Search results

Jump to navigation Jump to search

Page title matches

Page text matches

  • ...T-KIT-MARK-II.html Metrix Mark II] is a complete outdoor solution based on a [Soekris board]. 2 [http://www.wneweb.com/pdf/CM9.pdf Wistron CM9] 802.11 a/b/g mini-PCI modules<br/>
    390 bytes (58 words) - 04:58, 8 February 2007
  • ...view corresponding to the web service endpoint interface, as described by a WSDL document.
    767 bytes (130 words) - 08:59, 8 February 2005
  • '''A''': <ol><li>On newer busybox versions the command after a ''shutdown'' keyword from the ''/etc/inttab'' file will be executed, e.g.: So a ''halt'' action will be followed by a ''reboot'' and the node will only executes the '''''halt''''' action.</li>
    658 bytes (109 words) - 19:28, 15 September 2006
  • ...or this is a telephone Book. It’s very easy to find a telephone number for a given name, but it’s really hard to find a name for a given number if you have to do it all by yourself.
    438 bytes (85 words) - 09:28, 8 February 2005
  • '''A typical message-driven object has the following characteristics:''' *Executes upon receipt of a single client message.
    644 bytes (92 words) - 17:12, 19 November 2004
  • A Botnet is a collection of hosts (bots) under a common command and control infrastructure [Wikipedia: [http://en.wikipedia. A host has to be compromised in order to install a bot on it. That can be done by exploiting known bugs and using standard too
    821 bytes (139 words) - 19:16, 14 November 2004
  • '''A typical session object has the following characteristics:''' *Executes on behalf of a single client.
    742 bytes (109 words) - 17:20, 19 November 2004
  • ...add all technical terms that you encountered during the seminar, including a verbose description of their meaning. Please keep those terms in an alphabe ...enuation denotes the loss of intensity a signal expieriences on its way to a reciever.
    1 KB (194 words) - 17:53, 11 July 2007
  • '''A typical entity object has the following characteristics:''' ...ive an exception if it calls an entity in a container that has experienced a crash.
    797 bytes (134 words) - 17:09, 19 November 2004
  • 1. Attacking '' '''one''' '' account (The intruder tries to guess a specific password)<br> 2. Attempt to penetrate '' '''any''' '' account (on a system) used to steal a service directly<br>
    759 bytes (118 words) - 20:54, 8 November 2004
  • ...s are sent by the Anonymization Layer. All commands and responses end with a single newline (<code>"\n"</code> in C). ; <tt>newuser <var>n</var></tt> : A new user with index <tt><var>n</var></tt> has been added. <br />No response
    2 KB (393 words) - 18:46, 25 May 2006
  • ...essed a computer system and what operations he or she has performed during a given period of time.<br><br>
    431 bytes (68 words) - 23:04, 8 November 2004
  • ...tle says that this is a book for Win32 programmers but it also gives quite a lot of information on concepts of the operating systems that implement the
    282 bytes (45 words) - 14:12, 10 April 2005
  • ...this number is coded in the following scheme with a word, let's say ''c-r-a-p'' supposed to be an easy reminder. | A | | | | | | | | | |
    3 KB (170 words) - 20:50, 8 November 2004
  • ...e does not contain any theoretical discussions of web services. It is more a You should really careful think about design before you should start coding a web service.
