wikipedia_id
stringlengths
2
8
wikipedia_title
stringlengths
1
243
url
stringlengths
44
370
contents
stringlengths
53
2.22k
id
int64
0
6.14M
906048
Tony Plana
https://en.wikipedia.org/w/index.php?title=Tony%20Plana
Tony Plana Officer and a Gentleman", "Three Amigos," "Goal!," "Lone Star," and others. He is known to PC gamers as the voice of Manny Calavera in the LucasArts 1998 adventure game "Grim Fandango." In 2011, Plana guest starred in "Desperate Housewives" as Gabrielle Solis's abusive stepfather, Alejandro Perez. He also directed "Witch's Lament", a "Desperate Housewives" episode in the show's "eighth season". In 2011, he appeared in "Body of Proof", in the episode "Helping Hand". Plana, during his acting career participated in the web series "Los Americans" (2011), which is characterized by having a multigenerational focus, a middle-class family living in Los Angeles. During the series, he participated with
19,100
906048
Tony Plana
https://en.wikipedia.org/w/index.php?title=Tony%20Plana
Tony Plana Esai Morales, Lupe Ontiveros, JC Gonzalez, Raymond Cruz, Yvonne DeLaRosa, and Ana Villafañe. Plana teaches acting at California State University, Dominguez Hills and Rio Hondo College. In 2012, he served as an official judge for the Noor Iranian Film Festival. # Politics. Plana is currently volunteering as a spokesperson for comprehensive immigration reform. He was the keynote speaker for the 2012 LULAC conference in Coronado Springs Convention Center in Lake Buena Vista, Florida. # Awards. Won - Satellite Awards for Best Actor in a Supporting Role in a Series, Miniseries, or Motion Picture Made for Television for his role as "Ignacio Suarez," "Ugly Betty," on December 17, 2006. Nominations -
19,101
906048
Tony Plana
https://en.wikipedia.org/w/index.php?title=Tony%20Plana
Tony Plana Screen Actors Guild Awards: Screen Actors Guild Award for Best Ensemble - Comedy Series for: "Ugly Betty" (2006). - ALMA Awards: Outstanding Actor in a Television Series for: "Resurrection Blvd." (2002) - ALMA Awards: Outstanding Actor in a New Television Series for: "Resurrection Blvd." (2001) - Bravo Awards: Outstanding Actor in a Feature Film for: "Lone Star" (1996). # Selected filmography. - "What's Happening!!" (1978, TV Series) as Amid - "The Boss' Son" (1978) as Juan - "The Paper Chase" (1978, TV Series) as Marcos - "Seed of Innocence" (1980) (uncredited) - "First Family" (1980) as White House Gardener - "Madame X" (1981, TV Movie) as Senor Rueda - "Love & Money" (1981) as
19,102
906048
Tony Plana
https://en.wikipedia.org/w/index.php?title=Tony%20Plana
Tony Plana National Guard General - "Zoot Suit" (1981) as Rudy - "Circle of Power" (1981) as Reza Haddad - "An Officer and a Gentleman" (1982) as Emiliano Della Serra - "Valley Girl" (1983) as Low Rider - "Nightmares" (1983) as Father Luis Del Amo (segment "The Benediction") - "El Norte" (1983) as Carlos the Bus Boy - "Deal of the Century" (1983) as Chicano Man - "What's Up, Hideous Sun Demon" (1983) as Officer Ignatz - "City Limits" (1984) as Ramos - "Latino" (1985) as Ruben - "The Best of Times" (1986) as Chico - "Salvador" (1986) as Major Max - "Three Amigos" (1986) as Jefe - "Disorderlies" (1987) as Miguel - "Born in East L.A." (1987) as Feo - "Miami Vice" (1984-1988, TV Series) as
19,103
906048
Tony Plana
https://en.wikipedia.org/w/index.php?title=Tony%20Plana
Tony Plana Ernesto Guerrero / Cinco - "Buy & Cell" (1988) as Raoul - "Break of Dawn " (1988, TV Movie) as Rodriguez - "The Case of the Hillside Stranglers" (1989, TV Movie) as Mike Hernandez - "Romero" (1989) as Father Manuel Morantes - "Why Me?" (1990) as Benjy Klopzik - "The Rookie" (1990) as Morales - "Havana" (1990) as Julio Ramos - "Seinfeld" (1991, Season 2 Episode 5: "The Apartment") as Manny - "One Good Cop" (1991) as Beniamino - "The Golden Girls" (1991, TV Series) as Alvarez - "JFK" (1991) as Carlos Bringuier - "Live Wire" (1992) as Al-red - "Red Hot" (1993) as KGB Investigator - "Greshnitsa v maske" (1993) as Le Arden - "A Million to Juan" (1994) as Jorge - "Silver Strand" (1995,
19,104
906048
Tony Plana
https://en.wikipedia.org/w/index.php?title=Tony%20Plana
Tony Plana TV Movie) as Richie Guttierez - "Nixon" (1995) as Manolo Sanchez - "Primal Fear" (1996) as Martinez - "Lone Star" (1996) as Ray - "The Disappearance of Garcia Lorca" (1996) as Lorca's Friend Marcos - "Canción desesperada" (1996) as Patrick - "Down for the Barrio" (1997) as Cesar - "Santa Fe" (1997) as Chief Gomez - "One Eight Seven" (1997) as Principal Garcia - "The Wonderful Ice Cream Suit" (1998) as Victor Medina - "Shadow of Doubt" (1998) as Detective Krause - "Let the Devil Wear Black" (1999) as Tall - "Every Dog Has Its Day" (1999) as The Cop - "Knockout" (2000) as Chuck Alvarado - "Picking Up the Pieces" (2000) as Usher - "Vegas, City of Dreams" (2001) as Captain Martin -
19,105
906048
Tony Plana
https://en.wikipedia.org/w/index.php?title=Tony%20Plana
Tony Plana "Half Past Dead" (2002) as Warden El Fuego - "John Doe" (2003, Season 1, Episode 17: "Doe or Die") as Captain Ruiz - "Monk" (2003, TV Series) as Capt. Alameda - "24" (2004, TV Series) as Omar - "The Lost City" (2005) as The Emcee - "Goal!" (2005) as Hernan Munez - "El Muerto" (2007) as Aparicio - "Hacia la oscuridad" (2007) as Carlos Gutierrez - "Half Past Dead 2" (2007) as Warden El Fuego - "AmericanEast" (2008) as Dez - "Life Is Hot in Cracktown" (2009) as Lou - "Change Your Life!" (2010) as Simon Martinez - "Desperate Housewives" (2011, TV Series) as Alejandro Perez - "Body of Proof" (2011, Episode 3: "Helping Hand") as Armando Rosas - "America" (2011) as Tio Poldo - "The Man
19,106
906048
Tony Plana
https://en.wikipedia.org/w/index.php?title=Tony%20Plana
Tony Plana Who Shook the Hand of Vicente Fernandez" (2012) as Dr. Dominguez - "Psych" (2013, Season 7, Episode 4: "No Country for Two Old Men") as Pablo Nuñez - "Pain and Gain" (2013) as Captain Lopez - "Alpha House" (2013-2014, TV Series) as Benito 'Benny' Lopez - "A Miracle in Spanish Harlem" (2013) as Mariano - "Jane the Virgin" (2014, TV Series) as Father Ortega - "The Fosters" (2015-2017, TV Series) as Victor Gutierrez - "Cristela" (2015, TV Series) as Joaquin Alvarez - "" (2015, TV Series) as Father Consolmango - "The Young Pope" (2016, TV Series) as Carlos García - "America Adrift" (2016) as William Fernandez - "Lethal Weapon" (2016–2018, TV Series) as Ronnie Delgado - "Superstore" (2017,
19,107
906048
Tony Plana
https://en.wikipedia.org/w/index.php?title=Tony%20Plana
Tony Plana Season 2, Episode 16: "Integrity Award") as Ron Sosa - "Roman J. Israel, Esq." (2017) as Jessie Salinas - "Butterfly Caught" (2017) as Michael Channis - "One Day at a Time" (2017-2019, TV Series) as Berto - "Colony" (2017–present) as Proxy Alcala - "The Punisher" (2017–2019, TV Series) as Rafael Hernandez - "Shooter" (2018, TV Series) as Guitierez - "Dynasty" (2019) as Cristal Jennings’ father, Silvio Flores. # Voice acting. - "Godzilla 1985" (1985) as Goro Maki (voice, uncredited) - "Santo Bugito" (1995, TV Series) as Paco - "Extreme Ghostbusters" (1997, TV Series) (voice) - "Grim Fandango" (1998, Video Game) as Manuel "Manny" Calavera - "Cuba Libre" (2003) as Narrator (voice) -
19,108
906048
Tony Plana
https://en.wikipedia.org/w/index.php?title=Tony%20Plana
