text
stringlengths 6
1.88M
| source
stringclasses 13
values |
---|---|
tcp offload engine tcp offload engine toe technology used network interface cards nic offload processing entire tcp/ip stack network controller primarily used high-speed network interfaces gigabit ethernet 10 gigabit ethernet processing overhead network stack becomes significant term toe often used refer nic although circuit board engineers may use refer integrated circuit included card processes transmission control protocol tcp headers toes often suggested way reduce overhead associated internet protocol ip storage protocols iscsi network file system nfs originally tcp designed unreliable low speed networks early dial-up modems growth internet terms backbone transmission speeds using optical carrier gigabit ethernet 10 gigabit ethernet links faster reliable access mechanisms dsl cable modems frequently used data centers desktop pc environments speeds 1 gigabit per second tcp software implementations host systems require extensive computing power early 2000s full duplex gigabit tcp communication could consume 80 2.4 ghz pentium 4 processor see freed-up cpu cycles resulting small processing resources left applications run system tcp connection-oriented protocol adds complexity processing overhead aspects include moving functions dedicated hardware tcp offload engine frees system main cpu tasks 2012 consumer network interface cards support toe instead replacing tcp stack toe entirely alternative techniques offload operations co-operation operating system tcp stack tcp checksum offload large segment offload supported majority today ethernet nics newer techniques like large receive offload tcp acknowledgment offload already implemented high-end ethernet hardware effective even implemented purely software generally accepted rule thumb 1 hertz cpu processing required send receive 1 bit/s tcp/ip example 5 gbit/s 625 mb/s network traffic requires 5 ghz cpu processing implies 2 entire cores 2.5 ghz multi-core processor required handle tcp/ip processing associated 5 gbit/s tcp/ip traffic since ethernet 10ge example bidirectional possible send receive 10 gbit/s aggregate throughput 20 gbit/s using 1 hz/ bit/s rule equates eight 2.5 ghz cores many cpu cycles used tcp/ip processing freed-up tcp/ip offload may used cpu usually server cpu perform tasks file system processing file server indexing backup media server words server tcp/ip offload server work server without tcp/ip offload nics addition protocol overhead toe address also address architectural issues affect large percentage host based server pc endpoints many older end point hosts pci bus based provides standard interface addition certain peripherals network interfaces servers pcs pci inefficient transferring small bursts data main memory across pci bus network interface ics efficiency improves data burst size increases within tcp protocol large number small packets created e.g acknowledgements typically generated host cpu transmitted across pci bus network physical interface impacts host computer io throughput toe solution located network interface located side pci bus cpu host address i/o efficiency issue data sent across tcp connection sent toe cpu across pci bus using large data burst sizes none smaller tcp packets traverse pci bus one first patents technology udp offload issued auspex systems early 1990 auspex founder larry boucher number auspex engineers went found alacritech 1997 idea extending concept network stack offload tcp implementing custom silicon introduced first parallel-stack full offload network card early 1999 company ’ slic session layer interface card predecessor current toe offerings alacritech holds number patents area tcp/ip offload 2002 emergence tcp-based storage iscsi spurred interest said least dozen newcomers founded toward end dot-com bubble chasing opportunity merchant semiconductor accelerators storage protocols applications vying half dozen entrenched vendors in-house asic designs 2005 microsoft licensed alacritech patent base along alacritech created partial tcp offload architecture become known tcp chimney offload tcp chimney offload centers alacritech communication block passing patent time broadcom also obtained license build tcp chimney offload chips parallel-stack full offload gets name concept two parallel tcp/ip stacks first main host stack included host os second parallel stack connected application layer transport layer tcp using vampire tap vampire tap intercepts tcp connection requests applications responsible tcp connection management well tcp data transfer many criticisms following section relate type tcp offload hba host bus adapter full offload found iscsi host adapters present disk controllers host system connecting via tcp/ip iscsi storage device type tcp offload offloads tcp/ip processing also offloads iscsi initiator function hba appears host disk controller used iscsi devices appropriate general tcp/ip offload tcp chimney offload addresses major security criticism parallel-stack full offload partial offload main system stack controls connections host connection established local host usually server foreign host usually client connection state passed tcp offload engine heavy lifting data transmit receive handled offload device almost tcp offload engines use type tcp/ip hardware implementation perform data transfer without host cpu intervention connection closed connection state returned offload engine main system stack maintaining control tcp connections allows main system stack implement control connection security unlike kernels linux kernel include support toe hardware patches hardware manufacturers chelsio qlogic add support linux kernel developers opposed technology several reasons including much current work toe technology manufacturers 10 gigabit ethernet interface cards broadcom chelsio communications emulex mellanox technologies qlogic
|
Internet protocols
|
paizacloud cloud ide paizacloud cloud ide cloud ide online integrated development environment supports programming languages including c c++ php ruby perl python javascript node.js go enables developers get started coding immediately browser-based development environment written almost entirely javascript uses node.js back-end editor component uses ace dec 2017 uses docker containers workspaces gino inc. company actively maintains paizacloud cloud ide company offices tokyo
|
Distributed computing architecture
|
tetris tetris portmanteau tetromino tennis tile-matching puzzle video game originally designed programmed soviet russian game designer alexey leonidovich pajitnov first playable version completed june 6 1984 working dorodnitsyn computing centre academy science soviet union moscow derived name greek numerical prefix tetra- game pieces contain four segments tennis pajitnov favorite sport name also used in-game refer play four lines cleared tetris first entertainment software exported soviet union united states published spectrum holobyte commodore 64 ibm pc game popular use tetrominoes four-element case polyominoes used popular puzzles since least 1907 name figures given mathematician solomon w. golomb 1953 game one many variants available nearly every video game console computer operating system well devices graphing calculators mobile phones portable media players pdas network music players easter egg non-media products like oscilloscopes inspired tetris serving dishes even played sides various buildings versions tetris sold range 1980s home computer platforms well arcades successful handheld version game boy launched 1989 established game one popular video games ever electronic gaming monthly 100th issue tetris first place greatest game time 2007 came second place ign 100 greatest video games time 2019 moved 7th january 2010 announced games franchise sold 170 million copies—approximately 70 million physical copies 100 million copies cell phones—making second best selling paid-downloaded game time behind minecraft tetriminos game pieces shaped like tetrominoes geometric shapes composed four square blocks random sequence tetriminos fall playing field rectangular vertical shaft called well matrix objective game manipulate tetriminos moving one sideways and/or rotating quarter-turns form solid horizontal line without gaps line formed disappears blocks fall fill space certain number lines cleared game enters new level game progresses level causes tetriminos fall faster game ends stack tetriminos reaches top playing field new tetriminos able enter games also end finite number levels lines tetriminos fill clear singles doubles j l able clear triples tetrimino capacity clear four lines simultaneously referred tetris may vary depending rotation compensation rules specific tetris implementation instance super rotation system used recent implementations certain situations allow z 'snap tight spots clear triples pajitnov original version electronika 60 computer used green brackets represent blocks versions tetris original game boy/game boy color dedicated handheld games use monochrome grayscale graphics popular versions use separate color distinct shape prior tetris company standardization early 2000s colors varied widely implementation implementation scoring formula majority tetris products built idea difficult line clears awarded points example single line clear tetris zone worth 100 points clearing four lines known tetris worth 800 subsequent back-to-back tetris worth 1,200 conjunction players awarded combos exist certain games reward multiple line clears quick succession exact conditions triggering combos amount importance assigned vary game game nearly tetris games allow player press button increase speed current piece descent cause piece drop lock place immediately known soft drop hard drop respectively performing soft drop player also stop piece increased speed releasing button piece settles place games allow either soft drop hard drop others separate buttons many games award number points based height piece fell locking using hard drop generally awards points although first tetris game feature new kind tetris easy spin see next tetris also called infinite spin critics tetris worlds first game fall major criticisms easy spin refers property tetrimino stop falling moment left right movement rotation effectively allowing someone suspend tetrimino thinking place feature implemented tetris company official guideline type play differs traditional tetris takes away pressure higher level speed reviewers went far say mechanism broke game goal tetris worlds however complete certain number lines fast possible ability hold piece placement make achieving goal faster later gamespot received easy spin openly saying infinite spin issue honestly really affects single-player gameplay modes tetris ds competitive mode requires lay pieces quickly humanly possible response issue henk rogers stated interview infinite spin intentional part game design allowing novice players expend available scoring time decide best placement piece rogers observed gratuitous spinning occur competitive play expert players require much time think piece placed limitation placed infinite lock delay later games franchise certain amount inputs i.e rotations movements piece instantly lock defaulted 15 inputs tetris created june 1984 alexey pajitnov artificial intelligence researcher working soviet academy sciences computer center moscow tasked testing capabilities new hardware pajitnov would writing simple games initially considered creating game around pentominoes featured puzzle games enjoyed child felt might complicated twelve different shape variations concept switched tetrominoes seven variants electronika 60 working text-based display tetrominoes formed letter characters realizing completed lines resulted screen filling quickly pajitnov decided delete creating key part tetris gameplay pajitnov game proved popular colleagues academy sciences co-workers dmitry pavlovsky vadim gerasimov ported game ibm pc gerasimov reports pajitnov chose name tetris combination 'tetromino 'tennis pc game became popular began spreading around moscow gerasimov removed 1988 version game website october 2003 response demand counsel tetris company resumed making available august 2006 pc version made way budapest hungary ported various platforms discovered british software house andromeda attempted contact pajitnov secure rights pc version deal firmly settled already sold rights spectrum holobyte failing settle deal pajitnov andromeda attempted license hungarian programmers instead meanwhile legal rights settled spectrum holobyte ibm pc version tetris contained background graphics featuring russian scenes released united states 1987 game popularity tremendous computer gaming world called game deceptively simple insidiously addictive details licensing issues uncertain point 1987 andromeda managed obtain copyright licensing ibm pc home computer system commodore 64 release 1988 26-minute soundtrack composed game musician wally beben amiga atari st two different versions mirrorsoft 1987 spectrum holobyte 1988 became available mirrorsoft version feature background graphics spectrum holobyte version similar pc version contained similar images also distributed infogrames regions games sold budget titles due game simplicity spectrum apple ii package contained three diskettes three different versions game apple ii+ apple iie separate dos 3.3 prodos diskettes apple iigs diskette none copy-protected included documentation specifically charged purchaser honor give away copy extra diskettes unsure publish game fearful response soviet regime pajitnov took opportunity offered perestroika gave rights soviet government ten years 1988 soviet government began market rights tetris following promotional trip country gerald hicks one-time united states champion game organization called elektronorgtechnica elorg short time elorg still paid andromeda andromeda licensing sub-licensing rights game different version tetris originally released late 1988 bullet-proof software bps several japanese home computers well msx family computer japan predating nintendo version unlicensed arcade version released south korea well unlicensed master system titled super tetris 슈퍼 테트리스 syupeo teteuriseu 1989 half dozen different companies claimed rights create distribute tetris software home computers game consoles handheld systems elorg meanwhile held none companies legally entitled produce arcade version signed rights atari games signed non-japanese console handheld rights nintendo tetris show january 1988 consumer electronics show las vegas picked dutch games publisher henk rogers based japan eventually led agreement brokered nintendo saw tetris bundled every game boy rogers later stated tetris made game boy game boy made tetris tengen console software division atari games regardless applied copyright tetris game nintendo entertainment system loosely based arcade version proceeded market distribute name tetяis soviet mind game faux cyrillic typography incorporating cyrillic letter ya disregarding nintendo license elorg nintendo contacted atari games claiming stolen rights tetris whereupon atari games sued believing rights four weeks shelf courts ruled nintendo company rights tetris home game systems tengen tetяis recalled unknown number copies sold lawsuits tengen nintendo nes version carried 1993 tengen version tetяis considered rare nintendo released version tetris nintendo entertainment system nes developed gunpei yokoi nes version sold 8 million copies worldwide nintendo nes version lacked side-by-side 2-player option featured tengen version nintendo power reviewed version november december 1989 edition classic tetris world championship commenced 2010 uses nintendo version tetris nintendo released game super nintendo entertainment system snes along dr mario new version used different colors older versions makes squares look connected version similar version released nes february 13 2019 nintendo announced released new version classic game called tetris 99 tetris 99 features battle royale-style game mode 99 players play match addition complying tetris guideline version game features unique mechanic known badges badges lessen severity attacks received amplifies attacks sent players gain badges knocking others tetris 99 available nintendo switch 1988 arcade version released sega japan sega system 16 system e arcade boards japanese gamest award game year following year version sega mega drive originally planned release japan pulled following licensing issues resulting less ten copies printed new port arcade version m2 unrelated rare mega drive version included sega genesis mini microconsole scheduled release september 2019 sega arcade version commercially successful japanese arcades famicom tsūshin arcade earnings chart number-three august 1989 september 1989 rose number two october 1989 overtaking namco racing video game winning run 2014 conjunction 30th anniversary series sega released puyo puyo tetris multi-platform game blends gameplay elements tetris puyo puyo franchises 1996 rights game reverted russian state pajitnov previously made little money game year tetris company founded claiming hold copyright registrations tetris products u.s. taking trademark registrations tetris almost every country world licensed brand number companies u.s. court international trade u.s. customs times issued seizure orders preclude unlicensed tetris -like games imported u.s. though bulletins circulated u.s copyright office state copyright apply rules game late 1997 mid-2006 ttc legal counsel sent cease desist letters web sites basis tetris -type games infringing tetris trademark trade dress and/or look feel copyright around 2009 ttc tetris holding llc brought legal action biosocia inc. grounds biosocia blockles game infringed proprietary rights held ttc tetris holding llc september 10 2009 legal case biosocia resolved biosocia agreeing discontinue making blockles game available public may 2010 ttc legal counsel sent cease desist letters google insisting 35 tetris clones removed android market us district court judge ruled june 2012 tetris clone mino xio interactive infringed tetris company copyrights replicating elements playfield dimensions shapes blocks addition ruled tetris holding llc trade dress infringed mino replicated form brightly colored style tetris tetriminos higher-than-wide rectangular tetris playfield based success tetris 99 tetris company n3twork developing tetris royale ios android version tetris include battle royale mode 100 players along solo multiplayer modes expected release 2019 tetris subject many changes throughout releases since 1980s newer tetris games emphasized pace rather endurance older releases game boy nes tetris offer records according points since meter points restricted specific number digits games records maxed experienced player next big game boy release tetris tetris dx marathon mode—comparable mode previous releases—allowed additional digit point meter even players still maxed 9,999,999 points hours play new tetris world record competitors spent 12 hours playing game tetris dx new tetris new modes sprint ultra added modes require player act timer either gain lines points time releases like tetris worlds removed point records particular game kept records fast certain number lines could cleared depending level critics tetris worlds said flawed virtue ability piece hover bottom long player needs many different modes play added recent years modes appearing one major release include classic marathon game sprint otherwise game b 40 lines ultra square cascade field dimension tetris perhaps least deviated among releases almost always 10 cells wide 20 high releases handheld platforms small screens smaller fields example tetris jr. keychain game 8 12 tetris game boy 10 18 traditionally blocks spawn within four central columns two highest rows tetrimino occupies columns 4 5 6 7 tetrimino occupies columns 5 6 remaining 5 tetriminos occupy columns 4 5 6 especially older versions 5 6 7 recent games pieces spawn visible playfield traditional games level-up would occur every ten lines cleared newer games tetris worlds number lines required varies upon new level level-up points awarded increased blocks fall slightly faster example nes tetris operates 60 frames per second level 0 piece falls one step every 48 frames level 19 piece falls one step every 2 frames level increments either terminate certain point game boy tetris tops level 20 increase forever yet speed certain point nes tetris level speed level 29 due limitations game engine pieces capable dropping faster tool-assisted emulation show level indicator increases indefinitely—eventually leading glitch meter displays non-numeric characters modern games tetris grand master tetris worlds highest levels opt drop piece one row per frame pieces appear reach bottom soon spawn result games delay lets player slide piece bottom moment help deal otherwise unplayable fall speed games hover time regenerated piece moved rotated soft drops first implemented nintendo releases tetris pieces would able drop faster locking slide gaps option hard dropping originated early pc games microsoft tetris game developed dave edson bundled microsoft entertainment pack hard dropping piece falls locks one frame newer tetris games feature options games locking roles reversed soft dropping making pieces drop faster locking hard dropping making pieces drop instantly lock single direction rotation older restriction since ruled nearly every new official release favor separate buttons clockwise one counter clockwise rotation traditional games unsymmetrical vertical orientation i- z- s-pieces fill columns clockwise counter clockwise rotation games vary allowing two possible column orientations one counter clockwise one clockwise rotations double rotation—only seen progressive clones quadra dtet —rotates piece 180° one features appreciated skilled players wall kick ability rotate pieces even touch left right walls nes version example z piece vertically aligned falling touching left wall player rotate piece giving impression rotate buttons locked situation player move piece one position right rotating losing precious time proper implementations wall kick first appeared arcade version tetris atari games piece preview allows look next piece enter field feature implemented since earliest games though early games preview turned made score increase slowly several tetris variants exist feature alternate rules pieces feature alternate topologies dimensions others completely different gameplay popular variant called grand master eventually becomes fast players use every second time optimally even mode dubbed invisible tetris blocks shown falling – revealed game popularity relatively simple code required produce game game nearly rules tetris often used hello world project programmers coding new system programming language resulted availability large number ports different platforms instance µtorrent gnu emacs contain similar shape-stacking games easter eggs players lose typical game tetris longer keep increasing speed player find appropriate solution tetriminos 've given tetriminos stack top playing field commonly referred topping question would possible play forever first considered thesis john brzustowski 1992 conclusion reached game statistically doomed end reason z tetriminos player receives sufficiently large sequence alternating z tetriminos naïve gravity used standard game eventually forces player leave holes board holes necessarily stack top ultimately end game pieces distributed randomly sequence eventually occur thus game example ideal uniform uncorrelated random number generator played long enough player top practice occur tetris variants variants allow player choose play z tetriminos good player may survive well 150 consecutive tetriminos way implementation ideal uniform randomizer probability given time next 150 tetriminos z approximately implementations use pseudorandom number generator generate sequence tetriminos s–z sequence almost certainly contained sequence produced 32-bit linear congruential generator many implementations roughly states evil algorithm bastet unofficial variant often starts game series seven z pieces modern versions tetris released 2001 use bag-style randomizer guarantees players never receive four z pieces row one indispensable rules enforced tetris guideline officially licensed tetris games must follow recent versions tetris tetris worlds allow player repeatedly rotate block hits bottom playfield without locking place see easy spin dispute permits player play infinite amount time though necessarily land infinite number blocks computer science common analyze computational complexity problems including real life problems games proven offline version tetris player knows complete sequence pieces dropped i.e hidden information following objectives np-complete also difficult even approximately solve first second fourth problem np-hard given initial gameboard sequence p pieces approximate first two problems within factor constant np-hard approximate last problem within factor constant prove np-completeness shown polynomial reduction 3-partition problem also np-complete tetris problem atari arcade version tetris nes port subsidiary tengen original pieces composed brad fuller well traditional russian tunes also arranged fuller according research dr. richard haier et al prolonged tetris activity also lead efficient brain activity play first playing tetris brain function activity increases along greater cerebral energy consumption measured glucose metabolic rate tetris players become proficient brains show reduced consumption glucose indicating efficient brain activity task moderate play tetris half-an-hour day three months boosts general cognitive functions critical thinking reasoning language processing increases cerebral cortex thickness january 2009 oxford university research group headed dr. emily holmes reported plos one healthy volunteers playing tetris soon viewing traumatic material laboratory reduced number flashbacks scenes following week believe computer game may disrupt memories retained sights sounds witnessed time later re-experienced involuntary distressing flashbacks moment group hopes develop approach potential intervention reduce flashbacks experienced post-traumatic stress disorder emphasized preliminary results professor jackie andrade jon may plymouth university cognition institute ph.d. student jessica skorka-brown conducted research shows playing tetris could give quick manageable fix people struggling stick diets quit smoking drinking another notable effect according canadian study april 2013 playing tetris found treat older adolescents amblyopia lazy eye better patching victim well eye train weaker eye dr. robert hess research team said much better patching – much enjoyable faster seems work better. tested united kingdom experiment also appears help children problem game noted cause brain involuntarily picture tetris combinations even player playing tetris effect although occur computer game situation showcasing repeated images scenarios jigsaw puzzle debates tetris cognitive benefits continue least researchers view milestone gamification education 2013 tetris company signed contract hasbro make bop jenga themed version tetris games shown new york toy fair bop tetris sold amazon.com june 2013 jenga tetris like jenga using tetris shapes bop tetris audio game several game modes including marathon pass marathon mode player four lives complete puzzles square lights game unit three actions slam slams top part device slide screen rotate left right spin device spin player fails complete puzzle voice buddy rubino make santa claus type laugh encourage player comment squares man 're squares shapes hard buddy say life lost one four squares top screen disappear every stage completed buddy tell player comment level 45-second bonus round player score two bonus points pass mode marathon mode except buddy rubino say pass let people join compute called ibm version tetris one addictive computer games side berlin wall ... game start work appointment keep consider warned orson scott card joked game proves russia still wants bury us shudder think blow economy computer productivity drops 0 noting tetris copy-protected wrote obviously game meant find way onto every american machine ibm version game reviewed 1988 dragon 135 hartley patricia kirk lesser role computers column reviewers gave game 4.5 5 stars lessers later reviewed spectrum holobyte macintosh version tetris 1989 dragon 141 giving version 5 5 stars 1993 zx spectrum version game voted number 49 sinclair official top 100 games time 1996 tetris pro ranked 38th best game time amiga power entertainment weekly picked game 8 greatest game available 1991 saying thanks nintendo ’ endless promotion tetris become one popular video games computer gaming world gave tetris 1989 compute choice award arcade game describing far addictive game ever game three software publishers association excellence software awards 1989 including best entertainment program critic choice award consumers computer gaming world 1996 ranked 14th magazine list innovative computer games year next generation listed number 2 top 100 games time commenting something perfect zen falling blocks tetris game captured interest everyone ever played march 12 2007 new york times reported tetris named list ten important video games time so-called game canon announced 2007 game developers conference library congress took video game preservation proposal began 10 games including tetris 2007 video game website gamefaqs hosted sixth annual character battle users nominate favorite video game characters popularity contest characters participate l-shaped tetris piece l-block called entered contest joke character november 4 2007 contest june 6 2009 google honored tetris 25-year anniversary changing logotype version drawn tetris blocks – l letter long tetris block lowering place seen 2009 game informer put tetris 3rd list top 200 games time saying game could considered ageless tetris game informer staff also placed third 2001 list 100 best games ever electronic gaming monthly 100th issue tetris first place greatest game time 2007 tetris came second place ign 100 greatest video games time january 2010 announced tetris franchise sold 170 million copies approximately 70 million physical copies 100 million copies cell phones making best-selling paid-downloaded game time 1991 pc format named tetris one 50 best computer games ever editors called incredibly addictive one best games time guinness world records recognized game ported history video gaming appearing excess 65 different platforms 2011 tetris subject academic research vladimir pokhilko first clinical psychologist conduct experiments using tetris subsequently used research several fields including theory computation algorithmic theory cognitive psychology game tetris blocks appear adsorb onto lower surface window led scientists use tetrominoes proxy molecules complex shape model adsorption flat surface study thermodynamics nanoparticles threshold entertainment teamed tetris company develop film adaptation tetris threshold ceo describes film epic sci-fi adventure film says story big 'll part trilogy 2016 sources reported press release claiming film would shot china 2017 80 million budget however 2017 later sources confirm film ever actually went production tetris appeared 2010 short animated film pixels 2015 movie pixels inspired former
|
Computer architecture
|
kdump linux kdump feature linux kernel creates crash dumps event kernel crash triggered kdump exports memory image also known vmcore analyzed purposes debugging determining cause crash dumped image main memory exported executable linkable format elf object accessed either directly handling kernel crash automatically saved locally accessible file system raw device remote system accessible network event kernel crash kdump preserves system consistency booting another linux kernel known dump-capture kernel using export save memory dump result system boots clean reliable environment instead relying already crashed kernel may cause various issues causing file system corruption writing memory dump file implement dual kernel layout kdump uses kexec booting dump-capture kernel immediately kernel crash using kexec ability boot currently running kernel avoiding execution bootloader hardware initialization performed system firmware bios uefi dump-capture kernel either separate linux kernel image built specifically purpose primary kernel image reused architectures support relocatable kernels contents main memory ram preserved booting running dump-capture kernel reserving small amount ram advance dump-capture kernel preloaded none ram used primary kernel overwritten kernel crash handled reserved amount ram used solely dump-capture kernel otherwise unused normal system operation architectures including x86 ppc64 require small fixed-position portion ram boot kernel regardless loaded case kexec creates copy portion ram also accessible dump-capture kernel size optional position reserved portion ram specified kernel boot parameter command-line utility used primary kernel boots preload dump-capture kernel image associated initrd image reserved portion ram addition functionality part linux kernel additional userspace utilities support kdump mechanism including utility mentioned besides official utilities provided patch kexec suite userspace utilities linux distributions provide additional utilities simplify configuration kdump operation including setup automated saving memory dump files created memory dump files analyzed using gnu debugger using red hat dedicated utility kdump functionality together kexec merged linux kernel mainline kernel version 2.6.13 released august 29 2005
|
Operating systems
|
apple disk image apple disk image disk image format commonly used macos operating system opened apple disk image mounted volume within macintosh finder apple disk image structured according one several proprietary disk image formats including universal disk image format udif new disk image format ndif apple disk image file name usually .dmg extension apple disk image files published mime type application/x-apple-diskimage different file systems contained inside disk images also support creating hybrid optical media images contain multiple file systems file systems supported include hierarchical file system hfs hfs plus file allocation table fat iso9660 universal disk format udf apple disk images created using utilities bundled mac os x specifically disk copy mac os x v10.2 earlier disk utility mac os x v10.3 later utilities also use apple disk image files images burning cds dvds disk image files may also managed via command line interface using hdiutil utility mac os x v10.2.3 apple introduced compressed disk images internet-enabled disk images use apple utility disk copy later integrated disk utility 10.3 disk copy application ability display multi-lingual software license agreement mounting disk image image mounted unless user indicates agreement license apple disk image allows secure password protection well file compression hence serves security file distribution functions disk image commonly used distribute software internet apple originally created disk image formats resource fork used mac applications could easily transferred mixed networks make internet even use resource forks declined mac os x disk images remained standard software distribution format disk images allow distributor control finder presentation window commonly used instruct user copy application correct folder previous version format intended floppy disk images usually referred disk copy 4.2 format version disk copy utility used handle images similar format supported compression floppy disk images called dart new disk image format ndif previous default disk image format mac os 9 disk images format generally .img confused raw .img disk image files .smi file extension files .smi extension actually applications mount embedded disk image thus self mounting image intended mac os 9 earlier universal disk image format udif native disk image format mac os x disk images format typically .dmg extension apple released documentation format attempts reverse engineer parts format successful encrypted layer reverse engineered implementation called vilefault spoonerism filevault apple disk image files essentially raw disk images i.e contain block data added metadata optionally one two layers applied provide compression encryption hdiutil layers called cudifencoding cencryptedencoding udif supports adc old proprietary compression format apple zlib bzip2 mac os x v10.4 lzfse mac os x v10.11 compression internally trailer described using following c structure values big-endian powerpc byte ordering explanation options available extract files mount proprietary apple disk image format cross-platform conversion utilities windows dmg images opened using several programs ultraiso isobuster macdrive also mount simple dmg files drives windows sparse disk encrypted dmgs free apple dmg disk image viewer also exists linux possibly unix flavors .dmg files burned cd/dvd using cd-burner program using cdrecord directly front-end k3b brasero directly mounted mountpoint e.g darling-dmg fuse module enabling easy dmg file mounting linux
|
Operating systems
|
amp cybersecurity cybersecurity developer commercial open source solutions manage cyber attacks including open threat exchange world largest crowd-sourced computer-security platform july 2017 platform 65,000 participants contributed 14 million threat indicators daily company raised 116 million since founded 2007 july 10 2018 acquired communications becoming wholly owned subsidiary transaction completed august 22 2018 february 2019 alienvault renamed cybersecurity ossim project began 2003 started dominique karg julio casal ignacio cabrera alberto román became basis alienvault founded 2007 madrid spain company hired management team hewlett packard fortify group 2012 including alienvault ceo barmak meftah cto roger thornton five others 2015 company partnered intel coordinate real-time threat information similar deal hewlett packard announced year 2015 alienvault researchers released study disclosing chinese hackers circumventing popular privacy tools june 2015 alienvault chief scientist jaime blasco released report saying chinese hackers found way circumvent virtual private networks vpns tor anonymity software hides computer ’ location routing requests series internet service providers alienvault open threat exchange 26,000 participants 140 countries reporting one million potential threats daily june 2015 february 2017 alienvault released usm anywhere saas security monitoring platform designed centralize threat detection incident response compliance management cloud hybrid cloud on-premises environments cloud-based console july 2017 alienvault open threat exchange platform 65,000 participants contributed 14 million threat indicators daily july 10 2018 announced acquire alienvault undisclosed amount acquisition completed august 22 2018 company became subsidiary communications unit february 26 2019 alienvault renamed cybersecurity addition free products cybersecurity offers paid security platform called unified security management integrates threat detection incident response compliance management one solution threat applications offered via hardware virtual machines cloud service open threat exchange otx free enables security experts research collaborate new threats better compare data integrate threat information security systems big data platform otx leverages natural language processing machine learning cybersecurity also runs open source security information management ossim project helps network administrators computer security intrusion detection response august 2015 firm raised 52 million expand security business round led institutional venture partners included ggv capital kleiner perkins trident capital jackson square ventures company said 2015 adding 300 400 new clients quarter hired chief financial officer help prepare possible initial public offering ipo end fiscal year 2016 alienvault recorded 53 percent year-over-year sales growth increased install base 65 percent approximately 5,000 commercial customers alienvault raised 116 million since founded 2007 2017 alienvault best cloud computing security solution emea presented sc magazine uk year forbes featured alienvault forbes cloud 100 list deloitte featured alienvault deloitte technology fast 500 list 2015 2016 2015 alienvault advanced persistent threat apt solution year presented computing security awards 2014 alienvault nominated “ best smb security product ” jaime blasco director alienvault labs nominated “ technology hero year ” v3 technology industry publication alienvault competes siem network security industry hp arcsight ibm qradar logrhythm among others
|
Computer security
|
presidential policy directive 20 presidential policy directive 20 ppd-20 provides framework u.s. cybersecurity establishing principles processes signed president barack obama october 2012 directive supersedes national security presidential directive nspd-38 integrating cyber tools national security directive complements nspd-54/homeland security presidential directive hspd-23 classified unreleased national security agency nsa nspd-54 authorized george w. bush gives u.s. government power conduct surveillance monitoring existence made public june 2013 former intelligence nsa infrastructure analyst edward snowden private industry issues surrounding international domestic law public-private-partnership became cornerstone america cybersecurity strategy suggestions private sector detailed declassified 2003 national strategy secure cyberspace companion document national security presidential directive nspd-38 signed secret george w. bush following year although contents nspd 38 still undisclosed u.s. military recognize cyberspace theater operations u.s. national defense strategy 2005 report declared ability operate global commons-space international waters airspace cyberspace important ... project power anywhere world secure bases operation three years later george w. bush formed classified comprehensive national cybersecurity initiative cnci citing economic national security obama administration prioritized cybersecurity upon taking office in-depth review communications information infrastructure cnci partially declassified expanded president obama outlines key elements broader updated national u.s. cybersecurity strategy 2011 pentagon announced capability run cyber attacks u.s. senate failed pass cybersecurity act 2012 august presidential policy directive 20 ppd-20 signed secret electronic privacy information center epic filed freedom information request see nsa would comply details reported november 2012 washington post wrote ppd-20 extensive white house effort date wrestle constitutes 'offensive 'defensive action rapidly evolving world cyberwar cyberterrorism following january obama administration released ten-point factsheet june 7 2013 ppd-20 became public released edward snowden posted guardian part 2013 mass surveillance disclosures u.s. factsheet claims ppd-20 acts within law consistent values promote domestically internationally previously articulated international strategy cyberspace n't reveal cyber operations directive snowden disclosure called attention passages noting cyberwarfare policy possible consequences directive calls defensive offensive measures defensive cyber effects operations dceo offensive cyber effects operations oceo respectively
|
Computer security
|
gnewsense gnewsense linux distribution based debian developed sponsorship free software foundation goal user-friendliness proprietary e.g binary blobs non-free software removed free software foundation considers gnewsense composed entirely free software gnewsense takes relatively strict stance proprietary software example documentation gives instructions installing proprietary software excluded project launched brian brazil paul o'malley 2006. gnewsense originally based ubuntu since 1.0 release free software foundation assists gnewsense releases two years 8 august 2011 distrowatch classified gnewsense dormant september 2012 distrowatch changed status active 6 august 2013 first version directly based debian gnewsense 3 parkes released discussions trisquel forums gnewsense said inactive gnewsense activities 2017 default gnewsense uses gnome graphical user interface customized user choice x display manager window managers desktop environments available install hosted repositories ubiquity installer allows installing hard disk within live cd environment without need restarting computer prior installation besides standard system tools small applications gnewsense comes installed following software libreoffice productivity suite gnome web internet browser empathy instant messenger gimp editing photos raster graphics common software development tools including gcc installed default live cd used run operating system install onto disk cd images available download gnewsense made four major releases 2016 gnewsense announced next version gnewsense would 5.0 non-free software repositories provided gnewsense project non-free documentation artwork removed based ubuntu universe package repository enabled default order avoid trademark problems stem modification mozilla firefox gnewsense 1.1 rebranded burningdog burningdog likewise offer install non-free plugins various web media adobe flash gnewsense 2.0 abandoned burningdog adopted epiphany web browser later renamed simply web component gnome default browser application came recommendations instructions optionally compile run gnu icecat gnewsense 3.0 retains web default browser also comes modified version debian iceweasel offer access proprietary add-ons debian another linux distribution known strict licensing requirements adherence free software principles debian gnewsense rigorously exclude non-free software binary blobs official releases debian maintains hosts unofficial repositories non-free software firmware binaries debian free software sometimes depends upon suggests optional installation proprietary software theory users informed discretion use software paramount expressed clause 5 debian social contract though debian democratic project management seen stance become source recurrent controversy gnewsense contrast provide packages depend suggest use non-free software firmware extensions plugins gnewsense project provide convenience-access proprietary software reason seeing abrogation commitment development free software solutions similar debian gnewsense policies allow including documentation licensed gnu free documentation license invariant sections includes many manuals documentation released gnu project gnewsense initially forked ubuntu originally fork debian result founding developer paul o'malley prior work ubuntu gnewsense 3.0 distribution tracked debian base software distribution part debian project carefully disaggregate free software official distribution proprietary software provides courtesy access indeed many packages including debian-particular packages iceweasel icedove ported gnewsense simply modified way longer provide courtesy access non-free software options since gnewsense repositories contain free software support hardware requires firmware free firmware exists wireless network cards available may 1 2008 3d graphics application support also removed licensing issues mesa 3d january 13 2009 issues resolved 3d support became standard starting 2.2 release reviewing gnewsense 3.0 august 2013 jesse smith distrowatch noted many applications provided including openoffice.org 3 debian de-blobbed 2.6.32 linux kernel based linux-libre tools iceweasel 3.5 gnome 2.30 quite date smith concluded review following words generally speaking happy gnewsense 3.0 based debian distribution counted provide stability amazing performance distribution lean fast uncluttered flip side gnewsense system installer default package management tools geared toward experienced users probably provide steep learning curve novice linux users much automated minimum hand holding main feature gnewsense lack proprietary software also double-edged blade one hand means entire operating system audited modified redistributed great perspective software freedom fact distribution play multimedia formats handled flash content fairly well testament power free open source software one problem ran gnewsense software policy regards wireless network card distributions ship non-free intel firmware gnewsense n't include means distribution n't good fit laptop hand great match desktop system richard stallman founder president free software foundation said used gnewsense january 2010 still using april 2014 since stallman switched trisquel serdar yegulalp reviewed gnewsense infoworld said post network world gnewsense 3.1 february 2014 bryan lunduke reviewed linux distribution following words
|
Operating systems
|
cone software cone text-based e-mail client news client unix-like operating systems developed courier mail server developers name stands console newsreader emailer notable features include support unicode support smap
|
Internet protocols
|
acorn archimedes acorn archimedes family personal computers designed acorn computers ltd cambridge england sold late-1980s mid-1990s acorn first general-purpose home computer based arm architecture first archimedes launched 1987 arm risc design 32-bit cpu using 26-bit addressing running 8 mhz stated achieving 4.5+ mips provided significant upgrade 8-bit home computers acorn previous machines claims fastest micro world running 18 mips also made tests models family omitted either acorn archimedes part name first models named bbc archimedes yet name acorn archimedes commonly used describe acorn contemporary designs based architecture archimedes machines longer sold computers raspberry pi still run operating system risc os least later versions use arm chips mostly compatible acorn archimedes first risc-based home computer first models released june 1987 300 400 series 400 series included four expansion slots although two slot backplane could added 300 series official upgrade third parties produced 4-slot backplanes st-506 controller internal hard drive models included arthur operating system later replaced risc os paid-for upgrade bbc basic programming language emulator acorn earlier bbc micro mounted two-part cases small central unit monitor top separate keyboard three-button mouse middle one used pop-up context menus operating system models featured eight-channel 8-bit stereo sound capable displaying 256 colours screen three models initially released different amounts memory a305 a310 a440 soon replaced a410/1 a420/1 a440/1 featured upgraded memc1a a540 supported 16mib ram included higher speed scsi provision connecting genlock devices unveiled september 1990 300 400 followed number machines minor changes upgrades work began successor arthur operating system initially named arthur 2 renamed risc os 2 new computers shipped pre-installed number new machines introduced along risc os 2 may 1989 300 series phased favour new acorn a3000 400 series kept production earlier models shipped arthur could upgraded risc os 2 replacing rom chips containing operating system a3000 used 8 mhz arm2 supplied ram unlike previous models a3000 came single-part case similar bbc micro amiga 500 atari st computers keyboard integrated base unit kind housing consumes lot desktop space problem acorn tried overcome offering monitor stand attached base unit new model sported single internal expansion slot physically different earlier models although electronically similar external connector could interface existing expansion cards although really needed housed external case joined main unit a300 series a400 series r140 a3000 machines vidc1a video chip provided wide variety screen resolutions provided officially operating system chip could made run others palette range 4096 colours 12-bit vidc1a 16 hardware palette registers meant screen modes sixteen colours fewer colours could mapped 4096 available however 256 colour modes 4 bits colour data hardware derived could adjusted net result 256 colours 16 could assigned desired covering range 4096 available colours also horizontal sync interrupt meaning difficult display additional colours changing palette scan line impossible thanks 2 mhz ioc timer 1 many demos managed display 4096 colour screen dithering also one hardware sprite 32 pixels width unlimited height default used mouse pointer pixel coded two bits value 0 transparency three others freely chosen 4096 colour palette 1991 a5000 launched featured new 25 mhz arm3 processor 2 4 mb ram either 40 mb 80 mb hard drive conventional pizza box-style two-part case hxwxd 100 mm × 430 mm × 340 mm enhanced video capabilities allowed a5000 comfortably display vga resolutions 800×600 pixels first archimedes feature high density capable floppy disc drive standard natively supported various formats including dos atari discs risc os adfs floppy format relatively large capacity 800 kb double low density 1600 kb high density later version a5000 featured 33 mhz arm3 4 8 mb ram 80 120 mb hard drive a5000 initially ran new 3.0 version risc os although several bugs identified shipped risc os 3.10 3.11 earlier machines capable upgraded new risc os 3 though needed additional daughterboard installed first earlier models could also benefit video performance a5000 via third party upgrade 1992 new range produced utilising first arm system-on-chip arm250 microprocessor single-chip design including functionality arm3 chip without cache ioc1 input output controller vidc1a video sound controller memc1a memory controller chips integrated one chip increase clock frequency 8 mhz 12 mhz gave performance 7 mips machines supplied risc os 3.10 3.11 a30x0 series one-piece design similar a3000 far smaller a4000 looked like slightly slimmer a5000 a3010 model intended home computing machine featuring tv modulator standard 9-pin joystick ports a3020 targeted home office educational markets featuring built-in 2.5 hard drive dedicated network interface socket technically a4000 almost identical a3020 differing hard disk size 3.5-inch a4000 though sported different appearance three arm250-based machines could upgraded 4 mb plug-in chips though a3010 designed 2 mb third party upgrades overcame one mini-podule slot used internal expansion a3000 also 1992 acorn introduced a4 laptop computer featuring slower 24 mhz compared 25 mhz a5000 version arm3 processor lcd screen capable displaying maximum resolution 15 levels grey however feature monitor port offered display capabilities a5000 notable omission machine built-in pointing device requiring users navigate cursor keys attach conventional acorn three-button mouse a7000 despite name reminiscent archimedes naming conventions actually similar riscpc line risc os computers succeeded archimedes 1994 lacked however debi expansion slots multi-slice case characterized riscpc though removing cdrom backplane one slot could fitted also produced never sold commercially archimedes one powerful home computers available late 1980s early 1990s main cpu faster motorola 68000 microprocessors found popular amiga atari st machines 68000 average performance roughly 16-bit workloads 32-bit workloads peak performance simpler 16-bit instructions yielded 32-bit workloads repeatable benchmark tests computer exhibited 1987 personal computer world show along amiga atari st video game consoles commenting show crash magazine reported despite whiz-bang demos acorn ’ archimedes 8-bit machines dead archimedes significant market share education markets uk ireland australia new zealand success archimedes british schools due partly predecessor bbc micro later computers schools scheme organised tesco supermarket chain association acorn students pupils countries early 1990s exposed archimedes a-series computer archimedes range available us canada via olivetti canada mid late 1990s uk educational market began turn away archimedes apple macintosh computers ibm compatible pcs eclipsed archimedes multimedia capabilities led erosion archimedes market share tesco computers schools scheme later changed partnership acorn rm plc many computer-related suppliers also led decrease archimedes educational market share acorn gradually moved focus away computers instead began exploiting lucrative arm processor technology separate enterprise spin arm holdings founded 1990 1994 2008 model superseding archimedes computer riscpc also used television broadcast automation programmed company named omnibus systems ltd uk original desktop models custom made 19-inch rack models used control/automate multiple television broadcast devices manufactures way unusual time used several large european television stations including bbc nrk tmf nl uk also 1994 2004 archimedes riscpc models used teleprompters television studios hardware easy adapt tv broadcast use cheaper hardware available time
