Search results

Jump to navigation Jump to search
  • *[[A session object]] *[[A message-driven object]]
    339 bytes (40 words) - 08:56, 8 February 2005
  • *[[A session object]] *[[A message-driven object]]
    339 bytes (40 words) - 16:17, 19 November 2004
  • .... Any topic. Affordable prices. Order 100% custom-written term papers from a reputable custom writing. Quality assistance from professional writers.
    506 bytes (72 words) - 14:33, 20 July 2010
  • A '''blind credential''' is a token asserting that someone qualifies under some criteria or has some stat ...is not using another's credential — identity theft — therefore a great deal of effort goes into the application of cryptography to authentic
    855 bytes (133 words) - 00:42, 8 March 2005
  • ...by disclosing the password to a third party by accident, on purpose, or as a result of deception?<br><br> 2. Will the user enter the password correctly (at least with a high probability)?<br><br>
    616 bytes (102 words) - 19:21, 8 November 2004
  • ...llenge to get the BRN software for a new target platform you have to build a (cross) compiler.<br> A compiler translates a high-level programming language (like C or C++) into binary code for execut
    2 KB (259 words) - 12:27, 23 October 2006
  • '''Q:''' Why does VMware Server not autostart a VM? '''A:''' Have a look at the latest log file below /tmp/vmware-<username>/ and
    544 bytes (80 words) - 21:23, 3 May 2007
  • - Instead of (A^N)/2 it only takes A^(N/2) (A = alphabet of characters, N = number of characters used for the password)<b
    445 bytes (76 words) - 22:53, 8 November 2004
  • - Leads always to the used password but is a matter of time and compute power<br> - Total exhaust time is 968 or 252, the average effort for a search is half of this<br><br>
    643 bytes (102 words) - 23:30, 8 November 2004
  • The folder /src is a mirror and thus provides a better reliability (redundancy). If the master server breaks down we still Historically we had a ressource problem on the master server. To solve this we moved the folder /
    604 bytes (87 words) - 15:46, 21 October 2011
  • In a typical system, human users must authenticate themselves to a client through in general three possible ways:
    779 bytes (109 words) - 19:09, 8 November 2004
  • - A program running in the background in a public terminal room<br>
    345 bytes (51 words) - 10:19, 17 May 2006
  • You need a Linux system with approximately 1GB free disk space to download and compile ===What is a toolchain?===
    1 KB (211 words) - 19:36, 22 February 2006
  • ...a different password each time authentication is needed and to never reuse a used password. Also it must not be possible to easily compute yet unused pa # Systems based on a non-inversible function, e.g. cryptographically secure hash functions
    3 KB (448 words) - 00:53, 6 November 2004
  • ...e Macronix 29LV320CVBC-90G Flash] chip. The ethernet ports are provided by a [http://www.delta.com.tw Delta] LFE8782 transformer. There are no obvious i ...om/release_notes/d103016.asp firmware page] also describes how to download a new firmware via TFTP. [http://openwrt.org/ OpenWRT] does not [http://wiki.
    2 KB (345 words) - 05:06, 6 February 2007
  • A composition of the topic can be found [[Properties of the Wireless Medium | ...in.de/~beier/pdfs/brn-06-802.11%20Network%20Structures.pdf presentation as a pdf].
    882 bytes (132 words) - 20:29, 17 October 2006
  • ...p://www.glink.com.tw/pdf/GLT5640L16-R3.3.pdf G-Link GLT5640L16-6TC], Flash a 2 MByte [http://www.spansion.com/products/Am29LV160B.html AMD/Spansion AM29
    1 KB (189 words) - 07:51, 28 January 2007
  • ...elieved that fingerprints posess the two requirements necessary for use as a biometric criterion: ...s ever share exactly the same pattern. What is more: experience shows that a small amount (usually 12 to 18) of minute details (minutiae, see below) are
    810 bytes (119 words) - 07:49, 3 March 2005
  • ...ed time budget to read books. In order to learn as much as possible about a subject XYZ, which books should I read? (I can't read them all due to lack A: Obviously, I do not know the books yet.