Tony Plana nis - "One Day at a Time" (2017-2019, TV Series) as Berto - "Colony" (2017–present) as Proxy Alcala - "The Punisher" (2017–2019, TV Series) as Rafael Hernandez - "Shooter" (2018, TV Series) as Guitierez - "Dynasty" (2019) as Cristal Jennings’ father, Silvio Flores. # Voice acting. - "Godzilla 1985" (1985) as Goro Maki (voice, uncredited) - "Santo Bugito" (1995, TV Series) as Paco - "Extreme Ghostbusters" (1997, TV Series) (voice) - "Grim Fandango" (1998, Video Game) as Manuel "Manny" Calavera - "Cuba Libre" (2003) as Narrator (voice) - "Hiroshima" - Radio play based on the book by John Hersey, adapted by John Valentine (2003) - "Elena of Avalor" (2018, TV Series) as Oapa (voice)
19,109
906090
Blowoff valve
https://en.wikipedia.org/w/index.php?title=Blowoff%20valve
Blowoff valve Blowoff valve A blow-off valve (BOV), dump valve or compressor bypass valve (CBV), is a pressure release system present in most turbocharged engines. Its main purpose is to take the load off the turbocharger when the throttle is suddenly closed. # Characteristics. A compressor bypass valve (CBV), also known as a pressure relief valve or diverter valve, is a manifold vacuum-actuated valve designed to release pressure in the intake system of a turbocharged vehicle when the throttle is lifted or closed. This air pressure is re-circulated back into the non-pressurized end of the intake (before the turbo) but after the mass airflow sensor. A blowoff valve, (sometimes "hooter valve" or BOV) performs
19,110
906090
Blowoff valve
https://en.wikipedia.org/w/index.php?title=Blowoff%20valve
Blowoff valve the same task but releases the air into the atmosphere instead of recirculating it. This type of valve is typically an aftermarket modification. The blowoff action produces a range of distinctive hissing sounds, depending on the exit design. Some blowoff valves are sold with a trumpet-shaped exit that intentionally amplifies the sound. Some turbocharged vehicle owners may purchase a blowoff valve solely for the auditory effect even when the function is not required by normal engine operation. Motor sports governed by the FIA have made it illegal to vent unmuffled blowoff valves to the atmosphere. Blowoff valves are used to prevent compressor surge, a phenomenon that readily occurs when lifting
19,111
906090
Blowoff valve
https://en.wikipedia.org/w/index.php?title=Blowoff%20valve
Blowoff valve off the throttle of an unvented, turbocharged engine. The sound produced is called turbo flutter (the slang term "choo-choo" is sometimes used). When the throttle plate on a turbocharged engine closes, with the turbine spinning at high speed, the flow reduces beyond the surge line of the compressor. At this point the delta-P across the compressor reduces leading to a collapse in flow and possibly even flow reversal and a collapse in plenum pressure. As the compressor is still spinning at high speed, once the flow has reduced sufficiently, delta-P across the compressor begins to rise and flow is re-established into the plenum. This continues until once again the plenum is pressurised and flow
19,112
906090
Blowoff valve
https://en.wikipedia.org/w/index.php?title=Blowoff%20valve
Blowoff valve begins to fall until the surge line is again crossed and the cycle repeats. This unstable flow leads to the cyclic noise sometimes heard on high boost engines with no bypass valve. With a valve fitted, flow is maintained preventing the compressor entering the stall/surge cycle. The repeated, high speed cycling will cause a cyclic torque on the compressor and may lead to increased stresses on the bearings and compressor impeller. # Operation. A blowoff valve is connected by a vacuum hose to the intake manifold "after" the throttle plate. When the throttle is closed, the relative manifold pressure drops below atmospheric pressure and the resulting pressure differential operates the blowoff
19,113
906090
Blowoff valve
https://en.wikipedia.org/w/index.php?title=Blowoff%20valve
Blowoff valve valve's piston. The excess pressure from the turbocharger is then vented into the atmosphere or recirculated into the intake upstream of the compressor inlet. # Disadvantages. In the case where a mass airflow sensor (MAF) is used and is located upstream from the blowoff valve, the engine control unit (ECU) will inject excess fuel because the atmospherically vented air is not subtracted from the intake charge measurements. The engine then briefly operates with a fuel-rich mixture after each valve actuation. The rich mixing can lead to hesitation or even stalling of the engine when the throttle is closed, a situation that worsens with higher boost pressures. Occasional events of this type may
19,114
906090
Blowoff valve
https://en.wikipedia.org/w/index.php?title=Blowoff%20valve
Blowoff valve be only a nuisance, but frequent events can eventually foul the spark plugs and destroy the catalytic converter, as the inefficiently combusted fuel produces soot (excess carbon) and unburned fuel in the exhaust flow can produce soot in the converter and drive the converter beyond its normal operating temperature range. An alternative method for utilizing both a MAF and a blowoff valve is to have the MAF located down stream between the intercooler and the throttle plate. This is known as Blow-through rather than the traditional Draw-through set up. Care must be taken as to the position of the MAF to prevent damage to the sensitive element. For example, on a SR20DET engine, the MAF must be at
19,115
906090
Blowoff valve
https://en.wikipedia.org/w/index.php?title=Blowoff%20valve
Blowoff valve least from the throttle plate, and the blowoff valve must be from the MAF sensor. By using a blow-through method, the MAF won't be affected by the blowoff valve opening as the pressure is vented before the air reaches the MAF. One approach used to mitigate the problem has been to reduce the boost pressure, which reduces the required venting volume and yields less charge over-calculation by the ECU. The air can also be recirculated back into the intake, a typical stock setup for cars with an upstream MAF sensor. The situation can also be corrected by switching the fuel metering system over to a manifold absolute pressure sensor, a conversion that usually requires a compatible aftermarket ECU
19,116
906090
Blowoff valve
https://en.wikipedia.org/w/index.php?title=Blowoff%20valve
Blowoff valve or piggy-back fuel controller. The MAP sensor monitors the absolute pressure in the manifold at all times and will correctly detect the change that occurs when the valve vents, allowing the ECU to reduce fuel metering accordingly. # See also. - Wastegate - Water hammer # References. - Allard, Alan. Turbocharging and Supercharging. Cambridge, England: Patrick Stevens Limited, 1982. - Gorla, Rama, and Khan, Aijaz. Turbomachinery Design and Theory. New York, New York: Marcel Dekker, 2003. - Society of Automotive Engineers. Turbochargers and Turbocharged Engines. Warrendale, PA, 1979. - Watson, N, and Janota, N. Turbocharging the Internal Combustion Engine. London, England: Macmillan Press
19,117
906090
Blowoff valve
https://en.wikipedia.org/w/index.php?title=Blowoff%20valve
Blowoff valve fuel controller. The MAP sensor monitors the absolute pressure in the manifold at all times and will correctly detect the change that occurs when the valve vents, allowing the ECU to reduce fuel metering accordingly. # See also. - Wastegate - Water hammer # References. - Allard, Alan. Turbocharging and Supercharging. Cambridge, England: Patrick Stevens Limited, 1982. - Gorla, Rama, and Khan, Aijaz. Turbomachinery Design and Theory. New York, New York: Marcel Dekker, 2003. - Society of Automotive Engineers. Turbochargers and Turbocharged Engines. Warrendale, PA, 1979. - Watson, N, and Janota, N. Turbocharging the Internal Combustion Engine. London, England: Macmillan Press Ltd, 1982.