|
Computer architecture
|
hostapd hostapd host access point daemon user space daemon software enabling network interface card act access point authentication server three implementations jouni malinen hostapd openbsd hostapd devicescape hostapd jouni malinen hostapd user space daemon access point authentication servers used create wireless hotspot using linux computer implements ieee 802.11 access point management ieee 802.1x/wpa/wpa2/eap authenticators radius client eap server radius authentication server current version supports linux host ap madwifi prism54 drivers use kernel mac80211 subsystem qnx freebsd net80211 dragonflybsd openbsd hostapd user space daemon helps improve roaming monitoring openbsd-based wireless networks implements inter access point protocol iapp exchanging station association information access points trigger set actions like frame injection logging receiving specified ieee 802.11 frames open wireless linux version hostapd kept close possible original open source release owl specific packaging defaults website appears dead april 2013 probably project
|
Operating systems
|
signalling connection control part signalling connection control part sccp network layer protocol provides extended routing flow control segmentation connection-orientation error correction facilities signaling system 7 telecommunications networks sccp relies services mtp basic routing error detection base sccp specification defined itu-t recommendations q.711 q.714 additional information implementors provided q.715 q.716 however regional variations defined local standards bodies united states ansi publishes modifications q.713 ansi t1.112 ttc publishes jt-q.711 jt-q.714 europe etsi publishes etsi en 300-009-1 document modifications itu-t specifications although mtp provides routing capabilities based upon point code sccp allows routing using point code subsystem number global title point code used address particular node network whereas subsystem number addresses specific application available node sccp employs process called global title translation determine point codes global titles instruct mtp route messages sccp messages contain parameters describe type addressing used message routed sccp provides 4 classes protocol applications connectionless protocol classes provide capabilities needed transfer one network service data unit nsdu data field xudt ludt udt message one connectionless message sufficient convey user data contained one nsdu segmenting/reassembly function protocol classes 0 1 provided case sccp originating node relay node provides segmentation information multiple segments prior transfer data field xudt network option ludt messages destination node nsdu reassembled connection-oriented protocol classes protocol classes 2 3 provide means set signalling connections order exchange number related nsdus connection-oriented protocol classes also provide segmenting reassembling capability nsdu longer 255 octets split multiple segments originating node prior transfer data field dt messages segment less equal 255 octets destination node nsdu reassembled sccp class 0 protocol class basic sccp protocol classes network service data units passed higher layers sccp originating node delivered sccp higher layers destination node transferred independently therefore may delivered sccp user out-of-sequence thus protocol class corresponds pure connectionless network service connectionless protocol network connection established sender receiver sccp class 1 builds capabilities class 0 addition sequence control parameter nsdu allows sccp user instruct sccp given stream messages delivered sequence therefore protocol class 1 corresponds enhanced connectionless protocol assurances in-sequence delivery sccp class 2 provides facilities class 1 also allows entity establish two-way dialog another entity using sccp class 3 service builds upon class 2 also allows expedited urgent messages sent received errors sequencing segment re-assembly detected sccp restart connection occur sigtran suite protocols two primary methods transporting sccp applications across internet protocol networks sccp transported indirectly using mtp level 3 user adaptation protocol m3ua protocol provides support users mtp-3—including sccp alternatively sccp applications operate directly sccp user adaptation protocol sua form modified sccp designed specifically use ip networking itu-t also provides transport sccp users internet protocol using generic signalling transport service specified q.2150.0 signalling transport converter sctp specified q.2150.3 specialized transport-independent signalling connection control part ti-sccp specified t-rec-q.2220 ti-sccp also used generic signalling transport adapted mtp3 mtp3b described q.2150.1 adapted sscop sscopmce described q.2150.2
|
Internet protocols
|
structural vulnerability computing computing structural vulnerability system weakness consists several so-called component vulnerabilities type weakness generally emerges due several system architecture flaws example structural vulnerability person working critical part system security training ’ follow software patch cycles likely disclose critical information phishing attack
|
Computer security
|
sieve mail filtering language sieve programming language used email filtering owes creation cmu cyrus project creators cyrus imap server language tied particular operating system mail architecture requires use rfc 2822-compliant messages otherwise generalize systems meet criteria current version sieve base specification outlined rfc 5228 published january 2008 sieve data-driven programming language similar earlier email filtering languages procmail maildrop earlier line-oriented languages sed awk specifies conditions match actions take matching differs general-purpose programming languages highly limited – base standard variables loops allow conditional branching preventing runaway programs limiting language simple filtering operations although extensions devised extend language include variables limited degree loops language still highly restricted thus suitable running user-devised programs part mail system also significant number restrictions grammar language order reduce complexity parsing language language also supports use multiple methods comparing localized strings fully unicode-aware sieve scripts may generated gui-based rules editor may entered directly using text editor scripts transferred mail server server-dependent way managesieve protocol defined rfc 5804 allows users manage sieve scripts remote server mail servers local users may allow scripts stored e.g .sieve file users home directories language standardized now-obsolete rfc 3028 january 2001 tim showalter ietf sieve working group updated base specification 2008 rfc 5228 brought following extensions proposed standard status number extensions still developed sieve working group example sieve script
|
Computer security
|
panama papers panama papers 11.5 million leaked documents detail financial attorney–client information 214,488 offshore entities documents dating back 1970s created taken panamanian law firm corporate service provider mossack fonseca leaked 2015 anonymous source documents contain personal financial information wealthy individuals public officials previously kept private offshore business entities legal see offshore magic circle reporters found mossack fonseca shell corporations used illegal purposes including fraud tax evasion evading international sanctions john doe whistleblower leaked documents german journalist bastian obermayer newspaper süddeutsche zeitung sz remains anonymous even journalists worked investigation life danger told may 6 2016 statement john doe cited income inequality reason action said leaked documents simply understood enough contents realize scale injustices described added never worked government intelligence agency expressed willingness help prosecutors granted immunity prosecution sz verified statement fact come source panama papers international consortium investigative journalists icij posted full document website sz asked icij help amount data involved journalists 107 media organizations 80 countries analyzed documents detailing operations law firm year analysis first news stories published april 3 2016 along 150 documents project represents important milestone use data journalism software tools mobile collaboration documents dubbed panama papers country leaked however panamanian government expressed strong objections name concerns would tarnish government country image worldwide entities panama elsewhere led advertising campaign weeks leak titled panama papers media outlets covering story used name mossack fonseca papers addition much-covered business dealings british prime minister david cameron icelandic prime minister sigmundur davíð gunnlaugsson leaked documents also contain identity information shareholders directors 214,000 shell companies set mossack fonseca well financial transactions generally law offshore shell company although offshore shell companies may sometimes used illegal purposes journalists investigative team found business transactions many important figures world politics sports art many transactions legal since data incomplete questions remain many cases still others seem clearly indicate ethical legal impropriety disclosures – tax avoidance poor countries wealthy entities individuals example – lead questions moral grounds according namibian instance shell company registered beny steinmetz octea owes 700,000 us property taxes city koidu sierra leone 150 million red even though exports twice average month 2012–2015 period steinmetz personal worth 6 billion offshore shell company transactions described documents seem broken exchange laws violated trade sanctions stemmed political corruption according icij reporters example named leak 12 current former world leaders 128 public officials politicians hundreds celebrities businessmen wealthy individuals 200 countries individuals entities may open offshore accounts number reasons legal ethically questionable canadian lawyer based dubai noted example businesses might wish avoid falling islamic inheritance jurisprudence owner dies businesses countries may wish hold funds dollars also said brazilian lawyer estate planning another example legal tax avoidance american film-maker stanley kubrick estimated personal worth 20 million died 1999 much invested 18th-century english manor bought 1978 lived manor rest life filming scenes shining full metal jacket eyes wide shut well three holding companies set mossack fonseca property turn held trusts set children grandchildren since kubrick american living britain without trust estate would pay transfer taxes governments possibly forced sell property obtain liquid assets pay kubrick buried grounds along one daughters rest family still lives uses ambiguous chinese companies may incorporate offshore order raise foreign capital normally law china world hereditary dictatorships law may side elite use offshore companies award oil contracts gold concessions children however dealings sometimes prosecuted international law standard official definition exists economist international monetary fund describe offshore financial center tax jurisdiction whose banking infrastructure primarily provides services people businesses live requires little disclosure information business offers low taxes obvious use offshore financial centers avoid taxes economist added oxfam blamed tax havens 2016 annual report income inequality much widening gap rich poor tax havens core global system allows large corporations wealthy individuals avoid paying fair share said raymond c. offenheiser president oxfam america depriving governments rich poor resources need provide vital public services tackle rising inequality international monetary fund imf researchers estimated july 2015 profit shifting multinational companies costs developing countries around us 213 billion year almost two percent national income igor angelini head europol financial intelligence group said shell companies play important role large-scale money laundering activities often means transfer bribe money tax justice network concluded 2012 report designing commercial tax abuse schemes turning blind eye upon suspicious transactions become inherent part work bankers accountants money-laundering affects first world well since favored shell company investment real estate europe north america london miami new york paris vancouver san francisco affected practice parking assets luxury real estate frequently cited fueling skyrocketing housing prices miami miami association realtors said cash sales accounted 90 new home sales 2015 huge amount dirty money flowing miami disguised investment according former congressional investigator jack blum miami 76 condo owners pay cash practice considered red flag money-laundering real estate london housing prices increased 50 2007 2016 also frequently purchased overseas investors donald toon head britain national crime agency said 2015 london property market skewed laundered money prices artificially driven overseas criminals want sequester assets uk three quarters londoners 35 afford buy home andy yan urban planning researcher adjunct professor university british columbia studied real estate sales vancouver—also thought affected foreign purchasers—found 18 transactions vancouver expensive neighborhoods cash purchases 66 owners appeared chinese nationals recent arrivals china calls data foreign investors rejected provincial government chinese nationals accounted 70 2014 vancouver home sales ca 3 million june 24 2016 china citic bank corp filed suit canada chinese citizen borrowed cn¥50 million lumber business china withdrew roughly ca 7.5 million line credit left country bought three houses vancouver surrey british columbia together valued ca 7.3 million three-month period june 2014 issue surely raised g20 summit predicted tomasz kozlowski ambassador european union eu india need strengthen international cooperation exchange tax information tax authorities panama vanuatu lebanon may find list uncooperative tax havens organisation economic co-operation development oecd re-activated july 2016 request g20 nations warned le monde french newspaper participated investigation three countries followed none oecd three broad guidelines international banking cooperation oecd g20 european union could also institute another list countries inadequate one area countries meeting none criteria panama vanuatu lebanon would go blacklist countries meet one criterion would go greylist april 2016 greylist place would included nine countries antigua barbuda bahrain brunei dominica liberia nauru samoa tobago united arab emirates international consortium investigative journalists helped organize research document review süddeutsche zeitung realized scale work required validate authenticity 2.6 terabytes leaked data enlisted reporters resources guardian bbc le monde sonntagszeitung falter la nación german broadcasters ndr wdr austrian broadcaster orf eventually many others ultimately reporters 100 news media outlets working 25 languages used documents investigate individuals organizations associated mossack fonseca security factored number project management considerations saying life danger john doe insisted reporters communicate encrypted channels agree would never meet face-to-face sz also concerns security source leaked documents data also safety partners investigation living corrupt regimes might want money-handling practices made public stored data room limited physical access air gapped computers never connected internet guardian also limited access journalists project work area make even harder sabotage computers steal drives sz journalists made tamper-evident painting screws holding drives place glitter nail polish reporters sorted documents huge file structure containing folder shell company held associated emails contracts transcripts scanned documents mossack fonseca generated business company administering client behalf 4.8 million leaked files emails 3 million database entries 2.2 million pdfs 1.2 million images 320,000 text files 2242 files formats journalists indexed documents using open software packages apache solr apache tika accessed means custom interface built top blacklight süddeutsche zeitung reporters also used nuix proprietary software donated australian company also named nuix using nuix süddeutsche zeitung reporters performed optical character recognition ocr processing millions scanned documents making data contained become searchable machine-readable project reporters used neo4j linkurious extract individual corporate names documents analysis access nuix used well reporters cross-referenced compiled lists people processed documents analyzed information trying connect people roles monetary flow structure legality us banking sec expert david p. weber assisted journalists reviewing information panama papers additional stories released based data full list companies released early may 2016 icij later announced release may 9 2016 searchable database containing information 200,000 offshore entities implicated panama papers investigation 100,000 additional companies implicated 2013 offshore leaks investigation mossack fonseca asked icij publish leaked documents database sent cease desist letter company said statement sheer quantity leaked data greatly exceeds wikileaks cablegate leak 2010 1.7 gb offshore leaks 2013 260 gb 2014 lux leaks 4 gb 3.3 gb swiss leaks 2015 comparison 2.6 tb panama papers equals approximately 2,660 gb mossack fonseca notified clients april 1 2016 sustained email hack mossack fonseca also told news sources company hacked always operated within law data security experts noted however company encrypting emails furthermore seemed running three-year-old version drupal several known vulnerabilities according james sanders techrepublic drupal ran apache 2.2.15 version march 6 2010 worse oracle fork apache default allows users view directory structure network architecture also inherently insecure email web servers segmented client database way reports also suggest parts site may running wordpress out-of-date version revolution slider plugin whose previously-announced vulnerabilities well-documented grey hat hacker named 1×0123 announced april 12 mossack fonseca content management system secured sql injection well-known database attack vector able access customer database computer security expert chris kubecka announced may 24 2016 mossack fonseca client login portal running four different government grade remote access trojans rats kubecka confirmed still numerous critical vulnerabilities many open ports infrastructure internet access archive server due weak security kubecka explained data security issue discovered detail full-length book titled rabbit hole osint journey gerard ryle director international consortium investigative journalists called leak probably biggest blow offshore world ever taken extent documents edward snowden described release twitter message biggest leak history data journalism icij also said leak likely one explosive leaks inside information history nature revelations unique opportunity test effectiveness leaktivism said micah white co-founder occupy ... panama papers dissected via unprecedented collaboration hundreds highly credible international journalists working secretly year global professionalization leaktivism days wikileaks amateurism wikileaks spokesperson kristinn hrafnsson icelandic investigative journalist worked cablegate 2010 said withholding documents time maximise leak impact called full online publication panama papers eventually tweet wikileaks criticized decision icij release everything ethical reasons censor 99 documents engaged 1 journalism definition offshore business entities illegal jurisdictions registered often illegal reporters found mossack fonseca shell corporations seem used illegal purposes including fraud kleptocracy tax evasion evading international sanctions reports april 3 note law firm many connections high-ranking political figures relatives well celebrities business figures among things leaked documents illustrate wealthy individuals including public officials keep personal financial information private initial reports identified five then-heads state government leaders argentina iceland saudi arabia ukraine united arab emirates well government officials close relatives close associates various heads government forty countries names then-current national leaders documents include president khalifa bin zayed al nahyan united arab emirates petro poroshenko ukraine king salman saudi arabia prime minister iceland sigmundur davíð gunnlaugsson former heads state mentioned papers include former prime ministers leaked files identified 61 family members associates prime ministers presidents kings including clients included less-senior government officials close relatives associates forty countries £10 million cash sale gold stolen 1983 brink's-mat robbery laundered first unwittingly later complicity mossack fonseca panamanian company feberion inc company set behalf unnamed client twelve months robbery brinks money put feberion front companies banks switzerland liechtenstein jersey isle man issued bearer shares two nominee directors sark appointed feberion jersey-based offshore specialist centre services offshore firms recycled funds land property transactions united kingdom although metropolitan police service raided offices centre services late 1986 cooperation jersey authorities seized papers two feberion bearer shares n't 1995 brink's-mat solicitors finally able take control feberion assets actor jackie chan mentioned leaked documents shareholder six companies based british virgin islands law firms play central role offshore financial operations mossack fonseca one biggest field biggest financial institutions refer customers services clients include incorporating operating shell companies friendly jurisdictions behalf include creating complex shell company structures legal also allow firm clients operate behind often impenetrable wall secrecy leaked papers detail intricate multilevel multinational corporate structures mossack fonseca acted global consultancy partners like emirates asset management ltd ryan mohanlal ltd sun hedge invest blue capital ltd behalf 300,000 companies registered british overseas territories leaked documents also indicate firm would also backdate documents request based 2007 exchange emails leaked documents routinely enough establish price structure 8.75 per month past 2008 mossack fonseca hired 90-year-old british man pretend owner offshore company marianna olszewski us businesswoman blatant breach anti-money laundering rules according bbc anonymity offshore shell companies also used circumvent international sanctions 30 mossack fonseca clients one time another blacklisted us treasury department including businesses linked senior figures russia syria north korea three mossack fonseca companies started clients helene mathieu legal consultants later sanctioned us treasury office foreign assets control ofac pangates international corporation accused july 2014 supplying government syria large amount specialty petroleum products limited civilian application syria two maxima middle east trading morgan additives manufacturing co owners wael abdulkarim ahmad barqawi said engaged deceptive measures supply oil products syria mossack fonseca also ran six businesses rami makhlouf cousin syrian president bashar al-assad despite us sanctions internal mossack fonseca documents show 2011 mossack fonseca rejected recommendation compliance team sever ties mr. makhlouf agreed months later firm said never knowingly allowed anyone connected rogue regimes use companies frederik obermaier co-author panama papers story investigative reporter german newspaper süddeutsche zeitung told democracy mossack fonseca realised makhlouf cousin realised sanctioned realised allegedly one financiers syrian regime said 'oh bank still business still keep well hsbc also appeared reassure mossack fonseca comfortable makhlouf client suggested could rapprochement assad family us makhlouf already known long-standing client hsbc swiss private bank holding least 15 million multiple accounts 2006 panamanian files also show hsbc provided financial services makhlouf company called drex technologies hsbc said company good standing dcb finance virgin islands-based shell company founded north korean banker kim chol-sam british banker nigel cowie also ignored international sanctions continued business north korea help panamanian firm us treasury department 2013 called dcb finance front company daedong credit bank announced sanctions companies providing banking services north korean arms dealer korea mining development trading corporation attempting evade sanctions country helping sell arms expand north korea nuclear weapons programme cowie said holding company used legitimate business aware illicit transactions mossack fonseca required international banking standards avoid money-laundering fraudster clients like banks supposed particularly alert signs corruption politically exposed persons pep words clients either close ties government officials however somehow failed turn red flags concerning tareq abbas even though shares family name president palestine sat board directors company four fellow directors firm deem pep ties palestinian politics yet mossack fonseca actually documented due diligence research including google search mossack fonseca managed 300,000 companies years number active companies peaked 80,000 2009 210,000 companies twenty-one jurisdictions figure leaks half incorporated british virgin islands others panama bahamas seychelles niue samoa mossack fonseca clients come 100 countries corporate clients hong kong switzerland united kingdom luxembourg panama cyprus mossack fonseca worked 14,000 banks law firms incorporators others set companies foundations trusts clients 3,100 companies listed database appear ties us offshore specialists 3,500 shareholders offshore companies list us addresses mossack fonseca offices nevada wyoming leaked documents indicate us 2 trillion passed firm hands several holding companies appear documents business sanctioned entities arms merchants relatives dictators sanctions place firm provided services seychelles company named pangates international us government believes supplied aviation fuel syrian government current civil war continued handle paperwork certify company good standing despite sanctions august 2015 500 banks registered nearly 15,600 shell companies mossack fonseca hsbc affiliates accounting 2,300 total dexia j. safra sarasin luxembourg credit suisse channel islands swiss ubs requested least 500 offshore companies clients hsbc spokesman said allegations historical cases dating back 20 years predating significant well-publicized reforms implemented last years response queries miami herald icij mossack fonseca issued 2,900-word statement listing legal requirements prevent using offshore companies tax avoidance total anonymity fatf protocols require identifying ultimate beneficial owners companies including offshore companies opening account transacting business miami herald printed statement editor note said statement address specific due diligence failings uncovered reporters monday april 4 mossack fonseca released another statement facts may victim data breach nothing 've seen illegally obtained cache documents suggests 've done anything illegal much keeping global reputation 've built past 40 years business right way co-founder ramón fonseca mora told cnn reports false full inaccuracies parties many circumstances cited icij never clients mossack fonseca firm provided longer statements icij official statement april 6 mossack fonseca suggested responsibility legal violations might lie institutions approximately 90 clientele professional clients ... act intermediaries regulated jurisdiction business clients obliged perform due diligence clients accordance kyc aml regulations subject interview bloomberg jürgen mossack said cat bag deal aftermath said leak inside job —the company hacked servers based abroad filed complaint panamanian attorney general office april 7 2016 mossack resigned panama council foreign relations conarex even though officially serving time brother peter mossack still serves honorary consul panama since 2010 may 5 2016 mossack fonseca sent cease desist letter icij attempt stop icij releasing leaked documents panama papers scandal despite icij released leaked documents may 9 2016 march 2018 mossack fonseca announced would close 5:00 april 3 news first broke ramón fonseca mora told television channel tvn responsible accused tribunal said firm victim hack responsibility clients offshore companies purchased mossack fonseca legal panamanian law later day independent movement movin called calm expressed hope panamanian justice system would allow culprits go impunity april 8 government understood media reports addressing tax evasion attacking panama president met wednesday april 7 candif committee representatives different sectors economy includes chamber commerce chamber industry agriculture national lawyers association international lawyers association banking association stock exchange entered full crisis management mode.on day announced creation new judiciary tribunal high-level commission led nobel prize laureate joseph stiglitz accussations foreign forces attacking panama panama stable robust economy isabel saint malo de alvarado vice president panama said op-ed piece published april 21 guardian president juan carlos varela administration strengthened panama controls money-laundering twenty months power panama setting independent commission co-chaired nobel laureate joseph stiglitz evaluate financial system determine best practices recommend measures strengthen global financial legal transparency expect findings within next six months share results international community however early august 2016 stiglitz resigned committee learned panamanian government would commit making final report public said always assumed final report would transparent april 8 president varela denounced france proposal return panama list countries cooperate information exchange minister presidency alvaro alemán categorically denied panama tax said country would scapegoat alemán said talks french ambassador panama begun april 25 meeting panamanian french finance ministers resulted agreement panama provide information france french nationals taxable assets country ministry economy finance panama dulcidio de la guardia formerly offshore specialist mossack fonseca competitor morgan morgan said legal often murky niche establishing offshore accounts firms trusts make less half percentage point panama gdp appeared suggest publication papers attack panama high level economic growth country shown eduardo morgan panamanian firm morgan morgan accused oecd starting scandal avoid competition panama interests countries panama papers affect image panama unfair manner come light result investigation hack said adolfo linares president chamber commerce industries agriculture panama cciap colegio nacional de abogados de panama cna urged government sue political analyst mario rognoni said world perceives panama tax government president juan carlos varela might become implicated tries cover involved rognoni said economist rolando gordon said affair hurts panama emerged greylist fatf added country especially panama must conduct investigations determine whether illegal improper acts committed panama lawyers movement called panama papers leak cyber bullying press conference condemned attack 'panama brand fraguela alfonso president said called direct attack country financial system invite organized forces country create great crusade rescue country image offshore companies legal said panamanian lawyer former controller republic alvin weeden illegality arises used money laundering arms smuggling terrorism tax evasion october 19 2016 became known government executive spent 370 million u.s. dollars order clean country image october 22 2016 midst state visit germany varela told journalist jenny pérez deutsche welle progress transparency many agreements exchange tax information tax evasion global problem asked ties ramón fonseca mora managing partner firm mossack fonseca acknowledged friend procuraduría de la nación announced would investigate mossack fonseca panama papers april 12 newly formed second specialized prosecutor organized crime raided mossack fonseca searched bella vista office part investigation initiated panama papers attorney general office issued press release following raid lasted 27 hours stating purpose obtain documents relevant information published news articles establishes possible use law firm illegal activities search ended without measures law firm confirmed prosecutor javier caraballo second prosecutor organized crime april 22 unit raided another panama location secured large amount evidence municipality regulation supervision financial subjects ministry economy finance mef initiated special review law firm mossack fonseca determine whether followed tax law carlamara sanchez charge proceeding said press conference quartermaster come verify whether firm complied since april 8 due diligence customer knowledge final beneficiary reporting suspicious transactions financial analysis unit uaf operations said law 23 2015 empowers regulation supervision said firms monitored since late last year special attention panama papers noted law carries fines 5,000 1 million even suspension firm icij investigation mossack fonseca reported public ministry samid dan sandoval former candidate mayor santiago de veraguas 2014 filed legal action journalists participated said project name damaged integrity dignity sovereignty country consortium would assume legal responsibility damage caused panamanian nation change.org petition requested icij stop using name panama panama papers request said generally- accepted name investigation damage image panama attorney general panama kenia isolda porcell diaz announced january 24 2017 suspending investigations mossack fonseca filed appeal protection constitutional rights first superior court justice panama requested deliver original documents issue judgment mossack fonseca detained february 8 2017 money-laundering charges march 2018 mossack fonseca announced would cease operations end march due irreversible damage image direct result panama papers many senior eu figures implicated panama papers scandal european commissioner taxation pierre moscovici said european union whole duty prevent kind tax avoidance uncovered panama papers scandal moscovici told reporters use offshore companies hide called shocking amounts financial assets tax authorities unethical estimated tax shelters resulted annual loss €1 trillion public finances adding european commission attempted tighten tax rules across union since november 2014 due luxembourg leaks scandal also revealed icij hoped extent panama papers revelations would spur countries action 2013 letter unearthed financial times president european council herman van rompuy prime minister united kingdom david cameron said offshore trusts automatically subject transparency requirements shell companies panama papers revealed minister finance andorra jordi cinca ceo orfund sa maintained offshore company called mariette holdings inc dissolution 2002 fear discovery participation businesses business activities orfund ties blood diamond trade refining sale african gold company closed shortly civil war ivory coast opposition demanded resignation result response cinca said connection would affect government andorra step still panama papers show major-general justice head armenia compulsory enforcement service mihran poghosyan connected three panama-registered companies sigtem real estates inc. hopkinten trading inc. bangio invest s.a. issued bearer shares poghosyan degree economics sole owner sigtem hopkinten together owned best realty ltd recently awarded government contracts poghosian resigned april 18 saying unacceptable caused armenia name mentioned alongside azerbaijan whose president ilham aliyev actually embezzled billions dollars april 8 armenian transparency international anti-corruption center filed petition ethics committee high level officials requesting investigation poghosyan members families poghosyan uncles grigor mikhail haroutyunyan also mentioned connection business varuzhan hotkanian head armenian branch anti-corruption watchdog transparency international said perhaps poghosian forced resign country leadership since evidence pointed directly said still questions government commitment fighting corruption leading opposition figure levon zourabian demanded answers matter floor parliament austria financial market authority announced audit two austrian banks mentioned panama papers – raiffeisenbank international rbi specifically examining whether banks complied obligation prevent money laundering hypo vorarlberg subsequently announced complied laws past planning retreat completely offshore sector 2018 investigative media bivol.bg accessed panama papers agreement international consortium investigative journalists later published story offshore company viafot attempting acquire key asset bulgaria defense industry arms producer dunarit panama papers show viafot owned alexander angelov lawyer media mogul delyan peevski bulgarian media reported state institutions help viafot acquire dunarit illegitimate means however inquiry opened bulgaria general prosecutor sotir tsatsarov initially 2016 access panama papers granted journalist alekseniya dimitrova however spokesperson ministry foreign affairs bulgaria raised concern dimitrova worked communist secret services work papers may biased central bank cyprus officially declared regard press reports citing leaked documents known panama papers central bank cyprus announces assessing information extent may concern cypriot banking system taking necessary appropriate action cypriot online paper said cyprus link stems fact fonseca runs office cyprus specifically limassol chart leaks name cyprus tax countries offer little tax although corporate tax rate 12.5 ireland september 2016 danish tax authorities purchased panama papers data 320 companies 500-600 individuals investigate although data came anonymous source vetted credible sample data french financial prosecutors opened probe former president françois hollande declared tax evaders would brought trial punished also result leak france restored panama list tax havens panama recently removed former french budget minister jérôme cahuzac spearheaded crackdown tax fraud office client mossack fonseca owned seychelles company named cerman group limited incorporated 2009 france investigated 2013 allegations mediapart 2000 cahuzac held undeclared assets account first switzerland singapore resigned cabinet post protesting innocence admitted months later indeed hidden €600,000 ubs account moved keep hidden continuing lead france clampdown tax evasion french socialist party unanimously voted expel week later heels april 2013 cahuzac affair president hollande created parquet national financier pnf judiciary investigation unit specializing large-scale fraud corruption investigations jean-marie le pen founder long-time leader far-right-wing front national fn member european parliament already subject along daughter marine le pen staff pnf tax fraud investigation drawing official scrutiny undeclared hsbc account containing €2.2m gold coins managed geneva aide trust based british virgin islands closed moved bahamas 2014 allegations overbilling misuse comingling campaign funds tax evasion jean-marie le pen also suspected using european parliament funds campaign administrative expenses french political party jean-marie le pen mentioned documents along daughter marine le pen current party leader frederic chatillon fn insider also close friend marine among three may hidden much million pounds offshore accounts bidzina ivanishvili became wealthy russia returning georgia becoming prime minister 2012 public official asset declaration 72 pages long however list lynden management mossack fonseca company held 20 shares raptor pharmaceuticals declare us-based company listed new york stock exchange refused nearly four years provide copy passport proof address law firm needed comply money-laundering regulations well inquiries company financial investigation agency british virgin islands forbes calculates ivanishvili net worth 4.8 billion panama papers confirmed politician stavros papastavrou advisor former prime ministers kostas karamanlis antonis samaras member council panamanian foundations green shamrock foundation diman foundation 2005 2014 2006 became deputy chairman aisios foundation still exists today however papstavrou resigned aisios foundation 2012 number greek families significant art collections implicated scandal prime minister sigmundur davíð gunnlaugsson elected 2008 banking collapse iceland pledged clean corruption banking system sigmundur davíð took seat disclose 50 interest wintris company owned bonds one bankrupt banks divest day new law took effect january 1 2010 would required declare conflict interest sold share wife owns half couple come wealthy families bought wintris working journalist anthropologist failure disclose asset apparently broke laws country remembers 2008 financial crisis well thought put past since sigmundur davíð negotiated behalf iceland creditors failed icelandic banks discovery sigmundur davíð wife bondholder caused much outrage 22,000–24,000 people attended anti-government protest outside parliament april 4 2016 almost 8 population sigmundur davíð suggested snap election members coalition government want elections resignation april 5 2016 prime minister iceland sigmundur davíð gunnlaugsson announced resignation reykjavik grapevine news site kjarninn revealed president ólafur ragnar grímsson connections lasca finance limited registered 2005 british virgin islands ólafur ragnar categorically denied personal family ties companies tax havens parents wife dorrit moussaieff operated company 1999–2005 financial statements moussaieff family business show received nearly £7 million 10.2 million us €9.1 million interest payments lasca 2000–2005 2005 moussaieff jewelers limited sold 10 stake lasca s. dorrit moussaieff deceased father mother 86 years old registered owner lasca ownership stake dorrit sisters tamara sharon inherit fortune considered among largest world bjarni benediktsson iceland finance minister chairman gunnlaugsson coalition partner comes one iceland wealthiest families confirmed owned 33 falson co. seychelles shell company founded 2005 purchase real estate dubai still active 2009 benediktsson already member parliament financial disclosure requirements said registered company tax authorities aware registered seychelles minister interior ólöf nordal husband powers attorney dooley securities s.a. offshore company located panama said company founded husband never used think disclose hrólfur ölvisson managing director gunnlaugsson progressive party says mossack fonseca companies list name inactive long time legal businesswoman ingibjörg pálmadóttir husband jón ásgeir jóhannesson several years financed business dealings panamanian company guru invest owns shares retailer sports direct rhapsody investments europe based luxembourg guru invest paid around us 16 million glitnir bank crashed cover debt gaumur one jón ásgeir companies loaned isk 100 million jón ásgeir company þú blásól offshore company owns named jovita asked journalists kjarninn money came ingibjörg reply ingibjörg primary owner 365 media group owns icelandic news outlets vísir.is television channel stöð 2 radio stations bylgjan fm 957 none seem reporting disclosure irish times newspaper handled irish component leak prominent irish names listed included golfer pádraig harrington property developer sean mulryan manager irish rock group u2 paul mcguinness lists also included stanley watson senior partner ireland largest tax-law firm matheson led creation many irish corporate tax management tools used us multinationals ireland avoid billions us taxes list also included irish fine gael political advisor frank flannery april 6 2016 italy procura turin ordered guardia di finanza investigate 800 italians contained panama papers documents former long-time prime minister silvio berlusconi already convicted tax evasion expelled parliament included papers notable people whose names mentioned papers include entrepreneurs luca cordero di montezemolo flavio briatore adriano galliani actor carlo verdone investigation icij partner namibian found imprisoned mafioso vito roberto palazzolo shielded finances italian namibian south african authorities shell companies british virgin islands set german banker hong kong wolf-peter berthold also used transfer control palazzolo assets son panama papers linked minister government prime minister joseph muscat konrad mizzi prime minister chief staff keith schembri shell companies panama furthermore mizzi wife sai mizzi liang malta trade envoy china consul general malta shanghai china also named beneficiary together children trust based new zealand holding mizzi panama shell company mizzi april 28 2016 minister health energy currently minister tourism listed panama papers owner panama shell company called hearnville inc indications maltese press mizzi links offshore trust prevent mizzi elected deputy leader party affairs ruling labour party february 25 2016 following change party statutes enable sitting mp appointed mizzi stepped deputy leader labour party april 28 2016 schembri businessman managed electoral campaign labour party 2013 maltese general elections serves chief staff muscat reported hold offshore company based british virgin islands owns anonymous shell company panama called tillgate inc held trust established new zealand konrad mizzi keith schembri acquired shell companies panama hearnville inc tillgate inc respectively via mossack fonseca representatives malta also tried open bank accounts linked two shell companies two politically exposed persons various jurisdictions owner third anonymous shell company panama egrant inc whose existence revealed document referring two companies remains unknown although strict secrecy observed acquisition including avoidance e-mail communications utilization communications via skype fuelled strong suspicions third top maltese politically exposed person involved 2015 declaration assets dated february 8 submitted maltese parliament end march 2016 muscat said 'd shown draft form panama papers leaked mizzi listed trust new zealand shell company panama april 28 2016 report matter commissioned government malta unnamed international audit firm still pending april 28 2016 muscat announced cabinet reshuffle mizzi lost ministerial portfolio health energy retained minister without portfolio office prime minister malta member european union minister implicated scandal date withstanding mizzi schembri involvement scandal still hold high positions maltese government mark a. sammut wrote book case called l-aqwa fl-ewropa il-panama papers u l-poter best europe panama papers power october 2017 daphne caruana galizia blogger led panama papers investigation corruption malta killed car bomb near home norwegian tax administration expects demand access information dnb norway largest financial services group approximately 30 companies formed dnb owned norwegians 20 living norway 200 norwegians client list mossack fonseca icij offshore leaks database shows portugal 246 offshore entities 300 officers 40 intermediaries 175 addresses linked activities described mossack-fonseca papers newspapers reporting involvement several politicians government officials bankers company managers may 2017 criminal judicial consequences involved süddeutsche zeitung one newspapers participating project made papers public described connections various individuals listed russian president vladimir putin quoted nobel-winning economist paul krugman us state department documents saying russia kleptocracy mafia state respectively süddeutsche zeitung reported 2 billion moved network companies associated russian firms individuals years companies appeared used questionable business transactions putin criticized offshore companies unpatriotic several occasions since 2011 2013 law passed banning foreign bank accounts government officials putin name appear records released date associates construction billionaires arkady boris rotenberg musician sergei roldugin business magnate alisher usmanov mentioned leaked documents putin long-standing friend billionaire gennady timchenko well press secretary spouse cousin former kgb colleagues well several oligarchs connected mossack fonseca shell companies sergei roldugin cellist st petersburg orchestra godfather putin eldest daughter described putin best friend appears prominently panama papers according leaked papers roldugin acquired assets worth least 100 million including 12.5 stake video international russia largest television advertising firm companies stock options russia biggest companies rights loans worth hundreds millions dollars 2008 company controlled roldugin joined several offshore companies help another putin insider acquire control kamaz russia largest truck manufacturer obtain investment german carmaker daimler ag 250 million 10 kamaz sandalwood another company roldugin insiders interest issued lines credit 2009 2012 worth 800,000 russian commercial bank rcb cyprus wholly owned subsidiary vtb bank largely owned russian state panama papers documents indicate roldugin companies received several loans collateral low interest rates never repaid 2013 several shell companies linked brothers boris arkady rotenberg loaned worth us 200 million company roldugin network leaked documents show whether repaid shortly loan granted arkady rotenberg company awarded tender south stream pipeline project worth billions asked companies rodulgin said take look find say ca n't financial matters delicate putin spokesperson dmitry peskov