    1 KB (219 words) - 09:11, 26 January 2006
  • Simple flooding algorithms simply forward a packet several times to increase the possibility that the packet will reach it's destination in a certain time interval or
    3 KB (432 words) - 08:59, 20 October 2006
  • The purpose of the XML Schema language consists in a XML document’s validation. Thus, you can create application specific cons ...and separate elements in the document. The attribute xmlns indicates, that a namespace declaration follows:
    3 KB (397 words) - 23:33, 24 January 2005
  • ...put ejb-jar file is either a deployment unit intended for the Deployer, or a partially assembled application that is intended for another Application As ...and Application Assembler may be the same person or organization. In such a case, the person or organization performs the responsibilities described bo
    1 KB (181 words) - 10:39, 17 May 2006
  • - Carriage return bug after a wrong password entry<br> - Using shadow passwords (encrypted passwords hidden in a private file)
    502 bytes (80 words) - 22:58, 8 November 2004
  • Aradial is a high performance RADIUS server with Tier 1 levels of reliability and scalab a multitude of pre-configured settings that support most Access Servers in th
    1 KB (160 words) - 07:55, 3 April 2005
  • - NCC-1701D is not a good choice<br> - A password which seems to be a random combination<br>
    2 KB (292 words) - 21:54, 8 November 2004
  • ...nologies. It has been founded in 2001 by Sun and several partners to build a decentralized and open alternative to the centralized and proprietary Passp ...the use of [http://www.swig.org/ SWIG]. Closely related to LASSO is SOUK, a Python framework that uses LASSO and actually implements the Liberty Allian
    2 KB (248 words) - 10:36, 6 October 2011
  • Today there exist a lot of projects worldwide, using the WLAN-Technology, to realize wireless o also exist some research projects with a academic or commercial background.
    3 KB (398 words) - 01:24, 11 June 2005
  • ...hieves a better worst-case delay performance than existing approaches with a fixed overhead. ...n more detail, if an erasure code has a message of size <math>M</math> and a replication factor <math>r</math> as input, it produces <math>M*r/b</math>
    2 KB (423 words) - 09:01, 20 October 2006
  • because in case of, e.g. a raid this would compromise the users' anonymity. # The user sends his authentication information along with a new public key PK1 to an identity provider. The identity provider must know
    2 KB (364 words) - 21:55, 31 October 2006
  • A PKI consists of a Registration Authority (RA) and a Certification Authority (CA). At the following Picture you can see how a signed certificate is generated.
    1 KB (194 words) - 22:34, 18 January 2005
  • ...sses to share memory. Sharing memory for two processes means that there is a region of memory which both processes can access (read/write) such that bot ...his region starts at address MA, in Process B it starts at address MB. Let A write the value 0x23 to MA+4, that is, 4 bytes into the shared region. Then
    2 KB (265 words) - 20:44, 10 April 2005
  • ...rner-Allen, Johnson, Ruiz, Lees, Welsh: Monitoring Volcanic Eruptions with a Wireless Sensor Network [http://earth.unh.edu/johnson/PAPERS/ewsn.pdf] * Werner-Allen, Lorincz, Ruiz, Marcillo, Johnson, Lees, Welsh: Deploying a wireless sensor network on an active volcano. IEEE Internet Computing, acce
    2 KB (261 words) - 09:08, 25 January 2006
  • SETI (Search for Extraterrestrial Intelligence) is a scientific area whose goal is to detect intelligent life outside of earth. To our knowledge such signals do not exist naturally. A discovery of those should therefor be caused by extraterrestrial technology
    1 KB (216 words) - 14:42, 31 October 2005
  • - Keeping a plaintext file of passwords is dangerous<br><br> - Entry is encrypted and only if the value matches a stored one, the login is accepted<br>