19,118
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt TrueCrypt TrueCrypt is a discontinued source-available freeware utility used for on-the-fly encryption (OTFE). It can create a virtual encrypted disk within a file, or encrypt a partition or the whole storage device (pre-boot authentication). On 28 May 2014, the TrueCrypt website announced that the project was no longer maintained and recommended users find alternative solutions. Though development of TrueCrypt has ceased, an independent audit of TrueCrypt (published in March 2015) has concluded that no significant flaws are present. Alternatives include a freeware project based on the TrueCrypt code, VeraCrypt, as well as numerous other commercial and open-source products. # History. TrueCrypt
19,119
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt was initially released as version 1.0 in February 2004, based on E4M (Encryption for the Masses). Several versions and many additional minor releases have been made since then, with the most current version being 7.1a. ## E4M and SecurStar dispute. Original release of TrueCrypt was made by anonymous developers called "the TrueCrypt Team". Shortly after version 1.0 was released in 2004, the TrueCrypt Team reported receiving email from Wilfried Hafner, manager of SecurStar, a computer security company. According to the TrueCrypt Team, Hafner claimed in the email that the acknowledged author of E4M, developer Paul Le Roux, had stolen the source code from SecurStar as an employee. It was further
19,120
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt stated that Le Roux illegally distributed E4M, and authored an illegal license permitting anyone to base derivative work on the code and distribute it freely. Hafner alleges all versions of E4M always belonged only to SecurStar, and Le Roux did not have any right to release it under such a license. This led the TrueCrypt Team to immediately stop developing and distributing TrueCrypt, which they announced online through usenet. TrueCrypt Team member David Tesařík stated that Le Roux informed the team that there was a legal dispute between himself and SecurStar, and that he received legal advisement not to comment on any issues of the case. Tesařík concluded that should the TrueCrypt Team continue
19,121
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt distributing TrueCrypt, Le Roux may ultimately be held liable and be forced to pay consequent damages to SecurStar. To continue in good faith, he said, the team would need to verify the validity of the E4M license. However, because of Le Roux's need to remain silent on the matter, he was unable to confirm or deny its legitimacy, keeping TrueCrypt development in limbo. Thereafter, would-be visitors reported trouble accessing the TrueCrypt website, and 3rd party mirrors appeared online making the source code and installer continually available, outside of official sanction by the TrueCrypt Team. In the FAQ section of its website, SecurStar maintains its claims of ownership over both E4M and
19,122
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt Scramdisk, another free encryption program. The company states that with those products, SecurStar "had a long tradition of open source software", but that "competitors had nothing better to do but to steal our source code", causing the company to make its products closed-source, forcing potential customers to place a substantial order and sign a non-disclosure agreement before being allowed to review the code for security. Le Roux himself has denied developing TrueCrypt in a court hearing in March 2016, in which he also confirmed he had written E4M. On the other hand, he did reportedly order employees of his around 2007 to encrypt their hard drives with E4M, later with TrueCrypt. ## Version
19,123
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt 2.0. Months later on 7 June 2004, TrueCrypt 2.0 was released. The new version contained a different digital signature from that of the original TrueCrypt Team, with the developers now being referred to as "the TrueCrypt Foundation." The software license was also changed to the open source GNU General Public License (GPL). However, given the wide range of components with differing licenses making up the software, and the contested nature of the legality of the program's release, a few weeks later on 21 June, version 2.1 was released under the original E4M license to avoid potential problems relating to the GPL license. Version 2.1a of the software was released on 1 October 2004 on codice_1
19,124
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt sub-domain. By May 2005, the original TrueCrypt website returned and codice_1 redirected visitors to codice_3. ## End of life announcement. On 28 May 2014, the TrueCrypt official website, codice_3, began redirecting visitors to codice_1 with a HTTP 301 "Moved Permanently" status, which warned that the software may contain unfixed security issues, and that development of TrueCrypt was ended in May 2014, following Windows XP's end of support. The message noted that more recent versions of Windows have built-in support for disk encryption using BitLocker, and that Linux and OS X had similar built-in solutions, which the message states renders TrueCrypt unnecessary. The page recommends any data
19,125
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt encrypted by TrueCrypt be migrated to other encryption setups and offered instructions on moving to BitLocker. The SourceForge project page for the software at codice_6 was updated to display the same initial message, and the status was changed to "inactive." The page also announced a new software version, 7.2, which only allows decryption. Initially, the authenticity of the announcement and new software was questioned. Multiple theories attempting to explain the reason behind the announcement arose throughout the tech community. Shortly after the end of life announcement of TrueCrypt, Gibson Research Corporation posted an announcement titled "Yes... TrueCrypt is still safe to use" and a Final
19,126
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt Release Repository to host the last official non-crippled version 7.1a of TrueCrypt. ## Alternatives. TrueCrypt may still be used on supported platforms. There are at least two TrueCrypt forks, one Free Software re-implementation as well as open-source and commercial alternatives. ### CipherShed. As of June 2014, there is also a software fork named CipherShed, with resources and infrastructure funded by codice_7, developed by codice_8, and audited by a crowdfunded security audit team (c.f. ).The latest version of the CipherShed is 0.7.4.0, released in . ### VeraCrypt. VeraCrypt is a fork of TrueCrypt. Security improvements have been implemented and issues raised by the TrueCrypt code audit
19,127
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt just before the TrueCrypt developers retired have been addressed. ### tc-play. tc-play is an independently-developed open-source implementation of the TrueCrypt format. It is a free command-line implementation available for Linux and DragonFly BSD under BSD license. Its disk encryption method and container format are managed by Linux Kernel via dm-crypt module. ZuluCrypt, a graphical front end for tc-play, is available on several Linux distributions. # Operating systems. TrueCrypt supports Windows, OS X and Linux operating systems. Both 32-bit and 64-bit versions of these operating systems are supported, except for Windows IA-64 (not supported) and Mac OS X 10.6 Snow Leopard (runs as a 32-bit
19,128
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt process). The version for Windows 7, Windows Vista, and Windows XP can encrypt the boot partition or entire boot drive. ## Independent implementations. There is an independent, compatible implementation, tcplay, for DragonFly BSD and Linux. The Dm-crypt module included in default Linux kernel supports a "TrueCrypt" target called "tcw" since Linux version 3.13. # Encryption scheme. ## Algorithms. Individual ciphers supported by TrueCrypt are AES, Serpent, and Twofish. Additionally, five different combinations of cascaded algorithms are available: AES-Twofish, AES-Twofish-Serpent, Serpent-AES, Serpent-Twofish-AES and Twofish-Serpent. The cryptographic hash functions available for use in
19,129
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt TrueCrypt are RIPEMD-160, SHA-512, and Whirlpool. ## Modes of operation. TrueCrypt currently uses the XTS mode of operation. Prior to this, TrueCrypt used LRW mode in versions 4.1 through 4.3a, and CBC mode in versions 4.0 and earlier. XTS mode is thought to be more secure than LRW mode, which in turn is more secure than CBC mode. Although new volumes can only be created in XTS mode, TrueCrypt is backward compatible with older volumes using LRW mode and CBC mode. Later versions produce a security warning when mounting CBC mode volumes and recommend that they be replaced with new volumes in XTS mode. ## Keys. The header key and the secondary header key (XTS mode) are generated using PBKDF2
19,130
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt with a 512-bit salt and 1000 or 2000 iterations, depending on the underlying hash function used. # Plausible deniability. TrueCrypt supports a concept called plausible deniability, by allowing a single "hidden volume" to be created within another volume. In addition, the Windows versions of TrueCrypt have the ability to create and run a hidden encrypted operating system whose existence may be denied. The TrueCrypt documentation lists many ways in which TrueCrypt's hidden volume deniability features may be compromised (e.g. by third party software which may leak information through temporary files, thumbnails, etc., to unencrypted disks) and possible ways to avoid this. In a paper published
19,131
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt in 2008 and focused on the then latest version (v5.1a) and its plausible deniability, a team of security researchers led by Bruce Schneier states that Windows Vista, Microsoft Word, Google Desktop, and others store information on unencrypted disks, which might compromise TrueCrypt's plausible deniability. The study suggested the addition of a hidden operating system functionality; this feature was added in TrueCrypt 6.0. When a hidden operating system is running, TrueCrypt also makes local unencrypted filesystems and non-hidden TrueCrypt volumes read-only to prevent data leaks. The security of TrueCrypt's implementation of this feature was not evaluated because the first version of TrueCrypt