    1 KB (189 words) - 07:35, 9 March 2007
  • = Install OpenWrt on a Netgear WGT634U = ...ant to restore the original state later): '''Backup Settings''' -> '''Save a Copy of Current Settings''' -> '''Backup'''
    494 bytes (73 words) - 10:49, 8 March 2007
  • A frequent source of severe design errors can be fast built systems, develope ...sheer number of applications for which the average person is asked to use a password exceeds the powers of human memory
    1 KB (178 words) - 20:59, 8 November 2004
  • ...cessary binaries to bootstrap the system until you get a login program and a shell.<br> ...embedded systems the [http://www.busybox.net/ busybox] collection provides a huge set of common UNIX tools in one binary. This method saves some space o
    952 bytes (145 words) - 21:01, 19 September 2006
  • [[Image:Ddos.png|thumb|right|scheme of a DDoS attack]] ...ems are used for a [[Denial of Service]] attack. This scheme is similar to a [[Botnet|botnet]]. In fact, botnets are often used for DDoS attacks, but po
    2 KB (261 words) - 19:22, 14 November 2004
  • $ iptables -t nat -A PREROUTING -p udp --dport 53 -j DNAT --to 192.168.3.1:53 $ iptables -t nat -A POSTROUTING -d 192.168.3.1 -p udp --dport 53 -j MASQUERADE
    888 bytes (134 words) - 11:18, 11 January 2007
  • *[[A session object]] *[[A message-driven object]]
    339 bytes (40 words) - 16:17, 19 November 2004
  • *[[A session object]] *[[A message-driven object]]
    339 bytes (40 words) - 08:56, 8 February 2005
  • .... Any topic. Affordable prices. Order 100% custom-written term papers from a reputable custom writing. Quality assistance from professional writers.
    506 bytes (72 words) - 14:33, 20 July 2010
  • A '''blind credential''' is a token asserting that someone qualifies under some criteria or has some stat ...is not using another's credential &mdash; identity theft &mdash; therefore a great deal of effort goes into the application of cryptography to authentic
    855 bytes (133 words) - 00:42, 8 March 2005
  • ...by disclosing the password to a third party by accident, on purpose, or as a result of deception?<br><br> 2. Will the user enter the password correctly (at least with a high probability)?<br><br>
    616 bytes (102 words) - 19:21, 8 November 2004
  • ...llenge to get the BRN software for a new target platform you have to build a (cross) compiler.<br> A compiler translates a high-level programming language (like C or C++) into binary code for execut
    2 KB (259 words) - 12:27, 23 October 2006
  • '''Q:''' Why does VMware Server not autostart a VM? '''A:''' Have a look at the latest log file below /tmp/vmware-<username>/ and
    544 bytes (80 words) - 21:23, 3 May 2007
  • - Instead of (A^N)/2 it only takes A^(N/2) (A = alphabet of characters, N = number of characters used for the password)<b
    445 bytes (76 words) - 22:53, 8 November 2004
  • - Leads always to the used password but is a matter of time and compute power<br> - Total exhaust time is 968 or 252, the average effort for a search is half of this<br><br>
    643 bytes (102 words) - 23:30, 8 November 2004
  • The folder /src is a mirror and thus provides a better reliability (redundancy). If the master server breaks down we still Historically we had a ressource problem on the master server. To solve this we moved the folder /
    604 bytes (87 words) - 15:46, 21 October 2011
  • In a typical system, human users must authenticate themselves to a client through in general three possible ways:
    779 bytes (109 words) - 19:09, 8 November 2004
  • - A program running in the background in a public terminal room<br>
    345 bytes (51 words) - 10:19, 17 May 2006
  • You need a Linux system with approximately 1GB free disk space to download and compile ===What is a toolchain?===
    1 KB (211 words) - 19:36, 22 February 2006
  • ...a different password each time authentication is needed and to never reuse a used password. Also it must not be possible to easily compute yet unused pa # Systems based on a non-inversible function, e.g. cryptographically secure hash functions
    3 KB (448 words) - 00:53, 6 November 2004
  • ...e Macronix 29LV320CVBC-90G Flash] chip. The ethernet ports are provided by a [http://www.delta.com.tw Delta] LFE8782 transformer. There are no obvious i ...om/release_notes/d103016.asp firmware page] also describes how to download a new firmware via TFTP. [http://openwrt.org/ OpenWRT] does not [http://wiki.
    2 KB (345 words) - 05:06, 6 February 2007
  • A composition of the topic can be found [[Properties of the Wireless Medium | ...in.de/~beier/pdfs/brn-06-802.11%20Network%20Structures.pdf presentation as a pdf].