called western reporting panama papers putinophobia said target putin part conspiracy russia orchestrated central intelligence agency united states department state others putin denied element corruption said opponents trying destabilize russia putin also said wikileaks showed us official people official organs us behind 2016 annual direct line vladimir putin called leaked documents reliable confined comments roldugin saying western media understand musician spent off-shore income musical instruments russia putin also said goldman sachs owned shares parent company süddeutsche zeitung fact owned munich family german media group kremlin apologized mistake initially mainstream russian media almost entirely ignored leak neither state-owned channel 1 rossiya 1 privately owned ren-tv ntv mentioned story april 4 day story broke minimal coverage story ran middle night vesti tv relation lionel messi michel platini exception russian opposition newspaper novaya gazeta described icij russian partner reported story hard copy online end april occrp published analysis batch leaked documents demonstrating cash flow rodulgin accounts 2007 tax theft 230m moscow tax inspectors uncovered reported sergei magnitsky april 15 2016 josé manuel soria forced leave post acting minister industry energy tourism panama papers revealed family maintained several offshore societies tax havens previous decades soria initially denied reports kept leaking contradicted april 14 company came light owned jersey 2002 mayor las palmas soria put critical political position result confusing changing explanations issue resigned next day prominent spanish politician offshore companies former imf president rodrigo rato vice-president conservative government prime minister josé maría aznar €3.6 million two offshore companies charged spain alleged tax offenses money laundering corruption among individuals cases corruption micaela domecq-solís wife miguel arias cañete currently european commissioner climate action energy formerly eu minister agriculture food environment also opened shell societies spanish royal family also involved tax scandal princess pilar borbón duchess badajoz sister former king juan carlos aunt current king felipe vi offshore corporation 40 years abdication brother assembled company called delantera financiera 1974 president administrator initially denied name appeared panama papers husband died 1991 secretary-general corporation son bruno gomez-acebes treasurer manager company name count ripalda brother jaime de marichalar former husband king daughter elena de borbón also appears moreover huge corruption scandal involving royal house iñaki urdangarin business associate nóos foundation advised mossack fonseca move funds two great-grandchildren dictator francisco franco francisco juan josé franco suelves set registered societies british virgin islands mossack fonseca juan josé franco opened malini investments 1997 director 2012 closed 2013 told newspaper el confidencial absolutely ignorant francisco franco suelves older brother also opened vamfield alliance limited 1997 director son jordi pujol former president generalitat catalonia considered linchpin catalan independence granted diversion commission 6.8 million euros sale office opaque society repaid another offshore company 5 million pujol family parents children charged several counts tax fraud corruption among crimes current wife former prime minister spain felipe gonzález maría garcía vaquero opened account switzerland carmingo ltd 2004 tax niue island south pacific lawyer cándido conde-pumpido jr. son former general prosecutor spain magistrate supreme court spain cándido conde-pumpido asked open mossack fonseca offshore company 2008 though transaction n't completed intended offshore company intermediary project build skyscraper capital panama hide money francisco paesa important spy cni working ministry interior opened offshore account faking death 1998 top bankers spanish businessmen used firm open accounts companies miguel blesa president caja madrid tried spanish courts numerous cases corruption jesus barderas businessman close ex-prime minister felipe gonzález children lawyer javier de la rosa also linked corruption cases carlos ortega ceo pepe jeans families major hotel chains riu riu hotels resorts escarrer meliá hotels international martinón group martinón art collectors marina ruiz-picasso borja thyssen mossack fonseca companies thyssen lawyer said company fully declared tax authorities ruiz-picasso declined comment celebrities involved include spanish director pedro almodóvar oscar 2003 habla con ella brother agustin created company 1991 called glen valley british virgin islands agustin responded saying closed company 1994 paid taxes showbiz personality carmen lomana said death husband owner offshore company took care without knowing anything business tax bertín osborne host spanish singer famous actor imanol arias protagonist one longest important series spanish television cuéntame cómo pasó named osborne said account legal used recommended save money also involved scandal fraud treasury actress fellow protagonist series ana duato juan luis cebrián journalist co-founder el país ceo prisa spanish media conglomerate owns 2 star petroleum related oil corporation tax havens named decided take legal action la sexta revealed involvement scandal former president fc barcelona josep lluís núñez current vicepresident carles vilarrubí eduardo fernando de blas vicepresident real madrid offshore companies mossack fonseca swedish financial supervisory authority fi said april 4 2016 would investigate actions nordea one largest financial institutions nordic countries panama papers revealed bank luxembourg office helped set nearly 400 offshore companies clients 2004 2014 panama british virgin islands customers swedish financial supervisory authority fi said serious deficiencies exist nordea monitors money laundering given bank two warnings 2015 nordea pay largest possible fine—over five million eur 2012 nordea asked mossack fonseca change documents retroactively three danish customers power attorney documents would appear force since 2010 director nordea private banking thorben sanders admitted 2009 nordea screen tax evaders end 2009 decided bank shall means tax evasion said sanders swedish banks also present documents nordea occurs 10,902 times next frequently mentioned bank occurs 764 times swedish financial supervisory authority fi later said would also investigate three big banks sweden handelsbanken skandinaviska enskilda banken seb swedbank nordea cut ties mossack fonseca following interview nordea ceo casper von koskull svt april 4 response leaks prime minister stefan löfven said critical nordea conduct role minister finance magdalena andersson characterized bank conduct totally unacceptable april 6 federal police searched uefa headquarters nyon part criminal mismanagement probe champions league television rights deal signed fifa new president gianni infantino day geneva attorney general opened several procedures reaction report misconduct swiss lawyers trustees april 8 hours publication new series articles focusing art hidden behind offshore companies prosecutor sequestered modigliani worth 25 million geneva freeport litigation new york alleged painting stolen nazis world war ii defendants said leaked documents show control international art center shell company registered panama yves bouvier russian billionaire dmitry rybolovlev litigation art pricing mossack fonseca companies leaked papers also shed light ownership shell companies protracted litigation lausanne ownership artwork gstaad chalet late greek shipping tycoon basil goulandris april 11 another investigation abuse name charities like red cross wwf launched swiss-based diacore mossack fonseca client approximately thirty companies diacore run daniel steinmetz recently brother beny steinmetz power attorney company diacore part steinmetz group ukrainian president petro poroshenko took office 2014 popular uprising toppled predecessor viktor yanukovych poroshenko pledged sell candy business roshen elected leaked documents indicate august 21 2014 instead mossack fonseca set offshore holding company prime asset partners ltd british virgin islands moved company roughly two months election move potential save millions dollars ukrainian taxes records cyprus show firm shareholder legal experts say explanation may sound however n't making difference ukrainian media making point poroshenko opened offshore account august 2014 ukrainian soldiers massacred russians ilovaisk panama papers report may also figured defeat trade deal netherlands referendum april 6 anti-corruption group transparency international believes creation businesses serving president direct violation constitution also journalists organized crime corruption reporting project believe move poroshenko committed two illegalities starting new business office failing afterwards report disclosure statements poroshenko denied wrongdoing spokesman said offshore company active assets legitimate corporate restructure aimed helping sell poroshenko roshen group analysts ukraine responded secretive way poroshenko set accounts certain undermine trust party ukraine news poroshenko offshore business came government campaigned offshore companies oleh lyashko leader radical party urged lawmakers begin impeachment proceedings even allies backed calls parliamentary commission investigate allegations ukrainian parliament relations poroshenko bloc people front party prime minister arseniy yatsenyuk previous months already soured mutual accusations corruption prime minister arseniy yatsenyuk also announced would resign panama papers leaks according guardian £170bn uk property held overseas ... nearly one 10 31,000 tax companies british property linked mossack fonseca included among panama paper documents names six members house lords several donors cameron conservative party well conservative donors include united kingdom still exercises varying degrees control british overseas territories crown dependencies make large number many tax havens secrecy jurisdictions exist pressure mounted prime minister david cameron make changes according wall street journal panama papers shining light constellation offshore centers last remnants british empire gibraltar british virgin islands bvi companies created mossack fonseca included leaked data bvi companies topped list 113,000 nearly 215,000 companies mossack fonseca managed incorporated british overseas territory anguilla 7th list cameron criticized complex offshore structures 2013 saying fair right companies saying 've got lots sales uk 'm going pay sort royalty fee another company another country special tax dispensation said would bring issue g8 summit year summit cameron demanded transparency arguing would better business 2014 cameron asked overseas territories crown dependencies set open register firms individuals investments registered jurisdictions time panama papers leak april 2016 montserrat gibraltar agreed leader opposition jeremy corbyn said government needs stop pussyfooting around tax dodging called direct rule imposed british overseas territories crown dependencies act tax havens former business secretary vince cable agreed although former attorney general dominic grieve described proposal bit nuclear option would destroy livelihoods bvi inhabitants finance industry labour party also said cameron planned anti-corruption summit may would charade cameron chairman summit require representatives crown dependencies overseas territories attend jennie granger spokeswoman hmrc said department received great deal information offshore companies including panama wide range sources currently subject intensive investigation said hmrc asked icij share data private eye revealed edward troup appointed executive chair hmrc april 2016 former partner simmons simmons london-based legal firm whose clients included panama-registered fund created david cameron father blairmore holdings papers obtained süddeutsche zeitung icij reveal simmons simmons close relationship running offshore companies major overseas property owners including investment company run behalf sheikh hamad bin abdullah al thani troup senior tax partner ian cameron late father uk prime minister david cameron ran offshore fund blairmore holdings inc. mossack fonseca avoided uk taxes 30 years company moved ireland david cameron became prime minister april 6 cameron admitted owned shares blairmore said sold shares becoming pm prominent politicians criticized involvement cameron family scandal leader opposition jeremy corbyn urged immediate independent investigation tax affairs cameron family well tighter laws uk tax avoidance opponents also called cameron resignation admitted owning shares blairmore azerbaijan international mineral resources operating company ltd aimroc consortium partners spent nearly us 230 million open mine build refinery western azerbaijani village chovdar aimroc possibly produced us 30 million gold suddenly disappearing without making payroll may 2014 mine employees officially remain vacation azerbaijani law full-time employees seek work elsewhere even though paid two years 2012 investigation radio free europe organized crime corruption reporting project occrp discovered overseas holding companies daughters azerbaijani president ilham aliyev owned interest gold mine operation created 2006 presidential decree forming consortium awarding 30-year lease environmental transparency objections parliament panama papers made possible trace elaborate network shell companies manage ownership mines 2016 occrp able establish fact daughters control mining operation aliyev awarded gold mines globex international llp londex resources s.a. willy meyris s.a. fargate mining corporation thirty percent proceeds allocated government azerbaijan 11 remaining 70 went globex 45 londex 29 willy meyris remaining 15 fargate companies registered panama according documents obtained panama registry companies one fargate mining corporation founded tagiva management ltd. tagiva services ltd. verda management ltd issued general power attorney granted favour azerbaijan-born individual mr. nasib hasanov later londex resources s.a. globex international llp fargate mining corporation willy meyris s.a. registered st. kitts nevis addresses already used registering offshore energy holding – nobel oil ltd. partner state oil company socar azerbaijan umid gas field founder nobel oil group also mr. n. hasanov 2012 investigation reporters established globex owned shell companies panama shell companies belonged president daughters swiss businessman whose name appears shell companies manage azerphone family telecommunications monopoly villagers told reporters hoped work mine paid 12 day asked intervene president problems mine causing water supply became angry believe reporters said president family stake mine following may publication report national assembly passed law making illegal report company ownership another giving former presidents first ladies lifelong legal immunity khadija ismayilova radio free europe reporter 2012 investigation subjected escalating legal public harassment threatened eventually arrested currently serving 7.5 year sentence tax evasion abuse power leaked mossack fonseca documents made possible establish daughters also owned londex majority partner gold enterprise entirely clear shut operation industry experts familiar consortium say seem experienced may rushed production according icij aliyev daughter arzu financial stakes gold rights also azerfon country largest mobile phone business shares sw holding controls nearly every operation related azerbaijan airlines azal meals airport taxis sisters brother heydar property dubai valued roughly 75 million 2010 heydar legal owner nine luxury mansions dubai purchased 44 million leaked documents show daughters leyla arzu aliyeva hold shares exaltation limited incorporated april 2015 holding uk property child child london law firm registered obtained nominee directors though jersey branch mossack claimed women political connections family azerbaijan president ilham aliyev leads well-off life thanks part financial interests various sectors nation economy wife ascendants privileged powerful family owns banks insurance construction companies television station line cosmetics well known pre-eminent charity work led construction schools hospitals country major sports complex april 7 2016 anti corruption commission bangladesh launched inquiry obtain details businesses individuals allegedly affiliated mossack fonseca allegations made thirty-two bangladeshi individuals two corporations however media outlets staking claim referenced old icij database information compiled investigation 2013 offshore leaks relatives highly placed chinese officials including seven current former senior leaders politburo communist party china named including former premier li peng daughter li xiaolin former communist party general secretary hu yaobang son hu dehua deng jiagui brother-in-law current general secretary xi jinping deng two shell companies british virgin islands xi member politburo standing committee dormant time xi became general secretary communist party paramount leader november 2012 others named include son daughter-in-law propaganda chief liu yunshan son-in-law vice-premier zhang gaoli official chinese statistics show investment british overseas territories acting tax havens much significant places 44 billion invested cayman islands 49 billion british virgin islands despite figures probably exclud ing private investments many family members ruling elite channelled money bvi figures exceed chinese investment united states united kingdom china government suppressing mention panama papers social media search engines results reportedly told news organizations delete content related panama papers leak chinese authorities consider material concerted foreign media attack china ordered internet information offices delete reports reprinted panama papers exceptions follow related content hong lei spokesman china foreign ministry responded comment groundless accusations april 5 news conference screenshot showed authorities forced websites delete content panama papers foreign websites wikileaks china digital times blocked mainland china sina weibo twitter-like social media website censors deleted content panama paper however name xi brother-in-law got weibo users tried circumvent less obvious language brother-in-law canal papers panama canal despite censorship weibo search ranking topped phrases seemingly related panama papers tax evasion document leak putin chinese entertainment magnate art collector wang zhongjun also appears documents respond request comment according tax justice network chinese investors sometimes use overseas companies take advantage incentives china offers foreign investors canadian broadcaster radio canada reported hong kong-based citic pacific mossack fonseca set manage 90 subsidiaries chinese government majority stakeholder according fiscal expert marwah rizqy professor tax law université de sherbrooke mossack fonseca hong kong office busiest says icij chinese officials wealthy figures would carry funds across border deposit channeled offshore entities hong kong invested hk 4.6 trillion £360 billion bvi – hong kong invested mainland china – received hk 4.1 trillion £300 billion bvi £20 billion placed cayman islands bermuda individually newspaper ming pao fired deputy editor keung kwok-yuen following front-page article panama papers mentioned many prominent hong kong citizens paper blamed difficult business environment previously fired another editor 2014 another leak offshore documents employees publishing blank columns scattered newspaper protest dismissal polytechnic university two offshore companies set mossack fonseca 2012 2013 one created vice-president nicholas yang wei-hsiung became minister hong kong bollywood celebrities amitabh bachchan daughter-in-law actress aishwarya rai bachchan actor ajay devgan listed papers bachchan denied connection overseas companies spokesman rai also questioned documents authenticity bachchan repeated denial response august 21 report listed director two companies participated board meetings also listed real estate developer dlf ceo kushal pal singh sameer gehlaut indiabulls group gautam adani elder brother vinod adani shares companies fell following release papers well apollo tyres also mentioned dlf said invested existing overseas companies compliance lrs scheme set 2004 reported indian tax agency apollo spokesman said family members chairman onkar kanwar reported owning offshore companies live india complied law resided gehlaut said paid full taxes made full disclosures indian politicians list include shishir bajoria west bengal anurag kejriwal former chief delhi lok satta party bajoria said owned two isle man companies one ascribed leaked documents corporate services provider first names group acknowledged erroneously providing information mossack fonseca mf records show kejriwal director three offshore companies based british virgin islands bvi holding two private foundations panama power attorney another bvi company acknowledged offshore companies said shut short period time name deceased drug kingpin iqbal mirchi also surfaced papers 500 indian citizens appear mentioned indian government ordered inquiry subsequently announced constituting special multi-agency group comprising officers investigative unit central board direct taxes foreign tax tax research division financial intelligence unit reserve bank india 600 israeli companies 850 israeli shareholders listed among israeli names found leaked documents top attorney dov weissglass bureau chief deceased prime minister ariel sharon jacob engel businessman active african mining industry idan ofer member one israel wealthiest families according haaretz weissglass name appears sole owner one four companies set business partner assaf halkin company talaville global registered british virgin islands may 2012 according haaretz seven months later shares mortgaged loan vienna bank weissglass halkin told haaretz company registered purpose receiving loan bank order invest european properties bank would allow loan corporation ... company activity reported tax authorities israel required tax said activity paid israel many leaked documents reference bank leumi primarily branch island tax jersey one customers billionaire teddy sagi made fortune developing online gambling technology england recently developed camden market commercial real estate space sagi sole shareholder least 16 mossack fonseca offshore companies mostly real estate ventures israeli businessman beny steinmetz also mossack fonseca customer 282 companies nawaz sharif second top official ruled result information disclosures panama papers supreme court disqualified office one judge said mr sharif longer eligible honest member parliament pakistan ruling party pakistan muslim league-nawaz pml-n permitted speaker national assembly select interim prime minister 2018 general election supreme court verdict announced context heightened security capital 3,000 armed police members pakistan rangers paramilitary force deployed around supreme court verdict followed months dramatic news coverage social media debates divisions falling largely along party lines hearing october 18 2017 resulted indictment sharif faced allegations corruption since 1980s panama papers corroborated federal inquiry mid-1990s name nawaz sharif younger brother punjab chief minister shebaz sharif also link in-laws shebaz sharif children nawaz sharif offshore companies mossack fonseca records tie nawaz daughter maryam nawaz brothers hussein hassan four offshore companies nescoll limited nielson holdings limited coomber group inc. hangon property holdings limited companies acquired luxury real estate london 2006–2007 real estate collateral loans 13.8 million according panama papers prime minister children say money came sale family business saudi arabia offshore companies assets disclosed family wealth statement suspicion companies meant hide launder ill-gotten wealth avoid taxes called sharif ethics question prior ruling maryam nawaz tweeted denial wrongdoing adding company/property abroad except trustee brother corporation entitles distribute assets brother hussain family/children needed leaked documents name trustee nescoll created 1993 nielson first registered 1994 two companies subscribed mossack fonseca services july 2006 mossack fonseca managing nescoll nielsen holdings coomber group three companies obtained £7 million mortgage swiss bank deutsche bank suisse sa purchased four flats avenfield house 118 park lane london hassan brother bought hangon holdings stock 2007 £5.5 million hangon bought property financed bank scotland 1 hyde park place london samina durrani mother shebaz sharif second wife ilyas mehraj brother first also figure documents habib waqas group/ilyas mehraj listed shareholder 127,735 shares haylandale limited registered july 24 2003 bahamas mehraj denied knowing anything company whether incorporated commonwealth bahamas anywhere else name haylandale ltd. rainbow limited newest three offshore companies owned samina durrani registered september 29 2010 british virgin islands bvi armani river limited registered bahamas may 16 2002 describes assets property london currently rented assets star precision limited registered bvi may 21 1997 reported cash investment portfolio also holding 1,165,238 shares orix leasing pakistan limited hussain nawaz said family wo n't hamper investigation urged one former president pervez musharraf well government april 15 announced investigation inquiry commission pakistanis named documents opposition politicians said judge retired judge investigate numerous judges recused july 28 2017 supreme court pakistan disqualified sharif holding office late benazir bhutto also mossack fonseca client 2001 firm set bvi company petroline international inc. bhutto nephew hassan ali jaffery bhutto aide head security rehman malik later became senator interior minister government yousaf raza gillani mossack fonseca deemed bhutto first company similarly named petrofine fzc politically sensitive declined accept mrs bhutto client united nations committee chaired former us federal reserve head paul volcker determined 2005 investigation abuses oil-for-food program petrofine fzc paid us 2 million iraqi government saddam hussein obtain us 115–145 million oil contracts 2006 pakistani national accountability bureau nab accused bhutto malik ali jaffery owning petrofine established since 2000 sharjah united arab emirates bhutto pakistan peoples party denied april 2006 nab court froze assets owned pakistan elsewhere bhutto husband asif ali zardari saying assets totaling 1.5 billion result corrupt practices swiss charges criminal money laundering filed 1997 still litigation tareq abbas son mahmoud abbas president palestinian authority revealed hold 1 million shares arab palestinian investment company apic offshore company associated palestinian authority partially owned authority palestine investment fund hamad bin jassim bin jaber al thani prime minister 2007 2013 2002 acquired three shell companies incorporated bahamas another british virgin islands moorage mallorca 300 million yacht named al mirqab panama papers indicate owns owned eight shell companies subsequent reporting forbes found al thani bought 700 million deutsche bank shares 2014 paramount services holdings 2015 transferred roughly half stock supreme universal holdings owned relative left office emir qatar also 2013 king salman mentioned leaks relation two companies based british virgin islands—verse development corporation incorporated 1999 inrow corporation incorporated 2002 companies took mortgages totaling us 34 million purchased properties central london role companies specified bvi company crassus limited incorporated 2004 registered yacht london named erga king salman palace riyadh vessel boasts banquet hall comfortably sleep 30 king salman described documents principal user former crown prince muhammad bin nayef also named papers irish times found link iran-contra panama papers persons one america colourful political donors farhad azima multi-billionaire adnan khashoggi employed mossack fonseca services important figures iran-contra scandal mossack fonseca files show khashoggi appeared early 1978 became president panamanian company isis overseas s.a documents reveal fonseca clients included sheikh kamal adham saudi arabia first intelligence chief 1963–79 brother-in-law king faisal named us senate committee cia “ principal liaison entire middle east mid-1960s 1979 ” adham controlled offshore companies involved b.c.c.i banking scandal ministry finance monetary authority singapore said statement singapore takes serious view tax evasion tolerate business financial centre used facilitate tax related crimes evidence wrongdoing individual entity singapore hesitate take firm action sri lankan finance minister ravi karunanayake said panel investigate sri lankan names come panama papers well 46 appear 2013 offshore leaks according daily mail since earlier leadership apparently country many large outstanding foreign loans taken administration former president mahinda rajapakse current government recently obtain us 1.5 billion imf bailout rajapakse denied diverting funds current government came power january 2016 anti-corruption platform rami makhlouf maternal cousin bashar al-assad worth estimated 5 billion syrian civil war control 60 economy subject sanctions united states european union controlled syria oil telecommunications business us treasury charged pangates company registered supplied assad government thousand tonnes aviation fuel however makhloufs able continue operate via panama shell companies registered british virgin islands subject us law – however may 9 2011 eu issued sanctions extended order council british virgin islands july 2011 mossack fonseca decided september 6 resign makhlouf companies makhlouf already cut ties bank hsbc told law firm swiss authorities frozen makhlouf accounts contact beneficial owner company since last 3 months bangkok post reported anti-money laundering office amlo seeking information foreign counterparts regarding twenty-one thai nationals reportedly included list people worldwide using panama-based law firm apparently specializing money laundering tax evasion clear amlo investigating twenty-one panama papers include least 780 names individuals based thailand another 50 companies based thailand foreigners foreign-owned companies 634 individual addresses thailand appear documents surfaced date including ceos giant companies bangkok land phatra finance investigations icij sole east asian partner commonwealth magazine taiwan found least 2,725 offshore companies registered addresses taiwan ninety taiwanese including singer actor nicky wu included papers according report released commonwealth magazine wu used firm horizon sky technology ltd. co-operate hong kong-based sun entertainment culture limited publisher concludes taiwanese companies individuals believed extensively using offshore shelters avoid evade taxes ... scouring panama papers documents mossack fonseca one main conduits time appears big taiwanese banks law firms accounting firms often use services mossack fonseca presence taiwan forty-six taiwanese brokers work mossack fonseca relatively small-scale consulting firms operating greater china taiwanese entities set shell companies panamanian law firm small unlisted companies individuals icij guardian independent reported uae president khalifa bin zayed al nahyan owns london real estate worth £1.2 billion structure thirty shell companies mossack fonseca set british virgin islands administer using manage control luxury properties london december 2015 mossack fonseca held nearly shares companies trust structures behalf president wife son daughter trust beneficiaries canadian prime minister justin trudeau denied involvement affair saying entirely completely transparent mine family finances something learned early canadians expect leaders canada revenue agency said statement current tax evasion audits include canadian clients associated law firm mossack fonseca added would communicate treaty partners obtain information may currently possession cra tax treaties 92 different countries 22 tax information exchange agreements cra begun completed 116 audits 234 planned investigations expected recoup least 11 million taxes fines fewer 10 related criminal investigations progress royal bank canada rbc denied wrongdoing associated 370+ clients referred mossack fonseca years extensive due diligence process ... rbc works within legal regulatory framework every country operate said bank spokesman ceo david mckay said bank review four decades documentation problems ceo bill downe bank montreal said canadian banks 'dramatically beefed anti-money laundering control last seven 10 years added link canadian businesses panama papers companies would originated long time ago canadian banks took action stop money laundering individuals surface leaked documents according icij partner investigation toronto star canadians tax fairness calculated legal tax avoidance corporations alone cost canadian treasury almost 8 billion canadian year calculated 2015 numbers found corporations individuals combined sent 40 billion declared assets tax havens ten popular alone held 270 billion canadian assets administration president luis guillermo solís suggested activity unveiled leaked documents suggests attempts evade taxes administration effort implement tax increases reforms met strong resistance opposition business figures leaked documents suggest mossack fonseca helped tuna export company borda azul set shell company british virgin islands order avoid costa rican taxes firm business headed hermes navarro president costa rican football federation 1999 2006 late 1990s finance ministry prosecutor office investigated borda azul export companies allegedly misusing tax credit certificates 1997 dozens companies accused using certificates fraud launder drug profits according icij investigative partners databasear seminario universidad mossack fonseca helped borda azul fabricate invoices allow report inflated costs—to reduce taxes—and inflated exports allow continue qualify tax credit certificates letter dated october 19 1998 mossack fonseca lawyer explained investigation panama city office concluded thirty costa rican law firms mentioned panama papers referring clients mossack fonseca resulting creation 360 shell companies particular gonzalo fajardo asociados founded former finance ministry official later economy minister gonzalo fajardo salas nearly two decades helped costa rican companies set 82 offshore corporations tax havens according databasear finance vice minister fernando rodríguez said costa rica push sign tax information exchange agreement panama legislators several parties trying line political consensus seek approval administration tax fraud bill form legislative commission investigate named panama papers according emilia molina cruz citizens action party opposition parties maintained country financial problems stem excess spending according finance department sums costa rica loses tax evasion equal 8 country gross domestic product deficits run 6 aristóteles núñez charge time government tax administration said people involved panama papers case still make tax declarations pay taxes investments mexican foreign investments bank accounts crime income declaring illegal investments categorized tax evasion fines 100 omitted tax payment result well three months nine years imprisonment according forbes hinojosa prominent mexicans mostly businessmen close ties government including least one member forbes billionaires list subject extensive articles published online icij investigation partners proceso aristegui noticias sunday proceso also said mexicans mentioned leaked documents included individuals linked drug cartels ken emrith member opposition united national congress unc linked bribery scandal brazil panamanian shell companies used transfer millions us dollars offshore bank accounts brazilian construction company awarded contract 2011 national infrastructure development company nidco people partnership administration build highway trinidad tt 5.2 billion highway 49 complete estimated highway cost tt 8 billion done investigators found emirth companies received 6 million nidco emirth also director pembury consultants trinidad tobago limited oas hired highway project consultant 44,800 month may 2013 oas paid pembury least tt 896,000 totals beyond date currently available emrith described low-level unc party official second mossack fonseca company pendrey associates speaking parliament attorney general faris al-rawi said leaked documents tied offshore company key players petrobras scandal brazil including convicted jose luiz pires queluz dealings swiss ag pires investigation said according icij investigative partner trinidad express emrith close associate jack warner also owns half shares proteus holding sa investment refuses discuss says responsibility confidentiality fellow shareholders express also says oas used namibian port development project camouflage 1 million payment procopio shell company santa tereza services ltd emirth president barack obama critical caribbean tax havens 2008 election campaign 2010 united states implemented foreign account tax compliance act law required financial firms around world report accounts held us citizens internal revenue service us hand refused sign common reporting standard set organisation economic co-operation development alongside vanuatu bahrain means us receives tax asset information american assets income abroad share information happens united states countries words means united states become attractive tax least 2,400 us-based clients found papers many transactions legal mossack fonseca offered advice many us clients evade us tax financial disclosure laws panama free trade agreement supported obama clinton accused enabling practices detailed within panama papers regulatory oversight however obama administration official said argument zero merit john cassidy new yorker said panama free trade agreement actually forced panama release information american regulatory authorities ownership companies partnerships trusts foundations persons citing leaked diplomatic cables fortune writer chris matthews speculated obama clinton may supported agreement opposing campaigning office quid pro quo panamanian support us efforts drug trafficking event notes true agreement abolished limits fund transfers us panama obama administration insisted two countries first sign tax information exchange agreement well facilitated exchange tax information countries president barack obama addressed overseas shell companies listed leak press conference 're breaking laws said laws poorly designed allow people 've got enough lawyers enough accountants wiggle responsibilities ordinary citizens abide although leader us mentioned panama papers obama said frankly folks america taking advantage stuff senators sherrod brown elizabeth warren requested treasury department investigate us-linked companies appeared leaks addition justice department given role financial markets former secretary state 2016 democratic presidential candidate hillary clinton condemned outrageous tax havens loopholes ... panama elsewhere pennsylvania afl–cio event clinton added behavior clearly law everyone violates law anywhere held accountable scandalous much actually legal clinton promised going scams make sure everyone pays fair share america manhattan us attorney preet bharara opened criminal investigation matters related panama papers sent letter april 3 international consortium investigative journalists icij saying office would greatly appreciate opportunity speak soon possible icij received many requests many countries icij director gerard ryle said policy turn materials new york department financial services asked 13 foreign banks including deutsche bank ag credit suisse group ag commerzbank ag abn amro group nv societe generale sa information dealings mossack fonseca banks accused wrongdoing must provide telephone logs records transactions new york branches law firm mcclatchy newspapers initially found four americans offshore shell companies named documents previously either accused convicted financial crimes fraud tax evasion three reasons suggested explain scarcity americans leak asked paucity american individuals documents digital editor süddeutsche zeitung stefan plöchinger said via twitter wait coming next plöchinger later clarified advocating jumping conclusions copies least 200 american passports – indicating owners applied banking services – discovered papers us politicians yet named leak names americans however mentioned former south african president thabo mbeki head african union panel illicit financial flows april 9 called leak welcome called african nations investigate citizens nations appear papers panel 2015 report found africa loses 50 billion year due tax evasion illicit practices 50-year losses top trillion dollars furthermore said seychelles african nation fourth mentioned tax documents minister industry mines abdeslam bouchouareb sole owner panamanian-registered offshore company known royal arrival corp since 2015 company active turkey great britain algeria managed compagnie d'etude et de conseil cec based luxembourg account swiss nbad private bank cec confirmed ownership royal arrival said managed minister inherited assets transparency algeria estimates lost 16 billion dollars offshore 2004 2014 cause concern given drop price oil accounts 95 algeria external revenue panama papers exposed link american oil company oil concessions several powerful politicians angola according leaked documents approximately fifteen shell companies funneled money ubs bank accounts elites portugal direct ties helder bataglia dos santos escom describes one largest investors angola democratic republic congo account one company markwell inc received sent 12 million 2008 2009 petroleum minister josé maria botelho de vasconcelos power attorney offshore company 2002 became petroleum minister previously employed number years executive sonangol according leaked documents denies wrongdoing icij partner le monde says seen documents show proxyholder medea investments limited founded niue 2001 moved samoa five years later company issued bearer bonds capitalization 1 million closed 2009 never previously accused corruption angola 5 billion sovereign wealth fund fundo soberano de angola fsdea promotes vehicle development prosperity angola fsdea headed josé filomeno de sousa zenu dos santos son president josé eduardo dos santos power since 1979 funded state-owned petroleum company sonangol fsdea critics say record-keeping murky seems engage nepotism cronyism ian kirby head court appeal owns seven holding companies british virgin islands said intended investment lost money 2015 congo produced 290,000 barrels oil day philia attorney denied receiving advantageous pricing said received 2.5 coraf oil denis christel sassou-nguesso son denis sassou nguesso power 32 years re-elected march disputed election daniel representative oyo member ruling parti congolais du travail congolese party labour also assistant director-general société nationale des pétroles du congo snpc general manager national refinery coraf according leaked documents mossack fonseca establish shell company british virgin islands named phoenix best finance ltd. name also appears 2002 director geneva-based philia sa alongside oil merchant jean-philippe amvame ndong denied knowledge matters according swiss non-profit berne declaration philia exclusive no-bid contract congolese oil exports coraf refinery last three years country received payment oil shipped refinery bruno itoua president advisor oil director-general snpc 2005 us federal court found diverted funds fictitious companies nonetheless became minister energy panama papers documents seen le monde reveal also held power attorney since 2004 denvest capital strategies grafin associated sa registered mossack fonseca panama british virgin islands itoua currently minister scientific research 1999 2002 kabila regime transferred ownership least 5 billion assets state-mining sector private companies control ... compensation benefit state treasury united nations investigation found us dodd-frank act supposed help bring end conflict diamonds minerals us idea public opinion would force divestment time section 1502 require divestment mandate disclosure instead disclosure requirement simply meant new business opportunities money launderers recently 2014 un found 70 percent drc gold sold dubai without problem gold continued provide important funding army armed rebel groups march 2005 dan gertler international formed new company global enterprises corporate gec global resources owned beny steinmetz former drc mines minister simon tuma-waku special adviser company formed joint copper cobalt mining venture drc agency la générale des carriers et des mines gécamines held 25 gec 75 placed isle man holding company nikanor plc ipo raised £400 million london company eventually reached market capitalization 1.5 billion initial investment 3 million steinmetz appears 282 leaked documents gertler dan gertler inc ties joseph kabila closest aide 200 presidential decree ratified agreement issued despite recommendation anti-corruption lutundula commission according panama papers kabila twin sister owns part offshore company interests congo include part mobile-phone company vodacom congo government called press conference warn journalists printing names congolese figures might appear documents kabila sister jaynet désirée kabila kyungu feruzi kalume nyembwe advisor late father former president laurent-désiré kabila directors keratsu holding limited company registered niue mossack fonseca months elder kabila assassination keratsu held 19.6 shares congolese wireless network held 49 vodacom congo lucien ebata kinshasa businessman runs orion group sa registered seychelles 2009 mossack fonseca luxembourg-based figed according panama papers ebata receives salary million dollars business volume around billion counts shell société nationale des pétroles du congo snpc among customers theory american european buyers gold africa required review supply chain report use conflict resources gold eastern congo practice requirement widely ignored investigation african network centers investigative reporting ancir found examples leaked mossack fonseca documents anonymous shell companies sourcing start drc gold winds dubai way uganda dubai 75 billion gold industry regulated light hand quasi-private dubai multi commodities centre dmcc kalotti exports 40 dubai gold bought 5.2 billion gold 2012 little paperwork according ernst young partner amjad rihan rijan said dmcc employer squashed concerns dmcc changed audit procedures ensure favorable outcome future ancir journalists obtained records showing kalotti sold scrap gold refiners including valcambi leaked documents show pamp holding mauritius signed agreement mks holding bv two shell companies described beneficial owners panama-based mountside investment hong kong-based dynamic bonus limited 2010 mks holdings owned 72 joint venture mmtc ltd. owned state india switzerland pamp joint venture supply big multinationals like apple alaa mubarak son former president hosni mubarak cited owning holding companies real estate properties london assets virgin islands-registered firm pan world investments frozen response european union order father stepped 2011 arab spring mossack fonseca fined 37,500 2013 lack due diligence alaa brother convicted last year embezzling state funds still face trial insider trading egyptian businessmen mohamed abu el-enein ahmed bahgat ashraf marwan ibrahim kamal mohamed nosseir mohamed mansour raouf ghabbour mohamed al-maghraby named leaked documents well orascom development holding company headed samih sawiris also bank alexandria banque misr banque du caire former sudanese president ahmed al-mirghani client mossack fonseca also al-mirghani lived egypt 1989 coup ended presidency active democratic unionist party orange star corporation bought long-term lease tony london neighborhood near hyde park 600,000 year al-mirghani created time death held assets worth 2.72 million every ramadan fed 500 people financed 20 pilgrimages mecca every year described billionaire seydou kane holds diplomatic passports senegal gabon mali protocol officer senegalese embassy paris waiting plane landed roissy-charles-de-gaulle november 2015 kane close associate gabonese ruling family questioned jailed nanterre ten hours anti-corruption agents connection investigation opened july 2007 january 2013 kane briefly questioned transit miami le bourget french authorities whose curiosity piqued €2.5 million cash person according senegalese daily libération money-laundering unit tracfin became interested 2006 €300,000 payment groupe marck french company specializing military uniforms anti-riot gear monaco-based entity called citp citp managed kane close friend president chief staff maixent accrombessi held paris interrogated august 2015 french officials wanted ask accrombessi contract marck gabonese ministry interior €7 million head marck philippe belin also held questioned investigation assigned also conducted so-called ill-gotten goods investigation targeted number african leaders including father predecessor ali bongo ondimba current president gabon mossack fonseca opened two holding companies kane 2013 2014 maxi gold international limited smart key ltd according paperwork traded sundries one hand gym equipment john addo kufuor son john agyekum kufuor mossack fonseca manage trust starting 2001 father took office trust held 75,000 bank account panama mother also beneficiary linked two offshore companies also registered father term inactive kojo annan son former secretary-general united nations kofi annan appears laolu saraki son late nigerian senator abubakar olusola saraki shareholders blue diamond holding management corp registered mossack fonseca british virgin islands 2002 two directors sutton energy ltd also registered british virgin islands 2002 transferred samoa 2015 annan used another shell company first registered british virgin islands transferred samoa purchase apartment london 500,000 2008–2009 beny steinmetz group resources bsgr owner beny steinmetz paid 165 million mining rights northern portion simandou mine located nzérékoré region guinea interior soon sold 51 percent rights vale 2.5 billion rio tinto previously held concession invested 450 million infrastructure site global witness says bsgr fact paid nothing rights 165 million represents bsgr self-reported investment improvements site adds either way bsgr profit exceeded national budget guinea us authorities say steinmetz paid mamadie touré 5.3 million help obtaining concession husband lansana conté president guinea shortly died according global witness offshore company belonging touré matinda received payment 2.4 million company named pentler holdings several payments promised well 5 bsgr shares simandou pentler owned 17.65 bsgr guinea guinean president alpha condé launched investigation elected 2010 separately us federal bureau investigation fbi us justice department suspecting violations foreign corrupt practices act august 2014 mossack fonseca received tax information exchange agreement tiea notice us government inquiring ownership pentler two bsgr companies administered mossack fonseca geneva office however president pentler financial management firm menachem eitan fugitive us sec facing charges 55 million ponzi scheme guinea mines minister mohamed lamine fofana said 2012 bsgr n't follow law jean-claude n'da ametchi advisor former president laurent gbagbo refused accept lost election 2010 also mentioned leaked documents european union sanctioned banker n'da ametchi 2011 helping finance gbagbo regime offshore company cadley house ltd registered seychelles bearer bonds bank account morocco n'da ametchi sent email 2011 geneva office mossack fonseca naming geneva bank pasche financial managers company september 2012 acted sole director request transfer registration abidjan neither mossack fonseca banks mentioned european sanctions eventually lifted 2012 company apparently still active 2015 according documents seen le monde currently advisor former prime minister charles konan banny lost october 2015 presidential election former deputy chief justice kalpana rawal director shareholder four holding companies active two took office husband owns another seven companies used real estate transactions britain rawal husband shareholders directors highworth management services ajay shah former director trust bank also shareholder director central bank kenya ordered shah assets auctioned repay depositors trust bank collapsed went hiding assets recovered mounir majidi personal secretary king mohammed vi designated march 2006 representative smcd limited created 2005 geneva financial advisor dextima conseils according icij smcd majidi bought aquarius w 1930s-era luxury sailboat registered morocco el boughaz belonging king smcd according icij also made loan luxembourg company logimed investissements co sarl details available following loan smcd liquidated 2013 diamond ocean enterprises mossack fonseca entity set 2005 reported purpose financial consulting namibian diamond manufacturer polisher according law firm records