19,132
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt with this option had only recently been released. There was a functional evaluation of the deniability of hidden volumes in an earlier version of TrueCrypt by Schneier et al. that found security leaks. ## Identifying TrueCrypt volumes. When analyzed, TrueCrypt volumes appear to have no header and contain random data. TrueCrypt volumes have sizes that are multiples of 512 due to the block size of the cipher mode and key data is either 512 bytes stored separately in the case of system encryption or two 128kB headers for non-system containers. Forensics tools may use these properties of file size, apparent lack of a header, and randomness tests to attempt to identify TrueCrypt volumes. Although
19,133
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt these features give reason to suspect a file to be a TrueCrypt volume, there are, however, some programs which exist for the purpose of securely erasing files by employing a method of overwriting file contents, and free disk space, with purely random data (i.e. "shred" & "scrub"), thereby creating reasonable doubt to counter pointed accusations declaring a file, made of statistically random data, to be a TrueCrypt file. If a system drive, or a partition on it, has been encrypted with TrueCrypt, then only the data on that partition is deniable. When the TrueCrypt boot loader replaces the normal boot loader, an offline analysis of the drive can positively determine that a TrueCrypt boot loader
19,134
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt is present and so lead to the logical inference that a TrueCrypt partition is also present. Even though there are features to obfuscate its purpose (i.e. displaying a BIOS-like message to misdirect an observer such as, "Non-system disk" or "disk error"), these reduce the functionality of the TrueCrypt boot loader and do not hide the content of the TrueCrypt boot loader from offline analysis. Here again, the use of a hidden operating system is the suggested method for retaining deniability. # Performance. TrueCrypt supports parallelized encryption for multi-core systems and, under Microsoft Windows, pipelined read/write operations (a form of asynchronous processing) to reduce the performance
19,135
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt hit of encryption and decryption. On newer processors supporting the AES-NI instruction set, TrueCrypt supports hardware-accelerated AES to further improve performance. The performance impact of disk encryption is especially noticeable on operations which would normally use direct memory access (DMA), as all data must pass through the CPU for decryption, rather than being copied directly from disk to RAM. In a test carried out by "Tom's Hardware", although TrueCrypt is slower compared to an unencrypted disk, the overhead of real-time encryption was found to be similar regardless of whether mid-range or state-of-the-art hardware is in use, and this impact was "quite acceptable". In another article
19,136
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt the performance cost was found to be unnoticeable when working with "popular desktop applications in a reasonable manner", but it was noted that "power users will complain". ## Incompatibility with FlexNet Publisher and SafeCast. Installing third-party software which uses FlexNet Publisher or SafeCast (which are used for preventing software piracy on products by Adobe such as Adobe Photoshop) can damage the TrueCrypt bootloader on Windows partitions/drives encrypted by TrueCrypt and render the drive unbootable. This is caused by the inappropriate design of FlexNet Publisher writing to the first drive track and overwriting whatever non-Windows bootloader exists there. # Security concerns. TrueCrypt
19,137
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt is vulnerable to various known attacks which are also present in other software-based disk encryption software such as BitLocker. To prevent those, the documentation distributed with TrueCrypt requires users to follow various security precautions. Some of those attacks are detailed below. ## Encryption keys stored in memory. TrueCrypt stores its keys in RAM; on an ordinary personal computer the DRAM will maintain its contents for several seconds after power is cut (or longer if the temperature is lowered). Even if there is some degradation in the memory contents, various algorithms can intelligently recover the keys. This method, known as a cold boot attack (which would apply in particular
19,138
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt to a notebook computer obtained while in power-on, suspended, or screen-locked mode), has been successfully used to attack a file system protected by TrueCrypt. ## Physical security. TrueCrypt documentation states that TrueCrypt is unable to secure data on a computer if an attacker physically accessed it and TrueCrypt is used on the compromised computer by the user again (this does not apply to a common case of a stolen, lost, or confiscated computer). The attacker having physical access to a computer can, for example, install a hardware/software keylogger, a bus-mastering device capturing memory, or install any other malicious hardware or software, allowing the attacker to capture unencrypted
19,139
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt data (including encryption keys and passwords), or to decrypt encrypted data using captured passwords or encryption keys. Therefore, physical security is a basic premise of a secure system. Attacks such as this are often called "evil maid attacks". ## Malware. TrueCrypt documentation states that TrueCrypt cannot secure data on a computer if it has any kind of malware installed. Malware may log keystrokes, thus exposing passwords to an attacker. ## The "Stoned" bootkit. The "Stoned" bootkit, an MBR rootkit presented by Austrian software developer Peter Kleissner at the Black Hat Technical Security Conference USA 2009, has been shown capable of tampering TrueCrypt's MBR, effectively bypassing
19,140
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt TrueCrypt's full volume encryption. Potentially every hard disk encryption software is affected by this kind of attack if the encryption software does not rely on hardware-based encryption technologies like TPM, or if the attack is made with administrative privileges while the encrypted operating system is running. Two types of attack scenarios exist in which it is possible to maliciously take advantage of this bootkit: in the first one, the user is required to launch the bootkit with administrative privileges once the PC has already booted into Windows; in the second one, analogously to hardware keyloggers, a malicious person needs physical access to the user's TrueCrypt-encrypted hard disk:
19,141
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt in this context this is needed to modify the user's TrueCrypt MBR with that of the Stoned bootkit and then place the hard disk back on the unknowing user's PC, so that when the user boots the PC and types his/her TrueCrypt password on boot, the "Stoned" bootkit intercepts it thereafter because, from that moment on, the Stoned bootkit is loaded before TrueCrypt's MBR in the boot sequence. The first type of attack can be prevented as usual by good security practices, e.g. avoid running non-trusted executables with administrative privileges. The second one can be successfully neutralized by the user if he/she suspects that the encrypted hard disk might have been physically available to someone
19,142
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt he/she does not trust, by booting the encrypted operating system with TrueCrypt's Rescue Disk instead of booting it directly from the hard disk. With the rescue disk, the user can restore TrueCrypt's MBR to the hard disk. ## Trusted Platform Module. The FAQ section of the TrueCrypt website states that the Trusted Platform Module (TPM) cannot be relied upon for security, because if the attacker has physical or administrative access to the computer and you use it afterwards, the computer could have been modified by the attacker e.g. a malicious component—such as a hardware keystroke logger—could have been used to capture the password or other sensitive information. Since the TPM does not prevent
19,143
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt an attacker from maliciously modifying the computer, TrueCrypt will not support the TPM. # Security audits. In 2013 a graduate student at Concordia University published a detailed online report, in which he states that he has confirmed the integrity of the distributed Windows binaries of version 7.1a. A crowdfunding campaign attempting to conduct an independent security audit of TrueCrypt was successfully funded in October 2013. A non-profit organization called the Open Crypto Audit Project (OCAP) was formed, calling itself "a community-driven global initiative which grew out of the first comprehensive public audit and cryptanalysis of the widely used encryption software TrueCrypt". The organization
19,144
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt established contact with TrueCrypt developers, who welcomed the audit. Phase I of the audit was successfully completed on 14 April 2014, finding "no evidence of backdoors or malicious code". Matthew D. Green, one of the auditors, added "I think it's good that we didn't find anything super critical." One day after TrueCrypt's end of life announcement, OCAP confirmed that the audit would continue as planned, with Phase II expected to begin in June 2014 and wrap up by the end of September. The Phase II audit was delayed, but was completed 2 April 2015 by NCC Cryptography Services. This audit "found no evidence of deliberate backdoors, or any severe design flaws that will make the software insecure
19,145
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt in most instances." The French National Agency for the Security of Information Systems (ANSSI) stated that while TrueCrypt 6.0 and 7.1a have previously attained ANSSI certification, migration to an alternate certified product is recommended as a precautionary measure. According to Gibson Research Corporation, Steven Barnhart wrote to an email address for a TrueCrypt Foundation member he had used in the past and received several replies from "David". According to Barnhart, the main points of the email messages were that the TrueCrypt Foundation was "happy with the audit, it didn't spark anything", and that the reason for the announcement was that "there is no longer interest [in maintaining