    882 bytes (132 words) - 20:29, 17 October 2006
  • ...p://www.glink.com.tw/pdf/GLT5640L16-R3.3.pdf G-Link GLT5640L16-6TC], Flash a 2 MByte [http://www.spansion.com/products/Am29LV160B.html AMD/Spansion AM29
    1 KB (189 words) - 07:51, 28 January 2007
  • ...elieved that fingerprints posess the two requirements necessary for use as a biometric criterion: ...s ever share exactly the same pattern. What is more: experience shows that a small amount (usually 12 to 18) of minute details (minutiae, see below) are
    810 bytes (119 words) - 07:49, 3 March 2005
  • ...ed time budget to read books. In order to learn as much as possible about a subject XYZ, which books should I read? (I can't read them all due to lack A: Obviously, I do not know the books yet.
    1 KB (219 words) - 09:11, 26 January 2006
  • Simple flooding algorithms simply forward a packet several times to increase the possibility that the packet will reach it's destination in a certain time interval or
    3 KB (432 words) - 08:59, 20 October 2006
  • The purpose of the XML Schema language consists in a XML document’s validation. Thus, you can create application specific cons ...and separate elements in the document. The attribute xmlns indicates, that a namespace declaration follows:
    3 KB (397 words) - 23:33, 24 January 2005
  • ...put ejb-jar file is either a deployment unit intended for the Deployer, or a partially assembled application that is intended for another Application As ...and Application Assembler may be the same person or organization. In such a case, the person or organization performs the responsibilities described bo
    1 KB (181 words) - 10:39, 17 May 2006
  • - Carriage return bug after a wrong password entry<br> - Using shadow passwords (encrypted passwords hidden in a private file)
    502 bytes (80 words) - 22:58, 8 November 2004
  • Aradial is a high performance RADIUS server with Tier 1 levels of reliability and scalab a multitude of pre-configured settings that support most Access Servers in th
    1 KB (160 words) - 07:55, 3 April 2005
  • - NCC-1701D is not a good choice<br> - A password which seems to be a random combination<br>
    2 KB (292 words) - 21:54, 8 November 2004
  • ...nologies. It has been founded in 2001 by Sun and several partners to build a decentralized and open alternative to the centralized and proprietary Passp ...the use of [http://www.swig.org/ SWIG]. Closely related to LASSO is SOUK, a Python framework that uses LASSO and actually implements the Liberty Allian
    2 KB (248 words) - 10:36, 6 October 2011
  • Today there exist a lot of projects worldwide, using the WLAN-Technology, to realize wireless o also exist some research projects with a academic or commercial background.
    3 KB (398 words) - 01:24, 11 June 2005
  • ...hieves a better worst-case delay performance than existing approaches with a fixed overhead. ...n more detail, if an erasure code has a message of size <math>M</math> and a replication factor <math>r</math> as input, it produces <math>M*r/b</math>
    2 KB (423 words) - 09:01, 20 October 2006
  • because in case of, e.g. a raid this would compromise the users' anonymity. # The user sends his authentication information along with a new public key PK1 to an identity provider. The identity provider must know
    2 KB (364 words) - 21:55, 31 October 2006
  • A PKI consists of a Registration Authority (RA) and a Certification Authority (CA). At the following Picture you can see how a signed certificate is generated.