    476 bytes (76 words) - 23:08, 8 November 2004
  • to a consecutive log before the data write. If a crash occurs during the write,
    3 KB (486 words) - 15:07, 4 May 2007
  • Click is a modular software router developed by MIT. * Flexible control of parallelism in a multiprocessor PC router ([[Media:Click-paper.pdf|PDF]])
    623 bytes (80 words) - 21:22, 5 April 2005
  • An attack, where the hacker will extract the password directly from a person, who is authorized to access it by telling some plausible untruth is ...'. Insurance investigators for example often pretend on a phone call to be a desired victims doctor, so that they will get information concerning the vi
    994 bytes (159 words) - 19:35, 8 November 2004
  • ''Secret Sharing'' is used to split a secret (usually a key) into several pieces which are then given to distinct persons so that s == A Simple Approach ==
    3 KB (454 words) - 13:15, 1 December 2004
  • - A Dictionary Attack can be used, if a password file can be accessed (system can run tests offline)<br>
    540 bytes (86 words) - 23:12, 8 November 2004
  • static void swap_byte(unsigned char *a, unsigned char *b); static void swap_byte(unsigned char *a, unsigned char *b)
    2 KB (171 words) - 10:32, 31 October 2006
  • ...eless routers] - called Meraki mini - are currently available only through a beta program. ...m/products/partdetail?part=MT48LC16M16A2P-75 MICRON MT48LC16M16A2P-75] and a 8 MByte [http://www.sd.com SD] Flash. [http://www.realtek.com.tw/products/p
    2 KB (360 words) - 07:29, 11 April 2007
  • BitTorrent is a Peer2Peer filesharing protocol. It was designed in 2001 by Bram Cohen, to r ...belong to one file are named in a so called '''torrent-file''', which is a meata data file also containing the hash cheksums for each piece and additi
    4 KB (680 words) - 14:41, 19 July 2007
  • ...nsparent switch for it's participants. It is my goal to make it useable as a variable multi-switch. Encryption and authentication will be added to secur * List of standard/basic papers a ''person skilled in the art'' should have read.
    2 KB (319 words) - 21:20, 30 January 2006
  • = Creating a Standard Development Environemnt = ...ory buildroot and copy the necessary files into it. You can choose between a tarball or filesystem image, which can be loop mounted into your running Li
    2 KB (269 words) - 13:49, 8 September 2006
  • ...e OpenMoko is built on top of OpenEmbedded). In order to do this we create a new directory tree <code>openmoko-sar</code> next to <code>oe</code> and <c ...-devel-image.bb</code>. At a later time we plan to put this structure into a version control system.
    2 KB (265 words) - 03:12, 12 July 2007
  • ...ombinations of letters, signs and numbers used to authenticate one user on a system.<br><br> <br><br>A further introduction is available [[Passwords - Introduction|here]].
    657 bytes (100 words) - 18:44, 8 November 2004
  • This is about getting a mesh node to act as a internet gateway. There are different procedures for user- and kernel space ...g devices, doing NAT, ...) can be discussed separately. Especially we need a mechanism to detect, if we have internet connectivity.
    2 KB (310 words) - 09:52, 25 January 2006
  • * List of standard/basic papers a ''person skilled in the art'' should have read. For a list of currently available thesis topics see [http://sar.informatik.hu-ber
    862 bytes (118 words) - 17:16, 6 December 2005
  • * List of standard/basic papers a ''person skilled in the art'' should have read. For a list of currently available thesis topics see [http://sar.informatik.hu-ber
    862 bytes (118 words) - 17:16, 6 December 2005
  • * List of standard/basic papers a ''person skilled in the art'' should have read. For a list of currently available thesis topics see [http://sar.informatik.hu-ber
    862 bytes (118 words) - 17:16, 6 December 2005
View ( | ) (20 | 50 | 100 | 250 | 500)