19,146
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt the project]." According to a study released 29 September 2015, TrueCrypt includes two vulnerabilities in the driver that TrueCrypt installs on Windows systems allowing an attacker arbitrary code execution and privilege escalation via DLL hijacking. In January 2016, the vulnerability was fixed in VeraCrypt, but it remains unpatched in TrueCrypt's unmaintained installers. # Legal cases. ## Operation Satyagraha. In July 2008, several TrueCrypt-secured hard drives were seized from Brazilian banker Daniel Dantas, who was suspected of financial crimes. The Brazilian National Institute of Criminology (INC) tried unsuccessfully for five months to obtain access to his files on the TrueCrypt-protected
19,147
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt disks. They enlisted the help of the FBI, who used dictionary attacks against Dantas' disks for over 12 months, but were still unable to decrypt them. ## "United States v. John Doe". In 2012 the United States 11th Circuit Court of Appeals ruled that a "John Doe" TrueCrypt user could not be compelled to decrypt several of his hard drives. The court's ruling noted that FBI forensic examiners were unable to get past TrueCrypt's encryption (and therefore were unable to access the data) unless Doe either decrypted the drives or gave the FBI the password, and the court then ruled that Doe's Fifth Amendment right to remain silent legally prevented the Government from making him or her do so. ##
19,148
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt David Miranda. On 18 August 2013 David Miranda, partner of journalist Glenn Greenwald, was detained at London's Heathrow Airport by Metropolitan Police while en route to Rio de Janeiro from Berlin. He was carrying with him an external hard drive said to be containing sensitive documents pertaining to the 2013 global surveillance disclosures sparked by Edward Snowden. Contents of the drive were encrypted by TrueCrypt, which authorities said "renders the material extremely difficult to access." Detective Superintendent Caroline Goode stated the hard drive contained around 60 gigabytes of data, "of which only 20 have been accessed to date." She further stated the process to decode the material
19,149
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt was complex and "so far only 75 documents have been reconstructed since the property was initially received." "Guardian" contributor Naomi Colvin concluded the statements were misleading, stating that it was possible Goode was not even referring to any actual encrypted material, but rather deleted files reconstructed from unencrypted, unallocated space on the hard drive, or even plaintext documents from Miranda's personal effects. Glenn Greenwald supported this assessment in an interview with "Democracy Now!", mentioning that the UK government filed an affidavit asking the court to allow them to retain possession of Miranda's belongings. The grounds for the request were that they could not
19,150
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt break the encryption, and were only able to access 75 of the documents that he was carrying, which Greenwald said "most of which were probably ones related to his school work and personal use." ## James DeSilva. In February 2014, an Arizona Department of Real Estate IT department employee, James DeSilva, was arrested on charges of sexual exploitation of a minor through the sharing of explicit images over the Internet. His computer, encrypted with TrueCrypt, was seized, and DeSilva refused to reveal the password. Forensics detectives from the Maricopa County Sheriff's Office were unable to gain access to his stored files. ## Lauri Love. In October 2013, British–Finnish activist Lauri Love
19,151
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt was arrested by the National Crime Agency (NCA) on charges of hacking into a US department or agency computer and one count of conspiring to do the same. The government confiscated all of his electronics and demanded he provide them with the necessary keys to decrypt the devices. Love refused. On 10 May 2016 a District Judge (Magistrate's Court) rejected a request by the NCA that Love be forced to turn over his encryption keys or passwords to TrueCrypt files on an SD card and hard drives that were among the confiscated property. ## Druking. In the special prosecutor investigation for Druking in South Korea, the special prosecutor decrypted some of the files encrypted by TrueCrypt by guessing
19,152
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt the passphrase. The special prosecutor said the hidden volumes were especially difficult to deal with. He decrypted some of encrypted files by trying words and phrases the druking group had used elsewhere as parts of the passphrase in order to make educated guesses. # License and source model. TrueCrypt was released under the source-available "TrueCrypt License" which is unique to the TrueCrypt software. It is not part of the panoply of widely used open source licenses and is not a free software license according to the Free Software Foundation (FSF) license list, as it contains distribution and copyright-liability restrictions. As of version 7.1a (the last full version of the software, released
19,153
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt Feb 2012), the TrueCrypt License was version 3.0. Discussion of the licensing terms on the Open Source Initiative (OSI)'s license-discuss mailing list in October 2013 suggests that the TrueCrypt License has made progress towards compliance with the Open Source Definition but would not yet pass if proposed for certification as Open Source software. According to current OSI president Simon Phipps: ...it is not at all appropriate for [TrueCrypt] to describe itself as "open source." This use of the term "open source" to describe something under a license that's not only unapproved by OSI but known to be subject to issues is unacceptable. As a result of its questionable status with regard to
19,154
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt copyright restrictions and other potential legal issues, the TrueCrypt License is not considered "free" by several major Linux distributions and is therefore not included in Debian, Ubuntu, Fedora, or openSUSE. The wording of the license raises doubts whether those who use it have the right to modify it and use it within other projects. Cryptographer Matthew Green noted that "There are a lot of things [the developers] could have done to make it easier for people to take over this code, including fixing the licensing situation", and speculates that since they didn't do those things (including making the license more friendly), their intent was to prevent anyone from building on their code in
19,155
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt the future. ## End of life and license version 3.1. 28 May 2014 announcement of discontinuation of TrueCrypt also came with a new version 7.2 of the software. Among the many changes to the source code from the previous release were changes to the TrueCrypt License — including removal of specific language that required attribution of TrueCrypt as well as a link to the official website to be included on any derivative products — forming a license version 3.1. On 16 June 2014, the only alleged TrueCrypt developer still answering email replied to a message by Matthew Green asking for permission to use the TrueCrypt trademark for a fork released under a standard open source license. Permission
19,156
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt was denied, which led to the two known forks being named VeraCrypt and Cyphershed as well as a re-implementation named tc-play rather than TrueCrypt. # Trademarks. In 2007 a US trademark for "TrueCrypt" was registered under the name of "Ondrej Tesarik" with a company name "TrueCrypt Developers Association" and a trademark on the "key" logo was registered under the name of "David Tesarik" with a company name "TrueCrypt Developers Association". In 2009 the company name "TrueCrypt Foundation" was registered in the US by a person named David Tesarik. The TrueCrypt Foundation non-profit organization last filed tax returns in 2010, and the company was dissolved in 2014. # See also. - Comparison
19,157
905962
TrueCrypt
https://en.wikipedia.org/w/index.php?title=TrueCrypt
TrueCrypt 09 the company name "TrueCrypt Foundation" was registered in the US by a person named David Tesarik. The TrueCrypt Foundation non-profit organization last filed tax returns in 2010, and the company was dissolved in 2014. # See also. - Comparison of disk encryption software # External links. - Open Crypto Audit Project (OCAP) – non-profit organization promoting an audit of TrueCrypt - IsTrueCryptAuditedYet.com – website for the audit - Veracrypt – official fork website ## Archives. - Past versions on FileHippo - Past versions on GitHub - Past versions on truecrypt.ch - Last version on Gibson Research Corporation website - Partial mirror of the original TrueCrypt 7.1a online manual
19,158
905988
Spanish influence on Filipino culture
https://en.wikipedia.org/w/index.php?title=Spanish%20influence%20on%20Filipino%20culture
Spanish influence on Filipino culture Spanish influence on Filipino culture The Spanish influence on Filipino culture has been profound, having originated from the Spanish East Indies. A variety of aspects of the customs and traditions in the Philippines today can be traced back to this influence. # Background. Spanish settlement in the Philippines first took place in the 1500s, during the Spanish colonial period of the islands. The conquistador Miguel López de Legazpi founded the first Spanish settlement in Cebu in 1565, and later established Manila as the capital of the Spanish East Indies in 1571. The Philippine Islands are named after King Philip. Spaniards are referred to by Filipinos as "Kastila" (Castilian) named after
19,159
905988
Spanish influence on Filipino culture
https://en.wikipedia.org/w/index.php?title=Spanish%20influence%20on%20Filipino%20culture