    1 KB (194 words) - 22:34, 18 January 2005
  • ...sses to share memory. Sharing memory for two processes means that there is a region of memory which both processes can access (read/write) such that bot ...his region starts at address MA, in Process B it starts at address MB. Let A write the value 0x23 to MA+4, that is, 4 bytes into the shared region. Then
    2 KB (265 words) - 20:44, 10 April 2005
  • ...rner-Allen, Johnson, Ruiz, Lees, Welsh: Monitoring Volcanic Eruptions with a Wireless Sensor Network [http://earth.unh.edu/johnson/PAPERS/ewsn.pdf] * Werner-Allen, Lorincz, Ruiz, Marcillo, Johnson, Lees, Welsh: Deploying a wireless sensor network on an active volcano. IEEE Internet Computing, acce
    2 KB (261 words) - 09:08, 25 January 2006
  • SETI (Search for Extraterrestrial Intelligence) is a scientific area whose goal is to detect intelligent life outside of earth. To our knowledge such signals do not exist naturally. A discovery of those should therefor be caused by extraterrestrial technology
    1 KB (216 words) - 14:42, 31 October 2005
  • - Keeping a plaintext file of passwords is dangerous<br><br> - Entry is encrypted and only if the value matches a stored one, the login is accepted<br>
    476 bytes (76 words) - 23:08, 8 November 2004
  • to a consecutive log before the data write. If a crash occurs during the write,
    3 KB (486 words) - 15:07, 4 May 2007
  • Click is a modular software router developed by MIT. * Flexible control of parallelism in a multiprocessor PC router ([[Media:Click-paper.pdf|PDF]])
    623 bytes (80 words) - 21:22, 5 April 2005
  • An attack, where the hacker will extract the password directly from a person, who is authorized to access it by telling some plausible untruth is ...'. Insurance investigators for example often pretend on a phone call to be a desired victims doctor, so that they will get information concerning the vi
    994 bytes (159 words) - 19:35, 8 November 2004
  • ''Secret Sharing'' is used to split a secret (usually a key) into several pieces which are then given to distinct persons so that s == A Simple Approach ==
    3 KB (454 words) - 13:15, 1 December 2004
  • - A Dictionary Attack can be used, if a password file can be accessed (system can run tests offline)<br>
    540 bytes (86 words) - 23:12, 8 November 2004
  • static void swap_byte(unsigned char *a, unsigned char *b); static void swap_byte(unsigned char *a, unsigned char *b)
    2 KB (171 words) - 10:32, 31 October 2006
  • ...eless routers] - called Meraki mini - are currently available only through a beta program. ...m/products/partdetail?part=MT48LC16M16A2P-75 MICRON MT48LC16M16A2P-75] and a 8 MByte [http://www.sd.com SD] Flash. [http://www.realtek.com.tw/products/p
    2 KB (360 words) - 07:29, 11 April 2007
  • BitTorrent is a Peer2Peer filesharing protocol. It was designed in 2001 by Bram Cohen, to r ...belong to one file are named in a so called '''torrent-file''', which is a meata data file also containing the hash cheksums for each piece and additi
    4 KB (680 words) - 14:41, 19 July 2007
  • ...nsparent switch for it's participants. It is my goal to make it useable as a variable multi-switch. Encryption and authentication will be added to secur * List of standard/basic papers a ''person skilled in the art'' should have read.
    2 KB (319 words) - 21:20, 30 January 2006
  • = Creating a Standard Development Environemnt = ...ory buildroot and copy the necessary files into it. You can choose between a tarball or filesystem image, which can be loop mounted into your running Li
    2 KB (269 words) - 13:49, 8 September 2006
  • ...e OpenMoko is built on top of OpenEmbedded). In order to do this we create a new directory tree <code>openmoko-sar</code> next to <code>oe</code> and <c ...-devel-image.bb</code>. At a later time we plan to put this structure into a version control system.
    2 KB (265 words) - 03:12, 12 July 2007
  • ...ombinations of letters, signs and numbers used to authenticate one user on a system.<br><br> <br><br>A further introduction is available [[Passwords - Introduction|here]].
    657 bytes (100 words) - 18:44, 8 November 2004
  • This is about getting a mesh node to act as a internet gateway. There are different procedures for user- and kernel space ...g devices, doing NAT, ...) can be discussed separately. Especially we need a mechanism to detect, if we have internet connectivity.