deutsche investment consultants asia limited mossack fonseca company set british virgin islands now-imprisoned mafioso vito palazzolo wolf-peter berthold german banker based hong kong director firm shareholders include peter von palace kolbatschenko palazzolo son berthold giovanni agusta also 2005 zacharias zacky nujoma youngest son sam nujoma set two holding companies avila investments marbella investments licensed buy cut diamonds shortly afterwards 90 stock transferred diamond ocean 2006 nujoma established ancash investments obtained seven exclusive uranium prospecting licenses palazzolo loaned company us 10 million canadian mining company announced would partner ancash uranium contracts said based decision part ancash strong international support natural earth international ltd. hong kong natural earth another deutsche investment company corrupt officials stolen 150 billion nigeria last 10 years said nigerian president muhammadu buhari said april 7 2016 added planned ask united states president barack obama help president nigerian senate bukola saraki found panama papers leak ties least four offshore companies failed declare code conduct bureau nigerian law requires wife toyin also shell companies listed name mossack fonseca documents girol properties ltd sandon development limited *landfield international developments ltd. saraki said assets holding companies belong wife family therefore required report ancir dismisses however leaked documents link firm handwritten note suggests mossack fonseca aware nominee director aliko dangote chief executive dangote group tied leaked documents four offshore companies many 13 family business associates included dangote estimated 17 billion worth currently involved construction 14 billion oil refinery lagos former delta state governor james ibori also mentioned leak ibori pleaded guilty london 2012 siphoning 75 million nigeria office 1999–2007 charges nigeria dropped nigeria following election ibori sentenced 13 years mossack fonseca registered agent four offshore entities received request 2008 information accounts british crown prosecutors family julex foundation shareholder stanhope investments company incorporated 2003 island niue funneled millions dollars could buy private jet united kingdom returned £6.8 million nigeria funds seized accounts determined belonged ibori anti-corruption taskforce olusegun obasanjo government economic financial crimes commission questioned time whether yar'adua administration refrained loath pursue members nigerian elite suspected corruption including leading financiers ruling party like ibori supported election former senate president david mark also listed owner eight shell companies leaked panama papers sikera overseas s.a. colsan enterprises limited goldwin transworld limited hartland estates limited marlin holdings limited medley holdings limited quetta properties limited centenary holdings limited portion wealth owned former chairman united bank africa uba hakeem belo-osagie domiciled trusts shell companies notorious tax havens around world government rwanda uses offshore company lease private jet senior politicians leaked documents show brigadier-general emmanuel ndahiro using london address become director british virgin islands company debden investments ltd. 1998 owner jet aircraft ndahiro close advisor president paul kagame spokesman kagame military according panama papers owner company hatari sekoko ran number real estate hotel ventures marriott kigali icij partner ouestaf.com able establish panama papers existence secret contracts dp world fze dp mamadou pouye bribery codefendant karim wade son former prime minister abdoulaye wade information available trial ouestaf confirmed financial ties corporation first time panama papers investigation wade sentenced 2015 six-year prison term cour de répression de l'enrichissement illicite crei specialized anti-corruption court wade accused illegally amassing assets 240 million childhood friend pouye sentenced five years allegedly helping denied wrongdoing united nations amnesty international said rights violated trial ouestaf investigation address legality trial conclude succeeded tracing payment pouye oversea shell company subsidiary dp wade remains member senegalese democratic party pds still pds candidate 2017 presidential election mossack fonseca documents show pouye owned three offshore companies seabury inc regory invest latvae inc. seabury seems set solely business dp world started 2008 year senegal signed contract dp world rights container terminal autonomous port dakar april 2009 wade became minister international cooperation territorial development air transport infrastructure remained father defeat macky sall 2012 election regory invest acted seabury subcontractor receiving €65,000 euros month according documents according ouestaf documents make clear crei investigators interested funds pouye monaco account know source offshore account created two contracts prove fact relationship defendants dp world investigator papa alboury ndao told court february discovered two payments 13 million subsidiary dp world fze singapore bank account belonging karim wade however bank singapore refused cooperate ndao forced drop line inquiry mossack fonseca opened several offshore companies multinationals example anglogold owner anglogold investments senegal ltd et anglogold exploration senegal ltd based british virgin islands senegalese architect pierre atepa goudiaby special advisor former president abdoulaye wade also mentioned leaked documents swiss law firm fidinam sa mossack fonseca open offshore atepa engineering corp en 2006 year goudiaby opened paris office champs-elysées icij investigation traces many levels offshore holdings multiple countries related business dealings beny steinmetz many serious findings request mossack fonseca backdate revocation power attorney mossack fonseca records show sierra leone diamond exporter octea based british virgin islands steinmetz family beneficiaries wholly owned guernsey-based bsgr resources linked bribery scandal guinea foundations switzerland liechtenstein among nysco balda bsgr 2007 one nysco bank accounts contained 27.7 million steinmetz personal fortune 6 billion supplies diamonds tiffany debeers sierra leone largest private investor yet according detailed report namibian octea subsidiary owes among debts property taxes 700,000 city koidu unpaid taxes discounted according mayor saa emerson lamina octea promised 5 profit−sharing agreement payment 1 annual profit community development fund either octea subsidiary koidu holdings obtained mine 28 million supposed deposit 2002 fighting stopped sierra leone mine previously held worked south african firm branch energy payment services parent company executive outcomes effectively ... military battalion hire rebel fighters area steinmetz since put 300 million project according reporting african network centers investigative reporting ancir company produces 60–90 sierra leone diamond exports months 2012 2015 exported us 330 million rough diamonds octea owes us 150 million unpaid loans although government records show taxes paid diamond companies none listed octea national mineral agency nma 2005 valued diamonds export using price book based 1996 figures companies also often seek minimize value diamond exports reduce taxes move profits abroad transferred subsidiary elsewhere value taxed diamonds frequently worth diamonds koidu average 330 carat roughly 50 de beers jwaneng mine botswana world biggest tiffany first pick best stones mined koidu remainder sold trade buyers according bloomberg according world bank sierra leone long time based growth forecasts success two companies one octea parent bsgr two men linked fidentia south african asset management company looted 1.2 billion rand pension funds meant provide 46,000 widows orphans mineworkers accounts mossack fonseca willing help hide money even south africa made names public former chief executive fidentia j. arthur brown sentenced 2014 concurrent 15-year sentences fbi arrested one man steven goodwin los angeles 2008 sent back south africa goodwin sentenced 10 years prison fraud money laundering graham maddock also later jailed south africa fraud khulubuse zuma nephew south african president jacob zuma links documents offshore company oil interests democratic republic congo denied wrongdoing according leaked documents president zuma also ties oil mining deal british virgin islands-based oil company caprikat limited joseph kabila president democratic republic congo drc helped caprikat obtain oil fields drc sent nephew drc run firm former president ahmed al-mirghani surfaced client mossack fonseca al-mirghani president 1986 1989 created orange star corporation british virgin islands panama firm 1995 living egypt coup ended presidency active democratic unionist party orange star corporation bought long-term lease tony london neighborhood near hyde park 600,000 year al-mirghani created time death held assets worth 2.72 million trial court prosecutor tunis ordered judicial inquiry panama papers tunisian political figures suspected hiring firm judge tunisian court specializing financial crimes assigned case tunisian assembly representatives people established parliamentary commission inquiry well newspaper inkyfada access documents reported dozen politicians former government officials lawyers implicated well leading media figure monday april 4 2016 reported former secretary-general nidaa tounes political party mohsen marzouk also coordinator new political party machrouu tounes point creating account december 2014 first presidential elections marzouk written mossack fonseca company virgin islands emphasizing desire hold funds conduct business overseas marzouk denies filed defamation complaint inkyfada forced briefly shut website following report due cyberattack attempted insert names politicians mentioned leaked documents mossack fonseca documents provide new insight confirmation previously-litigated tax case offshore company transferred registration avoid paying capital gains tax uganda documents show heritage oil gas limited hogl knew advance capital gains tax uganda planned enact hogl operating uganda planned sell half ugandan assets urgently moved registration bahamas mauritius avoid tax mauritius double taxation agreement uganda meaning hogl would pay tax one two countries mauritius capital gains tax moving heritage reduced capital gains tax zero emails clearly show reason transfer although company attorneys deny 2010 hogl sold 50 percent stake ugandan oil fields tullow uganda us 1.5 billion uganda revenue authority ura applied us 404 million capital gains tax transaction hogl refused pay four-year battle various courts ensued ugandan officials including president yoweri museveni then-ura commissioner-general allen kagina demanded payment tullow threatening renew exploration licenses expire unless deducted tax payment heritage remitted ura eventually tullow made payment deposited rest escrow pending legal resolution appeal came 2013 tullow also successfully sued hogl recover taxes paid behalf heritage gas oil subsidiary heritage oil founded conservative party donor tony buckingham given party £100,000 december 31 2008 still owned 33.1 heritage oil uganda ratio tax gross domestic product less 14 one lowest east africa arms dealer mining tycoon close links president robert mugabe operated offshore companies despite us european sanctions 2013 four years sanctions announced according leaked documents according panama papers zimplats holdings large platinum mining concern set shell company pay salaries senior managers zimplats denies knowledge company hr consultancy company still active 2015 unknown reserve bank zimbabwe may indicate externalization funds tax evasion appears salaries citizens zimbabwe performing work zimbabwe april 22 2016 australia said would create public register showing beneficial actual owners shell companies part effort stamp tax avoidance multinational corporations australian taxation office announced investigating 800 individual australian taxpayers mossack fonseca list clients cases may referred country serious financial crime task force eighty names match organized crime intelligence database leaked documents examined abc pierced veil anonymous shell companies linked sydney businessman brisbane geologist mining deals north korea rather applying sanctions australian government asx seem allowed coach horses ridden people involved forming relationship corporate relationship one primary arms manufacturers north korea said thomas clark university technology sydney david sutton director aat corporation ehg corporation held mineral licenses north korea business korean natural resources development investment corporation united nations sanctions north korea primary arms dealer main exporter goods equipment related ballistic missiles conventional weapons responsible approximately half arms exported north korea geologist louis schurmann said british billionaire kevin leech key putting deal together leaked documents also reveal involvement another briton gibraltar-based john lister according abc department foreign affairs trade aware mining deals also brought australian senate nobody ever referred matter australian federal police may 12 2016 names former prime minister australia malcolm turnbull former premier new south wales neville wran found panama papers due pair former directorship mossack fonseca-incorporated company star technology systems limited turnbull wran resigned positions 1995 prime minister denied impropriety stating star technology made profits—which regrettably—it certainly would paid tax australia media initially reported panama papers lists 500 entities created jurisdiction cook islands population 10,000 almost many singapore whose population 5.7 million winebox affair cook islands gave new zealand jurisdiction tax matters new zealand inland revenue department said working obtain details people tax residence country may involved arrangements facilitated mossack fonseca gerard ryle director international consortium investigative journalists told radio new zealand april 8 2016 new zealand well-known tax nice front criminals new zealand provides overseas investors foreign trusts look-through companies new zealand government policy request disclosure identity either settlor beneficiaries trust thus ownership remains secret consequence thus hiding assets trust-holder home jurisdictions trusts taxed new zealand trusts used acquire new zealand registered companies become vehicle trust owners exercise day day control assets new zealand-registered companies designed make profit using loans tax havens profit shifting techniques result tax free income general respectability typically associated companies registered new zealand prime minister john key responded may 7 john doe remark curiously quiet tax evasion cook islands saying whistleblower confused probably european cook islands use new zealand currency much responsibility tax cook islands taxing russia new zealand represent cook islands defence foreign policy taxation said distancing new zealand cook islands key ignored close ties two countries crucial role new zealand setting cook island taxation system mossack fonseca approached niue 1996 offered help set tax tiny south sea island law firm drafted necessary legislation permitting offshore companies operate total secrecy took care paperwork island got modest fee filing seemed like quite deal even required law provide banking paperwork russian chinese well english soon filings almost covered island year budget us government however made official noises 2001 laundering criminal proceeds chase bank blacklisted island bank new york followed suit caused inconvenience population let contract mossack fonseca expire many privacy-seekers banking world moved stay however apparently panama papers database lists nearly 10,000 companies trusts set niue population 1200 many recently created shell companies set samoa perhaps niue revised tax laws panama papers database lists 13,000 companies trusts set samoa population roughly 200,000 may 27 2015 us department justice indicted number companies individuals conspiracy corruption racketeering connection bribes kickbacks paid obtain media marketing rights fifa tournaments immediately entered guilty pleas among indicted jeffrey webb jack warner current former presidents concacaf continental confederation fifa headquartered united states charged racketeering bribery offenses others us south american sports marketing executives paid agreed pay well 150 million bribes kickbacks december 12 2014 josé hawilla owner founder traffic group brazilian sports marketing conglomerate waived indictment pleaded guilty four-count information charging racketeering conspiracy wire fraud conspiracy money laundering conspiracy obstruction justice hawilla also agreed forfeit 151 million 25 million paid time plea torneos traffic subsidiary fox international channels since 2005 investments since 2002 company involved corrupt practices acquisition rights major south american soccer tournaments many individuals mentioned panama papers connected world governing body association football fifa including former president conmebol eugenio figueredo former president uefa michel platini former secretary general fifa jérôme valcke argentine player barcelona lionel messi italy head manager metro antonio guglielmi leak also revealed extensive conflict interest member fifa ethics committee former fifa vice president eugenio figueredo swiss police searched offices uefa european football governing body naming former secretary-general gianni infantino president fifa signed television deal uefa company called cross trading fbi since accused bribery contract emerged among leaked documents infantino denied wrongdoing april 2019 icij european newspapers reported global tally payments exceeded one billion usd 1.2 billion comparison great britain recovered largest position 253 million followed denmark 237 million germany 183 million spain 164 million france 136 million australia 93 million colombia 89 million recuperated highest amount south central american countries heavily involved financial scandal investigations ongoing austria canada switzerland payments expected many countries conducting continued inspections companies private individuals revealed report
|
Computer security
|
canonical s-expressions canonical s-expression csexp binary encoding form subset general s-expression sexp designed use spki retain power s-expressions ensure canonical form applications digital signatures achieving compactness binary form maximizing speed parsing particular subset general s-expressions applicable composed atoms byte strings parentheses used delimit lists sub-lists s-expressions fully recursive s-expressions typically encoded text spaces delimiting atoms quotation marks used surround atoms contain spaces using canonical encoding atom encoded length-prefixed byte string whitespace separating adjacent elements list permitted length atom expressed ascii decimal number followed sexp becomes csexp note quotation marks required escape space character internal atom canonical s-expression length prefix clearly points end atom note also whitespace separating atom next element list csexps generally permit empty lists empty atoms forth certain uses csexps impose additional restrictions example csexps used spki one limitation compared csexps general every list must start atom therefore empty lists typically list first atom treated one treats element name xml encodings common use generally csexp parser one two decimal orders magnitude smaller either xml asn.1 small size corresponding speed give csexp main advantage addition parsing advantage differences csexp xml differ csexp data-representation format xml includes data-representation format also schema mechanism thus xml configured particular kinds data conform grammar say html atom svg mathml new ones needed languages defining document grammars dtd defined xml standard xsd relaxng schematron commonly used xml additional features xml also work schema csexp data course operated schemas implemented higher level provides mechanism terms characters bytes csexp string may byte sequence whatsoever length prefix atom xml like regular scheme s-expressions json literals programming languages requires alternate representations characters control characters however effect range structures semantics represented xml also provides mechanisms specify given byte sequence intended interpreted say unicode utf-8 string jpeg file integer csexp leaves distinctions external mechanisms basic level csexp xml represent trees external representations surprising since xml described differently-punctuated form lisp-like s-expressions vice versa however xml includes additional semantics commonly achieved csexp various conventions rather part language first every xml element name csexp applications commonly use first child expression second xml provide datatyping firstly via schema grammar schema also however distinguish integers strings data objects types e.g jpeg especially xsd types xml element may also attributes construct csexp share represent xml data csexp one must choose representation attributes obvious one reserve second item s-expression list name value pairs analogous lisp association list xml id idref attributes equivalent csexp easily implemented csexp application program finally xml element may contain comments and/or processing instructions csexp specific equivalents trivial represent merely reserving name example naming *com *pi prevents ever colliding xml element type names csexp xml fully recursive first atom csexp list convention roughly corresponds xml element type name identifying type list however csexp atom encoding e.g. jpeg unicode string wav file … xml element names identifiers constrained certain characters like programming-language identifiers csexp method obviously general hand identifying encoding item thus interpret determined particular user conventions meaning csexp application must build conventions code documentation forth similarly csexp atoms binary consisting length prefix followed totally arbitrary bytes xml designed human-readable arguably less json yaml arbitrary bytes xml must encoded somehow example bitmapped image included using base64 means storing large amounts non-readable information uncompressed xml takes space hand survive translation alternate character sets including transmission network hosts may apply differing character sets line-end conventions etc. suggested xml merges sequence strings within one element single string csexp allows sequence atoms within list atoms remain separate one another incorrect exactly like s-expressions csexp xml notion sequence strings strings separated somehow asn.1 popular binary encoding form however expresses syntax data types semantics two different structures sequence two integers identical representations wire barring special tag choices distinguish parse asn.1 structure one must tell parser set structures one expecting parser must match data type parsed structure options adds complexity asn.1 parser csexp structure carries indication semantics encoded element names parser csexp structure care structure parsed wire-format expression parsed internal tree form similar xml dom consumer structure examine conformance expected noted xml document without schema works like csexp respect xml document work like asn.1
|
Programming language topics
|
mercury systems mercury systems inc. high-tech commercial company serving aerospace defense industries headquartered andover massachusetts processing subsystems used intelligence surveillance reconnaissance isr radar electronic warfare ew storage guidance defense applications mercury based andover massachusetts 1000 employees offices around world annual revenues approximately us 493 million fiscal year ended june 30 2018 meet department defense dod defense electronics procurement reform objectives mercury created next generation business model defense procurement reform objectives captured department ’ better buying power 3.0 bbp3.0 overarching theme “ achieving dominant capabilities technical excellence innovation. ” mercury systematic approach creation defense processing subsystems using sensor processing chain methodology define reusable building blocks business approach leverages best commercial technology making mercury processing building blocks interoperable standardized defense processing subsystems quickly developed open system architectures osa fundamental meeting dod ’ bbp 3.0 objectives aligned mercury ’ business posture company pioneered many today ’ embedded protocols processing standards including rapidio openvpx ansi/vita 65 standard de facto embedded digital processing standard currently company investing openrfm radio frequency rf microwave processing bring interoperability rf/microwave domain openvpx digital realm openrfm standardizes profiles interfaces protocols rf microwave processing enabling sensor chain applications fully open systems compliant mercury applies open systems architectures software well hardware approach applied middleware preserves software application investments adding new capabilities tech-refreshes mercury headquartered andover massachusetts facility incorporates design engineering capability innovation center mercury innovation centers showcase company ’ sensor mission processing solutions mercury redundant scalable advanced microelectronic centers amcs amcs production defense industry subsystems amcs operated new england new york metro-area southern california trusted dmea facility southwest mercury three major product lines br • advanced microelectronic rf digital br • sensor mission processing mercury mission systems safety-critical avionics mission processing networking communication secure high-performance sensor processing storage networking br • mercury defense systems – electronic warfare secure processing test simulation mercury ’ businesses supported several dedicated international operations including toronto canada silchester united kingdom tokyo japan geneva switzerland
|
Computer architecture
|
codan codan limited manufacturer supplier communications metal detection mining technology headquartered adelaide south australia revenue 132.3 million 2014 2017 revenue 226.1 million codan limited communications business unit parent company codan group engaged business operating segment radio communications product range sold customers 150 countries addition global service support network codan group regional sales offices washington d.c. usa victoria bc canada chicago il usa farnham uk beijing china dubai united arab emirates company maintains quality assurance systems approved standard company established 1959 three friends university adelaide alastair wood ian wall jim bettison company established electronics instrument lighting company limited eilco renaming codan 1970 codan listed australian stock exchange 2003 expanded military technology 2006 2005 ceo mike heard denied codan knowingling supplied technology al-quaeda operative 2001 mike heard acted company ceo 1990s held position retirement 2010 2009 codan established military security division usa 30 june 2012 codan limited sold satellite communications assets cpi international holding corp wholly owned subsidiary cpi international inc cpi 2016 codan defence electronics established leverage core competencies military radio countermine technology codan designs manufactures range hf equipment including transceivers base portable mobile modems power supplies amplifiers antennas accessories also provides hf solutions ranging basic voice communication data email fax chat gps tracking interoperability according fed mil standards codan hf transceivers initially developed provide communications people living working travelling central australia codan supplier hf radio products aid humanitarian markets since 1980 markets include public private security sectors well significant recreational vehicle user market australia codan military hf radio transceivers comply mil-std-188-141b ale jitc certified fed-std-1045 ale interoperable military grade radios provide frequency hopping voice encryption codan supplier us army provided around 3000 transceivers support security rebuilding programs afghanistan iraq 13 september 2011 dsei industry conference codan announced branding change hf radio division renaming division radio communications reflect broader focus company integrated radio communications systems 11 june 2012 eurosatory international defence security tradeshow codan radio communications announced launch codan envoy – software-defined radio enables users add new capabilities radio software updates 7 august 2012 codan announced acquisition daniels electronics limited daniels leading designer manufacturer supplier land mobile radio communications lmr solutions north america since launched tactical solutions stratus p25/lte hivenet p25 transportable repeaters secure mobile voice operations minelab specialises advanced electronic technologies including detection equipment military humanitarian de-mining projects also produce metal detectors consumer market company manufacturing distribution customer service operations adelaide australia cork ireland naperville usa iso 9001:2000 quality endorsed company minelab established 1985 acquired codan march 2008 minetec established technology service partner mining industry company provides integrated safety productivity communications solutions surface underground mining operations including advanced tracking mine operations management collision avoidance systems
|
Computer architecture
|
steve sakoman steve sakoman american computing executive retired apple computer 2005 independent consultant originally worked hewlett-packard manufacturing engineer project manager industry first battery-powered portable ms-dos pc hp 110 sakoman moved apple computer 1984 would oversee hardware groups responsible apple ii macintosh product lines 1987 formed team behind apple newton realize vision world first pda sakoman left apple 1990 newton shipped set inc. former apple executive jean-louis gassée led development original bebox personally developed beos support brooktree video-capture devices eventually worked company chief operating officer time ran webcam inside offices using codycam application 1994 moved silicon graphics director consumer products technologies group included work nintendo 64 graphics system returned 1996 palmsource acquired 2001 sakoman took role chief products officer key member team behind palm os 6 sakoman rejoined apple 2003 vice-president software technology reporting avie tevanian sakoman also set gutentalk 2004 site discuss ebooks specially formatted pdas hand-held readers
|
Operating systems
|
norton internet security norton internet security developed symantec corporation computer program provides malware prevention removal subscription period uses signatures heuristics identify viruses features included product personal firewall email spam filtering phishing protection release 2015 line summer 2014 symantec officially retired norton internet security 14 years chief norton product superseded norton security rechristened adaptation norton 360 security suite symantec distributed product download boxed compact disc cd copy oem software retailers also distributed usb flash drive norton internet security held 61 market share united states retail security suite category first half 2007 study competitors terms market share included security suites ca inc. trend micro kaspersky lab august 1990 symantec acquired peter norton computing peter norton norton company developed various applications dos including antivirus symantec continued development acquired technologies marketed name norton tagline symantec norton crossed-arm pose registered u.s. trademark featured norton product packaging however pose later moved spine packaging later dropped altogether users 2006 later versions upgrade latest version norton software without buying new subscription upgraded product retains number days left user subscription releases named year internal version numbers well internal version number advanced 15.x 2008 edition match norton antivirus release year 2013 20.x release product dropped year name although still referenced places norton internet security 2000 released january 10 2000 symantec first foray beyond virus protection content control filters release followed alliance internet provider excite home antivirus vendor mcafee.com provide internet subscribers mcafee new firewall software mcafee personal firewall version 2000s firewall based atguard wrq filters traffic packet level block activex controls java applets functionalities include cookie removal banner ad blocking zdnet found ad blocker removed graphics ads breaking pages adjusting settings fixed problem however process complicated zdnet noted lack information presented concerning attacks firewall blocked norton liveupdate downloads installs program updates family edition adds parental controls parental controls backed quality control team 10 searching web inappropriate content found content categorized subject matter placed blacklist 36,000 sites designed administrator add blocked sites however pre-supplied blacklist viewed edited since hard coded administrators block certain subject matters another option block sites create whitelist allowed sites family edition also block transmission specified personal information information replaced letter x however cnn noted x-rated sites retrieved personal information queried search engine version 2.0 released june 12 2000 version 2001 2.5 released september 18 2000 adding support windows addition windows 9x series windows nt windows 2000 following attacks iloveyou anna kournikova script viruses version block malicious scripts without virus signatures analyzing behavior firewall scans internet-enabled applications creates access rules based knowledge base maintained symantec installation pc magazine testing installation took 24 minutes complete 750 mhz pentium iii 92 internet-enabled applications using firewall users determine whether accept cookies java applets activex controls global per-site basis new feature intrusion detection autoblock detect port scans block intrusion attempts program provides notifications intrusion attempts stating severity level providing access threat details alternatively firewall put computer stealth essentially hiding system users configure security level affecting number notifications testing conducted pc magazine using shields symantec security check found firewall successfully stealthed ports hiding computer view leak test conducted see firewall ability detect outbound connections attempt detected suite offered block attempts family edition like prior version includes parental controls information filtering feature parental controls come list objectionable sites separated 32 categories list updated every two weeks norton liveupdate using list alone norton blocks sites present list consequently norton may block sites next update parents customize list adding removing sites list allowed sites created restrict children specific sites version uses application blocking rather protocol port filtering control internet access children restricted applications used access internet parental controls profile set child settings automatically configured based age group whether child teenager adult administrator internet usage violations noted report presented parents pc magazine found enabling parental controls added minute computer boot time version 3.0 released march 19 2001 version 2002 announced august 28 2001 family edition dropped parental controls information filtering bundled release installation noted quick simple pc magazine cnet installation requires reboot afterwards security assistant guides users questionnaire best configure settings problem cnet encountered upgrading prior release loss customized settings pc magazine found default settings aimed avoiding frequent notifications somewhat permissive windows 95 support also dropped running full scan complies list internet-enabled applications users set permissions accept norton default settings firewall detects blocks port scans logs intrusion attempts version run trace attackers however symantec planning online tool ensure rogue programs masquerade trustworthy applications norton verifies programs list digital signatures known programs update tracker warns users hackers attempt gain access users computers firewall blocked access attempts shields port checker version includes wizard simplify firewall setup accommodate multiple computers sharing internet connection release norton prevent specified personal information transmitted via compatible instant messenger client e-mail websites ad-blocking includes ad trashcan users place ads slipped past ad-filtering professional edition announced december 11 2001 marketing aimed towards business owners version features norton intrusion detection intercepts suspicious connections attacks code red worm intrusion detection focuses windows-based attacks central management also present version administrators configure firewall productivity settings client computers productivity settings allow administrators block newsgroups websites advertisements suite integrates xp user accounts settings personalized user version 2003 announced september 16 2002 scheduled available purchase later month version adds norton spam alert reduce spam filtering scans whole message context rather looking keywords ensure accuracy pop3 client must used message identified spam norton inserts identifier default spam alert subject line using mail client users create rule delete move flagged messages users also create strings text spam alert look classifying e-mail pc magazine testing spam alert mistakenly classified 2.8 percent legitimate e-mail spam 47 percent spam slipped past filter although false positive rate low feature fare well finding actual spam updated main interface green red indicators show features active need attention firewall several updated features version block traffic button present main interface blocks incoming outgoing internet traffic another new feature visual tracker graphically maps attacks back origin firewall blocked port scans conducted cnet stealthing port following nimda code red worms version scans incoming outgoing traffic suspicious data exchanges routinely updated database feature ported norton internet security 2002 professional edition connection offending computer automatically severed traffic matches database item symantec announced professional edition november 19 2002 data recovery tools version allow users recover deleted malware-damaged files inclusion data erasure tool allows users delete files minimizing chance recovery web cleanup removes browser cache files history cookies maintain dial-up connections connection keep alive simulates online activity periods user inactivity norton productivity control enables users filter internet content block newsgroups used user access manager multiple filtering profiles created assigned different users announced september 8 2003 version 2004 adds adware spyware keylogger protection pc magazine found added protection weak spyware samples norton detected significant number removed completely requiring manual removal norton also little prevent spyware infections norton antispam renamed spam filtering feature set spam rules viewed edited whitelists blacklists senders created users may also create spam definitions antispam integrates outlook outlook express eudora allowing users tag e-mail spam on-the-fly e-mail identified spam either quarantined default however feature configured delete messages automatically cnet testing antispam correctly identified 94 percent spam messages product activation introduced release installation users allowed 15-day grace period activate copy norton internet security 2004 program work deadline without 24-character product key product key used activate copy norton internet security ties alphanumeric code based computer hardware configuration users may activate product five times product key however licensing terms dictate users allowed install norton internet security 2004 one computer symantec introduced version 2005 august 17 2004 version sometimes referred tagline antispyware edition since spyware detection integrated norton default enabled found threats listed separating ones already dealt ones requiring user interaction detailed information provided link symantec website however pc pro pc magazine noted lengthy scan times full scan took 24 minutes half hour respectively pc pro testing norton detected 61 percent spyware samples compared average 68 percent tested products removal rates average 72 percent versus average 68 percent norton blocked reinstallation score 48 percent compared group average 43 percent overall norton ranked fifth among tested products pc magazine testing norton installed slowly infected systems failed install one altogether contacting symantec resolve issue new features include internet worm protection block worms scan ip addresses open ports also blocks inbound ports based known suspected exploits using signatures heuristics addition feature follows msblast 2003 sasser 2004 worms exploited vulnerability microsoft windows operating systems response emerging privacy threats — 75 percent threats last 12 months attempted steal confidential information — version adds phishing protection using firewall component users create whitelist sites confidential information transmitted users alerted information transmitted site list outbreak alert feature warns users major threats classified symantec users press fix button applies set changes close vulnerabilities blocking necessary ports used propagating worm browser privacy suppress information website generally receive visitors browser operating system used feature also block advertisements privacy control warn users sending confidential information also configured block transmission allows users specify information sent via im e-mail item-specific exceptions allow users control data sent however pc pro found flaw information filtering feature way information formatted list confidential information affect effectiveness example entering last six digits credit card number stop numbers leaking grouped four digits pc magazine also noted fact anyone login computer view database private information reason symantec recommends entering last portion sensitive information norton antispam scans e-mails spoofed urls deals offending e-mail spam e-mails also blocked based language however default filter allows languages antispam sync list allowed senders pop3 address books users train spam filter pointing valid e-mail marked spam vice versa support yahoo mail hotmail added release norton internet security 2006 debuted september 26 2005 new main interface norton protection center aggregates information central location security status shown secure computer tasks e-mail internet browsing context features enabled protection center also recognize third-party software protecting computer new interface advertises additional products symantec categories protection data protection read coverage user purchases installs norton systemworks additional system tray icon created protection center installation noted lengthy pc magazine especially malware-infected systems spyware detection tweaked since last release updated better identify keyloggers pc magazine testing norton successfully detected 11 spyware threats removed two pc magazine give norton credit even manual removal required suite also removed three four commercial keyloggers attempting install spyware clean system norton blocked 11 two four commercial keyloggers cases block installation however norton call scan spyware installed pc pro testing norton detected 78 percent spyware removed 82 percent blocked 65 percent installing norton antispam discontinued separate product symantec available norton internet security feature block e-mail unknown senders automatically blocks messages suspicious elements invisible text html forms phishing urls improve accuracy norton analyzes outgoing e-mails messages whose categorization corrected users hitting spam spam buttons pc magazine testing feature marked one ten valid e-mail spam let one every six spam messages inbox 400 messages used program allowed process messages week pc pro testing feature performed better blocking 96 percent spam false positive rate 0.2 percent norton recommends disabling windows firewall avoid redundant alerts firewall stealthed significant ports pc magazine testing attacking firewall unsuccessful pc magazine unable stop service terminate process disable firewall using simulated mouse clicks firewall also passed pc pro tests successfully stealthing ports features include bloodhound technology looks virus-like behavior better find zero day viruses security inspector looks common vulnerabilities including insecure user account passwords browser insecurities advertisement blocking rewrites website html prevent advertisements displayed parental controls optional component block certain programs accessing internet im clients restrict newsgroup access restrictions assigned different windows users accounts sites classified 31 categories four profiles assigned block different categories sites supervisors define exceptions add global blocked sites block access sites user-created whitelist pc magazine pc pro noted exclusion time-based restrictions information filtering controlled per-user basis windows 98 compatibility dropped release 2007 version announced september 12 2006 tabbed interface allows users access norton protection center program settings without separate tray icons windows open symantec revised norton internet security made version modularized reduced suite memory usage 10–15 megabytes scan times 30–35 percent another result spam filtering parental controls separate components install installed features consume 100 mb disk space anti-phishing integrates internet explorer analyzes sites examining website url title form page layout visible text links uses blacklist detect phishing sites users blocked access suspected phishing sites however presented option continue pc magazine testing feature blocked 22 24 phishing sites internet explorer 7 recognized 17 24 sites pc pro testing feature successfully blocked access every phishing site tested spam filtering longer includes language feature symantec claims less useful current spam created false positives tested 1,500 messages pc magazine norton let half spam inbox five percent valid mail marked spam version utilizes symantec veritas vxms technology better identify rootkits vxms allows norton find inconsistencies among files within directories files volume level startup application manager allows users prevent applications launching login release drops support windows 2000 compatible windows vista upon release update firewall makes decisions lessen chance weakened misinformed decision applications known safe allowed internet access vice versa malicious applications unknown ones analyzed blocked exhibit malicious behavior pc magazine pc pro testing firewall incorrectly block safe applications internet access malware blocked firewall pc magazine testing reflected results firewall also stealthed ports exploits blocked intrusion prevention system prevents threats leveraging vulnerabilities system updated whenever vulnerability identified windows-based computers attempts disable firewall unsuccessful registry changes process termination simulated mouse clicks failed disabling windows services effect firewall since works kernel driver level version automatically adjusts configuration different networks based physical address gateway rather ip addresses pc magazine testing norton detected 15 16 spyware samples 13 16 removed eight commercial keyloggers suite removed samples clean system norton blocked 14 16 spyware samples installing stopped seven eight keyloggers installing 2008 version announced august 28 2007 adding support windows vista 64-bit new features include sonar norton identity safe browser defender sonar monitors applications malicious behavior identity safe supersedes information filtering function instead blocking personal information leaving computer stores personal information fill webforms password protected checks website authenticity filling forms browser defender inspects blocks suspicious api calls intended stop drive-by downloads network map identifies networked computers norton internet security 2008 installed remote monitoring allows checking status installations different computers problems identified red x icon using feature users also control network traffic computers also warns users using unencrypted wireless network startup application manager advertisement blocking features dropped release information filtering although superseded identity safe suite available separately used conjunction identity safe phishing protection integrates mozilla firefox testing pc magazine found norton blocked 94 percent phishing sites compared 83 percent internet explorer 7 77 percent firefox 2 cnet identified issue feature anti-phishing disabled identity safe still offers users automatically submit personal information websites including phishing sites symantec declined call flaw stating recommended use identity safe anti-phishing enabled alternatively identity safe could used firefox internet explorer built-in anti-phishing capability pc magazine found firewall put ports stealth mode firewall blocked ten 12 leak tests used see malware evade firewall control network traffic previous versions identify tests none carried malicious payload another test conducted using core impact successfully exploited one vulnerability test computer however components norton stopped exploit causing harm attempts unsuccessful either system invulnerable norton intrusion prevention system stopped attempts disable firewall unsuccessful pc magazine contrary pc pro identified 15 open ports computer norton installed pc magazine testing norton completely detected malware samples two-thirds samples traces removed norton found removed commercial keyloggers full scan took nearly hour complete though twice long 2007 version suite blocked malware installing commercial keyloggers regardless modifications made samples pc world noted norton removed 80 percent malware-associated files registry entries spam filtering imports users address books compile whitelist allowed senders addresses users send mail e-mail tagged valid mail automatically added whitelist using several thousand messages pc magazine found norton marked 40 percent valid e-mail spam 80 percent valid newsletters marked spam norton correctly identify 90 percent spam e-mail 2009 version released sale september 9 2008 symantec set several goals version 2009 development complete installations minute footprint 100 mb average installation times range eight ten minutes previous 2008 version 400 mb footprint goals included reducing load time computer starts 20–30 seconds 10 seconds file scanning times technology allowing norton skip certain trusted files technology works basis piece software runs significant proportion computers safe public beta released july 14 reduction memory consumption made prompted fact 40 percent people contacting symantec support 512 mb ram beta uses 6 mb memory compared 11 mb prior version reduce scan times norton insight uses data norton community participants avoid scanning files found statistically significant number computers citing npd group study finding 39 percent consumers switching antiviruses blamed performance cpu usage meter available within final product allow users find cause high cpu usage whether norton another program version features frequent updates change called norton pulse updates rather deliver update every eight hours 2008 version pulse updates delivered five fifteen minutes silent mode automatically suspends alerts updates program enters mode manually enabled suite activities take place computer idle terminate user activity registered final release 16.5 bundles spam filtering used free download symantec release also bundles norton safe web identifies malicious websites compatible internet explorer firefox norton safe web color codes search results famous search engine google yahoo safety norton safe web toolbar also includes ask.com search box search box share code ask toolbar instead box redirects queries ask search engine norton safe web compatible internet explorer firefox norton safe web benchmarking conducted passmark software highlights 2009 version 52 second install time 32 second scan time 7 mb memory utilization symantec funded benchmark test provided scripts used benchmark participating antivirus software tests conducted windows vista running dual core processor pc magazine found suite added 15 seconds boot time baseline 60 seconds norton added less 5 percent time takes complete file operations 25 percent time taken unzip zip set files pc magazine testing norton removed traces 40 percent malware similar test specifically using commercial keyloggers norton able remove keyloggers beating tested products norton blocked attempts install malware clean system modifications made samples fool norton norton able block installation commercial keyloggers phishing protection blocked 90 percent verified phishing websites pc magazine testing internet explorer 7 caught 75 percent firefox caught 