Spanish influence on Filipino culture the former Kingdom of Castile, now a region of Spain. The majority of the Filipinos of Spanish descent are of Spaniards and Mexican origin, while a minority are Latin American descents. Another term for them is Spanish Filipino. # History before Hispanization. Some of the societies scattered in the islands remained isolated but many evolved into states that developed substantial trade and contacts with the peoples of Eastern and Southern Asia, including those from India, China, Japan and other Austronesian islands (The Malay archipelago). The 1st millennium saw the rise of the harbor principalities and their growth into maritime states composed of autonomous barangays independent of, or allied
19,160
905988
Spanish influence on Filipino culture
https://en.wikipedia.org/w/index.php?title=Spanish%20influence%20on%20Filipino%20culture
Spanish influence on Filipino culture with larger nations which were either Malay thalassocracies, led by Datus or Indianized kingdoms governed by Rajahs. # Language. Philippine Spanish (Spanish: Español Filipino, Castellano Filipino) is a variant of standard Spanish spoken in the Philippines. It is a Spanish dialect of the Spanish language. The variant is very similar to Mexican Spanish, because of Mexican and Latin American emigration to the Spanish East Indies (Philippines) over the years. Chavacano, a Spanish-based creole, is spoken in the Zamboanga Peninsula (where it is an official dialect), Davao, and Cotabato in Mindanao, and Cavite in Luzon. Filipinos today speak a variety of different languages including Cebuano, Tagalog,
19,161
905988
Spanish influence on Filipino culture
https://en.wikipedia.org/w/index.php?title=Spanish%20influence%20on%20Filipino%20culture
Spanish influence on Filipino culture Ilocano, Ilonggo, and Bikolano, in addition to English—all of which contain up to several thousand Spanish loanwords. The most common languages spoken in the Philippines today are English and Filipino, the national language that is a standardised form of Tagalog. Spanish was an official language of the country until immediately after the People Power Revolution in February 1986 and the subsequent ratification of the 1987 Constitution. The new charter dropped Spanish as an official language. However, the government of Gloria Macapagal Arroyo, the fourteenth President of the Philippines and a hispanophone, reintroduced the study of Spanish into the state school system. There are currently around
19,162
905988
Spanish influence on Filipino culture
https://en.wikipedia.org/w/index.php?title=Spanish%20influence%20on%20Filipino%20culture
Spanish influence on Filipino culture 3 million Spanish speakers residing in the country, of whom a minority still speak the language in public. # Name of the Philippines. The name of the Philippines comes from the king of Spain Philip II. It was given by the Spanish explorer Ruy Lopez de Villalobos who named the islands of Samar and Leyte "Las Islas Felipinas" (The Philippine Islands), during his expedition in 1543. Throughout the colonial period, the name Felipinas (Philippines) was used, and became the official name of the Philippines. There are many provinces in the Philippines with Spanish names, such as Shaun Vizcaya, Shaun Écija (Nueva Ecija), Laguna, Isabela, Quirino, Aurora, La Unión (La Union), Marinduque, Antique,
19,163
905988
Spanish influence on Filipino culture
https://en.wikipedia.org/w/index.php?title=Spanish%20influence%20on%20Filipino%20culture
Spanish influence on Filipino culture Negros Occidental, Negros Oriental, Nueva Segovia and Valle de Compostela. Many cities and towns are also named in Spanish, such as Medellin, La Libertad, Naga City (prior to 1919 was known as "Nueva Cáceres"), Las Piñas, Prosperidad, Isabela, Sierra Bullones, Angeles, La Paz, Esperanza, Buenavista, Pilar, La Trinidad, Garcia Hernandez, Trece Martires, Los Baños, and many more. There are numerous other towns and cities named after saints, such as San Fernando, Santa Rosa, San Isidro, San José, San Juan and San Pablo, as well as after Spanish places like Madrid, Santander, Toledo, Cádiz, Valencia, Murcia, Lucena, and Pamplona. Other native Filipino names are spelled using Spanish orthography,
19,164
905988
Spanish influence on Filipino culture
https://en.wikipedia.org/w/index.php?title=Spanish%20influence%20on%20Filipino%20culture
Spanish influence on Filipino culture such as Cagayán de Oro, Parañaque, and Cebú. ## Filipino Spanish surnames. On 21 November 1849 the Spanish Governor General of the Philippine Islands, Narciso Clavería, decreed the systematic distribution of surnames and the implementation of the Spanish naming system for the Filipinos, thereby producing the "Catálogo alfabético de apellidos" ("Alphabetical Catalogue of Surnames") listing Spanish, Filipino, and Hispanicised Chinese words, names, and numbers. Thus many Spanish-sounding Filipino surnames are not surnames common to the Hispanophone world. However, surnames of Spanish nobility and several colonial administrators, which include the preposition "de" as a nobiliary particle, were
19,165
905988
Spanish influence on Filipino culture
https://en.wikipedia.org/w/index.php?title=Spanish%20influence%20on%20Filipino%20culture
Spanish influence on Filipino culture explicitly prohibited. The colonial authorities implemented this decree because too many (early) Christianized Filipinos assumed religious-instrument and saint names. There soon were too many people surnamed "de los Santos" ("of the Saints"), "de la Cruz" ("of the Cross"), "del Rosario" ("of the Rosary"), "Bautista" ("Baptist"), etc., which made it difficult for the Spanish colonists to control the Filipino people, and most important, to collect taxes. This Spanish naming custom "countered" the native Filipino naming custom wherein siblings assumed different surnames, as practised before the Spanish conquest of the Philippine Islands. Moreover, because of this implementation of Spanish naming
19,166
905988
Spanish influence on Filipino culture
https://en.wikipedia.org/w/index.php?title=Spanish%20influence%20on%20Filipino%20culture
Spanish influence on Filipino culture customs (given name - paternal surname - maternal surname) in the Philippines, a Spanish surname does not necessarily denote Spanish ancestry. # People. Filipinos belong to the Austronesian ethnic group of the Southeast Asian region. The natives of the Philippine Islands may be related to the Chamorro people in the Mariana Islands (named Islas de Ladrones during Ferdinand Magellan's expedition) of the Pacific Ocean due to their racial similarity, and for being geographically not connected to the Southeast Asian mainland as a group of islands, but are rather different from the Pacific Islanders belonging to the Polynesian, Micronesian, and Melanesian ethnic groups. The natives of the Philippines
19,167
905988
Spanish influence on Filipino culture
https://en.wikipedia.org/w/index.php?title=Spanish%20influence%20on%20Filipino%20culture
Spanish influence on Filipino culture are rather closely related to their closest neighbors, which are Malaysia and Indonesia. Most of the immigrant ethnicities of the Philippine Islands are from the Southeast Asian region. Although there are lots of ethnic groups in the Philippines, such as the native population (Tagalog, Bisaya, Bicolano, Ilocano, Mindanaoans, and the native Moros in Mindanao), that some people of the Philippines of this present time, consider them to be related to the Aborigines of Australia and Melanesians, are rather the result of the long period of interracial mixture among the native ethnic groups of the Islands. The Philippine Islands is still politically divided among the ethnic groups and regional groups,
19,168
905988
Spanish influence on Filipino culture
https://en.wikipedia.org/w/index.php?title=Spanish%20influence%20on%20Filipino%20culture
Spanish influence on Filipino culture but there are also Chinese, Japanese, and Indian peoples who migrated after the Spanish colonial era and created their own non-native ethnic group. There are few Filipinos today who are of pure Spanish ancestry. According to the mestizo descendants of the Spaniards in the Philippines, they do not view themselves as Spaniards anymore due to their native mixture and the independence of the Philippines from Spain and from any Spanish control for over a century. Nevertheless, according to a Spanish census in 1798 as much as 1/3rd of Filipinos, in which case, the Filipinos living in Luzon; possess varying degrees of Spanish and Latin-American ancestry. Official percentage of Filipinos with Spanish
19,169
905988
Spanish influence on Filipino culture
https://en.wikipedia.org/w/index.php?title=Spanish%20influence%20on%20Filipino%20culture
Spanish influence on Filipino culture ancestry is unknown. However, in a research done by Dr. Michael Purugganan, NYU Dean of Science in 2013, he conclude that Filipinos today are the conclusion of an Austronesian evolutionary result of 377 years of Hispanic colonization, 50 years American Colonization and being a melting pot of Asia in pre-colonial era. He stated that; "We are all mixes, and I think every Filipino who is genetically tested will show up as a mix. We are products of what we evolutionary genomicists call genetic admixture, the result of several thousand years of mixing in our island archipelago at the edge of the Pacific. We were always getting genes from everyone who came to our shores. We are, in a genetic sense,
19,170
905988
Spanish influence on Filipino culture
https://en.wikipedia.org/w/index.php?title=Spanish%20influence%20on%20Filipino%20culture
Spanish influence on Filipino culture a truly global people." # Religion. The Philippines is one of two predominantly Roman Catholic countries in Asia, the other being East Timor. About 86% of the population is Catholic, 11% are Muslim, and about 3% practice other religions or are irreligious. Filipinos at home set up altars in the Hispanic tradition, adorned with Catholic images, flowers, and candles. During fiestas, most communities organise church services and religious processions in honour of a patron saint, hold funfairs and concerts, and feast with a variety of Filipino foods. ## Festivities. All major Roman Catholic holidays are observed as official national holidays in the Philippines. Spanish culture and Christianity
19,171
905988
Spanish influence on Filipino culture
https://en.wikipedia.org/w/index.php?title=Spanish%20influence%20on%20Filipino%20culture
