Search results

Jump to navigation Jump to search

Page title matches

Page text matches

  • ...T-KIT-MARK-II.html Metrix Mark II] is a complete outdoor solution based on a [Soekris board]. 2 [http://www.wneweb.com/pdf/CM9.pdf Wistron CM9] 802.11 a/b/g mini-PCI modules<br/>
    390 bytes (58 words) - 04:58, 8 February 2007
  • ...view corresponding to the web service endpoint interface, as described by a WSDL document.
    767 bytes (130 words) - 08:59, 8 February 2005
  • '''A''': <ol><li>On newer busybox versions the command after a ''shutdown'' keyword from the ''/etc/inttab'' file will be executed, e.g.: So a ''halt'' action will be followed by a ''reboot'' and the node will only executes the '''''halt''''' action.</li>
    658 bytes (109 words) - 19:28, 15 September 2006
  • ...or this is a telephone Book. It’s very easy to find a telephone number for a given name, but it’s really hard to find a name for a given number if you have to do it all by yourself.
    438 bytes (85 words) - 09:28, 8 February 2005
  • '''A typical message-driven object has the following characteristics:''' *Executes upon receipt of a single client message.
    644 bytes (92 words) - 17:12, 19 November 2004
  • A Botnet is a collection of hosts (bots) under a common command and control infrastructure [Wikipedia: [http://en.wikipedia. A host has to be compromised in order to install a bot on it. That can be done by exploiting known bugs and using standard too
    821 bytes (139 words) - 19:16, 14 November 2004
  • '''A typical session object has the following characteristics:''' *Executes on behalf of a single client.
    742 bytes (109 words) - 17:20, 19 November 2004
  • ...add all technical terms that you encountered during the seminar, including a verbose description of their meaning. Please keep those terms in an alphabe ...enuation denotes the loss of intensity a signal expieriences on its way to a reciever.
    1 KB (194 words) - 17:53, 11 July 2007
  • '''A typical entity object has the following characteristics:''' ...ive an exception if it calls an entity in a container that has experienced a crash.
    797 bytes (134 words) - 17:09, 19 November 2004
  • 1. Attacking '' '''one''' '' account (The intruder tries to guess a specific password)<br> 2. Attempt to penetrate '' '''any''' '' account (on a system) used to steal a service directly<br>
    759 bytes (118 words) - 20:54, 8 November 2004
  • ...s are sent by the Anonymization Layer. All commands and responses end with a single newline (<code>"\n"</code> in C). ; <tt>newuser <var>n</var></tt> : A new user with index <tt><var>n</var></tt> has been added. <br />No response
    2 KB (393 words) - 18:46, 25 May 2006
  • ...essed a computer system and what operations he or she has performed during a given period of time.<br><br>
    431 bytes (68 words) - 23:04, 8 November 2004
  • ...tle says that this is a book for Win32 programmers but it also gives quite a lot of information on concepts of the operating systems that implement the
    282 bytes (45 words) - 14:12, 10 April 2005
  • ...this number is coded in the following scheme with a word, let's say ''c-r-a-p'' supposed to be an easy reminder. | A | | | | | | | | | |
    3 KB (170 words) - 20:50, 8 November 2004
  • ...e does not contain any theoretical discussions of web services. It is more a You should really careful think about design before you should start coding a web service.
    1 KB (189 words) - 07:35, 9 March 2007
  • = Install OpenWrt on a Netgear WGT634U = ...ant to restore the original state later): '''Backup Settings''' -> '''Save a Copy of Current Settings''' -> '''Backup'''
    494 bytes (73 words) - 10:49, 8 March 2007
  • A frequent source of severe design errors can be fast built systems, develope ...sheer number of applications for which the average person is asked to use a password exceeds the powers of human memory
    1 KB (178 words) - 20:59, 8 November 2004
  • ...cessary binaries to bootstrap the system until you get a login program and a shell.<br> ...embedded systems the [http://www.busybox.net/ busybox] collection provides a huge set of common UNIX tools in one binary. This method saves some space o
    952 bytes (145 words) - 21:01, 19 September 2006
  • [[Image:Ddos.png|thumb|right|scheme of a DDoS attack]] ...ems are used for a [[Denial of Service]] attack. This scheme is similar to a [[Botnet|botnet]]. In fact, botnets are often used for DDoS attacks, but po
    2 KB (261 words) - 19:22, 14 November 2004
  • $ iptables -t nat -A PREROUTING -p udp --dport 53 -j DNAT --to 192.168.3.1:53 $ iptables -t nat -A POSTROUTING -d 192.168.3.1 -p udp --dport 53 -j MASQUERADE
    888 bytes (134 words) - 11:18, 11 January 2007
  • *[[A session object]] *[[A message-driven object]]
    339 bytes (40 words) - 16:17, 19 November 2004
  • *[[A session object]] *[[A message-driven object]]
    339 bytes (40 words) - 08:56, 8 February 2005
  • .... Any topic. Affordable prices. Order 100% custom-written term papers from a reputable custom writing. Quality assistance from professional writers.
    506 bytes (72 words) - 14:33, 20 July 2010
  • A '''blind credential''' is a token asserting that someone qualifies under some criteria or has some stat ...is not using another's credential &mdash; identity theft &mdash; therefore a great deal of effort goes into the application of cryptography to authentic
    855 bytes (133 words) - 00:42, 8 March 2005
  • ...by disclosing the password to a third party by accident, on purpose, or as a result of deception?<br><br> 2. Will the user enter the password correctly (at least with a high probability)?<br><br>
    616 bytes (102 words) - 19:21, 8 November 2004
  • ...llenge to get the BRN software for a new target platform you have to build a (cross) compiler.<br> A compiler translates a high-level programming language (like C or C++) into binary code for execut