60 percent norton stealthed ports according pc magazine port scans unsuccessful firewall blocked exploit attempts core impact malware blocking removal garnered good results pc magazine testing one malware samples contained within folder removed folder opened last one removed executed modifications made samples affect detection similar test specifically using commercial keyloggers norton successfully detect removing threats norton almost completely removed 40 percent malware samples related executables norton also able remove commercial keyloggers product version 2010 released officially september 8 2009 version features technology code named project quorum introduces reputation-based threat detection keep 200 million attacks month many symantec claims evade signature based detection new approach relies norton community watch participants send information applications running computers safe applications exhibit common attributes known origin known publishers conversely new malware may unknown publisher among attributes using data reputation score calculated used infer likelihood unknown application safe malicious facets quorum parental controls spam filtering norton internet security 2010 bundles free subscription onlinefamily.norton pc magazine found improvement parental controls bundled prior releases spam filtering uses technologies symantec acquired brightmail two filters used find spam locally installed one check symantec servers see message known spam pc magazine testing valid e-mail marked spam however 11 percent spam still made inbox significant improvement prior releases another improvement product improved heuristic feature called sonar 2 leverages reputation data judge program malicious clean norton insight also expanded showing users number norton community participants certain program installed impact system resources long released information program origin graph resource usage also provided new feature codenamed autospy helps users understand norton malware found malware actions norton resolution presented user previous releases removed threats sight quietly warned users potentially confusing users deceived downloading rogue security software another addition product new flip screen compatible graphics card main display flips show opposite side main interface consisting chart cpu memory usage timeline security events without one flip screen link replaced back link opens back windows separate window product also adds search engine labeled safe search custom search allows user filter unsafe sites get insight keep track http cookies malware removal blocking performed well setting meeting records pc magazine testing achieved detection rate 98 highest 12 tested antivirus products exception blocking commercial keyloggers norton made average score file operations took 2 percent longer file compression extraction test took 4 percent longer area norton introduced significant delay system booting beta version suite added 31 percent boot time significantly longer prior versions according norton performance comparison website norton internet security scans 31 percent faster 70 percent lighter installs 76 percent faster leading anti-virus product according av-comparatives norton internet security best product 2009 bronze award 98.6 detection rate 2010 norton internet security 2010 blocked 99/100 internet threats infecting user computer norton internet security 2011 released beta testing april 21 2010 changes include new user interface improved scanning internet sites malware 2011 version symantec also released application scans user facebook feed malware links application require valid subscription test sponsored symantec norton internet security 2011 security suite ever achieve 100 percent protection score new third-party test dennis labs improved reputation scan provides user easy understand interface files stored user computer marking trusted good poor bad final version norton internet security 2011 released august 31 2010 new features version 2011 also include norton rescue tools tools include norton bootable recovery tool norton power eraser december 9 2010 symantec released 18.5 version norton liveupdate however update later pulled due numerous reports norton forums update causing system instability freeze ups system scans full quick scans issue affects customers users affected update advised uninstall product run norton removal tool reinstall 18.1 version http //www.norton.com/nis11 symantec later fixed bugs re-released update following acquisition verisign security norton parent company symantec several verisign features incorporated 2011 edition new product features new norton logo uses verisign checkmark formerly seen verisign logo well several new icon changes norton safe web norton identity safe features released 19.1.0.28 september 6 2011 norton internet security 2012 brought new features one new features included new release download insight 2.0 monitors files safety also stability given file means file stable windows 7 unstable windows xp xp users notified file instability enhanced removal tools tightly integrated better cleanup already infected systems triggered new powerful version norton power eraser restarts system locate remove fake antivirus software fake antivirus software deeply embedded threats otherwise hard remove new tool called norton management helps manage different computers devices equipped norton software single location changes release include sonar 4 google chrome compatibility identity safe safe web ability store passwords notes cloud however license agreement guarantee passwords stored securely provides remedy cloud vault compromised user interface also simplified three buttons third button opens advanced complicated menu user able manage settings access different product features cpu meter removed norton 2011 also makes return advanced screen combining netbook desktop line norton internet security integrates bandwidth metering controls product traffic usage takes minimum necessary ideal networks limited traffic also user interface window adjusts accordingly size computer screen version norton internet security includes several easter eggs pressing shift+1 2 3 4 would change theme default background plain black ray animals floral respectively also holding control win key alt pressing performance button activate crazy flip make window flip head heels effect would continue main window closed reopened furthermore scans longer scheduled windows task scheduler symantec proprietary one performs tasks computer idle i.e. user away computer version 20 2013 began version-less approach dropping 20xx naming convention automatically update new releases become available notable changes include new user interface better suited touchscreen devices social networking protection intends protect threats targeted social networks also first release officially support windows 8 version released october 7 2013 became last version marketed symantec norton internet security along norton antivirus norton 360 replaced norton security version 22.5 update released june 2015 includes restyled user interface windows 10 support september 2014 norton internet security folded norton security part symantec streamlined norton line symantec released special edition norton internet security optimized netbooks available download symantec website usb thumb drive symantec states netbook edition optimized netbooks main display optimized provide support 800 x 480 screen resolution addition non-critical tasks delayed netbook battery furthermore netbook edition contains complimentary access norton secure online backup parental control protect children surf web norton internet security version 1.0 mac released november 1 2000 identify remove windows mac viruses features include firewall advertisement blocking browser parental controls ability prevent confidential information transmitted outside computer users prompted information able transmitted incorporation aladdin systems iclean allows users purge browser cache cookies browsing history within norton interface operating system requirements call mac os 8.1 hardware requirements call 24 mb ram 12 mb disk space powerpc processor norton internet security version 2.0 mac released date unknown know please provide version 2.0 also ties whois database allowing users trace attacking computers users inform network administrators attacking computers corrective actions running mac os 8.1 9 powerpc processor 24 mb ram 25 mb free space required mac os x 10.1 powerpc g3 processor 128 mb ram 25 mb free space required norton internet security version 3.0 mac released date unknown know please provide subsequent release version 3.0 maintained feature set found version 2.0 firewall allocates internet access needed rather relying user input using predefined rules compatibility os 8 dropped running os 9.2 powerpc processor 24 mb ram 25 mb free space required os x 10.1.5 10.3 powerpc g3 128 mb ram 150 mb free space required however version 3.0 compatible mac os x 10.4 tiger version 4.0 released december 18 2008 symantec also markets bundle version 4.0 2009 version windows intended users microsoft windows mac os x installed iclean dropped release firewall blocks access malicious sites using blacklist updated symantec prevent attackers leveraging insecurities mac installed software exploit protection introduced release phishing protection introduced release well operating system requirements call mac os x 10.4.11 higher powerpc intel core processor 256 mb ram 150 mb free space required features norton internet security underwent considerable changes performance symantec rewrote code 2009 release norton products two running processes using 15 mb ram according passmark security benchmark 2012 norton antivirus norton internet security lightest suites available av-comparatives.org also tested products gave similar results pc magazine recognized 2011 2012 lines fastest strongest protection pcworld tests security software put norton internet security 2009 first place 2011 test conducted pc world norton internet security winner dennis technology labs tests sponsored symantec confirmed performance effectiveness norton 2011 2012 lines symantec compliance federal bureau investigation fbi whitelisted magic lantern keylogger actively developed fbi purpose magic lantern obtain passwords encrypted e-mail part criminal investigation magic lantern first reported media bob sullivan msnbc november 20 2001 ted bridis associated press magic lantern deployed e-mail attachment attachment opened trojan horse installed suspect computer trojan horse activated suspect uses pgp encryption often used increase security sent e-mail messages activated trojan horse log pgp password allows fbi decrypt user communications symantec major antivirus vendors whitelisted magic lantern rendering antivirus products including norton internet security incapable detecting concerns include uncertainties magic lantern full potential whether hackers could subvert purposes outside jurisdiction law graham cluley technology consultant sophos said way knowing written fbi even ’ know whether used fbi commandeered third party another reaction came marc maiffret chief technical officer cofounder eeye digital security customers paying us service protect forms malicious code us law enforcement job make exceptions law enforcement malware tools fbi spokesman paul bresson response question whether magic lantern needed court order deployed said like technology projects tools deployed fbi would used pursuant appropriate legal process proponents magic lantern argue technology would allow law enforcement efficiently quickly decrypt messages protected encryption schemes unlike predecessor carnivore implementing magic lantern require physical access suspect computer would necessitate court order older versions norton hard slow uninstall leaving many traces sometimes completing errors however 2009 versions symantec featured uninstaller removes products better quickly usually less minute norton removal tool well known instrument removes norton products completely without trace tool downloaded symantec website symantec reports norton 2010 range products feature cleaner uninstall over-installs recommended update route 2011 link norton internet security 2008 installed users may encounter incompatibilities upgrading windows xp service pack 3 windows vista service pack 1 users report numerous invalid registry keys added tool named fixcss.exe resulting empty device manager missing devices wireless network adapters symantec initially blamed microsoft incompatibilities since accepted partial responsibility dave cole symantec vice president general manager acknowledged users running norton products experiencing problems said numbers small cole also said symantec done extensive testing products windows xp sp3 issue encountered cole blamed microsoft related xp sp3 microsoft recommended users contact windows customer support resolve problem symantec issued fix intended users upgrading symantec also recommends disabling tamper protection component 2008 release dubbed symprotect tool remove added registry entries also available symantec sarah hicks symantec vice president consumer product management voiced concern windows vista 64-bit patchguard feature patchguard designed microsoft ensure integrity kernel part operating system interacts hardware rootkits often hide operating system kernel complicating removal mike dalton european president mcafee said decision build wall around kernel assumption ca n't breached ridiculous claiming microsoft preventing security vendors effectively protecting kernel promoting security product windows live onecare hicks said symantec mind competition onecare symantec later published white paper detailing patchguard instructions obtain patchguard exploit negotiations investigations antitrust regulators microsoft decided allow security vendors access kernel creating special api instructions
|
Computer security
|
heidisql heidisql free open-source administration tool mysql forks well microsoft sql server postgresql codebase originally taken ansgar becker mysql-front 2.5 software due sold mysql-front branding unrelated party becker chose heidisql replacement name suggested friend tribute heidi klum reinforced becker nostalgia heidi girl alps version written java jheidi designed work mac linux computers discontinued march 2010 favor wine support ansgar becker began development mysql front-end 1999 naming project mysql-front used direct api layer written matthias fichtner interface mysql servers contained databases private development continued 2003 version 2.5 2004 period inactivity becker sold mysql-front branding nils hoyer continued development cloning original software april 2006 becker open-sourced application sourceforge renaming project heidisql heidisql re-engineered use newer popular database-interface layer zeoslib debuted version 3.0 database layer replaced single-unit approach october 2009 becker later extended supporting database servers support microsoft sql server added march 2011 7.0 release since 8.0 release heidisql offers gui 22 languages english translations contributed users various countries via transifex postgresql support introduced march 2014 9.0 release early 2018 slightly extended v9.5 release published microsoft store heidisql following gui features capabilities
|
Databases
|
gamespy technology gamespy technology also known gamespy industries inc. division glu mobile developer gamespy technology product suite middleware tools software services use computer video game industry gamespy technology acquired glu mobile 2012 company service shut may 2014 gamespy shut gamespy technology consisted array portable c sdks plug hosted web services provided following functionality game engines
|
Distributed computing architecture
|
zeroaccess botnet zeroaccess trojan horse computer malware affects microsoft windows operating systems used download malware infected machine botnet remaining hidden using rootkit techniques zeroaccess botnet discovered least around may 2011 zeroaccess rootkit responsible botnet spread estimated present least 9 million systems estimates size botnet vary across sources antivirus vendor sophos estimated botnet size around 1 million active infected machines third quarter 2012 security firm kindsight estimated 2.2 million infected active systems bot spread zeroaccess rootkit variety attack vectors one attack vector form social engineering user persuaded execute malicious code either disguising legitimate file including hidden additional payload executable announces example bypassing copyright protection keygen second attack vector utilizes advertising network order user click advertisement redirects site hosting malicious software third infection vector used affiliate scheme third party persons paid installing rootkit system december 2013 coalition led microsoft moved destroy command control network botnet attack ineffective though c c seized peer-to-peer command control component unaffected meaning botnet could still updated system infected zeroaccess rootkit start one two main botnet operations bitcoin mining click fraud machines involved bitcoin mining generate bitcoins controller estimated worth 2.7 million us dollars per year september 2012 machines used click fraud simulate clicks website advertisements paid pay per click basis estimated profit activity may high 100,000 us dollars per day costing advertisers 900,000 day fraudulent clicks typically zeroaccess infects master boot record mbr infected machine may alternatively infect random driver c \windows\system32\drivers giving total control operating system also disables windows security center firewall windows defender operating system zeroaccess also hooks tcp/ip stack help click fraud software also looks tidserv malware removes finds
|
Computer security
|
nec hydrastor nec hydrastor disk-based grid storage system data deduplication backups archiving developed nec corporation hydrastor storage system composed multiple nodes starting one 100+ nodes node contains standard hardware including disk drives cpu memory network interfaces integrated hydrastor software single storage pool hydrastor software incorporates multiple features distributed storage systems content-addressable storage global data deduplication variable block size rabin fingerprinting erasure codes data encryption load balancing hydrastor project started 2002 cezary dubnicki cristian ungureanu nec research princeton nj prototype version implemented evaluated 2004 another 3 years development first version hydrastor brought market us japan subsequent version improved software hardware released following years latest version hs8-5000 providing 72tb raw storage per node 11.88pb raw capacity maximum configuration hydrastor scaled single node 165 nodes multi-rack grid appliance capacity bandwidth scaled independently using different types nodes hydrastor supports online expansion automatic data migration downtime standard configuration hydrastor provides resiliency 3 concurrent disk node failures failures automatically detected data reconstruction automatically performed means time failures enough reconstruct data system withstand number
|
Computer security
|
glassfish metro metro opensource web service stack part glassfish project though also used stand-alone configuration components metro include jaxb ri jax-ws ri saaj ri stax sjsxp implementation wsit available cddl gplv2 classpath exception originally glassfish project developed two semi-independent projects june 2007 decided bundle two components single component named metro metro bundled java se 6 order allow consumers java se 6 consume web services metro bundled numerous application servers jaxb reference implementation developed metro used virtually every java web services framework apache axis2 codehaus xfire apache cxf application servers metro compares well web service frameworks terms functionality comparison provided codehaus compares apache axis 1.x axis 2.x celtix glue jbossws xfire 1.2 jax-ws ri wsit bundle yet named metro time
|
Web technology
|
ipad mini 2 ipad mini 2 stylized marketed ipad mini 2 previously marketed ipad mini retina display second-generation ipad mini tablet computer produced marketed apple inc design almost identical first generation ipad mini features internal revisions addition a7 system-on-a-chip 2,048 × 1,536 resolution retina display ipad mini 2 nearly hardware larger sibling ipad air apple released ipad mini 2 space gray silver colors november 12 2013 successor ipad mini 3 unveiled october 16 2014 featuring internals adding touch id differing storage sizes additional gold color ipad mini 2 discontinued march 21 2017 following press announcement new lower cost ipad replaces ipad air 2 ipad mini 2 first ipad mini support six major versions ios ios 7 ios 12 ipad mini 2 announced keynote yerba buena center arts october 22 2013 theme keynote named 'we still lot cover ipad mini 2 originally marketed ipad mini retina display however successor ipad mini 3 announced october 16 2014 apple started marketing former device ipad mini 2 ipad mini 2 comes ios 7 operating system released september 18 2013 jony ive designer ios 7 new elements described update bringing order complexity highlighting features refined typography new icons translucency layering physics gyroscope-driven parallaxing major changes design design ios 7 os x mavericks version 10.9 noticeably depart skeuomorphic elements green felt game center wood newsstand leather calendar favor flat colourful design act hotspot carriers sharing internet connection wi-fi bluetooth usb also access apple app store digital application distribution platform ios service allows users browse download applications itunes store developed xcode ios sdk published apple app store garageband imovie iphoto iwork apps pages keynote numbers available ipad mini 2 bluetooth function attaches wireless keyboard headset allows user access wireless keyboard used apple pages writing program needs editing ipad mini 2 comes several pre-installed applications including siri safari mail photos video music itunes app store maps notes calendar game center photo booth contacts like ios devices ipad sync content data mac pc using itunes although ios 5 later managed backed without computer although tablet designed make phone calls cellular network users use headset built-in speaker microphone place phone calls wi-fi cellular using voip application skype device dictation application using voice recognition technology iphone 4s enables users speak ipad types say screen though ipad must internet connection available via wi-fi cellular network due feature reliance apple servers translate speech ipad mini 2 ibooks application originally optional app though since release ios 8 comes pre-installed displays books epub-format content downloaded ibooks store several major book publishers including penguin books harpercollins simon schuster macmillan committed publishing books device despite direct competitor amazon kindle barnes noble nook amazon.com barnes noble offer e-reader apps ipad siri intelligent personal assistant knowledge navigator included application uses natural language user interface answer questions make recommendations perform actions delegating requests set web services apple claims software adapts user individual preferences time personalizes results ios 7 adds new male female voices new system setting functionalities redesign match rest operating system integration twitter wikipedia bing photos facebook comes integrated apple native apps facebook features directly accessed within native apps calendar sync facebook events use facebook like button within apple app store june 2 2014 announced ipad mini 2 would receive ios 8 update june 13 2016 announced ipad mini 2 support ios 10 update june 5 2017 also announced ipad mini 2 support ios 11 update apple announced ipad mini 2 support ios 12 update together apple a7 cousins make first ipad mini support six major versions ios ios 7 ios 12 longest supported ipad mini june 2019 apple announced drop support ipad mini 2 release ipados along a7 cousins ipad mini 2 sized 7.9-inch screen largely design first generation ipad mini 1st generation one notable change inclusion retina display matching screen resolution full-sized retina ipad models mini 2 features resolution ipad air makes mini 2 screen even pixel dense compared larger sibling slate-colored back panel first-generation ipad mini discontinued favor space gray lighter grey tone whilst silver color option still remained ipad mini 2 shares hardware components ipad air iphone 5s notably 64-bit apple a7 system-on-chip apple m7 motion processor mini 2 a7 system-on-chip clocked slightly slower otherwise one ipad air iphone 5s three released q4 2013 mini 2 uses home button predecessor therefore support touch id feature added succeeding ipad mini 3 mini 2 also includes 5 megapixel rear-facing camera 1.2 mp facetime hd front-facing camera support 802.11n estimated 10 hours battery life previous generations ipad hardware four buttons one switch ipad mini 2 device portrait orientation home button face device display returns user home screen wake/sleep button top edge device two buttons upper right side device performing volume up/down functions switch whose function varies according device settings functioning either switch device silent mode lock/unlock orientation screen addition wifi version weighs 331 grams cellular model weighs 341 grams – slightly respective predecessors display responds sensors ambient light sensor adjust screen brightness 3-axis accelerometer sense orientation switch portrait landscape modes unlike iphone ipod touch built-in applications work three orientations portrait landscape-left landscape-right ipad built-in applications support screen rotation four orientations including upside-down consequently device intrinsic native orientation relative position home button changes audio playback ipad mini 2 stereo two speakers located either side lightning connector ipad mini 2 originally available 16 32 64 128gb internal flash memory expansion option however announcement ipad mini 3 october 16 2014 64 128gb versions ipad mini 2 discontinued september 7 2016 16gb model discontinued well final model 32gb discontinued march 21 2017 following unveiling new lower-cost ipad apple also sells camera connection kit sd card reader used transfer photos videos ipad mini 2 models connect wireless lan offer dual band wi-fi support also manufactured either without capability communicate cellular network tablet cellular model comes two variants support nano-sims quad-band gsm penta-band umts dual-band cdma ev-do rev b. additionally one variant also supports lte bands 1 2 3 4 5 7 8 13 17 18 19 20 25 26 variant supports lte bands 1 2 3 5 7 8 18 19 20 td-lte bands 38 39 40 apple ability handle many different bands one device allowed offer first time single ipad variant supports cellular bands technologies deployed major north american wireless providers time device introduction mini 2 praised packing essentially hardware larger expensive ipad air significantly compact lighter featuring even pixel-dense screen keeping resolution despite smaller display 100 usd cheaper air mini 2 essentially rendered obsolete similarly-priced ipad 2 ipad 4 remained apple ipad lineup first year mini 2 availability budget alternative ipad air writing techradar gareth beavis awarded ipad mini 2 rating 4.5 5 beavis praises retina display a7 chip performance states design still best tablet category however criticize price increase website anandtech anand lal shimpi highly compliments design increased speed ipad mini 2 lamenting limited color palette stating ... ’ shame tradeoff exists two ipads especially given good apple srgb coverage nearly displays despite criticisms quality camera jeffrey van camp digital trends gave tablet score 4.5 5 writes ipad mini 2 favorite tablet 2013 powerful 64-bit a7 processor high-resolution ‘ retina ’ screen finishes job apple started first ipad mini addressing main complaints original mini under-powered processor low-resolution display like contemporary ipads mini 2 rear camera photo quality mediocre compared iphones ipad mini 2 also considerably expensive closest android competitor nexus 7 although mini 2 significantly powerful better build quality well apple larger tablet-specific app selection established ecosystem ipad mini 2 criticized thicker heavier original ipad mini also criticized taking longer time charge
|
Operating systems
|
windows meeting space windows meeting space codenamed windows shared view also referred windows collaboration peer-to-peer collaboration program developed microsoft windows vista replacement older windows netmeeting application however features microphone support ability set audio video conferences removed meeting space enables application sharing collaborative editing desktop sharing file sharing projecting simple text-based ink-based instant messaging across 10 users connected network across internet meeting space ability automatically set ad hoc wireless network connection network internet available also enables participants invite people meeting sessions one first applications new peer-to-peer infrastructure windows vista hence requires ipv6 meeting space available editions windows vista functionality unavailable starter edition home basic edition allows users join sessions meeting space exist edition windows 7 microsoft recommended microsoft office live meeting replacement meeting space result microsoft peer-to-peer collaboration efforts—with emphasis mobile computing—discussed windows hardware engineering conference 2004 windows vista codenamed longhorn time reported windows vista would enable users create ad hoc wireless networks file sharing discover people connected nearby meeting space relies functionality services meeting space demonstrated jim allchin darryn dieken professional developers conference pdc 2005 projected shared powerpoint presentation allchin stated demonstration illustrate functions application itself—development complete time—but illustrate select capabilities peer-to-peer framework windows vista later interview paul thurrott allchin expressed desire developers create applications supporting peer-to-peer capabilities starting session workspace contains presentation area displayed list notes also shown list users local subnet collaboration session started automatically detected using people near functionality based ws-discovery peer-to-peer networking implementation windows vista users outside local subnet must sent e-mail file invitation participate applications shared session local session application shared windows meeting space switches presentation mode participants see presenter working collaboratively edit review shared application instance
|
Operating systems
|
validsoft validsoft security software company providing telecommunications-based multi-factor authentication identity transaction verification technology company founded 2003 current ceo patrick carroll company provides business-to-business mobile security cloud security products including multi-factor authentication platform called smart secure mobile architecture real-time transactions uses mobile telecommunication channels devices includes proprietary voice biometric engine solutions designed reduce electronic fraud safeguard consumer privacy using internet mobile banking credit/debit card mobile fixed line telephony channels validsoft products designed verify authenticity parties transaction mutual authentication ensure fidelity telecommunication channels secure communications confirm integrity transactions transaction verification
|
Computer security
|
peter j. weinberger peter jay weinberger born august 6 1942 computer scientist best known early work bell labs works google weinberger undergraduate swarthmore college graduating 1964 received phd mathematics number theory 1969 university california berkeley derrick henry lehmer thesis entitled proof conjecture gauss class number two holding position department mathematics university michigan ann arbor continued work analytic number theory moved bell labs bell labs weinberger contributed design awk programming language w awk fortran compiler f77 detailed explanation contributions awk unix tools found interview transcript princeton university another interview sheds light work google interviews also confirm rumors involvement early digital photography especially abuse photograph face demonstrating digital imaging effects peter weinberger promoted head computer science research bell labs picture merged death star logo mid-80s creating pjw face image appeared innumerable locations including t-shirts coffee mugs cds least one water tower sole remaining pjw face bell labs somewhat disarray plans afoot repair prior joining google weinberger chief technology officer renaissance technologies weinberger member jason defense advisory group since 1990 erdos number 2
|
Programming language topics
|
key ring file key ring file contains multiple public keys certificate authority ca key ring file necessary secure sockets layer ssl connection web securely stored server hosts website contains public/private key pair particular website also contains public/private key pairs various certificate authorities trusted root certificate various certification authorities entity website administrator send certificate signing request csr ca ca returns signed certificate entity certificate received ca stored key ring
|
Computer security
|
transaction processing facility transaction processing facility tpf ibm real-time operating system mainframe computers descended ibm system/360 family including zseries system z9 tpf delivers fast high-volume high-throughput transaction processing handling large continuous loads essentially simple transactions across large geographically dispersed networks industrial-strength transaction processing systems notably ibm cics ims tpf specialty extreme volume large numbers concurrent users fast response times example visa credit card transaction processing peak holiday shopping season tpf passenger reservation application pars international version ipars used many airlines one tpf major optional components high performance specialized database facility called tpf database facility tpfdf close cousin tpf transaction monitor alcs developed ibm integrate tpf services common mainframe operating system mvs z/os tpf evolved airlines control program acp free package developed mid-1960s ibm association major north american european airlines 1979 ibm introduced tpf replacement acp — priced software product new name suggests greater scope evolution non-airline related entities tpf traditionally ibm system/370 assembly language environment performance reasons many tpf assembler applications persist however recent versions tpf encourage use c. another programming language called sabretalk born died tpf ibm announced delivery current release tpf dubbed z/tpf v1.1 september 2005 significantly z/tpf adds 64-bit addressing mandates use 64-bit gnu development tools gcc compiler dignus systems/c++ systems/c supported compilers z/tpf dignus compilers offer reduced source code changes moving tpf 4.1 z/tpf current users include sabre reservations visa inc. authorizations american airlines american express authorizations dxc technology shares reservations formerly eds hpes holiday inn central reservations amtrak marriott international travelport galileo apollo worldspan axess japan gds citibank air canada trenitalia reservations delta air lines reservations operations japan airlines tpf capable running multiprocessor systems one cpu within lpar cpus referred instruction streams simply i-streams running lpar one i-stream tpf said running tightly coupled tpf adheres smp concepts concept numa-based distinctions memory addresses exist depth cpu ready list measured incoming transaction received queued i-stream lowest demand thus maintaining continuous load balancing among available processors cases loosely coupled configurations populated multiprocessor cpcs central processing complex i.e physical machine packaged one system cabinet smp takes place within cpc described whereas sharing inter-cpc resources takes place described loosely coupled tpf architecture memory except 4kb-sized prefix area shared among i-streams instances memory-resident data must kept separated i-stream programmer typically allocates storage area number subsections equal number i-streams accesses desired i-stream associated area taking base address allocated area adding product i-stream relative number times size subsection tpf capable supporting multiple mainframes size — single i-stream multiple i-stream connecting operating common database currently 32 ibm mainframes may share tpf database system operation would called 32-way loosely coupled simplest loosely coupled system would two ibm mainframes sharing one dasd direct access storage device case control program would equally loaded core program record dasd could potentially accessed either mainframe order serialize accesses data records loosely coupled system practice known record locking must used means one mainframe processor obtains hold record mechanism must prevent processors obtaining hold communicate requesting processors waiting within tightly coupled system easy manage i-streams via use record hold table however lock obtained offboard tpf processor dasd control unit external process must used historically record locking accomplished dasd control unit via rpq known llf limited locking facility later ellf extended llf ellf replaced multipathing lock facility mplf run clustered loosely coupled z/tpf requires either mplf disk control units alternative locking device called coupling facility records absolutely must managed record locking process processor shared tpf record accesses done using record type ordinal defined record type tpf system 'fred gave 100 records ordinals processor shared scheme record type 'fred ordinal 5 would resolve exactly file address dasd — clearly necessitating use record locking mechanism processor shared records tpf system accessed via exactly file address resolve exactly location processor unique record one defined processor expected loosely coupled complex record type 'fred perhaps 100 ordinals however user 2 processors examines file address record type 'fred ordinal 5 resolves note different physical address used tpf general-purpose operating system gpos tpf specialized role process transaction input messages return output messages 1:1 basis extremely high volume short maximum elapsed time limits tpf built-in graphical user interface functionality tpf never offered direct graphical display facilities implement host would considered unnecessary potentially harmful diversion real-time system resources tpf user interface command-line driven simple text display terminals scroll upwards mouse-driven cursors windows icons tpf prime cras computer room agent set — best thought operator console character messages intended mode communications human users work accomplished via use command line similar unix without x several products available connect prime cras provide graphical interface functions tpf operator tpf operations server graphical interfaces end users desired must provided external systems systems perform analysis character content see screen scrape convert message to/from desired graphical form depending context specialized purpose operating system tpf host compiler/assembler text editor implement concept desktop one might expect find gpos tpf application source code commonly stored external systems likewise built offline starting z/tpf 1.1 linux supported build platform executable programs intended z/tpf operation must observe elf format s390x-ibm-linux using tpf requires knowledge command guide since support online command directory man /help facility users might accustomed commands created shipped ibm system administration tpf called functional messages -- commonly referred z-messages prefixed letter z letters reserved customers may write commands tpf implements debugging distributed client-server mode necessary system headless multi-processing nature pausing entire system order trap single task would highly counter-productive debugger packages developed 3rd party vendors took different approaches break/continue operations required tpf host implementing unique communications protocols used traffic human developer running debugger client server-side debug controller well form function debugger program operations client side two examples 3rd party debugger packages step step trace bedford associates cmstpf tpf/gi ztpfgi tpf software inc.. neither package wholly compatible ibm offering ibm debugging client offering packaged ide called ibm tpf toolkit tpf highly optimized permit messages supported network either switched another location routed application specific set programs permit extremely efficient accesses database records historically data tpf system fit fixed record core block sizes 381 1055 4k bytes due part physical record sizes blocks located dasd much overhead saved freeing part operating system breaking large data entities smaller ones file operations reassembling read operations since ibm hardware i/o via use channels channel programs tpf would generate small efficient channel programs i/o — name speed since early days also placed premium size storage media — memory disk tpf applications evolved powerful things using little resource today much limitations removed fact legacy support smaller-than-4k dasd records still used advances made dasd technology read/write 4k record efficient 1055 byte record advances increased capacity device longer premium placed ability pack data smallest model possible tpf also program segments allocated 381 1055 4k byte-sized records different points history segment consisted single record typically comprehensive application requiring perhaps tens even hundreds segments first forty years tpf history segments never link-edited instead relocatable object code direct output assembler laid memory internally self-referential relocatable symbols resolved entire image written file later loading system created challenging programming environment segments related one another could directly address control transfer implemented enter/back system service acp/tpf earliest days circa 1965 memory space severely limited gave rise distinction file-resident core-resident programs -- frequently used application programs written memory never removed core-residency rest stored file read demand backing memory buffers released post-execution introduction c language tpf version 3.0 first implemented conformant segment conventions including absence linkage editing scheme quickly demonstrated impractical anything simplest c programs tpf 4.1 truly fully linked load modules introduced tpf compiled z/os c/c++ compiler using tpf-specific header files linked iewl resulting z/os-conformant load module manner could considered traditional tpf segment tpf loader extended read z/os-unique load module file format lay file-resident load modules sections memory meanwhile assembly language programs remained confined tpf segment model creating obvious disparity applications written assembler written higher level languages hll z/tpf 1.1 source language types conceptually unified fully link-edited conform elf specification segment concept became obsolete meaning program written source language -- including assembler -- may size furthermore external references became possible separate source code programs segments could directly linked together shared object value point critical legacy applications benefit improved efficiency simple repackaging -- calls made members single shared object module much shorter pathlength run time compared calling system enter/back service members shared object may share writeable data regions directly thanks copy-on-write functionality also introduced z/tpf 1.1 coincidentally reinforces tpf reentrancy requirements concepts file- core- residency also made obsolete due z/tpf design point sought programs resident memory times since z/tpf maintain call stack high-level language programs gave hll programs ability benefit stack-based memory allocation deemed beneficial extend call stack assembly language programs optional basis ease memory pressure ease recursive programming z/tpf executable programs packaged elf shared objects historically step previous core blocks— memory— also 381 1055 4 k bytes size since memory blocks size overhead obtaining memory found systems discarded programmer merely needed decide size block would fit need ask tpf would maintain list blocks use simply hand first block available list physical memory divided sections reserved size 1055 byte block always came section returned overhead needed add address appropriate physical block table list compaction data collection required applications got advanced demands memory increased c became available memory chunks indeterminate large size required gave rise use heap storage memory management routines ease overhead tpf memory broken frames— 4 kb size 1 mb z/tpf application needs certain number bytes number contiguous frames required fill need granted
|
Operating systems
|
geeksphone keon geeksphone keon entry-level smartphone released geeksphone april 2013 intended software developers wanting build test mobile applications new firefox os general consumers keon higher-end peak first commercially available mobile devices running firefox os geeksphone keon peak initially became available 23 april 2013 first batch sold hours
|
Operating systems
|
postscript printer description postscript printer description ppd files created vendors describe entire set features capabilities available postscript printers ppd also contains postscript code commands used invoke features print job ppds function drivers postscript printers providing unified interface printer capabilities features example generic ppd file models hp color laserjet contains specifies printer understands postscript level 2 color device forth ppd describe allowable paper sizes memory configurations minimum font set printer even specify tree-based user interface printer-specific configuration ppd also often called postscript page description instead printer description postscript concept page devices postscript page description configuration read saved ppd file cups uses ppd drivers postscript printers even extended concept allow postscript printing non-postscript printing devices directing output cups filter file longer standard ppd rather cups-ppd cups clients usually read current ppd file server every time new print job created microsoft windows also uses ppd files converts binary .bpd file format using normally stored c \windows\system32\spool\drivers\w32x86\3 x86 system c \windows\system32\spool\drivers\x64\3 64 bit system updating ppd files requires removing reinstalling printer mime type cups variant ppd application/vnd.cups.ppd
|
Programming language topics
|
mapi messaging application programming interface mapi api microsoft windows allows programs become email-aware mapi designed independent protocol usually used communicate microsoft exchange server mapi uses functions loosely based x.400 xapia standard includes facilities access message transports message stores directories simple mapi smapi subset 12 functions enable developers add basic messaging functionality extended mapi emapi allows complete control messaging system client computer includes creation management messages plus management client mailbox service providers simple mapi included microsoft windows part outlook express/windows mail full extended mapi included office outlook exchange addition extended mapi client interface programming calls made indirectly simple mapi api client interface common messaging calls cmc api client interface object-based cdo library interface three methods easier use designed less complex messaging-enabled -aware applications simple mapi cmc removed exchange 2003 mapi originally designed microsoft company founded ms mail team 1987 acquired consumers software 1991 obtain network courier messaging product reworked sold ms pc mail microsoft mail pc networking basic api ms pc mail later known mapi version 0 mapi0 differentiate true mapi full extended mapi interface required interfacing messaging-based services client applications outlook example several non-microsoft e-mail server product vendors created mapi service providers allow products accessed via outlook notable examples include axigen mail server kerio connect scalix zimbra hp openmail ibm lotus notes zarafa/kopano bynari mapi also service provider interface sorts microsoft used interface ms mail email system based xenix internal use extended mapi main e-mail data access method used outlook interface microsoft exchange via mapi service providers shipped outlook microsoft released full details mapi/rpc protocol since august 2007 mapi protocol colloquial name mapi/rpc times microsoft also called exchange rpc outlook-exchange transport protocol microsoft provides sample mapi/rpc-based application called mfcmapi assist developers also widely used diagnostics tool developers microsoft exchange administrators original implementation designed use local network lan outlook anywhere feature extended external internet-facing interface mapi/http introduced 2014 exchange 2013 sp1 replaced 'normal http-based stack several open-source software projects started working implementing mapi libraries including
|
Operating systems
|
smartsheet smartsheet software service saas application collaboration work management developed marketed smartsheet inc used assign tasks track project progress manage calendars share documents manage work using spreadsheet-like user interface smartsheet used collaborate project timelines documents calendars tasks work according idg part office productivity part project management part document sharing ... trying central hub people work smartsheet combines functionality microsoft excel project access sharepoint competes microsoft project 10 million users 85,000 organizations according forbes smartsheet relatively simple user interface interface centers smartsheets similar spreadsheets typically found microsoft excel smartsheet rows expanded collapsed see individual tasks large-scale project progress respectively tasks sorted deadline priority person assigned spreadsheet contains dates smartsheet create calendar view row smartsheet may files attached emails stored within discussion board associated new smartsheet created notifications pushed staff populate rows columns information updated smartsheets tracking task project data-point updated automatically service also alerts task deadline coming keeps track document versions smartsheet import data microsoft office google applications software integrates services like salesforce.com dropbox amazon web services also smartsheet mobile app android iphone operating systems smartsheet sold subscription basis free version smartsheet first introduced 2006 according company co-founder brent frei initial adoption slow software difficult use end first year 10,000 users company began making changes software 2008 eventually cutting 60 percent features purpose making user-friendly following 2010 launch redesign adoption grew 1 million users 20,000 organizations 2012 integration microsoft office 365 microsoft azure added 2014 october account map tool introduced uses algorithm visualize flow work across groups employees august 2014 version 2.0 smartsheet ios app introduced made spreadsheet-like user interface focus app user interface whereas previously mobile interface different spreadsheet-oriented desktop version 2015 smartsheet started introducing closer integrations microsoft office products part thanks changes microsoft making products work better third-party software january 2015 smartsheet added support microsoft identity management software azure active directory allowed users log products like excel smartsheet login users also make changes smartsheets directly microsoft outlook 2016 smartsheet introduced sights configurable dashboard shows metrics team performing key performance indicators smartsheet inc. publicly-listed company develops markets smartsheet application 2017 760 employees headquartered bellevue washington company founded summer 2006 shortly co-founder brent frei sold prior company onyx software initially funded mostly frei year founding smartsheet raised 4 million funding nine employees early 2012 raised 8.2 million funding three rounds hired first salesperson smartsheet software redesigned 2010 company revenues grew 100 percent year four consecutive years raised 26 million funding december 2012 another 35 million may 2014 2017 company raised additional 52.1 million funding 2018 announced smartsheet acquired converse.ai scotland-based company develops software creating business automation bots company began trading new york stock exchange april 27 2018
|
Distributed computing architecture
|
avfoundation avfoundation framework objective-c interface provides high-level services working time-based audiovisual media apple operating systems ios macos tvos watchos first introduced ios 2.2 seen significant changes ios 4 ios 5 ios 6 starting mac os x lion default media framework macos platform
|
Operating systems
|