    2 KB (310 words) - 09:52, 25 January 2006
  • * List of standard/basic papers a ''person skilled in the art'' should have read. For a list of currently available thesis topics see [http://sar.informatik.hu-ber
    862 bytes (118 words) - 17:16, 6 December 2005
  • * List of standard/basic papers a ''person skilled in the art'' should have read. For a list of currently available thesis topics see [http://sar.informatik.hu-ber
    862 bytes (118 words) - 17:16, 6 December 2005
  • * List of standard/basic papers a ''person skilled in the art'' should have read. For a list of currently available thesis topics see [http://sar.informatik.hu-ber
    862 bytes (118 words) - 17:16, 6 December 2005
  • ...ization und functioning of the METRIK testbed network. It's supposed to be a first guide for developers and scientists who do experiments on this networ The main purpose of the testbed network is to serve as a real-world scenario for testing and experimenting. In order to do that we u
    2 KB (212 words) - 11:41, 8 May 2013
  • In May 1999 Windows and MAC version were released and within a week 200.000 people downloaded and installed the client. ...e classic client) had 232.420 users with 494.090 computers. There is still a migration from the classic client (as described here) to the new BOINC clie
    1 KB (156 words) - 14:43, 31 October 2005
  • '''JavaBeans''' is a client-side component model. It is intended to be used for
    138 bytes (20 words) - 16:20, 11 November 2004
  • '''Bugs''' are errors that are done at the implementation level. A well known example are buffer overflows. A very good description of buffer overflows has been written by Aleph One "Sm
    2 KB (283 words) - 12:24, 25 January 2005
  • ** Difference in fulfilling a request * Used bandwidth for fulfilling a request (number of packets or bytes?)
    1 KB (162 words) - 10:04, 27 January 2006
  • ...P or serial connection. At first we have to build both a debugger stub and a cross-debugger (note that the host debugger which is shipped with the linux ...fy an executable which is load or attach it to a running process. To debug a process with PID 333 for example, simply type
    3 KB (447 words) - 10:57, 22 April 2007
  • so that every write creates a consistent state. On a typical file system there are files, directories and pointers to these.
    3 KB (524 words) - 15:04, 4 May 2007
  • ...ich an entity attempts to confirm that another entity is allowed to access a resource. For example, it is often desirable to grant access without requiring a unique identity. Familiar examples of [[authorization token]]s include keys
    2 KB (288 words) - 00:35, 8 March 2005
  • ...mplex the user might have problems entering it correctly and especially in a case of urgent (or safety) operations this would be not useful.<br><br> ...mple:'' South African Prepaid Electricity with 20-digit numbers – although a third of the population is illiterate, entry errors were the major problem
    695 bytes (107 words) - 20:47, 8 November 2004
  • This task requires knowledge in C/C++ and to a certain amount working with the compiler tools lex/flex and yacc/bison. There you find examples of working flex/bison code too and a makefiles.
    929 bytes (149 words) - 11:59, 19 April 2005
  • [[Image:Brn.Gui-500Nodes.png|none|right|thumb|400px|Brn.Gui running a simulation with 500 nodes.]] ...in simulation code via the Brn.Measure framework. Furthermore, it is also a result browser for already completed simulations which were executed by the
    3 KB (498 words) - 14:24, 16 March 2008
  • ...uler of the world *harharhar*. Some of these are presented here. There are a lot more techniques used that are not presented here.