    2 KB (259 words) - 12:27, 23 October 2006
  • '''Q:''' Why does VMware Server not autostart a VM? '''A:''' Have a look at the latest log file below /tmp/vmware-<username>/ and
    544 bytes (80 words) - 21:23, 3 May 2007
  • - Instead of (A^N)/2 it only takes A^(N/2) (A = alphabet of characters, N = number of characters used for the password)<b
    445 bytes (76 words) - 22:53, 8 November 2004
  • - Leads always to the used password but is a matter of time and compute power<br> - Total exhaust time is 968 or 252, the average effort for a search is half of this<br><br>
    643 bytes (102 words) - 23:30, 8 November 2004
  • The folder /src is a mirror and thus provides a better reliability (redundancy). If the master server breaks down we still Historically we had a ressource problem on the master server. To solve this we moved the folder /
    604 bytes (87 words) - 15:46, 21 October 2011
  • In a typical system, human users must authenticate themselves to a client through in general three possible ways:
    779 bytes (109 words) - 19:09, 8 November 2004
  • - A program running in the background in a public terminal room<br>
    345 bytes (51 words) - 10:19, 17 May 2006
  • You need a Linux system with approximately 1GB free disk space to download and compile ===What is a toolchain?===
    1 KB (211 words) - 19:36, 22 February 2006
  • ...a different password each time authentication is needed and to never reuse a used password. Also it must not be possible to easily compute yet unused pa # Systems based on a non-inversible function, e.g. cryptographically secure hash functions
    3 KB (448 words) - 00:53, 6 November 2004
  • ...e Macronix 29LV320CVBC-90G Flash] chip. The ethernet ports are provided by a [http://www.delta.com.tw Delta] LFE8782 transformer. There are no obvious i ...om/release_notes/d103016.asp firmware page] also describes how to download a new firmware via TFTP. [http://openwrt.org/ OpenWRT] does not [http://wiki.
    2 KB (345 words) - 05:06, 6 February 2007
  • A composition of the topic can be found [[Properties of the Wireless Medium | ...in.de/~beier/pdfs/brn-06-802.11%20Network%20Structures.pdf presentation as a pdf].
    882 bytes (132 words) - 20:29, 17 October 2006
  • ...p://www.glink.com.tw/pdf/GLT5640L16-R3.3.pdf G-Link GLT5640L16-6TC], Flash a 2 MByte [http://www.spansion.com/products/Am29LV160B.html AMD/Spansion AM29
    1 KB (189 words) - 07:51, 28 January 2007
  • ...elieved that fingerprints posess the two requirements necessary for use as a biometric criterion: ...s ever share exactly the same pattern. What is more: experience shows that a small amount (usually 12 to 18) of minute details (minutiae, see below) are
    810 bytes (119 words) - 07:49, 3 March 2005
  • ...ed time budget to read books. In order to learn as much as possible about a subject XYZ, which books should I read? (I can't read them all due to lack A: Obviously, I do not know the books yet.
    1 KB (219 words) - 09:11, 26 January 2006
  • Simple flooding algorithms simply forward a packet several times to increase the possibility that the packet will reach it's destination in a certain time interval or
    3 KB (432 words) - 08:59, 20 October 2006
  • The purpose of the XML Schema language consists in a XML document’s validation. Thus, you can create application specific cons ...and separate elements in the document. The attribute xmlns indicates, that a namespace declaration follows:
    3 KB (397 words) - 23:33, 24 January 2005
  • ...put ejb-jar file is either a deployment unit intended for the Deployer, or a partially assembled application that is intended for another Application As ...and Application Assembler may be the same person or organization. In such a case, the person or organization performs the responsibilities described bo
    1 KB (181 words) - 10:39, 17 May 2006
  • - Carriage return bug after a wrong password entry<br> - Using shadow passwords (encrypted passwords hidden in a private file)
    502 bytes (80 words) - 22:58, 8 November 2004
  • Aradial is a high performance RADIUS server with Tier 1 levels of reliability and scalab a multitude of pre-configured settings that support most Access Servers in th
    1 KB (160 words) - 07:55, 3 April 2005
  • - NCC-1701D is not a good choice<br> - A password which seems to be a random combination<br>
    2 KB (292 words) - 21:54, 8 November 2004
  • ...nologies. It has been founded in 2001 by Sun and several partners to build a decentralized and open alternative to the centralized and proprietary Passp ...the use of [http://www.swig.org/ SWIG]. Closely related to LASSO is SOUK, a Python framework that uses LASSO and actually implements the Liberty Allian
    2 KB (248 words) - 10:36, 6 October 2011
  • Today there exist a lot of projects worldwide, using the WLAN-Technology, to realize wireless o also exist some research projects with a academic or commercial background.
    3 KB (398 words) - 01:24, 11 June 2005
  • ...hieves a better worst-case delay performance than existing approaches with a fixed overhead. ...n more detail, if an erasure code has a message of size <math>M</math> and a replication factor <math>r</math> as input, it produces <math>M*r/b</math>
    2 KB (423 words) - 09:01, 20 October 2006
  • because in case of, e.g. a raid this would compromise the users' anonymity. # The user sends his authentication information along with a new public key PK1 to an identity provider. The identity provider must know
    2 KB (364 words) - 21:55, 31 October 2006
  • A PKI consists of a Registration Authority (RA) and a Certification Authority (CA). At the following Picture you can see how a signed certificate is generated.
    1 KB (194 words) - 22:34, 18 January 2005
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)