ipop ipop ip-over-p2p open-source user-centric software virtual network allowing end users define create virtual private networks vpns ipop virtual networks provide end-to-end tunneling ip ethernet “ tincan ” links setup managed control api create various software-defined vpn overlays ipop started research project university florida 2006 first-generation design implementation ipop built atop structured p2p links managed c brunet library first design ipop relied brunet ’ structured p2p overlay network peer-to-peer messaging notifications nat traversal ip tunneling brunet-based ipop still available open-source code however ipop ’ architecture implementation evolved starting september 2013 project funded national science foundation si2 software infrastructure sustained innovation program enable open-source “ scientific software element ” research cloud computing second-generation design ipop incorporates standards xmpp stun turn libraries libjingle evolved since project ’ beginning create p2p tunnels – refer tincan links current tincan-based ipop implementation based modules written c/c++ leverage libjingle create tincan links exposing set apis controller modules manage setup creation management tincan links enhanced modularity controller module runs separate process c/c++ module implements tincan links communicate json-based rpc system thus controller written languages python
|
Computer security
|
categorial grammar categorial grammar term used family formalisms natural language syntax motivated principle compositionality organized according view syntactic constituents generally combine functions according function-argument relationship versions categorial grammar analyze sentence structure terms constituencies opposed dependencies therefore phrase structure grammars opposed dependency grammars categorial grammar consists two parts lexicon assigns set types also called categories basic symbol type inference rules determine type string symbols follows types constituent symbols advantage type inference rules fixed specification particular language grammar entirely determined lexicon categorial grammar shares features simply typed lambda calculus whereas lambda calculus one function type formula_1 categorial grammar typically two function types one type applied left one right example simple categorial grammar might two function types formula_2 formula_3 first formula_2 type phrase results phrase type formula_5 followed right phrase type formula_6 second formula_7 type phrase results phrase type formula_5 preceded left phrase type formula_6 notation based upon algebra fraction multiplied i.e concatenated denominator yields numerator concatenation commutative makes difference whether denominator occurs left right concatenation must side denominator cancel first simplest kind categorial grammar called basic categorial grammar sometimes ab-grammar ajdukiewicz bar-hillel given set primitive types formula_10 let formula_11 set types constructed primitive types basic case least set formula_12 formula_13 formula_14 think purely formal expressions freely generated primitive types semantics added later authors assume fixed infinite set primitive types used grammars making primitive types part grammar whole construction kept finite basic categorial grammar tuple formula_15 formula_16 finite set symbols formula_10 finite set primitive types formula_18 relation formula_19 lexicon relates types symbols formula_20 since lexicon finite specified listing set pairs like formula_21 grammar english might three basic types formula_22 assigning count nouns type formula_23 complete noun phrases type formula_24 sentences type formula_25 adjective could type formula_26 followed noun whole phrase noun similarly determiner type formula_27 forms complete noun phrase followed noun intransitive verbs type formula_28 transitive verbs type formula_29 string words sentence overall type formula_25 example take string bad boy made mess determiners boy mess nouns bad adjective made transitive verb lexicon formula_32 formula_33 formula_34 formula_35 formula_36 sequence types string formula_37 find functions appropriate arguments reduce according two inference rules formula_38 formula_39 formula_40 br formula_41 br formula_42 br formula_43 br formula_44 br formula_45 fact result formula_25 means string sentence sequence reductions shows must parsed bad boy made mess categorial grammars form function application rules equivalent generative capacity context-free grammars thus often considered inadequate theories natural language syntax unlike cfgs categorial grammars lexicalized meaning small number mostly language-independent rules employed syntactic phenomena derive lexical entries specific words another appealing aspect categorial grammars often easy assign compositional semantics first assigning interpretation types basic categories associating derived categories appropriate function types interpretation constituent simply value function argument modifications handle intensionality quantification approach used cover wide variety semantic phenomena lambek grammar elaboration idea concatenation operator types several inference rules mati pentus shown still generative capacity context-free grammars lambek calculus type concatenation operator formula_47 formula_12 formula_13 formula_50 lambek calculus consists several deduction rules specify type inclusion assertions derived following rules upper case roman letters stand types upper case greek letters stand sequences types sequent form formula_51 read string type formula_52 consists concatenation strings types formula_53 type interpreted set strings formula_54 may interpreted formula_55 includes subset horizontal line means inclusion line implies one line process begun axiom rule antecedents says type includes math axiom \quad
|
Computational linguistics
|
geckos geckos discontinued experimental operating system mos 6502 compatible processors system offers unix-like functionality including preemptive multitasking multithreading semaphores signals binary relocation tcp/ip networking via slip 6502 standard library geckos includes native support commodore pet 32 kb 96 kb models commodore 64 cs/a65 homebrew system due platform independent nature kernel code geckos advertised extremely easy os port alternative 6502 platforms binary compatibility lunix operating system attained lib6502 shared library used due lack mmu small fixed-location stack 6502 multitasking somewhat limited os supports maximum four tasks shared stack space used increased sixteen tasks stack snapshotting enabled although done expense system speed
|
Operating systems
|
david lowman david daniel lowman former national security agency employee expert witness case overturned hirabayashi v. united states author posthumously published book magic untold story u.s. intelligence evacuation japanese residents west coast world war ii lowman career officer national security agency 1970s lowman worked declassification world war ii japanese cable traffic decrypted magic program based reading cables criticized commission wartime relocation internment civilians conclusion military necessity relocating japanese-americans internment camps 1985 court case brought gordon hirabayashi clear wartime conviction refusing report relocation lowman testified united states government intercepted decrypted signal traffic japan directing officials united states organize spy networks using japanese-americans agents court decided favor hirabayashi lowman died april 1999 lowman book magic untold story u.s. intelligence evacuation japanese residents west coast world war ii published posthumously 2001 magic argued internment japanese americans justified based intercepted communications indicated spy network operating american west coast book published lee allen retired army lieutenant colonel activist convinced smithsonian institution revise downward estimates medals honors awarded japanese-american soldiers world war ii allen also wrote book foreword claimed japanese-americans world war ii evacuation life government care provided much needed relief trials threats faced west coast magic particularly criticized civil liberties act 1988 offered reparations surviving japanese-american internees writing military review richard milligan concluded magic refutes accepted history evacuation solely result national leaders 'racism war hysteria lack political publishers weekly agreed book discussion decrypted japanese communications makes solid case intelligence community faith credibility contributed significantly government decision also noted book actually refute claims racism digressing instead technical details bitter critique 1988 decision compensate former prisoners jonathan kirsch los angeles times praised book intellectually honest enough allow us come conclusions particularly inclusion rebuttal general counsel commission wartime relocation internment civilians also suggested possible read magic intercepts come away entirely different impression evidence
|
Computer security
|
rightscale rightscale company sells software service cloud computing management multiple providers company based santa barbara california thorsten von eicken former professor computer science cornell university left manage systems architecture expertcity startup company became citrix online joined rightscale ceo michael crandell rightscale vice president engineering rafael saavedra rightscale received 4.5 million venture capital april 2008 13 million december 2008 25 million september 2010 july 18 2012 rightscale announced acquisition scotland-based planforcloud.com formerly shopforcloud.com provides free cloud cost forecasting service rightscale introduced cloud maturity model release second annual state cloud report april 25 2013 report findings based rightscale survey 625 decision makers categorized according cloud maturity model analysis segmentation companies based varying degrees cloud adoption company raised 15.6 million february 2013 september 26 2018 flexera software acquired rightscale undisclosed amount november 5 2012 rightscale announced expanding existing relationship cloud hosting provider rackspace integrate openstack february 2013 rightscale became first cloud management company resell google compute engine public cloud services april 15 2013 rightscale announced would provide enterprise support windows azure conjunction microsoft announcement general availability release windows azure infrastructure services
|
Distributed computing architecture
|
capture flag capture flag ctf traditional outdoor game two teams flag marker objective capture team flag located team base bring safely back base enemy players tagged players home territory depending rules may game become members opposite team sent back territory frozen place jail freed member team capture flag requires playing field sort indoor outdoor versions field divided two clearly designated halves known territories players form two teams one territory side flag often piece fabric object small enough easily carried person night time games might use flashlights glowsticks lanterns flags sometimes teams wear dark colors night make difficult opponents see one team opposing team flag territory may tagged opposing team flag objective game players venture opposing team territory grab flag return territory without tagged flag defended mainly tagging opposing players attempt take within territory players safe meaning tagged opposing players cross opposing team territory vulnerable flag usually placed visibly obvious location rear team territory difficult version flag hidden place seen one angle also might challenge involved example flag could hidden leaves tall tree players see flag knock bring base different versions capture flag different rules handling flag happens tagged players player tagged may eliminated game entirely game forced join opposing team sent back territory placed jail without guard according number people team jail predesignated area group territory exists holding tagged players normally towards back group territory tagged players may confined jail limited predetermined time common form game involves option jailbreak version players tagged remain jail indefinitely however players team may free jail means jailbreak jailbreaks accomplished player running territory enemy jail action may depending rules free jailed players simply physically touched one performing jailbreak variants teammates got tagged jailed 3 times kicked game next round general freed players obligated return directly territory attempting offensive action i.e. attempting grab flag return side freed players usually acquire free walk-backs safe tagging reach home territory player performing jail break hand neither safe restricted performing actions attempting grab flag generally moving enemy territory sometimes players jail form chains teammate tags one person chain everyone free simply leaving jail without freed considered poor sportsmanship severely frowned upon often leading expulsion game players one team jailed meaning teammate free jail team time want find team flag rules handling flag also vary game game deal mostly disposition flag failed attempt capturing one variant player tagged carrying flag returned original place another variant flag left location player tagged latter variant makes offensive play easier flag tend course game moved closer dividing line territories games possible players throw flag teammates long flag stays play without hitting ground allowed players pass flag captured one player 're safe tagged unless trip sometimes flag holder may safe even home territory obtain flags thus ending game option return side hand teammate carry side versions may throw flag hand running game player returns territory enemy flag teams flags also general rule flag carrier may attempt free teammates jail alterations may include one flag ctf defensive team offensive team games three flags case latter one win flags captured one another variation players put bandannas pockets six inches sticking instead tagging opponents must pull opponent bandanna pocket matter player bandanna pulled 're captured must depending preferences players go jail return base returning play version team territory small base team flag kept win one team must flags base urban settings game played indoors enclosed area walls similar walls hockey rink also spot sticking back opposing ends connected playing area flag placed urban variation legal checking hockey style legal checking boards allowed player commits foul illegal check placed penalty box specified amount time depending severity foul player deliberately injures opponent expelled rest game throwing flag allowed variation long flag caught hits ground flag thrown teammate hits ground caught flag placed spot throw player throws flag blocked intercepted player opposing team flag placed back base uncommon airsoft paintball nerf water warriors play ctf typically territories versions players hit must sit predetermined amount time returning play respawning 2014 kickstarter users fully funded campaign starlux games capture flag redux update would allow played night dark campaign raised 7,000 100 backers new game uses glowing orbs flags led bracelets identify teams light-up markers show boundaries jails kit comes 2 glowing orbs 8 jail markers 7 territory lights 16 led glow bracelets eight team 12 cards explain game variation one guidebook english spanish 2018 heavy.com featured game roundup 62 best games tweens toybuzz.org regularly includes game gift guides plasticandplush.com describes capture flag redux good example one successful kickstarter projects ’ widely available online retail aside software video games apps used urban capture flag first time classic game reimagined retail product stealing sticks similar game played british isles united states australia however instead flag number sticks items coats hats placed goal far end side playing field area capture flag players sent prison tagged opponents side may freed teammates player may take one opponents sticks time first team take opponents sticks side wins 1984 scholastic published bannercatch apple ii commodore computers edutainment game recognizable capture-the-flag mechanics bannercatch allows two humans alternating two characters game world play capture flag increasingly difficult team four ai bots bannercatch game world divided quadrants home enemy two no-mans land areas hold jails successful capture requires bringing enemy flag one team home quadrant players captured enemy territory no-mans land holding flag captured players must rescued designated jail one members team fallen flags remain dropped time-out period elapses flag returns one several starting locations home territory 2d map also features walls trees moving river enabling wide variety strategies special locations play area allow humans query game state flag status using binary messages 1992 richard carr released ms-dos based game called capture flag turn-based strategy game real time network modem play play-by-mail based around traditional outdoor game game required players merely move one characters onto square opponent flag opposed bringing back friendly territory difficulties implementing artificial intelligence computer player would needed bring enemy flag home intercept opposing characters carrying flag computer security capture flag ctf type wargame computer security competition ctf contests usually designed serve educational exercise give participants experience securing machine well conducting reacting sort attacks found real world i.e. bug bounty programs professional settings reverse-engineering network sniffing protocol analysis system administration programming cryptanalysis skills required prior ctf contests def con three main styles capture flag competitions attack/defense hardware challenges jeopardy attack/defense style competition team given machine small network defend isolated network teams scored success defending assigned machine success attacking team machines depending nature particular ctf game teams may either attempting take opponent flag machine teams may attempting plant flag opponent machine two prominent attack/defense ctf held every year def con largest hacker conference nyu-csaw cyber security awareness week largest student cyber-security contest hardware challenges usually involve getting unknown piece hardware figure bypass part security e.g using debugging ports using side-channel attack jeopardy -style competitions usually involve multiple categories problems contains variety questions different point values difficulties teams attempt earn points competition time frame example 24 hours directly attack rather race style game play encourages taking time approach challenges prioritizes quantity correct submissions timing fourth type ctf commonly referred king hill koth king hill similar attack/defend instead everyone machine small network defend preconfigured ones require teams exploit team successfully taken machine focus shifts defending machine teams attacks score usually determined score reporting service machine reports team token one team able gain access remove teams token insert thus making king hill capture flag among games made recent comeback among adults part urban gaming trend includes games like pac-manhattan fugitive manhunt game played city streets players use cellphones communicate news games spreads virally use blogs mailing lists urban capture flag played cities throughout north america one long running example occurs northrop mall university minnesota fridays typical attendance ranging 50 several hundred
|
Computer security
|
alien syndrome two players control two soldiers named ricky mary fight way large eight-way scrolling levels rescuing comrades held aliens rescued certain number hostages exit opens pass order fight end-of-level guardian monstrosity defeated able move onto next stage alien syndrome features two player simultaneous gameplay pickups assist player including better weapons maps current level 1988 game ported master system msx amiga atari st amstrad cpc commodore 64 famicom/nintendo entertainment system published tengen without nintendo license later game ported zx spectrum 1989 game gear 1992 sharp x68000 1992 latter arcade perfect port original arcade version game reviewed july 1987 issue computer video games clare edgeley described one gripping games played months praising aliens like horror atmosphere chilling sounds special effects graphics gameplay stated first time atmosphere sheer addictiveness shoot 'em transported another planet concluded fantastic master system version game reviewed 1989 dragon getting 2 5 stars game also converted polygonal graphics ps2 part sega ages re-release program included us version sega classics collection removed european version receive lower age certificate version updated controls adding use analog sticks similar seen sheriff smash tv original arcade game also included unlockable sonic ultimate genesis collection sequel name alien syndrome released wii psp july 24 2007
|
Computer architecture
|
bartpe bartpe bart preinstalled environment discontinued tool customizes windows xp windows server 2003 lightweight environment similar windows preinstallation environment could run live cd live usb drive bartpe system image created using pe builder freeware program created bart lagerweij requires legal copy windows xp windows server 2003 additional applications included image using plugins often resides live cd usb drive bartpe allows user boot windows even hardware software fault disabled installed operating system internal hard drive – instance recover files also used scan remove rootkits computer viruses spyware infected boot files reset lost administrator password pe builder also known bart pe builder software used create bartpe system images windows preinstallation environment bartpe operates loading system registry files ram writing registry changes back boot media thus operating systems require hard drive network access also allows run non-writable media cd-rom since instance bartpe new installation bartpe boot disk needs original windows setup files order operate bart pe builder application interprets condenses files windows setup cd create bartpe installation build windows xp pro home edition cd preinstalled windows xp version without cd additional applications included bartpe setup use plugins plugin contains setup information specific application included media installed along windows bartpe boot currently hundred plugins available addition dozen-odd included default bartpe since bartpe represents totally independent operating environment obvious application examples involve backup restoration diagnosis error-correction systems malfunctioning primary storage drives plugin programs nominally added capacity bartpe media bartpe known certain incompatibilities windows xp cds shipped dell pcs dell versions include changes windows setup files cause bartpe build process fail two patches currently available correct known problems one replace setupreg.hiv load standard iastor.sys bartpe create windows vista windows 7 live dvds
|
Operating systems
|
weave protocol weave network application layer protocol implementation comprehensive toolkit building connected internet things-class applications primary current focus consumer residential applications weave works across multiple ipv6-bearing link technologies ethernet wi-fi cellular thread adaptations bluetooth low energy point-to-point wireless links weave originally created nest labs launched nest protect 1st generation product 2013 since adopted continued google following google acquisition nest labs 2014 second wave architectural revisions made weave support nest secure security system nest connect nest x yale lock since acquisition nest labs google planned integrate weave android things embedded operating system codenamed brillo order create end-to-end solution iot devices google released implementation weave open source project openweave github june 2017 apache 2.0 license
|
Internet protocols
|
superantispyware superantispyware software application detect remove spyware adware trojan horses rogue security software computer worms rootkits parasites potentially harmful software applications although detect various types malware superantispyware designed replace antivirus software superantispyware virus definitions updated several times week generally receive build update month company claims specifically designed compatible security applications kaspersky therefore used even applications incompatible anti-spyware products product available freeware personal use limited functions automatic update scheduling limited repairing functions 2011 superantispyware received dismal rating pc magazine complained real-time protection lowest detection rate lowest score malware removal test freeware commercial version received 4 5 star average user rating cnet download.com website 16 july 2011 superantispyware acquired support.com transaction structured acquisition assets cash purchase price 8.5 million employees including founder industry leader nick skrepetos joined acquirer
|
Computer security
|
paradox database paradox relational database management system currently published corel corporation originally released ms-dos ansa software updated borland bought company mid 1991 borland began process acquire ashton-tate competing dbase product line windows version planned release borland 1992 delayed january 1993 time microsoft access windows available paradox last updated 2008 paradox dos relational database management system originally written richard schwartz robert shostak released belmont california-based company ansa software 1985 new york times described among first emerging generation software making extensive use artificial intelligence techniques noted paradox could read competing ashton tate dbase files september 1987 borland purchased ansa software including paradox/dos 2.0 software notable classic versions 3.5 4.5 versions 3.5 evolutions 1.0 version 4.0 4.5 retooled borland c++ windowing toolkit used different extended memory access scheme paradox/dos successful dos-based database late 1980s early 1990s time dbase xbase clones foxpro clipper dominated market notable competitors clarion dataease dataflex features distinguished paradox/dos – copiously illustrated well laid explanations written common english paradox windows distinctly different product paradox dos produced different team programmers paradox windows applications programmed different programming language called objectpal although key features dos product qbe database engine ports keeping dos code major break compatibility pal objectpal shift gui design metaphor forms reports objectpal changes controversial forced since pal based keystroke recording actions equivalent windows object-based language based ideas hypercard used place keystroke recording forms reports designers used device independent scaling including ability work zoomed mode detailed layout mouse right-click used access forms reports properties inspired xerox alto smalltalk way almost universal windows programs objectpal like hypercard associated visual objects also revealed right click property inspection layout tools could pinned stay screen idea borrowed next fairly widely adopted windows approximately first year development object-oriented code written c aided macros turbo c++ available point remaining parts code written c++ product manager shipping version 1.0 joe duncan development qa team totaled 30 people paradox windows quattro pro windows closely related project started development using beta versions windows 3.0 spring 1990 paradox/windows ended delayed year beyond original plan shipping early 1993 reasons many entirely surprising major rewrite oo language new tools shifting gui paradigm essentially first version operating system still big problem company microsoft managed ship access couple months ahead paradox windows major marketing win microsoft 1990 borland also started work internal dbase clone dos windows written assembler planned ship 1992 early 1992 became clear ashton-tate difficulties developing windows versions products borland switched plans instead acquiring company anointing internal project official successor part ashton-tate acquisition interbase database decided paradox/w able work interbase well paradox engine led creation idapi engine based around interbase acquisition also shifted focus paradox historically competed dbase markets paradox/w originally designed improve competitive position developer-oriented market dbase acquired longer desirable emphasis shifted towards ease-of-use market however product could changed match emphasis occurred later releases late stage making product somewhat overly complex entry level market microsoft first desktop database program microsoft access good job addressing market got first debuted comdex november 1992 response borland acquisition ashton-tate microsoft acquired foxpro incorporated rushmore technology access jet engine significantly improve performance microsoft access offered many features easier end users developers implement including intuitive query interface using windows links fields rather paradox text tagging fields qbe access basic programming language similar pal objectpal access paradox significantly differed way presented results queries access showed records query completed without overhead creating output table paradox showed results records retrieved answer table created performance difference significant large datasets negatively impacted paradox/w taking cue borland low price quattro pro spreadsheet debut microsoft excel microsoft access debuted 99 price undercut traditional dbms prices paradox dos paradox windows dbase around 799 negatively impacted borland firm borland management team 85 market share desktop database market severely underestimated threat microsoft microsoft access still paradox/w sold well meanwhile borland going serious problems caused ashton-tate acquisition many product lines discontinued corporate reorganization consolidation painful even worse internal dbase project center acquisition rationale eventually cancelled technical reasons leaving borland collapse revenues serious need develop missing dbase windows hurry borland lost strength fight multiple marketing battles needed range products paradox minimally marketed developers since company decided would hold replacement dbase eventually came 1994 late company make matters worse dbase dos clone foxbase copied dbase closely windows version product developed without existing dbase windows model one dbase dos strengths multi-vendor support lost various windows xbase products borland visual dbase windows could n't run microsoft foxbase windows programs vice versa faced fragmented market need rewrite programs take advantage windows little incentive xbase users stay loyal product 'd used dos 1995 microsoft bundled access microsoft office professional suite word excel powerpoint effectively killed end-user desktop database market standalone products despite solid follow-on versions improvements usability entry-level users paradox faded market included sale borland products wordperfect turn resold wordperfect got financial products current time writing paradox windows wordperfect quattro pro windows owned corel sold part office suite dbase windows came late significant player windows market dbase programmers migrated microsoft foxbase similar database tool borland retained interbase/idapi server focused efforts delphi tools years gave influential small part data-oriented developer market corel acquired certain rights develop market paradox mid-1990s released corel paradox 8 1997 association computing machinery acm began putting information corel paradox version 8 1998 paradox also bundled professional version corel wordperfect office suite subsequent releases included office professional edition versions 9 10 11 12 x3 x4 x5 x6 x7 x8 x9 strong paradox user base mainly centered paradox community associated newsgroups although many fans objectpal programming language paradox/windows pal/dos scripts could easily migrated object event models completely different forcing developers using pal completely rewrite database applications
|
Databases
|
microsoft store digital microsoft store formerly known windows store digital distribution platform owned microsoft started app store windows 8 windows server 2012 primary means distributing universal windows platform uwp apps windows 10 microsoft merged distribution platforms windows marketplace windows phone store xbox video xbox music eventually xbox store microsoft store making unified distribution point apps digital videos digital music console games e-books included 2019 content available free charge store 2015 669,000 apps available store categories containing largest number apps games entertainment books reference education majority app developers one app similar platforms mac app store google play microsoft store curated apps must certified compatibility content addition user-facing microsoft store client store also developer portal developers interact microsoft takes 30 sale price apps prior january 1 2015 cut reduced 20 developer profits reached 25,000 microsoft previously maintained similar digital distribution system software known windows marketplace allowed customers purchase software online marketplace tracked product keys licenses allowing users retrieve purchases switching computers windows marketplace discontinued november 2008 microsoft first announced digital distribution service windows presentation build developer conference september 13 2011 details announced conference revealed store would able hold listings certified traditional windows apps well called metro-style apps time tightly-sandboxed software based microsoft design guidelines constantly monitored quality compliance consumers windows store intended way obtain metro-style apps announced alongside developer preview release windows 8 windows store become available consumer preview released february 2012 updates apps published store july 1 2019 available windows 8 rtm users per microsoft lifecycle policies windows 8 unsupported since 2016 updated version windows store introduced windows 8.1 home page remodeled display apps focused categories popular recommended top free paid special offers expanded details ability apps automatically update also added windows 8.1 update also introduced notable presentation changes including increasing top app lists return 1000 apps instead 100 apps 'picks section changing default sorting reviews 'most popular updates apps published store july 1 2023 available windows 8.1 windows 10 released updated version windows store merged microsoft distribution platforms windows marketplace windows phone store xbox video xbox music unified store front windows 10 platforms offering apps games music film tv series themes ebooks september 2017 microsoft began re-brand windows store microsoft store new icon carrying microsoft logo xbox store merged new version platform web apps traditional desktop software packaged distribution windows store desktop software distributed windows store packaged using app-v system allow sandboxing february 2018 microsoft announced progressive web apps would begin available microsoft store microsoft would automatically add selected quality progressive web apps bing crawler allow developers submit progressive web apps microsoft store windows store available windows server 2012 installed default unavailable windows server 2016 however line-of-business uwp apps uwp apps acquired microsoft store business formerly windows store business installed sideloading microsoft store primary means distributing windows store apps users although sideloading apps outside store supported out-of-box sideloading support windows 8 available enterprise edition windows 8 running computers joined windows domain sideloading windows rt windows 8 pro windows 8 enterprise computers without domain affiliation requires purchase additional licenses volume licensing windows 10 removes requirement allowing users freely enable disable sideloading initially microsoft took 30 cut app sales reached us 25,000 revenue cut dropped 20 january 1 2015 reduction cut 25,000 removed microsoft takes 30 cut app purchases regardless overall sales third-party transactions also allowed microsoft take cut early 2019 microsoft lets app developers get 95 app revenues microsoft take 5 user download app direct url individual developers able register 19 usd companies 99 usd 2015 669,000 apps available store including apps windows nt windows phone uwp apps work platforms categories containing largest number apps games entertainment books reference education majority app developers one app free paid apps distributed microsoft store paid apps ranging cost us 0.99 999.99 developers 120 countries submit apps microsoft store apps may support 109 languages long support one 12 app certification languages april 2 2019 microsoft announced sale e-books microsoft store ceased due drm licenses renewed books become inaccessible july 2019 microsoft automatically refund users purchased books via service similar windows phone store microsoft store regulated microsoft applicants must obtain microsoft approval app becomes available store prohibited apps include following types app forbidden microsoft indicated remotely disable and/or remove apps users systems security legal reasons case paid apps refunds may issued done microsoft initially banned pegi 18 -rated content store europe however critics noted made content policies stricter intended pegi 18-rated games rated mature u.s. esrb system next lowest highest rating adults guidelines amended december 2012 remove discrepancy addition user facing microsoft store client store also developer portal developers interact windows developer portal following sections app microsoft store provides developer tools tracking apps store one track downloads financials crashes adoption ratings dashboard also presents detailed breakdown users market age region well charts number downloads purchases average time spent app dashboard also allows developer claim app name one year name returned available pool
|
Operating systems
|
pilot job computer science pilot job type multilevel scheduling resource acquired application application schedule work resource directly rather going local job scheduler might lead queue waits work unit term comes condor high-throughput computing system condor glideins provides functionality examples pilot jobs bigjob implemented saga swift coasters part swift parallel scripting system falkon lightweight task execution framework htcaas pilot jobs often used systems queues part purpose sense avoid multiple waits queues often found parallel computing systems pilot jobs usually part distributed application many times associated many-task computing
|
Distributed computing architecture
|
windows driver kit windows driver kit wdk software toolset microsoft enables development device drivers microsoft windows platform includes documentation samples build environments tools driver developers complete toolset driver development also need following compiler visual studio windows sdk windows hlk previously wdk known windows driver development kit ddk supported windows driver model wdm development got current name microsoft released windows vista added following previously separated tools kit installable file system kit ifs kit driver test manager dtm though dtm later renamed removed wdk ddk windows 2000 earlier versions include compiler instead need install visual c++ separately compile drivers version windows xp ddk later wdk include command line compiler compile drivers one reasons microsoft gave including compiler quality drivers would improve compiled version compiler used compile windows visual c++ targeted application development different product cycle frequent changes wdk 8.x later series goes back require installing matched version visual studio separately time integration complete edit build debug driver within visual studio directly note windows nt ddk windows 98 ddk windows 2000 ddk longer made available download microsoft java-related settlements made microsoft sun microsystems
|
Operating systems
|
norton antibot norton antibot developed symantec monitors applications damaging behavior application designed prevent computers hijacked controlled hackers according symantec 6 million computers hijacked majority users unaware computers hacked antibot designed used conjunction antivirus software unlike traditional antivirus products antibot use signatures delay vendor discovers virus distributes signature delay computers affected instead antibot attempts identify virus actions viruses malicious nature however antibot intended replace antivirus product program uses technology licensed sana security product discontinued avg acquired sana security january 2009 developing standalone program similar antibot called avg identity protection also discontinued integrated avg internet security 2011 product updates technical support available symantec one year customer last purchase renewal ed kim director product management symantec highlighted rise botnets botnet collection compromised computers known bots hackers usually control malicious purposes two main uses botnets include identity theft e-mail spam kim cited 29 percent increase bots first half 2006 second half six million active bots end 2006 7 june 2007 symantec released beta version norton antibot antibot designed supplement user existing antivirus software unlike traditional antivirus software antibot use signatures identify malware instead monitors running applications damaging malicious behavior licensing technology sana security antibot also supplement sonar technology symantec found norton antivirus 2007 norton internet security 2007 norton 360 similar antibot sonar monitors malicious behavior however sonar run continuously background virus scan specific products antibot made available general public 17 july 2007 16 january 2009 avg announced plans acquire sana security finalized j.r. smith ceo avg technologies highlighted 40,000 unique malware samples analysts see day noted time frame sample analyzed signature created emphasizing need instant protection since hackers constantly modifying malicious software evade signature detection often several strains variations one virus different classification signature symantec confirmed ceasing sales distribution norton antibot early 2009 product help updates would still available one year following customer last purchase renewal pc magazine noted antibot average ability identify malicious programs based behavior fact mistakenly mark legitimate program malicious testing however infected systems antibot failed install caused blue screens failed completely remove virus technical limitation antibot detect inactive malware since behavior software monitor
|
Computer security
|
nilsimsa hash nilsimsa anti-spam focused locality-sensitive hashing algorithm originally proposed cmeclax remailer operator 2001 reviewed ernesto damiani et al 2004 paper titled open digest-based technique spam detection goal nilsimsa generate hash digest email message digests two similar messages similar comparison cryptographic hash functions sha-1 md5 making small modification document substantially change resulting hash document paper suggests nilsimsa satisfies three requirements subsequent testing range file types identified nilsimsa hash significantly higher false positive rate compared similarity digest schemes tlsh ssdeep sdhash nilsimsa similarity matching taken consideration jesse kornblum developing fuzzy hashing 2006 used algorithms spamsum andrew tridgell 2002 several implementations nilsimsa exist open-source software
|
Computer security
|
mac flooding computer networking media access control attack mac flooding technique employed compromise security network switches attack works forcing legitimate mac table contents switch forcing unicast flooding behavior potentially sending sensitive information portions network normally intended go switches maintain mac table maps individual mac addresses network physical ports switch allows switch direct data physical port recipient located opposed indiscriminately broadcasting data ports ethernet hub advantage method data bridged exclusively network segment containing computer data specifically destined typical mac flooding attack switch fed many ethernet frames containing different source mac addresses attacker intention consume limited memory set aside switch store mac address table effect attack may vary across implementations however desired effect attacker force legitimate mac addresses mac address table causing significant quantities incoming frames flooded ports flooding behavior mac flooding attack gets name launching successful mac flooding attack malicious user use packet analyzer capture sensitive data transmitted computers would accessible switch operating normally attacker may also follow arp spoofing attack allow retain access privileged data switches recover initial mac flooding attack mac flooding also used rudimentary vlan hopping attack prevent mac flooding attacks network operators usually rely presence one features network equipment
|
Computer security
|
greylisting greylisting method defending e-mail users spam mail transfer agent mta using greylisting temporarily reject email sender recognize mail legitimate originating server try delay sufficient time elapsed email accepted server employing greylisting temporarily rejects email unknown suspicious sources sending 4xx reply codes please call back later defined simple mail transfer protocol smtp fully capable smtp implementations expected maintain queues retrying message transmissions cases legitimate mail may delayed still get temporary rejection issued different stages smtp dialogue allowing implementation store less data incoming message trade-off work bandwidth exact matching retries original messages rejecting message content received allows server store choice headers and/or hash message body addition whitelisting good senders greylister provide exceptions greylisting generally overridden fully validated tls connection matching certificate large senders often pool machines send resend email ip addresses most-significant 24 bits /24 treated equivalent cases spf records used determine sending pool similarly e-mail systems use unique per-message return-paths example variable envelope return path verp mailing lists sender rewriting scheme forwarded e-mail bounce address tag validation backscatter protection etc exact match sender address required every e-mail systems delayed greylisting systems try avoid delay eliminating variable parts verp using sender domain beginning local-part sender address greylisting effective mass email tools used spammers queue reattempt mail delivery normal regular mail transport agent delaying delivery also gives real-time blackhole lists similar lists time identify flag spam source thus subsequent attempts likely detected spam mechanisms greylisting delay main advantage user point view greylisting requires additional user configuration server utilizing greylisting configured appropriately end user notice delay first message given sender long sending email server identified belonging whitelisted group earlier messages mail sender repeatedly greylisted may worth contacting mail system administrator detailed headers delayed mail mail administrator point view benefit twofold greylisting takes minimal configuration get running occasional modifications local whitelists second benefit rejecting email temporary 451 error actual error code implementation dependent cheap system resources spam filtering tools intensive users cpu memory stopping spam hits filtering processes far fewer system resources used biggest disadvantage greylisting unrecognized servers destroys near-instantaneous nature email users come expect mail unrecognized servers typically delayed 15 minutes could delayed days poorly configured sending systems explaining users become accustomed immediate email delivery probably convince mail server uses greylisting behaving correctly particular problem websites require account created email address confirmed used – user greylisting mailserver attempts reset credentials website uses email confirmation password resets sending mta site poorly configured greylisting may delay initial email link extreme cases delivery delay imposed greylister exceed expiry time password reset token delivered email cases manual intervention may required whitelist website mailserver email containing reset token used expires mail server greylisted duration time initial delay re-transmission variable – something greylisting server control visibility smtp says retry interval least 30 minutes give-up time needs least 4–5 days actual values vary widely different mail server software modern greylisting applications postgrey unix-like operating systems automatically whitelist senders prove capable recovering temporary errors note irrespective reputed spamminess sender implementation also generally include ability manually whitelist mailservers one 2007 analysis greylisting considers totally undesirable due delay mail unreliable greylisting becomes widespread junkmailers adapt systems get around conclusion purpose greylisting reduce amount spam server spam-filtering software needs analyze resource-intensively save money servers reduce spam reaching users conclusion greylisting annoying much annoying spam current smtp specification rfc 5321 clearly states smtp client retains responsibility delivery message section 4.2.5 mail transmitted immediately must queued periodically retried sender section 4.5.4.1 mtas therefore queue retry messages small number typically handled whitelisting exception lists also legitimate mail might get delivered retry comes different ip address original attempt source email server farm goes kind relay service likely server original one make next attempt network fault tolerance ips belong completely unrelated address blocks thereby defying simple technique identifying significant part address since ip addresses different recipient server fail recognize series attempts related refuse turn continue message ages queue number servers large enough problem partially bypassed proactively identifying exceptions server farms likewise exception configured multihomed hosts hosts using dhcp extreme case sender could legitimately use different ipv6 address outbound smtp connection sender server subjected greylisting might also reattempt delivery another receiving mailserver receiving domain one mx record may cause problems hosts implement greylisting policy share database
|
Computer security
|
3g-324m 3g-324m 3gpp umbrella protocol video telephony 3g mobile networks 3g-324m protocol operates established circuit switched connection two communicating peers 3g-324m umbrella specification enable conversational multimedia communication circuit switched cs networks adopted 3gpp 3g-324m based itu-t h.324 specification multimedia conferencing circuit switched networks 3g-324m composed following sub-protocols 3g-324m specification using circuit switched network allows delay sensitive conversational multimedia services 3g-324m agnostic actual circuit switched network uses run easily umts well td-scdma networks 3g-324m proven solution conversational multimedia based services packet-based wireless networks deliver inherent overhead ber sensitivity variant routing delays 3g-324m operating circuit switched channel two communication peers guarantees fixed-delay quality service multimedia communications combining circuit switched 3g-324m services packet-based sip services presence leverage strength networks enable new types differentiated innovative mobile 3g services audio codec video codec
|
Internet protocols
|
