs divocodec installs malware users computer divocodec polymorphic change structure also known write another process virtual memory process hijacking domplayer similar divocodec 3wplayer users also instructed download player order view avi file divocodec false .avi easily spotted duration file usually lying 10–12 seconds one conclude chance file may film/tv series despite size file always case however many distributors recently begun falsifying file meta data display normal durations file sizes x3 player similar domplayer instructs users download player view avi file also circulated 5-second asf video disguised mp3 file instructing users install player
[ 5983, 5482, 4759, 8066 ]
Test
7,883
9
Datapoint's_Advanced_Systems_Language:datapoint advanced systems language dasl datapoint advanced systems language programming language compiler proprietary datapoint primarily influenced pascal c touches created early 1980s gene hughes compiler output assembly language typically processed peep-hole optimizer assembler linker reflecting name dasl used systems programming mainly vendor
[ 1361, 336, 4662, 5948, 1435 ]
Test
7,884
1
Resources,_events,_agents_(accounting_model):resources events agents accounting model resources events agents rea model accounting system re-engineered computer age rea originally proposed 1982 william e. mccarthy generalized accounting model contained concepts resources events agents mccarthy 1982 rea popular model teaching accounting information systems ais rare business practice companies easily dismantle legacy data warehouse systems unwilling workday inc. ibm scalable architecture financial reporting reatechnology iso 15944-4 exceptions fallon polovina 2013 however shown rea also add value modelling current erp business processes providing tool increases understanding implementation underlying data model rea model gets rid many accounting objects necessary computer age visible debits credits—double-entry bookkeeping disappears rea system many general ledger accounts also disappear least persistent objects e.g. accounts receivable accounts payable computer generate accounts real time using source document records rea treats accounting system virtual representation actual business words creates computer objects directly represent real-world-business objects computer science terms rea ontology real objects included rea model objects contrast conventional accounting terms asset liability less directly tied real-world objects example conventional accounting asset goodwill rea resource separate rea model business process company business process roughly corresponds functional department function michael porter value chain examples business processes would sales purchases conversion manufacturing human resources financing heart rea model usually pair events linked exchange relationship typically referred duality relation one events usually represents resource given away lost represents resource received gained example sales process one event would sales —where goods given up—and would cash receipt cash received two events linked cash receipt occurs exchange sale vice versa duality relationship complex e.g. manufacturing process would often involve two events see dunn et al 2004 examples rea systems usually modeled relational databases entity-relationship diagrams though compulsory philosophy rea draws idea reusable design patterns though rea patterns used describe databases rather object oriented programs quite different 23 canonical patterns original designs pattern book gamma et al research rea emphasizes patterns e.g. hruby et al 2006 example basic rea pattern shown e-r diagram pattern extended encompass commitments promises engage transactions e.g. sales order policies constructs dunn et al 2004 provide good overview undergraduate level accounting majors hruby et al 2006 advanced reference computer scientists diagram extended rea pattern hruby et al 2006 rea continuing influence electronic commerce standard ebxml w. mccarthy actively involved standards committee competing xbrl gl standard however odds rea concept closely mimics double-entry book-keeping rea recognised open group og within togaf® standard industry standard enterprise framework one modelling tools useful modelling business processes sensorica world first open value network ovn specialized open innovation peer production hardware uses rea model basis network resource planning contribution/value accounting system nrp-vas nrp-vas created bob haugen collaboration sensorica ovn
[]
Validation