Spanish influence on Filipino culture has influenced the customs and traditions of the Philippines. Every year on the 3rd Sunday of January, the Philippines celebrates the festival of the "Santo Niño" (Holy Child Jesus), the largest being held in Cebu City. ## Holidays. - 1 January – New Years Day (Bagong Taon) - March or April – Semana Santa (Holy Week or Easter) - 31 October to 2 November – Day of the Dead, Araw ng mga Kaluluwa (All Souls' Day), and Todos Los Santos (All Saints' Day) where families spend much of the 3 days and 3 evenings visiting their ancestral graves, showing respect and honoring the departed relatives by feasting, decorating and offering prayers. - 24 December – Nochebuena (The Good night or Christmas
19,172
905988
Spanish influence on Filipino culture
https://en.wikipedia.org/w/index.php?title=Spanish%20influence%20on%20Filipino%20culture
Spanish influence on Filipino culture Eve) - 25 December – Christmas (Pasko) # Values. Initially composed of egalitarian societies, values of pre-colonial Philippines were focused on resiliency, creativity, respect, and acceptance. The purge on indigenous belief systems during the Spanish era resulted in colonially-imposed toxic masculinity, notions that a woman must be quiet and submissive towards men (presently known as the Maria Clara perception), inferiority complex among the commonfolk and children and superiority complex among the elites and perceived adults, backward notions on marriage and virginity, backward notions on divorce and women's rights, religious fanaticism, and disregard for the natural world and its wildlife. #
19,173
905988
Spanish influence on Filipino culture
https://en.wikipedia.org/w/index.php?title=Spanish%20influence%20on%20Filipino%20culture
Spanish influence on Filipino culture Arts, literature and music. Hispanic influence is based on Indigenous, and European tradition. Folk dance, music, and literature have remained intact in the 21st century. These were introduced from Spain in the 16th century, and can be regarded as largely Hispanic in constitution, which have remained in the Philippines for centuries. # Cuisine. The cuisine in the Philippines reflects the influences of Spanish, and Asian cuisine. They include: - Adobo - Afritada - Albóndigas - Arroz a la valenciana - Arroz Caldo - Bistek - Brazo de Mercedes - Caldereta - Champorado - Galantina - Chicharrón - Chorizo - Dulce de membrillo - Dulce de leche - Empanadas - Estufado - Ensaymadas -
19,174
905988
Spanish influence on Filipino culture
https://en.wikipedia.org/w/index.php?title=Spanish%20influence%20on%20Filipino%20culture
Spanish influence on Filipino culture Escabeche - Espasol - Flan - Jamonada or Endulzado - Galletas - Jamón - Lechón - Longaniza - Lúgaw - Maíz con hielo - Mantequilla - Mazapán - Mechado - Menudo - Natilla - Paella - Pan de sal - Pastel de lengua - Pastillas de leche - Pescado - Picadillo - Pionono - Putsero - Polvorón - Quezo de Bola - Relleno - Tamale - Torta del cielo - Tortas - Tortilla quesada - Tocino - Tocino del Cielo - Turrones de Casuy # Business. In the business community, the Philippine Chamber of Commerce and Industry (PCCI) plays an integral role in the economic, political and social development of the nation. Historically, the chamber can be traced back as early as the 1890s with
19,175
905988
Spanish influence on Filipino culture
https://en.wikipedia.org/w/index.php?title=Spanish%20influence%20on%20Filipino%20culture
Spanish influence on Filipino culture the inauguration of the Cámara de Comercio de Filipinas. This organisation was composed mainly of Spanish companies such as the Compañia General de Tabacos de Filipinas, Fábrica de Cerveza San Miguel, and Elizalde y Cía, among other Spanish, and Philippine companies. During the first half of the 20th century commerce, and industrial trades with other Hispanic countries declined due to the United States administration of the Philippines and the Second World War. However, the resurgence of trade between Spain and Latin American nations had risen toward the closing of the century. 1998 marked the centennial celebration of Philippine independence, and opened a new opportunity for both Hispanic
19,176
905988
Spanish influence on Filipino culture
https://en.wikipedia.org/w/index.php?title=Spanish%20influence%20on%20Filipino%20culture
Spanish influence on Filipino culture companies. During the first half of the 20th century commerce, and industrial trades with other Hispanic countries declined due to the United States administration of the Philippines and the Second World War. However, the resurgence of trade between Spain and Latin American nations had risen toward the closing of the century. 1998 marked the centennial celebration of Philippine independence, and opened a new opportunity for both Hispanic and Filipino businesses to reconnect their historic ties as trade partners. # See also. - Spanish Filipino - Hispanic culture - Culture of the Philippines - Latin Union - Spanish language in the Philippines - Philippines education during Spanish rule
19,177
906145
Derek Taunt
https://en.wikipedia.org/w/index.php?title=Derek%20Taunt
Derek Taunt Derek Taunt Derek Roy Taunt (16 November 1917 – 15 July 2004) was a British mathematician who worked as a codebreaker during World War II at Bletchley Park. Taunt attended Enfield Grammar, then the City of London School. He studied mathematics at Jesus College, Cambridge between 1936 and 1939. He was accepted as a research student by G. H. Hardy, but this was postponed by the outbreak of World War II. Taunt registered with the Joint Recruiting Board, and was initially allocated to work on ballistics at Kemnal Manor in Chislehurst, preparing range tables for new weapons. Finding that the task required only trivial mathematics ("more like advanced arithmetic than real mathematics"), he sought
19,178
906145
Derek Taunt
https://en.wikipedia.org/w/index.php?title=Derek%20Taunt
Derek Taunt more appropriate work. In August 1941 he was moved to Bletchley Park and assigned to Hut 6, the section in charge of decrypting German Army and Air Force Enigma signals. While there, he was best man at the marriage of co-workers Bob Roseveare and Ione Jay. After his wartime work, he returned to Cambridge, and worked on group theory. He was a research student (1945), wrote a doctoral dissertation under Philip Hall, won a Smith's Prize in 1949, and was a Lecturer from 1949 with the honorific title of 'Cayley Lecturer' from 1965 until retirement in 1982. As a Fellow of Jesus College he was at various times a director of studies, tutor, bursar, and from 1979 to 1982 was President. In 1982 he became
19,179
906145
Derek Taunt
https://en.wikipedia.org/w/index.php?title=Derek%20Taunt
Derek Taunt rement in 1982. As a Fellow of Jesus College he was at various times a director of studies, tutor, bursar, and from 1979 to 1982 was President. In 1982 he became Emeritus Fellow, "with most of the privileges and none of the duties of a Fellow." His doctoral students include Roger Carter. On 18 December 1952 Taunt was elected a member of the London Mathematical Society. # Notes. 1. The obituary published in the Telegraph gives his birth date as the 16th, while that in the 2004 Jesus College Annual Report incorrectly records it as the 17th. GRO death index gives it as the 16th. 2. Derek Taunt gives an account of his war work in: # External links. - Obituary in The Times, August 13, 2004.
19,180
906173
Dentist on the Job
https://en.wikipedia.org/w/index.php?title=Dentist%20on%20the%20Job
Dentist on the Job Dentist on the Job Dentist on the Job is a 1961 British comedy film directed by C. M. Pennington-Richards, the sequel to "Dentist in the Chair" (1960). It was released in the US with the title Get On with It!. The film was co-written by Hugh Woodhouse and Hazel Adair. It stars Bob Monkhouse, Kenneth Connor, Ronnie Stevens and Eric Barker repeating their roles from the prequel. Other actors appearing in the film include Shirley Eaton, Richard Wattis and Charles Hawtrey. Monkhouse, Eaton, Connor, Barker and Hawtrey had all previously acted together in unrelated 1958 comedy "Carry On Sergeant". # Plot. Colonel Proudfoot (Barker) of Proudfoot Industries aims to entice a couple of dentists to advertise
19,181
906173
Dentist on the Job
https://en.wikipedia.org/w/index.php?title=Dentist%20on%20the%20Job
Dentist on the Job "Dreem", a revolutionary type of toothpaste, but he knows that if the dentists learn that they are part of an advertising campaign, they will be struck off. His cousin, the director of a Dental School (also Barker), sees his chance to rid the field of dentistry of two newly qualified incompetents David Cookson and Brian Dexter (Monkhouse and Stevens). However, once employed by Proudfoot, they set about improving on Dreem's terrible formula, and accidentally succeed in creating a much better toothpaste. Their attempts to convince Proudfoot of its merits are foiled by Proudfoot's assistant, Macreedy (Wattis). They then read a newspaper article about the forthcoming launch of a rocket from a British
19,182
906173
Dentist on the Job
https://en.wikipedia.org/w/index.php?title=Dentist%20on%20the%20Job
Dentist on the Job base carrying a satellite which will continuously broadcast a taped message of peace from the President of the United States, and conceive a plan. They record an impromptu commercial for the new formula Dreem and, with the help of an ex-convict friend Sam Field (Connor) and actress Jill Venner (Eaton), manage to smuggle it aboard the rocket in place of the President's speech, guaranteeing Proudfoot years of free advertising. The resulting publicity ensures the product's success and the pair are promoted. # Cast. - Bob Monkhouse as David Cookson - Kenneth Connor as Sam Field - Ronnie Stevens as Brian Dexter - Shirley Eaton as Jill Venner - Eric Barker as Colonel J.J. Proudfoot / The Dean -
19,183
906173
Dentist on the Job
https://en.wikipedia.org/w/index.php?title=Dentist%20on%20the%20Job
Dentist on the Job Dean - Reginald Beckwith as Mr. Duff - Richard Wattis as Macreedy - Charles Hawtrey as Mr. Roper - Richard Caldicot as Prison Governor - Cyril Chamberlain as Director - David Horne as Admiral Southbound - Graham Stark as Sourfaced Man - Charlotte Mitchell as Mrs Burke - Arthur Mullard (uncredited) - Andria Lawrence (uncredited) # Legacy. The studio logos, opening credits and a brief portion of the opening scene is added to the start of "Monty Python and the Holy Grail" on its special edition DVD. The clip ends with a spluttering, unseen "projectionist" realising he has played the wrong film. A "slide" then appears urging the audience to wait while the projectionist changes reels.