internet key exchange computing internet key exchange ike sometimes ikev1 ikev2 depending version protocol used set security association sa ipsec protocol suite ike builds upon oakley protocol isakmp ike uses x.509 certificates authentication ‒ either pre-shared distributed using dns preferably dnssec ‒ diffie–hellman key exchange set shared session secret cryptographic keys derived addition security policy every peer connect must manually maintained internet engineering task force ietf originally defined ike november 1998 series publications request comments known rfc 2407 rfc 2408 rfc 2409 rfc 4306 updated ike version two ikev2 december 2005 rfc 4718 clarified open details october 2006 rfc 5996 combined two documents plus additional clarifications updated ikev2 published september 2010 later update upgraded document proposed standard internet standard published rfc 7296 october 2014 parent organization ietf internet society isoc maintained copyrights standards freely available internet community ipsec implementations consist ike daemon runs user space ipsec stack kernel processes actual ip packets user-space daemons easy access mass storage containing configuration information ipsec endpoint addresses keys certificates required kernel modules hand process packets efficiently minimum overhead—which important performance reasons ike protocol uses udp packets usually port 500 generally requires 4–6 packets 2–3 round trips create sa security association sides negotiated key material given ipsec stack instance could aes key information identifying ip endpoints ports protected well type ipsec tunnel created ipsec stack turn intercepts relevant ip packets appropriate performs encryption/decryption required implementations vary interception packets done—for example use virtual devices others take slice firewall etc ikev1 consists two phases phase 1 phase 2 ike phase one purpose establish secure authenticated communication channel using diffie–hellman key exchange algorithm generate shared secret key encrypt ike communications negotiation results one single bi-directional isakmp security association sa authentication performed using either pre-shared key shared secret signatures public key encryption phase 1 operates either main mode aggressive mode main mode protects identity peers hash shared key encrypting aggressive mode ike phase two ike peers use secure channel established phase 1 negotiate security associations behalf services like ipsec negotiation results minimum two unidirectional security associations one inbound one outbound phase 2 operates quick mode originally ike numerous configuration options lacked general facility automatic negotiation well-known default case universally implemented consequently sides ike exactly agree type security association wanted create – option option – connection could established complications arose fact many implementations debug output difficult interpret facility produce diagnostic output ike specifications open significant degree interpretation bordering design faults dead-peer-detection case point giving rise different ike implementations able create agreed-upon security association many combinations options however correctly configured might appear either end need intent overhaul ike protocol described appendix rfc 4306 following issues addressed ietf ipsecme working group standardized number extensions goal modernizing ikev2 protocol adapting better high volume production environments extensions include ike supported part ipsec implementation windows 2000 windows xp windows server 2003 windows vista windows server 2008 isakmp/ike implementation jointly developed cisco microsoft microsoft windows 7 windows server 2008 r2 partially support ikev2 rfc 7296 well mobike rfc 4555 vpn reconnect feature also known agile vpn several open source implementations ipsec associated ike capabilities linux libreswan openswan strongswan implementations provide ike daemon configure i.e. establish sas klips xfrm/netkey kernel-based ipsec stacks xfrm/netkey linux native ipsec implementation available version 2.6 berkeley software distributions also ipsec implementation ike daemon importantly cryptographic framework openbsd cryptographic framework ocf makes supporting cryptographic accelerators much easier ocf recently ported linux significant number network equipment vendors created ike daemons ipsec implementations license stack one another number implementations ikev2 companies dealing ipsec certification interoperability testing starting hold workshops testing well updated certification requirements deal ikev2 testing icsa labs held latest ikev2 interoperability workshop orlando fl march 2007 13 vendors around world following open source implementations ikev2 currently available leaked nsa presentations released der spiegel indicate ike exploited unknown manner decrypt ipsec traffic isakmp researchers discovered logjam attack state breaking 1024-bit diffie–hellman group would break 66 vpn servers 18 top million https domains 26 ssh servers researchers claim consistent leaks.. claim refuted eyal ronen adi shamir paper critical review imperfect forward secrecy paul wouters libreswan article 66 vpn ’ fact broken ipsec vpn configurations allow negotiation multiple configurations subject mitm-based downgrade attacks offered configurations ikev1 ikev2 avoided careful segregation client systems onto multiple service access points stricter configurations
|
Internet protocols
|
computer security compromised hardware failure computer security compromised hardware failure branch computer security applied hardware objective computer security includes protection information property theft corruption natural disaster allowing information property remain accessible productive intended users secret information could retrieved different ways article focus retrieval data thanks misused hardware hardware failure hardware could misused exploited get secret data article collects main types attack lead data theft computer security comprised devices keyboards monitors printers thanks electromagnetic acoustic emanation example components computer memory network card processor thanks time temperature analysis example monitor main device used access data computer shown monitors radiate reflect data environment potentially giving attackers access information displayed monitor video display units radiate known compromising emanations tempest radiation code word u.s. government programme aimed attacking problem electromagnetic broadcast data significant concern sensitive computer applications eavesdroppers reconstruct video screen content radio frequency emanations radiated harmonic video signal shows remarkable resemblance broadcast tv signal therefore possible reconstruct picture displayed video display unit radiated emission means normal television receiver preventive measures taken eavesdropping video display unit possible distances several hundreds meters using normal black-and-white tv receiver directional antenna antenna amplifier even possible pick information types video display units distance 1 kilometer sophisticated receiving decoding equipment used maximum distance much greater displayed monitor reflected environment time-varying diffuse reflections light emitted crt monitor exploited recover original monitor image eavesdropping technique spying distance data displayed arbitrary computer screen including currently prevalent lcd monitors technique exploits reflections screen optical emanations various objects one commonly finds close proximity screen uses reflections recover original screen content objects include eyeglasses tea pots spoons plastic bottles even eye user attack successfully mounted spy even small fonts using inexpensive off-the-shelf equipment less 1500 dollars distance 10 meters relying expensive equipment allowed conduct attack 30 meters away demonstrating similar attacks feasible side street close building many objects may found usual workplace exploited retrieve information computer display outsider particularly good results obtained reflections user eyeglasses tea pot located desk next screen reflections stem eye user also provide good results however eyes harder spy distance fast-moving objects require high exposure times using expensive equipment lower exposure times helps remedy problem reflections gathered curved surfaces close objects indeed pose substantial threat confidentiality data displayed screen fully invalidating threat without time hiding screen legitimate user seems difficult without using curtains windows similar forms strong optical shielding users however aware risk may willing close curtains nice day reflection object computer display curved mirror creates virtual image located behind reflecting surface flat mirror virtual image size located behind mirror distance original object curved mirrors however situation complex computer keyboards often used transmit confidential data passwords since contain electronic components keyboards emit electromagnetic waves emanations could reveal sensitive information keystrokes electromagnetic emanations turned constitute security threat computer equipment figure presents keystroke retrieved material necessary approach acquire raw signal directly antenna process entire captured electromagnetic spectrum thanks method four different kinds compromising electromagnetic emanations detected generated wired wireless keyboards emissions lead full partial recovery keystrokes best practical attack fully recovered 95 keystrokes ps/2 keyboard distance 20 meters even walls keyboard specific fingerprint based clock frequency inconsistencies determine source keyboard compromising emanation even multiple keyboards model used time four different kinds way compromising electromagnetic emanations described key pressed released held keyboard sends packet information known scan code computer protocol used transmit scan codes bidirectional serial communication based four wires vcc 5 volts ground data clock clock data signals identically generated hence compromising emanation detected combination signals however edges data clock lines superposed thus easily separated obtain independent signals falling edge transition attack limited partial recovery keystrokes significant limitation gtt falling edge transition attack improved recover almost keystrokes indeed two traces exactly one data rising edge attackers able detect transition fully recover keystrokes harmonics compromising electromagnetic emissions come unintentional emanations radiations emitted clock non-linear elements crosstalk ground pollution etc determining theoretically reasons compromising radiations complex task harmonics correspond carrier approximately 4 mhz likely internal clock micro-controller inside keyboard harmonics correlated clock data signals describe modulated signals amplitude frequency full state clock data signals means scan code completely recovered harmonics keyboard manufacturers arrange keys matrix keyboard controller often 8-bit processor parses columns one-by-one recovers state 8 keys matrix scan process described 192 keys keys may used instance modern keyboards use 104/105 keys arranged 24 columns 8 rows columns continuously pulsed one-by-one least 3μs thus leads may act antenna generate electromagnetic emanations attacker able capture emanations easily recover column pressed key even signal fully describe pressed key still gives partial information transmitted scan code i.e column number note matrix scan routine loops continuously key pressed still signal composed multiple equidistant peaks emanations may used remotely detect presence powered computers concerning wireless keyboards wireless data burst transmission used electromagnetic trigger detect exactly key pressed matrix scan emanations used determine column belongs techniques target keyboards table sums technique could used find keystroke different kind keyboard paper called compromising electromagnetic emanations wired wireless keyboards martin vuagnoux sylvain pasini tested 12 different keyboard models ps/2 usb connectors wireless communication different setups semi-anechoic chamber small office adjacent office flat building table presents results attacks emanations caused human typing attracted interest recent years particular works showed keyboard acoustic emanations leak information exploited reconstruct typed text pc keyboards notebook keyboards vulnerable attacks based differentiating sound emanated different keys attack takes input audio signal containing recording single word typed single person keyboard dictionary words assumed typed word present dictionary aim attack reconstruct original word signal attack taking input 10-minute sound recording user typing english text using keyboard recovering 96 typed characters attack inexpensive hardware required parabolic microphone non-invasive require physical intrusion system attack employs neural network recognize key pressed combines signal processing efficient data structures algorithms successfully reconstruct single words 7-13 characters recording clicks made typing keyboard sound clicks differ slightly key key keys positioned different positions keyboard plate although clicks different keys sound similar human ear average 0.5 incorrect recognitions per 20 clicks shows exposure keyboard eavesdropping using attack attack efficient taking 20 seconds per word standard pc 90 better success rate finding correct word words 10 characters success rate 73 words tested practice human attacker typically determine text random attacker also identify occasions user types user names passwords short audio signals containing single word seven characters long considered means signal seconds long short words often chosen password dominant factors affecting attack success word length importantly number repeated characters within word procedure makes possible efficiently uncover word audio recordings keyboard click sounds recently extracting information another type emanations demonstrated acoustic emanations mechanical devices dot-matrix printers extracting private information watching somebody typing keyboard might seem easy task becomes extremely challenging automated however automated tool needed case long-lasting surveillance procedures long user activity human able reconstruct characters per minute paper clearshot eavesdropping keyboard input video presents novel approach automatically recovering text typed keyboard based solely video user typing automatically recognizing keys pressed user hard problem requires sophisticated motion analysis experiments show human reconstructing sentences requires lengthy hours slow-motion analysis video attacker might install surveillance device room victim might take control existing camera exploiting vulnerability camera control software might simply point mobile phone integrated camera laptop keyboard victim working public space balzarotti analysis divided two main phases figure first phase analyzes video recorded camera using computer vision techniques frame video computer vision analysis computes set keys likely pressed set keys certainly pressed position space characters results phase analysis noisy second phase called text analysis required goal phase remove errors using language context-sensitive techniques result phase reconstructed text word represented list possible candidates ranked likelihood acoustic emanations attack recovers dot-matrix printer processing english text printing possible based record sound printer makes microphone close enough attack recovers 72 printed words 95 knowledge text done microphone distance 10 cm printer upfront training phase picture attack b picture fully automated uses combination machine learning audio processing speech recognition techniques including spectrum features hidden markov models linear classification fundamental reason reconstruction printed text works emitted sound becomes louder needles strike paper given time correlation number needles intensity acoustic emanation training phase conducted words dictionary printed characteristic sound features words extracted stored database trained characteristic features used recognize printed english text task trivial major challenges include timing attacks enable attacker extract secrets maintained security system observing time takes system respond various queries ssh designed provide secure channel two hosts despite encryption authentication mechanisms uses ssh weaknesses interactive mode every individual keystroke user types sent remote machine separate ip packet immediately key pressed leaks inter-keystroke timing information users ’ typing picture represents command su processed ssh connection simple statistical techniques suffice reveal sensitive information length users ’ passwords even root passwords using advanced statistical techniques timing information collected network eavesdropper learn significant information users type ssh sessions time takes operating system send packet keypress general negligible comparing interkeystroke timing also enables eavesdropper learn precise interkeystroke timings users ’ typing arrival times packets data remanence problems affect obvious areas ram non-volatile memory cells also occur areas device hot-carrier effects change characteristics semiconductors device various effects examined alongside obvious memory-cell remanence problems possible analyse recover data cells semiconductor devices general long theory vanished electromigration means physically move atom new locations physically alter device another type attack involves relocation metal atoms due high current densities phenomenon atoms carried along electron wind opposite direction conventional current producing voids negative electrode hillocks whiskers positive electrode void formation leads local increase current density joule heating interaction electrons metal ions produce thermal energy producing electromigration effects external stress removed disturbed system tends relax back original equilibrium state resulting backflow heals electromigration damage long term though cause device failure less extreme cases simply serves alter device operating characteristics noticeable ways example excavations voids leads increased wiring resistance growth whiskers leads contact formation current leakage example conductor exhibits whisker growth due electromigration shown figure one example exhibits void formation case severe enough led complete failure shown figure contrary popular assumption drams used modern computers retain contents several seconds power lost even room temperature even removed motherboard many products cryptographic security-related computations using secret keys variables equipment operator must able read alter usual solution secret data kept volatile memory inside tamper-sensing enclosure security processors typically store secret key material static ram power removed device tampered temperatures −20 °c contents sram ‘ frozen ’ interesting know period time static ram device retain data power removed low temperatures increase data retention time sram many seconds even minutes maximillian dornseif presented technique slides let take control apple computer thanks ipod attacks needed first generic phase ipod software modified behaves master firewire bus ipod full read/write access apple computer ipod plugged firewire port firewire used audio devices printers scanners cameras gps etc generally device connected firewire full access read/write indeed ohci standard firewire standard reads device connected firewire read write data computer memory example device increase computational power processors generally equipped cache memory decreases memory access latency figure shows hierarchy processor memory first processor looks data cache l1 l2 memory data processor looking called cache-miss pictures show processor fetch data two cache levels unfortunately caches contain small portion application data introduce additional latency memory transaction case miss involves also additional power consumption due activation memory devices memory hierarchy miss penalty already used attack symmetric encryption algorithms like des basic idea proposed paper force cache miss processor executing aes encryption algorithm known plain text attacks allow unprivileged process attack process running parallel processor despite partitioning methods memory protection sandboxing virtualization carefully measuring amount time required perform private key operations attackers may able find fixed diffie-hellman exponents factor rsa keys break cryptosystems vulnerable system attack computationally inexpensive often requires known ciphertext attack treated signal detection problem signal consists timing variation due target exponent bit noise results measurement inaccuracies timing variations due unknown exponent bits properties signal noise determine number timing measurements required attack timing attacks potentially used cryptosystems including symmetric functions simple generic processor backdoor used attackers means privilege escalation get privileges equivalent given running operating system also non-privileged process one non-privileged invited domain running top virtual machine monitor get privileges equivalent virtual machine monitor loïc duflot studied intel processors paper cpu bugs cpu backdoors consequences security explains processor defines four different privilege rings numbered 0 privileged 3 least privileged kernel code usually running ring 0 whereas user-space code generally running ring 3 use security-critical assembly language instructions restricted ring 0 code order escalate privilege backdoor attacker must backdoors loïc duflot presents simple modify behavior three assembly language instructions simple specific activation conditions unlikely accidentally activated recent inventions begun target types processor-based escalation attacks
|
Computer security
|
amaya web editor amaya formerly amaya world discontinued free open source wysiwyg web authoring tool browsing abilities created structured editor project inria french national research institution later adopted world wide web consortium w3c testbed web standards role took arena web browser since last release january 2012 inria w3c stopped supporting project active development ceased amaya relatively low system requirements even comparison web browsers era active development period considered lightweight browser amaya originated direct descendant grif wysiwyg sgml editor created early 1980s html editor symposia based grif developed sold french software company grif sa last change code amaya feb 22 2013 used test-bed new web technologies supported major browsers amaya first client supported rdf annotation schema using xpointer browser available linux windows nt 95 mac os x amigaos sparc solaris aix osf/1 amaya formerly called tamaya tamaya name type tree represented logo later discovered tamaya also trademark used french company developers chose drop first letter make amaya
|
Internet protocols
|
bunchball bunchball provides cloud-based software service gamification product intended help companies improve customer loyalty online engagement using game mechanics bunchball founded rajat paharia 2005 raised 17.5 million funding 2005 rajat paharia founded bunchball approached companies like facebook myspace dating websites proposition integrating social games bunchball received initial financing sunil singh ceo informance international payman pouladdej angel investor october 2006 company closed 2 million series investment round granite ventures adobe ventures 2007 nbc hired bunchball develop community website called dunder mifflin infinity popular comedy show office 2007 bunchball transitioned social gaming launched nitro allows organizations implement game mechanics social networks mobile applications websites january 2008 bunchball received additional 4 million series b funding round return investors granite ventures adobe ventures time announcement bunchball 28 employees june 2010 bunchball closed 6.5 million series c funding round triangle peak partners northport investments correlation ventures granite ventures bunchball 60 employees raised 21 million date bunchball nitro gamification platform aims motivate online user engagement contains set game mechanics including badges team points leader boards websites social communities mobile applications desktop enterprise applications currently generates 70 million unique users 2.3 billion actions month march 2012 bunchball released updated version nitro code-named flamethrower bunchball nitro salesforce motivates sales teams adding gamification salesforce.com jive gamification module add-on module jive social business platform powered bunchball nitro gives users set missions complete exposes critical piece functionality within jive platform nitro ibm connections helps businesses train new users keep existing users engaged within ibm connections application using nitro platform businesses employ gamification techniques like completing missions earning rewards engage users ibm connections 2007 40,000 people generated 1 million page views dunder mifflin infinity separate nbc universal website bunchball developed dunder mifflin infinity gives users experience employee dunder mifflin fictional company featured show 2009 usa network hired bunchball “ gamify ” website psych television show page views surged 16 million last season 9 million season average visitor came 4 5 times per month compared twice month previous season stayed site 22 minutes visit 14 minutes december 2010 bunchball nitro powered playboy ’ facebook app called miss social month-long competition women aspired playboy due competition playboy saw 85 percent rate re-engagement 60 percent improvement revenues one month next since starting app december playboy ’ active user base grown 80,000 2011 bunchball partnered los angeles kings gamify fan website
|
Distributed computing architecture
|
cloud analytics cloud analytics marketing term businesses carry analysis using cloud computing uses range analytical tools techniques help companies extract information massive data present way easily categorised readily available via web browser cloud analytics term set technological analytical tools techniques specifically designed help clients extract information massive data cloud analytics designed make official statistical data readily categorized available via users web browser aws analytics products amazon athena run interactive queries directly data amazon s3 amazon emr deploy open source big data frameworks like apache hadoop spark presto hbase flink amazon redshift fully managed petabyte-scale data warehouse run complex queries collections structured data google cloud analytics products google bigquery google fully managed low cost analytics data warehouse google cloud dataflow unified programming model managed service executing range data processing patterns including streaming analytics etl batch computation google cloud dataproc managed spark hadoop service process big datasets using open tools apache big data ecosystem google cloud composer fully managed workflow orchestration service author schedule monitor pipelines span across clouds on-premises data centers google cloud datalab interactive notebook based jupyter explore collaborate analyze visualize data google data studio turns data dashboards reports read shared customized google cloud dataprep data service visually exploring cleaning preparing structured unstructured data analysis google cloud pub/sub serverless large scale real-time messaging service allows send receive messages independent applications related azure services microsoft products hdinsight provision cloud hadoop spark r server hbase storm clusters data lake analytics distributed analytics service makes big data easy machine learning studio easily build deploy manage predictive analytics solutions cloud analytics tools juresse m'bambi
|
Distributed computing architecture
|
fan-out software message-oriented middleware solutions fan-out messaging pattern used model information exchange implies delivery spreading message one multiple destinations possibly parallel halting process executes messaging wait response message software construction fan-out class method number classes used class number methods called method
|
Distributed computing architecture
|
nbname nbname note capitalization computer program used carry denial-of-service attacks disable netbios services windows machines written sir dystic cult dead cow cdc released july 29 2000 def con 8 convention las vegas program decodes provides user netbios name packets receives udp port 137 many command line options effectively disable netbios network prevent computers rejoining according sir dystic nbname disable entire lans prevent machines rejoining ... nodes netbios network infected tool think names already used machines 'it impossible everyone figure going added
|
Computer security
|
pharming pharming cyber attack intended redirect website traffic another fake site pharming conducted either changing hosts file victim computer exploitation vulnerability dns server software dns servers computers responsible resolving internet names real ip addresses compromised dns servers sometimes referred poisoned pharming requires unprotected access target computer altering customer home computer rather corporate business server term pharming neologism based words farming phishing phishing type social-engineering attack obtain access credentials user names passwords recent years pharming phishing used gain information online identity theft pharming become major concern businesses hosting ecommerce online banking websites sophisticated measures known anti-pharming required protect serious threat antivirus software spyware removal software protect pharming malicious domain-name resolution result compromises large numbers trusted nodes participate name lookup vulnerable points compromise near leaves internet instance incorrect entries desktop computer hosts file circumvents name lookup local name ip address mapping popular target malware rewritten legitimate request sensitive website direct user fraudulent copy desktops often better targets pharming receive poorer administration internet servers worrisome host-file attacks compromise local network router since routers specify trusted dns clients join network misinformation spoil lookups entire lan unlike host-file rewrites local-router compromise difficult detect routers pass bad dns information two ways malconfiguration existing settings wholesale rewrite embedded software aka firmware many routers allow administrator specify particular trusted dns place one suggested upstream node e.g. isp attacker could specify dns server control instead legitimate one subsequent resolutions would go bad server scenario involving malicious javascript changes router dns server called drive-by pharming demonstrated stamm ramzan jakobsson december 2006 technical report alternatively many routers ability replace firmware i.e internal software executes device complex services like malware desktop systems firmware replacement difficult detect stealthy implementation appear behave manufacturer firmware administration page look settings appear correct etc approach well executed could make difficult network administrators discover reconfiguration device appears configured administrators intend actually redirects dns traffic background pharming one many attacks malicious firmware mount others include eavesdropping active man middle attacks traffic logging like misconfiguration entire lan subject actions pharming approaches academic interest however ubiquity consumer grade wireless routers presents massive vulnerability administrative access available wirelessly devices moreover since routers often work default settings administrative passwords commonly unchanged even altered many guessed quickly dictionary attacks since consumer grade routers n't introduce timing penalties incorrect login attempts administrative access granted router settings including firmware may altered attacks difficult trace occur outside home small office outside internet 15th january 2005 domain name large new york isp panix hijacked point website australia financial losses known domain later restored 17th january icann review blames melbourne known arq group result failure melbourne obtain express authorization sic registrant accordance icann inter-registrar transfer policy january 2008 symantec reported drive-by pharming incident directed mexican bank dns settings customer home router changed receipt e-mail appeared legitimate spanish-language greeting-card company term pharming controversial within field conference organized anti-phishing working group phillip hallam-baker denounced term marketing neologism designed convince banks buy new set security services
|
Computer security
|
software incompatibility software incompatibility characteristic software components systems operate satisfactorily together computer different computers linked computer network may components systems intended operate cooperatively independently software compatibility characteristic software components systems operate satisfactorily together computer different computers linked computer network possible software components systems may compatible one environment incompatible another consider sequential programs form particular program might use printer resource file resource b order print file several programs p1 p2 p3 ... operate time first one execute block others resources released programs execute turn problem makes difference whether uni-processor multi-processor system used allocation resources determines order execution note however programmers general constrained write programs particular way even guidelines may differ guidelines variant previous program may resources b previous example – simply dummy variables otherwise programs identical several programs q1 q2 q3 run time using resources problem however several ps set run time several qs deadlock condition arise note deadlock need arise may neither p q proceed one kind example programs may demonstrate incompatibility another example different kind would one software component provides service another incompatibility could simple change order parameters software component requesting service component providing service would kind interface incompatibility might considered bug could hard detect systems interface incompatibilities easily detected build stage particularly strongly typed systems others may hard find may detected run time others may almost impossible detect without detailed program analysis consider following example variant q q nowiki /nowiki similar behaviour following differences p never calls q set 100 using q nowiki /nowiki instead compatible computation however p calls q set 100 using q nowiki /nowiki instead lead non-terminating computation assume f x numeric value component q nowiki /nowiki defined may cause problem behaviour p calls q nowiki /nowiki 101 results computation incorrect may cause program failure p calls q nowiki /nowiki 102 results unpredictable failure may arise possibly due divide zero errors arithmetic overflow p calls q nowiki /nowiki y= 103 event p uses result division operation divide zero failure may occur example shows one program p1 may always compatible another q1 constructed programs q1 q1 nowiki /nowiki p1 q sometimes incompatible p1 q1 nowiki /nowiki always incompatible sometimes programs p q running computer presence one inhibit performance particularly happen computer uses virtual memory result may disk thrashing occurs one programs significantly reduced performance form incompatibility occur p q intended cooperate also occur p q completely unrelated happen run time example might p program produces large output files happen stored main memory q anti-virus program scans many files hard disk memory cache used virtual memory possible two programs interact adversely performance drastically reduced programs p q performance compatibility may depend environment run may substantially incompatible run computer limited main memory yet may possible run satisfactorily machine memory programs may performance incompatible almost environment
|
Computer architecture
|
corosync cluster engine corosync cluster engine open source implementation totem single ring ordering membership protocol originally derived openais project licensed new bsd license mission corosync effort develop release support community-defined open source cluster corosync cluster engine group communication system additional features implementing high availability within applications project provides four c api features software designed operate udp/ip infiniband networks software composed executive binary uses client-server communication model libraries service engines loadable modules called service engines loaded corosync cluster engine use services provided corosync service engine internal api services provided corosync service engine internal api additionally corosync provides several default service engines used via c apis project formally announced july 2008 via conference paper ottawa linux symposium source code openais refactored core infrastructure components placed corosync sa forum apis kept openais second version corosync published 2012 quorum subsystem changed integrated daemon version available since fedora 17 rhel7
|
Distributed computing architecture
|
cryptographic key types cryptographic key string data used lock unlock cryptographic functions including authentication authorization encryption cryptographic keys grouped cryptographic key types according functions perform consider keyring contains variety keys keys might various shapes sizes one thing certain generally serve separate purpose one key might used start automobile another might used open safety deposit box automobile key work open safety deposit box vice versa analogy provides insight cryptographic key types work keys categorized respect used properties possess cryptographic key categorized according used properties example key might one following properties symmetric public private keys may also grouped pairs one private one public key referred asymmetric key pair asymmetric keys differ symmetric keys algorithms use separate keys encryption decryption symmetric key ’ algorithm uses single key processes multiple keys used asymmetric algorithm process takes longer produce symmetric key algorithm would however benefits lay fact asymmetric algorithm much secure symmetric key algorithm symmetric key key needs transmitted receiver always possibility key could intercepted tampered asymmetric key message and/or accompanying data sent received using public key however receiver sender would use personal private key access message and/or accompanying data thus asymmetric keys suited use transmitting confidential messages data authentication required assurance message tampered receiver possession public key ’ corresponding private key ability decode message public key sent back forth recipients private key remains fixed one location sent back forth keeps safe intercepted transmission cryptographic keys may also keys designate used long-term static archived use used single session ephemeral latter generally applies use ephemeral key agreement key key types designed last long crypto-periods one two years shorter crypto-period designed different key types may used data encryption keys symmetric authentication keys private key-transport keys key-wrapping keys authorization keys rng keys page shows classification key types point view key management key management system key labeled one type key never used different purpose according nist sp 800-57 revision 4 following types keys exist
|
Computer security
|
dataease dataease relational database management system rdbms considered rapid application development tool developing relationally-organized data-intensive software applications personal computers dataease created early 1980s software developers arun gupta joseph busch first version software released 1981 software solutions inc principals sold company sapphire international corporation united kingdom 1991 sapphire continues develop market product two distinct product arcs dataease history dataease dos dataease windows originally called datamaster dataease early hallmark ease non-programmers found could rapidly develop useful software applications dataease design emphasized visual design screen forms reports hiding almost arcane details properties underlying data structure addition complex data management processes would typically require multitude complex steps complete traditional programming tools handled automatically transparently user made changes his/her application example editing existing form user removed field added another indexed another changed data type yet another necessary steps required reflect changes data structure underlying form automatically non-destructively applied form saved report writing similarly streamlined user simply defined access desired data using simple procedural language known dataease query language dql prompting script editor permitted user instantly create dql script prior knowledge dql syntax remains one dataease overlooked beneficial features one required memorize details application components dql syntactical construction prior writing valid dql script employees salary 50000 yearsofservice 4 lastreviewgrade 85 addition simplified definition data forms reports procedures dataease dos provided facilities defining application user access navigational menus multi-format importing data sources data exporting data backup restoration system documentation user help backing restoring data integrating external programs application dataease dos applications provided record-level locking meaning could accessed simultaneously many users dataease dos gained eclectic following among application developers responsible managing proprietary business processes corporate world dataease resource guide published dataease international late 1980s lists approximately two hundred commercially available applications spanning specialized domains waste management law enforcement indeed many corporate users deployed business-critical applications using dataease including organizations nasa ford motor co. citimortgage fka lomas financial corporation american automobile club dataease dos distributed worldwide according information provided sapphire international peaked installed base approximately 2 million seats despite fact sapphire ceased distribution dataease dos 2003 significant number dataease dos applications remained active use worldwide 2008 dataease dos recognized number prestigious industry awards including dataease windows dfw rapid application development tool constructing windows database applications dataease windows abandoned many intuitive features dataease dos ancestor dataease windows product designed positioned address needs technical programmer due belief time soon data would stored sql-based client-server platforms dataease would evolve sql development tool dataease windows initially released 1994 follow dataease express lacked dql procedural language user interface overhauled automatic creation data structures along screens forms abandoned despite fact dataease windows incorporated automated migration tool de dos 4.53 ability directly acquire tables data dfd5 many long-time dataease dos users found difficult break hierarchical cui paradigm make best use new tools windows product dataease windows acceptance existing dataease dos users therefore significantly hindered delayed decision move instead upgraded recent dos versions found could share data windows versions achieve full windows application forms report layouts re-created scratch dfw even though business rules could imported tables dql could imported also either cutting pasting 'dos report facility dfw version 5.5 difficulty still remained application designed work-flow single-tasking dos environment frequently unsuited multi-session windows environment difficulty considerable expense posed task re-writing applications forced many otherwise-satisfied dataease users reconsider choice dataease platform conversely new users dataease windows previous experience found effective tool important systems written using second half 1990s since dataease version 7 2006 interoperability abandoned restrictive product development good 'windows citizen 2008 new dataease development team appointed leadership ulrik krohn take dataease new era eventually culminate completely web based product dataease 7.2 officially launched july 1 2009 version first use 64 bit operating system extensively reworked contain 1,000 improvements fixes release 7.2 also marked time dataease international ltd. became independent product company solely focused product development dataease services continue provided sapphire group dataease 7.3 scheduled end year dataease 8 promises web community dataease dos character based community completely web based full interoperability windows first dataease since dos improved interactive dql/oml/brl editing dataease 8 make easy make transaction intensive advanced web-based applications
|
Databases
|
inquisitor hardware testing software inquisitor software suite used hardware diagnostics stress testing certification benchmarking platform available three formats released terms version 3 gnu general public license inquisitor free software inquisitor started early 2004 closed project developed mikhail yakshin alt linux maxselect russian hardware vendor first versions closed-source although effort made open components versions 1 2 fully developed in-house fully adopted maxselect multiple branches versions concentrated server-based enterprise testing optimized mostly notebook hardware 2005 special abridged version inquisitor suite developed distribution live cds live cds supplied maxselect products every buyer stress test newly bought hardware ensure runs stable august 2007 legal complications solved inquisitor announced open source platform platform used implement various linux-based solutions deal hardware testing monitoring benchmarking july 2008 version 3.0 released public minimal steps undertaken purposes testing benchmarking called tests inquisitor implemented simple unix shell scripts run binary programs collects results simplest form test outputs binary result success failure advanced api supplied benchmarks output results inquisitor distribution includes following tests
|
Operating systems
|
embedded database embedded database system database management system dbms tightly integrated application software requires access stored data database system hidden application ’ end-user requires little ongoing maintenance actually broad technology category includes term embedded database confusing small subset embedded database products used real-time embedded systems telecommunications switches consumer electronics devices see mobile database small-footprint databases could used embedded devices major embedded database products include alphabetical order sybase advantage database server ads full-featured embedded database management system provides isam relational data access compatible multiple platforms including windows linux netware available royalty-free local file-server database full client-server version ads around many years highly scalable administration support variety ides including .net framework .net object pascal delphi visual foxpro foxpro php visual basic vb visual objects vo vulcan clipper perl java xharbour etc derby embeddable sql engine written entirely java fully transactional multi-user decent sql subset derby mature engine freely available apache license actively maintained derby project page also distributed part oracle java se development kit jdk name java db empress software inc. developer empress embedded database privately held company founded 1979 empress embedded database full-function relational database embedded applications organizations small large deployment environments including medical systems network routers nuclear power plant monitors satellite management systems embedded system applications require reliability power empress acid compliant sql database engine c c++ java jdbc odbc sql ado.net kernel level apis applications developed using apis may run standalone and/or server modes empress embedded database runs linux unix microsoft windows real-time operating systems ese indexed sequential access method isam data storage technology microsoft ese notably core microsoft exchange server active directory purpose allow applications store retrieve data via indexed sequential access windows mail desktop search windows vista operating system also make use ese store indexes property information respectively mcobject launched extremedb first in-memory embedded database designed scratch real-time embedded systems initial product soon joined extremedb high availability ha fault tolerant applications product family includes 64-bit transaction logging editions hybrid extremedb fusion combines in-memory on-disk data storage 2008 mcobject introduced extremedb kernel mode first embedded dbms designed run operating system kernel today extremedb used millions real-time embedded systems worldwide mcobject also offers perst open source object-oriented embedded database java java .net .net compact framework silverlight firebird embedded relational database engine open source fork interbase acid compliant supports triggers stored procedures available linux osx windows systems features classic superserver version firebird two threads applications access database time starting firebird 2.5 firebird embedded acts local server one threaded client accessing databases means works properly asp.net web applications user thread means two users could access database time would thread asp.net opens new thread user exports standard firebird api entrypoints main advantage firebird embedded databases unlike sqlite access databases plugged full firebird server without modifications also multiplatform runs linux os x full asp.net mono support written java open source fast database engine embedded server mode clustering support run inside google app engine supports encrypted database files aes xtea development h2 started may 2004 first published december 14 2005 h2 dual licensed available modified version mpl 1.1 mozilla public license unmodified epl 1.0 eclipse public license haildb standalone embeddable form innodb storage engine given haildb based code base innodb storage engine contains many features high-performance scalability multiversion concurrency control mvcc row-level locking deadlock detection fault tolerance automatic crash recovery etc however embedded engine completely independent mysql lacks server components networking object-level permissions etc eliminating mysql server overhead innodb small footprint well-suited embedding applications require high-performance concurrency embedded database systems haildb designed accessed primarily isam-like c api rather sql though extremely rudimentary sql variant supported project longer maintained hsqldb opensource relational database management system bsd-like license runs java virtual machine embedded application hsqldb supports variety in-memory disk-based table modes unicode sql:2008 infinitydb embedded java dbms sorted hierarchical key/value store encrypted edition client/server edition multi-core speed patent-applied-for infinitydb secure transactional compressing robust single file instant installation zero administration apis include simple fast 'itemspace concurrentnavigablemap view json remoteitemspace transparently redirect embedded apis db instances client/server includes light-weight servlet server web admin database browsing rest python informix dynamic server ids characterized enterprise class embeddable database server combining embeddable features low footprint programmable autonomic capabilities enterprise class database features high availability flexible replication features ids used deeply embedded scenarios ip telephony call-processing systems point sale applications financial transaction processing systems interbase iot award-winning cross-platform unicode enabled sql database platform able embedded within turn-key applications box smp support disk aes strength 256bit encryption sql 92 acid compliance support windows macintosh linux solaris ios android platforms ideal small-to-medium large enterprises supporting hundreds users mobile application development interbase light free version used mobile device ideal mobile applications enterprises switch paid version requirements change management security increase interbase high adoption defense airspace oil gas manufacturing industries leveldb ordered key/value store created google lightweight implementation bigtable storage design library way use leveldb native api c++ also includes official c wrappers functionality third-party api wrappers exist python php go pure go leveldb implementation exists progress still node.js objective c. google distributes leveldb new bsd license lightning memory-mapped database lmdb memory-mapped key-value database openldap project written c api modeled berkeley db api though much simplified library extremely compact compiling 40kb x86 object code corruption proof orders magnitude faster robust scalable efficient similar libraries like berkeley db leveldb etc library implements b+trees multiversion concurrency control mvcc single level store copy write provides full acid transactions deadlocks library optimized high read concurrency readers need locks readers n't block writers writers n't block readers read performance scales perfectly linearly across arbitrarily many threads cpus third-party wrappers exist c++ erlang python lmdb distributed openldap project openldap public license 2013 openldap project deprecating use berkeley db favor lmdb embedded zero maintenance version proprietary mimer sql database available mongodb cross-platform document-oriented database program mongodb stores data flexible json-like documents meaning fields vary document document data structure changed time document model maps objects application code making data easy work ad hoc queries indexing real time aggregation provide powerful ways access analyze data mongodb distributed database core high availability horizontal scaling geographic distribution built easy use mongodb open-source published gnu affero general public license mongodb embedded across many industries high tech finserv retail healthcare use cases security fraud iot cms prestigious companies world embedded libmysqld mysql embedded server library provides features regular mysql linkable library run context client process initialization clients use c api calls talking separate mysql server less communication overhead need separate database process nexusdb commercial successor flashfiler database open source embedded delphi applications create stand-alone executables full database functionality objectbox nosql acid-compliant on-device object-oriented key-value database mobile iot name implies oracle ’ embedded database actually berkeley db oracle acquired sleepycat software originally developed university california berkeley db fast open-source embedded database used several well-known open-source products including linux bsd unix operating systems apache web server openoffice productivity suite nonetheless recent years many well-known projects switched using lmdb outperform berkeley db key scenarios ground less design well due license changing raima database manager produced raima one first database management systems categorized embedded database according raima definition product embedded two senses first embedded within application becoming extension application second possible use embedded computer/os real-time environments small footprint efficient operation apis c/c++ sql designed support limited resources embedded environments since initial release rdm embedded continually evolving currently released version 14.1 rocksdb created facebook began fork leveldb focuses performance especially ssds adds many features including transactions backups snapshots bloom filters column families expiry custom merge operators tunable compaction statistics collection geospatial indexing used storage engine inside several databases including arangodb ceph cockroachdb mongorocks myrocks rocksandra tikv soliddb hybrid on-disk/in-memory relational database often used embedded system database telecommunications equipment network software similar systems in-memory database technology used achieve throughput tens thousands transactions per second response times measured microseconds high availability option maintains two copies data synchronized times case system failure applications recover access soliddb less second without loss data sqlite software library implements self-contained server-less zero-configuration transactional sql database engine sqlite widely deployed sql database engine world source code chiefly c sqlite public domain includes native c library simple command line client database ’ included several operating systems among android freebsd ios os x windows 10 microsoft sql server compact embedded database wide variety features like multi-process connections t-sql ado.net sync services sync back end database merge replication sql server programming api linq sql linq entities ado.net product runs desktop mobile windows platforms market long time used many enterprises production software case studies product went multiple re-brandings known multiple names like sql ce sql server ce sql server mobile sql mobile