    1 KB (190 words) - 11:25, 30 January 2005
  • ...antenna will be connected to the WRT54GS through a cable, which is called a pigtail. The pigtail has two connectors: One that connects to the WRT54GS, ...can be used, but try to keep their length and the number of connectors at a minimum as they all reduce the strength of the received/transmitted radio s
    1 KB (175 words) - 19:07, 11 March 2005
  • With one-bit complex sampling this yields a frequency band of 2.5 MHz which is enough to handle doppler shifts for rela ...ted via the Internet to the clients. The client program computes a result (a set of candidate signals) and returns it to the server. As mentioned in the
    3 KB (547 words) - 14:42, 31 October 2005
  • .../wndw.net/pdf/wndw-ebook.pdf Wireless Networking in the Developing World], A practical guide to planning and building low-cost telecommunications infras * Pentland A, Fletcher R, Hasson A. [http://www.firstmilesolutions.com/documents/DakNet_IEEE_Computer.pdf DakN
    1 KB (193 words) - 13:56, 3 March 2006
  • * MSC Tracer provides on-line behaviour of a Click router embedded NS2 simulator. [[Image:Brntracer.png|thumb|250px|Desc
    152 bytes (22 words) - 11:46, 21 November 2006
  • * the abbreviation for '''S'''imple '''O'''bject '''A'''ccess '''P'''rotocol The protocol serves as a distributed object protocol such as RMI or CORBA-IIOP. Thus, whereas RMI is
    5 KB (753 words) - 00:09, 25 January 2005
  • ...atest communication and information exchange - but not without a price. As a result of this connection, your computer, your organization's network, and
    1 KB (159 words) - 14:39, 18 June 2005
  • <dt>User management</dt> <dd><ul><li>RP has a database with two unrelated tables: <ul><li>UserIDs and accompanying data</ ...fusing creation if this is the case (counters Sybil attack)</li><li>Create a new UserID and enter it into the database; at the same time enter the realn
    4 KB (699 words) - 01:57, 13 May 2006
  • ...ew routing technologies or the extension of existing VoIP technology (e.g. a SIP extension) MAY result from this work, development of new VoIP technolog * If successful, this contribution will allow to give a statement whether VoIP in current mesh networks is possible, and if not, wh
    2 KB (311 words) - 08:51, 23 April 2006
  • ...ization und functioning of the METRIK testbed network. It's supposed to be a first guide for developers and scientists who do experiments on this networ The main purpose of the testbed network is to serve as a real-world scenario for testing and experimenting. In order to do that we u
    2 KB (238 words) - 20:08, 1 November 2012
  • ...ions are special [[one way functions]] that can be easily inverted knowing a secret or trapdoor.
    157 bytes (22 words) - 09:29, 8 February 2005
  • ...hardships on peers with slow links and those holding many unpopular files, a rule was established which gives uploading more points than downloading. Fu ...rg/events/worlds04/tech/full_papers/yang/yang_html/maze.html Deployment of a Large-scale Peer-to-Peer Social Network]
    1 KB (201 words) - 18:19, 26 July 2007
  • ...f concept] of the [http://www.dtnrg.org DTN research group] views a DTN as a network of networks, as some sort of overlay on top of other nets, being ab ...ocator'' a node belonging to this network. Note that addressing ''within'' a region/network can be completely different, it's up to the network how this
    4 KB (650 words) - 16:18, 18 July 2006
  • * [[DistSim|DistSim]] is a framework for defining, executing and collecting the results of multiple si
    155 bytes (20 words) - 15:16, 16 February 2007
  • ...f Trust between peers is measured in a Matrix M. This N * N matrix defines a one-step rank among peers. ...normalized download volume that a peer i has received from a peer j during a period of time.
    3 KB (412 words) - 16:00, 5 August 2007
  • ...://www.hu-berlin.de/ Humboldt University Berlin]. The goal is to construct a network of nodes (access points) which share Internet access over wireless ...nges and higher data rates, as soon as such equipment becomes available at a reasonable price.
    4 KB (597 words) - 12:28, 21 November 2006
  • The container provides a runtime-environment for an enterprise bean and offers services, like contai As a result the bean depends on the container in every aspect. There are three w
    9 KB (1,399 words) - 06:32, 23 February 2005
  • ...sin for writing programs that run on unused workstations, typically within a single organization. ...cientific research and the creation of global communities centered arround a specific scientific interest.
    3 KB (449 words) - 14:51, 31 October 2005
  • ...erent implementations: RMI/[[JRMP]] commonly just referred to as "RMI" and a [[CORBA]] compliant implementation called RMI-[[IIOP]]. When the client invokes a remote method a so called stub on the client side marhalls the invokation and sends it to t
    5 KB (747 words) - 06:56, 11 April 2005
View (previous 100 | ) (20 | 50 | 100 | 250 | 500)