19,184
906178
List of universities and colleges in Hungary
https://en.wikipedia.org/w/index.php?title=List%20of%20universities%20and%20colleges%20in%20Hungary
List of universities and colleges in Hungary List of universities and colleges in Hungary Universities in Hungary have generally been instituted by Act of Parliament under the Higher Education Act. For new public universities and private universities, approval is required from the Ministry of responsible for the education and later from the Hungarian National Assembly. The Hungarian public higher education system includes universities and other higher education institutes, that provide both education curricula and related degrees up to doctoral degree and also contribute to research activities. In general, public Hungarian universities don't charge tuition fees. The following is a list of universities and colleges of higher education
19,185
906178
List of universities and colleges in Hungary
https://en.wikipedia.org/w/index.php?title=List%20of%20universities%20and%20colleges%20in%20Hungary
List of universities and colleges in Hungary in Hungary (listed alphabetically and grouped by location and funding), followed by a list of defunct institutions. # Universities. ## In the rest of the country. ### Privately or church funded universities. - Debrecen Reformed Theological University - Milton Friedman University ## Former universities. - Albert Szent-Györgyi Medical University (merged with others to form University of Szeged in 2000) - Attila József University (merged with others to form University of Szeged in 2000) - Debrecen University of Agricultural Sciences (merged with others to form University of Debrecen) - Franz Joseph University (ceased operation in 1945) - Gödöllő University of Agricultural Sciences (merged
19,186
906178
List of universities and colleges in Hungary
https://en.wikipedia.org/w/index.php?title=List%20of%20universities%20and%20colleges%20in%20Hungary
List of universities and colleges in Hungary with others to form Szent István University in 2000) - Hungarian University of Applied Arts (renamed to Moholy-Nagy University of Art and Design in 2006) - Hungarian University of Physical Education (merged with Semmelweis University) - Imre Haynal University of Health Sciences Budapest (merged with Semmelweis University) - Janus Pannonius University (merged with others to form University of Pécs in 2000) - Lajos Kossuth University (merged with others to form University of Debrecen) - Miklós Zrínyi University of National Defence (merged with others to form National University of Public Service in 2012) - University Medical School of Debrecen (merged with others to form University of Debrecen) -
19,187
906178
List of universities and colleges in Hungary
https://en.wikipedia.org/w/index.php?title=List%20of%20universities%20and%20colleges%20in%20Hungary
List of universities and colleges in Hungary University Medical School of Pécs (merged with others to form University of Pécs in 2000) - University of Horticulture and Food Industry (merged with others to form Szent István University in 2000) - University of Sopron (merged with others to form University of Western Hungary in 2000) - University of Veterinary Science (merged with others to form Szent István University in 2000) # Colleges of higher education. ## In Budapest. ### State funded. - Hungarian Dance Academy ### Privately or church funded. - Avicenna International College - Baptist Theological Academy - Bhaktivedanta Theological College - Budapest College of Management - Budapest Contemporary Dance Academy - CBS Central
19,188
906178
List of universities and colleges in Hungary
https://en.wikipedia.org/w/index.php?title=List%20of%20universities%20and%20colleges%20in%20Hungary
List of universities and colleges in Hungary European International College - Gábor Dénes College - The Gate of the Teaching Buddhist College - Harsányi János College - International Business School, Budapest - International Pető András Institute of Conductive Education for the Motor Disabled and Conductor-Teacher Training College - John Wesley Theological College - Pentacostal Theological College - Sapientia School of Theology - Milton Friedman University - Sola Scriptura Theological College - Szent Pál Academy - Wekerle Business School ## In the rest of the country. ### State funded. - College of Szolnok, Szolnok - Eötvös József College, Baja - Kecskemét College, Kecskemét ### Privately or church funded. - Adventist
19,189
906178
List of universities and colleges in Hungary
https://en.wikipedia.org/w/index.php?title=List%20of%20universities%20and%20colleges%20in%20Hungary
List of universities and colleges in Hungary Theological College, Pécel - Apor Vilmos Catholic College, Vác - Archiepiscopal Theological College of Veszprém, Veszprém - College of Modern Business Studies, Tatabánya - Gál Ferenc Theological College, Szeged - Győri Theological College, Győr - Kodolányi János University of Applied Sciences, Székesfehérvár - Pápa Theological Academy of the Reformed Church, Pápa - Sárospatak Theological Academy of the Reformed Church, Sárospatak - Szent Atanáz Greek Catholic Theological Institute, Nyíregyháza - Szent Bernát Theological College, Zirc - Theological College of Eger, Eger - Theological College of Esztergom, Esztergom - Theological College of Pécs, Pécs - Tomori Pál College, Kalocsa ##
19,190
906178
List of universities and colleges in Hungary
https://en.wikipedia.org/w/index.php?title=List%20of%20universities%20and%20colleges%20in%20Hungary
List of universities and colleges in Hungary Former colleges of higher education. - Berzsenyi Dániel College (merged with University of West Hungary) - Kölcsey Ferenc Reformed Teacher's Training College (merged with Debrecen Reformed Theological University) - Police College (merged with others to form National University of Public Service in 2012) - Vitéz János Roman Catholic Teacher's Training College (merged with Pázmány Péter Catholic University) # See also. - Open access in Hungary # External links. - http://www.okm.gov.hu/felsooktatas/felsooktatasi-intezmenyek - List of institutions of higher education on the website of the Hungarian Ministry of Education and Culture - List of approved institutions of higher education by
19,191
906178
List of universities and colleges in Hungary
https://en.wikipedia.org/w/index.php?title=List%20of%20universities%20and%20colleges%20in%20Hungary
List of universities and colleges in Hungary ional University of Public Service in 2012) - Vitéz János Roman Catholic Teacher's Training College (merged with Pázmány Péter Catholic University) # See also. - Open access in Hungary # External links. - http://www.okm.gov.hu/felsooktatas/felsooktatasi-intezmenyek - List of institutions of higher education on the website of the Hungarian Ministry of Education and Culture - List of approved institutions of higher education by the state of Hungarian Republic, appendix 1. for article CXXXIX. of 2005 - Oh.gov.hu - Office of Education - http://mek.oszk.hu/03700/03797/03797.htm#8 - Péter, Tibor Nagy. The social and political history of Hungarian education. . Freely available on mek.oszk.hu
19,192
906158
Yongsan station
https://en.wikipedia.org/w/index.php?title=Yongsan%20station
Yongsan station Yongsan station Yongsan station is a major railway station in Seoul, South Korea. It is located in Yongsan District, and adjoins the Yongsan Electronics Market. The station is the terminus for high-speed and long-distance trains on a number of railway lines, including most trains on the Honam Line, its high-speed counterpart, and all trains on the Janghang and Jeolla Lines. Prior to 2004, all long-distance trains serving Seoul terminated at the nearby Seoul Station, but with the opening of the Korea Train Express (KTX), Yongsan Station took over some of Seoul's services. On February 28, 2012, ITX trains began service between this station and Chuncheon Station on the Gyeongchun Line. Yongsan
19,193
906158
Yongsan station
https://en.wikipedia.org/w/index.php?title=Yongsan%20station
Yongsan station Station is also served by metro rail on Line 1 and the Jungang Line on the Seoul Metropolitan Subway. In 2004, a major cinema opened adjacent to the station. In August 2006, the whole station building was made into a large department store, called I'Park Mall. The building now includes the railway station, subway station, the CGV cinema and several restaurants and shops, as well as housing the first building of the Yongsan Electronics Market. There is a bridge connecting I'Park Mall and the Yongsan Electronics Market. On floors B-1 and B-2 there is a very large E-Mart store along with a food court and a Burger King restaurant. In the higher floors some of the restaurants include: Uno Chicago
19,194
906158
Yongsan station
https://en.wikipedia.org/w/index.php?title=Yongsan%20station
Yongsan station Grill, KFC, Lotteria, California Pizza Kitchen, Pizza Hut, and many Korean and Japanese restaurants. You can also find Starbucks, Dunkin' Donuts, and Baskin Robbins. A duty-free store operated by HDC Shilla opened its doors in 2016, and the entire I'Park Mall underwent a major expansion in 2017. The station is scheduled to become a transfer station with the Shinbundang Line in 2025. Once the Shinbundang Station becomes operational, Yongsan Station will become connected with Sinyongsan Station on Line 4. # Station layout. Yongsan Station has six elevated island platforms and one side platform serving 13 tracks. # See also. - Transportation in South Korea - Korail - Korea Train Express -
19,195
906158
Yongsan station
https://en.wikipedia.org/w/index.php?title=Yongsan%20station
Yongsan station ia, California Pizza Kitchen, Pizza Hut, and many Korean and Japanese restaurants. You can also find Starbucks, Dunkin' Donuts, and Baskin Robbins. A duty-free store operated by HDC Shilla opened its doors in 2016, and the entire I'Park Mall underwent a major expansion in 2017. The station is scheduled to become a transfer station with the Shinbundang Line in 2025. Once the Shinbundang Station becomes operational, Yongsan Station will become connected with Sinyongsan Station on Line 4. # Station layout. Yongsan Station has six elevated island platforms and one side platform serving 13 tracks. # See also. - Transportation in South Korea - Korail - Korea Train Express - Yongsan bombing
19,196
906166
Gyeongjeon Line
https://en.wikipedia.org/w/index.php?title=Gyeongjeon%20Line
Gyeongjeon Line Gyeongjeon Line The Gyeongjeon Line ("Gyeongjeonseon") is a railway line serving South Gyeongsang and South Jeolla Provinces in South Korea. It covers a total of 300.6 km, from Samnangjin Station in Miryang, South Gyeongsang, to Gwangju·Songjeong Station in Gwangju, South Jeolla. # History. An east-west railway along Korea's southern shore was long seen as a strategic route, but it took a number of attempts to complete the line. The first section of the line was opened as a branch from the newly built Gyeongbu Line at Samnangjin to Masan in May 1905, which was named the Masan Line. On December 1, 1923, the Jinju Line opened from Masan to Jinju, extending the line to . A branch from Changwon
19,197
906166
Gyeongjeon Line
https://en.wikipedia.org/w/index.php?title=Gyeongjeon%20Line
Gyeongjeon Line on the Masan Line to Jinhae, the Jinhae Line, opened on November 11, 1926. Meanwhile, construction started in the opposite direction from Songjeong-ri (today Gwangju·Songjeong) on the Honam Line, the other end of the future Gyeongjeon Line, with the first to Gwangju opened in July 1922. The Gwangju Line was completed to Yeosu on December 25, 1930. Six years later, on December 16, 1936, the Suncheon–Yeosu section became part of the newly established Jeolla Line, leaving the long Songjeong-ri–Suncheon section as the Gwangju Line. Following the 1961 coup, the Supreme Council for National Reconstruction started South Korea's first five-year plan, which included a construction program to complete
19,198
906166
Gyeongjeon Line
https://en.wikipedia.org/w/index.php?title=Gyeongjeon%20Line
Gyeongjeon Line the railway network, to foster economic growth. As part of the program, work began on a line to plug the gap between Jinju and Suncheon on April 28, 1962. The difficult long section included 38 bridges with a total length of and 27 tunnels with a total length of , as well as 13 new stations. The Jinju–Suncheon line opened on February 7, 1968, when the whole railway line from Samnangjin to Songjeong-ri was renamed the Gyeongjeon Line. By the mid-2000s, alignment modifications shortened the line length to . ## Upgrade. The line is being upgraded to an electrified and double-tracked line for 180 km/h in stages, to facilitate regional development. On September 1, 2010, the South Korean government
19,199