Search results
Jump to navigation
Jump to search
Page title matches
- '''A typical session object has the following characteristics:''' *Executes on behalf of a single client.742 bytes (109 words) - 17:20, 19 November 2004
- '''A typical message-driven object has the following characteristics:''' *Executes upon receipt of a single client message.644 bytes (92 words) - 17:12, 19 November 2004
- ...tle says that this is a book for Win32 programmers but it also gives quite a lot of information on concepts of the operating systems that implement the282 bytes (45 words) - 14:12, 10 April 2005
- ** Difference in fulfilling a request * Used bandwidth for fulfilling a request (number of packets or bytes?): global, per Client2 KB (209 words) - 11:49, 27 February 2006
- ...this number is coded in the following scheme with a word, let's say ''c-r-a-p'' supposed to be an easy reminder. | A | | | | | | | | | |3 KB (170 words) - 20:50, 8 November 2004
- 13 bytes (2 words) - 16:35, 12 July 2007
- ** Difference in fulfilling a request * Used bandwidth for fulfilling a request (number of packets or bytes?)1 KB (162 words) - 10:04, 27 January 2006
- 10 KB (1,386 words) - 16:13, 15 July 2007
Page text matches
- ...T-KIT-MARK-II.html Metrix Mark II] is a complete outdoor solution based on a [Soekris board]. 2 [http://www.wneweb.com/pdf/CM9.pdf Wistron CM9] 802.11 a/b/g mini-PCI modules<br/>390 bytes (58 words) - 04:58, 8 February 2007
- ...view corresponding to the web service endpoint interface, as described by a WSDL document.767 bytes (130 words) - 08:59, 8 February 2005
- '''A''': <ol><li>On newer busybox versions the command after a ''shutdown'' keyword from the ''/etc/inttab'' file will be executed, e.g.: So a ''halt'' action will be followed by a ''reboot'' and the node will only executes the '''''halt''''' action.</li>658 bytes (109 words) - 19:28, 15 September 2006
- ...or this is a telephone Book. It’s very easy to find a telephone number for a given name, but it’s really hard to find a name for a given number if you have to do it all by yourself.438 bytes (85 words) - 09:28, 8 February 2005
- '''A typical message-driven object has the following characteristics:''' *Executes upon receipt of a single client message.644 bytes (92 words) - 17:12, 19 November 2004
- A Botnet is a collection of hosts (bots) under a common command and control infrastructure [Wikipedia: [http://en.wikipedia. A host has to be compromised in order to install a bot on it. That can be done by exploiting known bugs and using standard too821 bytes (139 words) - 19:16, 14 November 2004
- '''A typical session object has the following characteristics:''' *Executes on behalf of a single client.742 bytes (109 words) - 17:20, 19 November 2004
- ...add all technical terms that you encountered during the seminar, including a verbose description of their meaning. Please keep those terms in an alphabe ...enuation denotes the loss of intensity a signal expieriences on its way to a reciever.1 KB (194 words) - 17:53, 11 July 2007
- '''A typical entity object has the following characteristics:''' ...ive an exception if it calls an entity in a container that has experienced a crash.797 bytes (134 words) - 17:09, 19 November 2004
- * a/b/c relativer Path * /a/b/c absoluter Path2 KB (248 words) - 10:43, 13 December 2024
- 1. Attacking '' '''one''' '' account (The intruder tries to guess a specific password)<br> 2. Attempt to penetrate '' '''any''' '' account (on a system) used to steal a service directly<br>759 bytes (118 words) - 20:54, 8 November 2004
- ...s are sent by the Anonymization Layer. All commands and responses end with a single newline (<code>"\n"</code> in C). ; <tt>newuser <var>n</var></tt> : A new user with index <tt><var>n</var></tt> has been added. <br />No response2 KB (393 words) - 18:46, 25 May 2006
- ...essed a computer system and what operations he or she has performed during a given period of time.<br><br>431 bytes (68 words) - 23:04, 8 November 2004
- ...tle says that this is a book for Win32 programmers but it also gives quite a lot of information on concepts of the operating systems that implement the282 bytes (45 words) - 14:12, 10 April 2005
- ...this number is coded in the following scheme with a word, let's say ''c-r-a-p'' supposed to be an easy reminder. | A | | | | | | | | | |3 KB (170 words) - 20:50, 8 November 2004
- ...e does not contain any theoretical discussions of web services. It is more a You should really careful think about design before you should start coding a web service.1 KB (189 words) - 07:35, 9 March 2007
- = Install OpenWrt on a Netgear WGT634U = ...ant to restore the original state later): '''Backup Settings''' -> '''Save a Copy of Current Settings''' -> '''Backup'''494 bytes (73 words) - 10:49, 8 March 2007
- A frequent source of severe design errors can be fast built systems, develope ...sheer number of applications for which the average person is asked to use a password exceeds the powers of human memory1 KB (178 words) - 20:59, 8 November 2004
- ...cessary binaries to bootstrap the system until you get a login program and a shell.<br> ...embedded systems the [http://www.busybox.net/ busybox] collection provides a huge set of common UNIX tools in one binary. This method saves some space o952 bytes (145 words) - 21:01, 19 September 2006
- [[Image:Ddos.png|thumb|right|scheme of a DDoS attack]] ...ems are used for a [[Denial of Service]] attack. This scheme is similar to a [[Botnet|botnet]]. In fact, botnets are often used for DDoS attacks, but po2 KB (261 words) - 19:22, 14 November 2004