|
Databases
|
daniel ravicher daniel dan ravicher serves executive director public patent foundation pubpat
|
Operating systems
|
radius values remote authentication dial user service radius networking protocol provides centralized authentication authorization accounting aaa management computers connect use network service attributes radius use defined rfc 2865 .5
|
Internet protocols
|
transmission control protocol transmission control protocol tcp one main protocols internet protocol suite originated initial network implementation complemented internet protocol ip therefore entire suite commonly referred tcp/ip tcp provides reliable ordered error-checked delivery stream octets bytes applications running hosts communicating via ip network major internet applications world wide web email remote administration file transfer rely tcp applications require reliable data stream service may use user datagram protocol udp provides connectionless datagram service emphasizes reduced latency reliability may 1974 vint cerf bob kahn described internetworking protocol sharing resources using packet switching among network nodes authors working gérard le lann incorporate concepts french cyclades project new network central control component model transmission control program incorporated connection-oriented links datagram services hosts monolithic transmission control program later divided modular architecture consisting transmission control protocol internet protocol resulted networking model became known informally tcp/ip although formally variously referred department defense dod model arpanet model eventually also internet protocol suite 2004 vint cerf bob kahn received turing award foundational work tcp/ip transmission control protocol provides communication service intermediate level application program internet protocol provides host-to-host connectivity transport layer internet model application need know particular mechanisms sending data via link another host required ip fragmentation accommodate maximum transmission unit transmission medium transport layer tcp handles handshaking transmission details presents abstraction network connection application typically network socket interface lower levels protocol stack due network congestion traffic load balancing unpredictable network behaviour ip packets may lost duplicated delivered order tcp detects problems requests re-transmission lost data rearranges out-of-order data even helps minimize network congestion reduce occurrence problems data still remains undelivered source notified failure tcp receiver reassembled sequence octets originally transmitted passes receiving application thus tcp abstracts application communication underlying networking details tcp used extensively many internet applications including world wide web www email file transfer protocol secure shell peer-to-peer file sharing streaming media tcp optimized accurate delivery rather timely delivery incur relatively long delays order seconds waiting out-of-order messages re-transmissions lost messages therefore particularly suitable real-time applications voice ip applications protocols like real-time transport protocol rtp operating user datagram protocol udp usually recommended instead tcp reliable stream delivery service guarantees bytes received identical order sent since packet transfer many networks reliable tcp achieves using technique known positive acknowledgement re-transmission requires receiver respond acknowledgement message receives data sender keeps record packet sends maintains timer packet sent sender re-transmits packet timer expires receiving acknowledgement timer needed case packet gets lost corrupted ip handles actual delivery data tcp keeps track segments individual units data transmission message divided efficient routing network example html file sent web server tcp software layer server divides file segments forwards individually internet layer network stack internet layer software encapsulates tcp segment ip packet adding header includes among data destination ip address client program destination computer receives tcp software transport layer re-assembles segments ensures correctly ordered error-free streams file contents receiving application transmission control protocol accepts data data stream divides chunks adds tcp header creating tcp segment tcp segment encapsulated internet protocol ip datagram exchanged peers term tcp packet appears informal formal usage whereas precise terminology segment refers tcp protocol data unit pdu datagram ip pdu frame data link layer pdu processes transmit data calling tcp passing buffers data arguments tcp packages data buffers segments calls internet module e.g ip transmit segment destination tcp tcp segment consists segment header data section tcp header contains 10 mandatory fields optional extension field options pink background table data section follows header contents payload data carried application length data section specified tcp segment header calculated subtracting combined length tcp header encapsulating ip header total ip datagram length specified ip header tcp protocol operations may divided three phases connections must properly established multi-step handshake process connection establishment entering data transfer phase data transmission completed connection termination closes established virtual circuits releases allocated resources tcp connection managed operating system resource represents local end-point communications internet socket lifetime tcp connection local end-point undergoes series state changes establish connection tcp uses three-way handshake client attempts connect server server must first bind listen port open connections called passive open passive open established client may initiate active open establish connection three-way 3-step handshake occurs point client server received acknowledgment connection steps 1 2 establish connection parameter sequence number one direction acknowledged steps 2 3 establish connection parameter sequence number direction acknowledged full-duplex communication established connection termination phase uses four-way handshake side connection terminating independently endpoint wishes stop half connection transmits fin packet end acknowledges ack therefore typical tear-down requires pair fin ack segments tcp endpoint side sent first fin responded final ack waits timeout finally closing connection time local port unavailable new connections prevents confusion due delayed packets delivered subsequent connections connection half-open case one side terminated end side terminated longer send data connection side terminating side continue reading data side terminates well also possible terminate connection 3-way handshake host sends fin host b replies fin ack merely combines 2 steps one host replies ack host tcp stacks may implement half-duplex close sequence linux hp-ux host actively closes connection still read incoming data stack already received link host sends rst instead fin section 4.2.2.13 rfc 1122 allows tcp application sure remote application read data former sent—waiting fin remote side actively closes connection remote tcp stack distinguish connection aborting rst data loss rst cause remote stack lose data received application protocols using tcp open/close handshaking application protocol open/close handshaking may find rst problem active close example program flow like tcp/ip stack like described guarantee data arrives application unread data arrived end implementations allocate entry table maps session running operating system process tcp packets include session identifier endpoints identify session using client address port whenever packet received tcp implementation must perform lookup table find destination process entry table known transmission control block tcb contains information endpoints ip port status connection running data packets exchanged buffers sending receiving data number sessions server side limited memory grow new connections arrive client must allocate random port sending first syn server port remains allocated whole conversation effectively limits number outgoing connections client ip addresses application fails properly close unrequired connections client run resources become unable establish new tcp connections even applications endpoints must also allocate space unacknowledged packets received unread data key features set tcp apart user datagram protocol tcp uses sequence number identify byte data sequence number identifies order bytes sent computer data reconstructed order regardless packet reordering packet loss may occur transmission sequence number first byte chosen transmitter first packet flagged syn number arbitrary fact unpredictable defend tcp sequence prediction attacks acknowledgements acks sent sequence number receiver data tell sender data received specified byte acks imply data delivered application merely signify receiver responsibility deliver data reliability achieved sender detecting lost data retransmitting tcp uses two primary techniques identify loss retransmission timeout abbreviated rto duplicate cumulative acknowledgements dupacks single packet say packet 100 stream lost receiver acknowledge packets 100 uses cumulative acks hence receiver acknowledges packet 99 receipt another data packet duplicate acknowledgement used signal packet loss sender receives three duplicate acknowledgements retransmits last unacknowledged packet threshold three used network may reorder packets causing duplicate acknowledgements threshold demonstrated avoid spurious retransmissions due reordering sometimes selective acknowledgements sacks used give explicit feedback packets received greatly improves tcp ability retransmit right packets whenever packet sent sender sets timer conservative estimate packet acked sender receive ack transmits packet timer reset every time sender receives acknowledgement means retransmit timer fires sender received acknowledgement long time typically timer value set formula_1 formula_2 clock granularity case retransmit timer fired still acknowledgement received next timer set twice previous value certain threshold among things helps defend man-in-the-middle denial service attack tries fool sender making many retransmissions receiver overwhelmed sender infers data lost network using one two techniques described retransmits data sequence numbers allow receivers discard duplicate packets properly sequence reordered packets acknowledgments allow senders determine retransmit lost packets assure correctness checksum field included see checksum computation section details checksumming tcp checksum weak check modern standards data link layers high bit error rates may require additional link error correction/detection capabilities weak checksum partially compensated common use crc better integrity check layer 2 tcp ip used ppp ethernet frame however mean 16-bit tcp checksum redundant remarkably introduction errors packets crc-protected hops common end-to-end 16-bit tcp checksum catches simple errors end-to-end principle work tcp uses end-to-end flow control protocol avoid sender send data fast tcp receiver receive process reliably mechanism flow control essential environment machines diverse network speeds communicate example pc sends data smartphone slowly processing received data smartphone must regulate data flow overwhelmed tcp uses sliding window flow control protocol tcp segment receiver specifies receive window field amount additionally received data bytes willing buffer connection sending host send amount data must wait acknowledgement window update receiving host receiver advertises window size 0 sender stops sending data starts persist timer persist timer used protect tcp deadlock situation could arise subsequent window size update receiver lost sender send data receiving new window size update receiver persist timer expires tcp sender attempts recovery sending small packet receiver responds sending another acknowledgement containing new window size receiver processing incoming data small increments may repeatedly advertise small receive window referred silly window syndrome since inefficient send bytes data tcp segment given relatively large overhead tcp header final main aspect tcp congestion control tcp uses number mechanisms achieve high performance avoid congestion collapse network performance fall several orders magnitude mechanisms control rate data entering network keeping data flow rate would trigger collapse also yield approximately max-min fair allocation flows acknowledgments data sent lack acknowledgments used senders infer network conditions tcp sender receiver coupled timers tcp senders receivers alter behavior flow data generally referred congestion control and/or network congestion avoidance modern implementations tcp contain four intertwined algorithms slow-start congestion avoidance fast retransmit fast recovery rfc 5681 addition senders employ retransmission timeout rto based estimated round-trip time rtt sender receiver well variance round trip time behavior timer specified rfc 6298 subtleties estimation rtt example senders must careful calculating rtt samples retransmitted packets typically use karn algorithm tcp timestamps see rfc 1323 individual rtt samples averaged time create smoothed round trip time srtt using jacobson algorithm srtt value finally used round-trip time estimate enhancing tcp reliably handle loss minimize errors manage congestion go fast high-speed environments ongoing areas research standards development result number tcp congestion avoidance algorithm variations maximum segment size mss largest amount data specified bytes tcp willing receive single segment best performance mss set small enough avoid ip fragmentation lead packet loss excessive retransmissions try accomplish typically mss announced side using mss option tcp connection established case derived maximum transmission unit mtu size data link layer networks sender receiver directly attached furthermore tcp senders use path mtu discovery infer minimum mtu along network path sender receiver use dynamically adjust mss avoid ip fragmentation within network mss announcement also often called mss negotiation strictly speaking mss negotiated originator receiver would imply originator receiver negotiate agree upon single unified mss applies communication directions connection fact two completely independent values mss permitted two directions data flow tcp connection situation may arise example one devices participating connection extremely limited amount memory reserved perhaps even smaller overall discovered path mtu processing incoming tcp segments relying purely cumulative acknowledgment scheme employed original tcp protocol lead inefficiencies packets lost example suppose bytes sequence number 1,000 10,999 sent 10 different tcp segments equal size second segment sequence numbers 2,000 2,999 lost transmission pure cumulative acknowledgment protocol receiver send cumulative ack value 2,000 sequence number immediately following last sequence number received data say received bytes 3,000 10,999 successfully thus sender may resend data starting sequence number 2,000 alleviate issue tcp employs selective acknowledgment sack option defined 1996 rfc 2018 allows receiver acknowledge discontinuous blocks packets received correctly addition sequence number immediately following last sequence number last contiguous byte received successively basic tcp acknowledgment acknowledgement specify number sack blocks sack block conveyed left edge block first sequence number block right edge block sequence number immediately following last sequence number block block contiguous range receiver correctly received example receiver would send ack segment cumulative ack value 2,000 sack option header sequence numbers 3,000 11,000 sender would accordingly retransmit second segment sequence numbers 2,000 2,999 tcp sender interpret out-of-order segment delivery lost segment tcp sender retransmit segment previous out-of-order packet slow data delivery rate connection duplicate-sack option extension sack option defined may 2000 rfc 2883 solves problem tcp receiver sends d-ack indicate segments lost tcp sender reinstate higher transmission-rate sack option mandatory comes operation parties support negotiated connection established sack uses tcp header option see tcp segment structure details use sack become widespread—all popular tcp stacks support selective acknowledgment also used stream control transmission protocol sctp efficient use high-bandwidth networks larger tcp window size may used tcp window size field controls flow data value limited 2 65,535 bytes since size field expanded scaling factor used tcp window scale option defined rfc 1323 option used increase maximum window size 65,535 bytes 1 gigabyte scaling larger window sizes part necessary tcp tuning window scale option used tcp 3-way handshake window scale value represents number bits left-shift 16-bit window size field window scale value set 0 shift 14 direction independently sides must send option syn segments enable window scaling either direction routers packet firewalls rewrite window scaling factor transmission causes sending receiving sides assume different tcp window sizes result non-stable traffic may slow problem visible sites behind defective router tcp timestamps defined rfc 1323 1992 help tcp determine order packets sent tcp timestamps normally aligned system clock start random value many operating systems increment timestamp every elapsed millisecond however rfc states ticks proportional two timestamp fields tcp timestamps used algorithm known protection wrapped sequence numbers paws see rfc 1323 details paws used receive window crosses sequence number wraparound boundary case packet potentially retransmitted answers question sequence number first 4 gb second timestamp used break tie also eifel detection algorithm rfc 3522 uses tcp timestamps determine retransmissions occurring packets lost simply order recent statistics show level timestamp adoption stagnated ~40 owing windows server dropping support since windows server 2008 tcp timestamps enabled default linux kernel. disabled default windows server 2008 2012 2016 possible interrupt abort queued stream instead waiting stream finish done specifying data urgent tells receiving program process immediately along rest urgent data finished tcp informs application resumes back stream queue example tcp used remote login session user send keyboard sequence interrupts aborts program end signals often needed program remote machine fails operate correctly signals must sent without waiting program finish current transfer tcp out-of-band data designed modern internet urgent pointer alters processing remote host n't expedite processing network gets remote host two slightly different interpretations protocol means single bytes oob data reliable assuming reliable one least commonly used protocol elements tends poorly implemented normally tcp waits 200 ms full packet data send nagle algorithm tries group small messages single packet wait creates small potentially serious delays repeated constantly file transfer example typical send block would 4 kb typical mss 1460 2 packets go 10 mbit/s ethernet taking ~1.2 ms followed third carrying remaining 1176 197 ms pause tcp waiting full buffer case telnet user keystroke echoed back server user see screen delay would become annoying setting socket option codice_1 overrides default 200 ms send delay application programs use socket option force output sent writing character line characters rfc defines codice_2 push bit message receiving tcp stack send data immediately receiving application way indicate control user space using berkeley sockets controlled protocol stack tcp may attacked variety ways results thorough security assessment tcp along possible mitigations identified issues published 2009 currently pursued within ietf using spoofed ip address repeatedly sending purposely assembled syn packets followed many ack packets attackers cause server consume large amounts resources keeping track bogus connections known syn flood attack proposed solutions problem include syn cookies cryptographic puzzles though syn cookies come set vulnerabilities sockstress similar attack might mitigated system resource management advanced dos attack involving exploitation tcp persist timer analyzed phrack 66 push ack floods variants attacker able eavesdrop tcp session redirect packets hijack tcp connection attacker learns sequence number ongoing communication forges false segment looks like next segment stream simple hijack result one packet erroneously accepted one end receiving host acknowledges extra segment side connection synchronization lost hijacking might combined address resolution protocol arp routing attacks allow taking control packet flow get permanent control hijacked tcp connection impersonating different ip address difficult prior rfc 1948 initial sequence number easily guessable allowed attacker blindly send sequence packets receiver would believe come different ip address without need deploy arp routing attacks enough ensure legitimate host impersonated ip address bring condition using denial-of-service attacks initial sequence number chosen random attacker eavesdrop predict size next packet sent cause receiver accept malicious payload without disrupting existing connection attacker injects malicious packet sequence number payload size next expected packet legitimate packet ultimately received found sequence number length packet already received silently dropped normal duplicate packet—the legitimate packet vetoed malicious packet unlike connection hijacking connection never desynchronized communication continues normal malicious payload accepted tcp veto gives attacker less control communication makes attack particularly resistant detection large increase network traffic ack storm avoided evidence receiver something amiss single duplicate packet normal occurrence ip network sender vetoed packet never sees evidence attack another vulnerability tcp reset attack tcp udp use port numbers identify sending receiving application end-points host often called internet sockets side tcp connection associated 16-bit unsigned port number 0-65535 reserved sending receiving application arriving tcp packets identified belonging specific tcp connection sockets combination source host address source port destination host address destination port means server computer provide several clients several services simultaneously long client takes care initiating simultaneous connections one destination port different source ports port numbers categorized three basic categories well-known registered dynamic/private well-known ports assigned internet assigned numbers authority iana typically used system-level root processes well-known applications running servers passively listening connections typically use ports examples include ftp 20 21 ssh 22 telnet 23 smtp 25 http ssl/tls 443 http 80 registered ports typically used end user applications ephemeral source ports contacting servers also identify named services registered third party dynamic/private ports also used end user applications less commonly dynamic/private ports contain meaning outside particular tcp connection network address translation nat typically uses dynamic port numbers internet-facing public side disambiguate flow traffic passing public network private subnetwork thereby allowing many ip addresses ports subnet serviced single public-facing address tcp complex protocol however significant enhancements made proposed years basic operation changed significantly since first specification rfc 675 1974 v4 specification rfc 793 published september 1981 rfc 1122 host requirements internet hosts clarified number tcp protocol implementation requirements list 8 required specifications 20 strongly encouraged enhancements available rfc 7414 among list rfc 2581 tcp congestion control one important tcp-related rfcs recent years describes updated algorithms avoid undue congestion 2001 rfc 3168 written describe explicit congestion notification ecn congestion avoidance signaling mechanism original tcp congestion avoidance algorithm known tcp tahoe many alternative algorithms since proposed including tcp reno tcp vegas fast tcp tcp new reno tcp hybla tcp interactive itcp research effort tcp extensions allows applications subscribe tcp events register handler components launch applications various purposes including application-assisted congestion control multipath tcp mptcp ongoing effort within ietf aims allowing tcp connection use multiple paths maximize resource usage increase redundancy redundancy offered multipath tcp context wireless networks enables simultaneous utilization different networks brings higher throughput better handover capabilities multipath tcp also brings performance benefits datacenter environments reference implementation multipath tcp developed linux kernel multipath tcp used support siri voice recognition application iphones ipads macs tcp cookie transactions tcpct extension proposed december 2009 secure servers denial-of-service attacks unlike syn cookies tcpct conflict tcp extensions window scaling tcpct designed due necessities dnssec servers handle large numbers short-lived tcp connections tcpcrypt extension proposed july 2010 provide transport-level encryption directly tcp designed work transparently require configuration unlike tls ssl tcpcrypt provide authentication provides simple primitives application first tcpcrypt ietf draft published implementations exist several major platforms tcp fast open extension speed opening successive tcp connections two endpoints works skipping three-way handshake using cryptographic cookie similar earlier proposal called t/tcp widely adopted due security issues tcp fast open published rfc 7413 2014 proposed may 2013 proportional rate reduction prr tcp extension developed google engineers prr ensures tcp window size recovery close slow-start threshold possible algorithm designed improve speed recovery default congestion control algorithm linux 3.2+ kernels tcp originally designed wired networks packet loss considered result network congestion congestion window size reduced dramatically precaution however wireless links known experience sporadic usually temporary losses due fading shadowing hand interference radio effects strictly congestion erroneous back-off congestion window size due wireless packet loss may congestion avoidance phase conservative decrease window size causes radio link underutilized extensive research combating harmful effects conducted suggested solutions categorized end-to-end solutions require modifications client server link layer solutions radio link protocol rlp cellular networks proxy-based solutions require changes network without modifying end nodes number alternative congestion control algorithms vegas westwood veno santa cruz proposed help solve wireless problem one way overcome processing power requirements tcp build hardware implementations widely known tcp offload engines toe main problem toes hard integrate computing systems requiring extensive changes operating system computer device one company develop device alacritech packet sniffer intercepts tcp traffic network link useful debugging networks network stacks applications use tcp showing user packets passing link networking stacks support so_debug socket option enabled socket using setsockopt option dumps packets tcp states events socket helpful debugging netstat another utility used debugging many applications tcp appropriate one problem least normal implementations application access packets coming lost packet retransmitted copy lost packet received causes problems real-time applications streaming media real-time multiplayer games voice ip voip generally useful get data timely fashion get data order historical performance reasons storage area networks sans use fibre channel protocol fcp fibre channel connections also embedded systems network booting servers serve simple requests huge numbers clients e.g dns servers complexity tcp problem finally tricks transmitting data two hosts behind nat using stun similar systems far simpler without relatively complex protocol like tcp way generally tcp unsuitable user datagram protocol udp used provides application multiplexing checksums tcp handle streams retransmission giving application developer ability code way suitable situation replace methods like forward error correction interpolation stream control transmission protocol sctp another protocol provides reliable stream oriented services similar tcp newer considerably complex tcp yet seen widespread deployment however especially designed used situations reliability near-real-time considerations important venturi transport protocol vtp patented proprietary protocol designed replace tcp transparently overcome perceived inefficiencies related wireless data transport tcp also issues high-bandwidth environments tcp congestion avoidance algorithm works well ad-hoc environments data sender known advance environment predictable timing based protocol asynchronous transfer mode atm avoid tcp retransmits overhead udp-based data transfer protocol udt better efficiency fairness tcp networks high bandwidth-delay product multipurpose transaction protocol mtp/ip patented proprietary software designed adaptively achieve high throughput transaction performance wide variety network conditions particularly tcp perceived inefficient tcp runs ipv4 method used compute checksum defined rfc 793 checksum field 16 bit one complement one complement sum 16-bit words header text segment contains odd number header text octets checksummed last octet padded right zeros form 16-bit word checksum purposes pad transmitted part segment computing checksum checksum field replaced zeros words appropriate padding 16-bit words added using one complement arithmetic sum bitwise complemented inserted checksum field pseudo-header mimics ipv4 packet header used checksum computation shown table source destination addresses ipv4 header protocol value 6 tcp cf list ip protocol numbers tcp length field length tcp header data measured octets tcp runs ipv6 method used compute checksum changed per rfc 2460 pseudo-header mimics ipv6 header computation checksum shown many tcp/ip software stack implementations provide options use hardware assistance automatically compute checksum network adapter prior transmission onto network upon reception network validation may relieve os using precious cpu cycles calculating checksum hence overall network performance increased feature may cause packet analyzers unaware uncertain use checksum offload report invalid checksums outbound packets yet reached network adapter occur packets intercepted transmitted network adapter packets transmitted network adaptor wire valid checksums issue also occur monitoring packets transmitted virtual machines host virtual device driver may omit checksum calculation optimization knowing checksum calculated later vm host kernel physical hardware
|
Internet protocols
|
data access layer data access layer dal computer software layer computer program provides simplified access data stored persistent storage kind entity-relational database acronym prevalently used microsoft environments example dal might return reference object terms object-oriented programming complete attributes instead row fields database table allows client user modules created higher level abstraction kind model could implemented creating class data access methods directly reference corresponding set database stored procedures another implementation could potentially retrieve write records file system dal hides complexity underlying data store external world example instead using commands insert delete update access specific table database class stored procedures could created database procedures would called method inside class would return object containing requested values insert delete update commands could executed within simple functions like registeruser loginuser stored within data access layer also business logic methods application mapped data access layer example instead making query database fetch users several tables application call single method dal abstracts database calls applications using data access layer either database server dependent independent data access layer supports multiple database types application becomes able use whatever databases dal talk either circumstance data access layer provides centralized location calls database thus makes easier port application database systems assuming 100 database interaction done dal given application object-relational mapping tools provide data layers fashion following active record model orm/active-record model popular web frameworks
|
Databases
|
diskless node diskless node diskless workstation workstation personal computer without disk drives employs network booting load operating system server computer may also said act diskless node disks unused network booting used diskless nodes computers acting sometimes known network computers hybrid clients hybrid client may either mean diskless node may used particular sense mean diskless node runs applications remotely thin client computing architecture advantages diskless nodes include lower production cost lower running costs quieter operation manageability advantages example centrally managed software installation many universities large organizations pcs used similar configuration applications stored remotely executed locally—again manageability reasons however diskless nodes still boot local hard drive diskless nodes process data thus using cpu ram run software store data persistently—that task handed server distinct thin clients significant processing happens remotely server—the software runs thin client thin i.e relatively small simple client software handles simple input/output tasks communicate user drawing dialog box display waiting user input collective term encompassing thin client computing technological predecessor text terminals text-only centralized computing thin clients text terminals require powerful central processing facilities servers order perform significant processing tasks clients diskless nodes seen compromise fat clients ordinary personal computers centralized computing using central storage efficiency requiring centralized processing making efficient use powerful processing power even slowest contemporary cpus would tend sit idle much time centralized computing model operating system os diskless node loaded server using network booting cases removable storage may used initiate bootstrap process usb flash drive bootable media floppy disk cd dvd however firmware many modern computers configured locate server begin bootup process automatically without need insert bootable media network auto-booting preboot execution environment pxe bootstrap protocol bootp network protocols commonly used find server files booting device standard full-size desktop pcs able network-booted manner add-on network card includes undi boot rom diskless network booting commonly built-in feature desktop laptop pcs intended business use since used otherwise disk-booted standard desktop computer remotely run diagnostics install software apply disk image local hard drive bootstrapping process initiated described bootstrapping take place according one three main approaches windows 3.x windows 95 osr1 supported remote boot operations netware servers windows nt servers even dec pathworks servers third party software vendors qualystem acquired neoware lanworks acquired 3com ardence acquired citrix apct xtreamining technology developed marketed software products aimed remote-boot newer versions windows product line windows 95 osr2 windows 98 supported qualystem lanworks windows nt supported apct ardence called venturcom time windows 2000/xp/2003/vista/windows 7 supported hewlett packard acquired neoware previously acquired qualystem citrix systems acquired ardence essentially single os image array machines perhaps customizations differences hardware configurations among nodes installing software maintaining installed software efficient furthermore system changes made operation due user action worms viruses etc either wiped power removed image copied local ram disk windows xp embedded remote boot prohibited entirely image network filesystem allows use public access areas libraries schools etc. users might wish experiment attempt hack system however necessary implement network booting achieve either advantages ordinary pcs help appropriate software configured download reinstall operating systems e.g nightly basis extra work compared using shared disk image diskless nodes boot modern diskless nodes share disk image using 1 n relationship 1 disk image used simultaneously n diskless nodes makes easy install maintain software applications administrator needs install maintain application clients get new application soon boot updated image disk image sharing made possible use write cache client competes writing shared disk image client writes cache modern diskless nodes systems also use 1:1 client-to-diskimage relationship one client owns one disk image writes directly said disk image write cache used making modification shared disk image usually made way use central disk storage also makes efficient use disk storage cut storage costs freeing capital invest reliable modern storage technologies raid arrays support redundant operation storage area networks allow hot-adding storage without interruption means losses disk drives mechanical electrical failure—which statistically highly probable events timeframe years large number disks involved—are often less likely happen typically fewer disk drives fail less likely cause interruption would likely part raid arrays also means nodes less likely hardware failures fat clients diskless nodes share advantages thin clients however storage efficiency come price often happens computing increased storage efficiency sometimes comes price decreased performance large numbers nodes making demands server simultaneously slow everyone experience however mitigated installing large amounts ram server speeds read operations improving caching performance adding servers distributes i/o workload adding disks raid array distributes physical i/o workload case also problem affect client-server network extent since course fat clients also use servers store user data indeed user data may much significant size may accessed far frequently operating systems programs environments moving diskless model necessarily cause noticeable degradation performance greater network bandwidth i.e capacity also used diskless model compared fat client model necessarily mean higher capacity network infrastructure need installed—it could simply mean higher proportion existing network capacity used finally combination network data transfer latencies physically transferring data network contention latencies waiting server process nodes requests lead unacceptable degradation performance compared using local drives depending nature application capacity network infrastructure server another example situation diskless node would useful possibly hazardous environment computers likely damaged destroyed thus making need inexpensive nodes minimal hardware benefit thin clients also used diskless machines may also consume little power make little noise implies potential environmental benefits makes ideal computer cluster applications major corporations tend instead implement thin clients using microsoft windows terminal server software since much lower specification hardware used client essentially acts simple window central server actually running users operating system login session course diskless nodes also used thin clients moreover thin client computers increasing power point becoming suitable fully-fledged diskless workstations applications thin client diskless node architectures employ diskless clients advantages fat clients see differ regard location processing
|
Distributed computing architecture
|
iptscrae iptscrae stack-oriented scripting language used give additional functionality palace software servers name comes pronunciation script pig latin language created jim bumgardner turn inspired forth another stack-based language bumgardner chose style language extremely easily implement interpreter since need support parenthetical groupings operator precedence idea name iptscrae borrowed bumgardner former colleague mentor kevin bjorke came name orthfay freeware forth interpreter 1983 bumgardner originally created iptscrae idaho in-house multi-media authoring system similar hypercard created employee warner new media reused modified iptscrae compiler palace project developed 1994 although scripting language many used provide additional functionality many programs functions forums created iptscrae embedding javascript many factions iptscrae fans done past fully possible implement iptscrae languages even 're dynamic principles example iptscrae past webbed together java javascript html artificial languages including scripting languages programming languages specification languages query languages markup languages add end-user interactions commands programs without sacrificing user-friendliness past years iptscrae even utilized computer peer groups open-source language compilers using transformation hardware description languages also combining several genres computer languages create intertwined web user-friendliness application compatibility following solution classic programmer job interview exercise fizzbuzz implemented iptscrae ..or one-line direct input
|
Programming language topics
|
carnegie mellon cylab carnegie mellon cylab security privacy institute computer security research center carnegie mellon university founded 2003 university-wide research center involves 50 faculty 100 graduate students different departments schools within university one largest university-based cyber security research education centers u.s. cylab works cert coordination center well us-cert matters relating cybersecurity institute often cited security privacy research cylab website
|
Computer security
|
netronome netronome privately held fabless semiconductor company specializing design network flow processors used intelligent flow processing network communications devices switches routers cyber security applications netronome founded 2003 niel viljoen david wells johann tönsing previously worked marconi niel viljoen served chief technology officer marconi general manager fore systems acquired marconi 4.6 billion 1999 viljoen served ceo president netronome 2003 2011 february 2011 2013 howard bubb stepped chief executive officer however july year viljoen took ceo november 2007 netronome announced technology licensing sales marketing agreement intel corporation focused extension intel ixp28xx product line network processors terms agreement netronome developing next-generation line ixp-compatible high-end network processors combine intel ixp28xx technology netronome architecture march 2010 netronome announced began shipping network flow processor nfp–3240 specifically designed tight coupling x86 architectures january 2016 netronome announced agilio family server-based networking solutions
|
Distributed computing architecture
|
phantasie ii phantasie ii second video game phantasie series 1986 ssi published next part phantasie series phantasie ii dark lord nikademus nemesis time nikademus fashioned evil orb cast curse beautiful island named ferronrah enslaved people player mission find destroy orb phantasie ii used graphics fighting original phantasie game one improvement combat ability character class target enemy rank thrown rock improvements complexity quests little done innovate series one option endeared many veterans ability transfer characters phantasie sequel manual included phantasie ii identical one included phantasie plus small card explaining differences computer gaming world noted advantageous terms players original would easier time getting game disadvantageous particularly tedious mechanisms games particularly infamous distribution selling rigamarole review continued note characters imported original equipment removed well gold experience affording slight head start newly created characters phantasie ii sold 30,100 copies compute 1986 recommended seeking traditional role-playing game ssi rings zilfin enjoyed phantasie scorpia criticized phantasie ii changing predecessor infamous distribution selling rigamarole including bug handling money magazine concluded although flawed certain aspects phantasie ii interesting overall good game rpg type recommended fans first game reviewing atari st version antic 1987 liked lack disk-based copy protection permadeath magazine concluded phantasie ii fun play spend much time solving puzzles antic also approved atari 8-bit version praising practically transparent user interface concluded phantasie ii fine addition anyone software library must adventurers
|
Computer architecture
|
list msx games following incomplete list video games msx msx2 msx2+ msx turbo r home computers games released system
|
Computer architecture
|
inoc-dba inoc-dba inter-network operations center dial-by-asn hotline phone system global voice telephony network deployed managed packet clearing house connects network operations centers security incident response teams critical internet infrastructure providers backbone carriers internet service providers internet exchanges well critical individuals within policy regulatory internet governance security vendor communities inoc-dba closed system ensuring secure authenticated communications uses combination redundant directory services direct peer-to-peer communications stations create resilient high-survivability network carries routine operational traffic emergency-response traffic inoc-dba network uses ietf-standard sip voice ip protocols ensure interoperability thousands users dozens different station switch devices inoc-dba first telephone network kind provide service seven continents
|
Computer security
|
grsecurity grsecurity set patches linux kernel emphasize security enhancements patches typically used computer systems accept remote connections untrusted locations web servers systems offering shell access users grsecurity provides collection security features linux kernel including address space protection enhanced auditing process control grsecurity produced open source security inc. headquartered pennsylvania since april 2017 patches available paying customers major component bundled grsecurity pax among features patch flags data memory stack example non-executable program memory non-writable aim prevent memory overwritten help prevent many types security vulnerabilities buffer overflows pax also provides address space layout randomization aslr randomizes important memory addresses reduce probability attacks rely easily predicted memory addresses another notable component grsecurity provides full role-based access control rbac system rbac intended restrict access system normally provided unix access control lists aim creating fully least-privilege system users processes absolute minimum privileges work correctly nothing way system compromised ability attacker damage gain sensitive information system drastically reduced rbac works collection roles role individual restrictions roles restrictions form access policy amended needed list rbac features grsecurity restricts chroot variety ways prevent various vulnerabilities privilege escalation attacks well add additional checks among things configured audit specific group users mounting/unmounting devices changes system time date codice_14 logging audit types allow administrator also log denied resource attempts failed codice_15 attempts ipc creation removal codice_16 logging together arguments trusted path execution another optional feature used prevent users executing binaries owned root user world-writable binaries useful prevent users executing malicious binaries accidentally executing world-writable system binaries could modified malicious user grsecurity also hardens way chroot jails work chroot jail used isolate particular process rest system used minimise potential damage service compromised ways break chroot jail grsecurity attempts prevent also features increase security prevent users gaining unnecessary knowledge system restricting codice_17 codice_18 commands root user list additional features security improvements grsecurity patches never submitted inclusion mainline linux kernel following reasons access grsecurity stable patches restricted bruce perens speculated blog post using patches obtained oss inc. stable patch access agreement according perens adds term gpl prohibiting distribution creating penalty distribution may expose clients legal risk copyright infringement brad spengler open source security inc. sued defamation lost district court directed pay bruce perens legal team almost 260,000 presently case process appeal
|
Operating systems
|
pat fothergill ann patricia pat fothergill née waddington formerly ambler 13 february 1936 – 28 january 2017 pioneer robotics robot control languages ai department university edinburgh moved university aberdeen 1986 join department computing senior lecturer remained death pat fothergill born woodford wells essex england 1936 early childhood family moved singapore south africa accommodate father career civil engineer attended dorking county grammar school prefect received governors prize academic achievements excelled math science studying pure mathematics applied mathematics physics chemistry a-level exams received distinction pure mathematics state scholarship uk ministry education attend newnham college cambridge cambridge studied natural sciences tripos specialising chemistry physics biological chemistry mathematics also studied archaeological anthropological tripos graduated ba 1957 1961 following graduation fothergill remained cambridge first husband richard ambler graduate student biological sciences worked information officer organic chemistry department alexander r. todd joined ai laboratory university edinburgh 1968 research scientist helped develop robot command language rapt worked robin popplestone rod burstall amongst others whilst aberdeen pat co-authored paper wpfm workspace prediction fast matching algorithm jonathan c aylett robert b fisher later included john e. w. mayhew john p. frisby 3d model recognition stereoscopic cues
|
Programming language topics
|
carnivore software carnivore later renamed dcs1000 system implemented federal bureau investigation fbi designed monitor email electronic communications used customizable packet sniffer monitor target user internet traffic carnivore implemented october 1997 2005 replaced improved commercial software carnivore grew earlier fbi project called omnivore replaced older surveillance tool migrated us navy fbi director integrity compliance patrick w. kelley still undisclosed name september 1998 fbi data intercept technology unit ditu quantico virginia launched project migrate omnivore sun solaris operating system windows nt platform done facilitate miniaturization system support wider range personal computer pc equipment migration project called phiple troenix resulting system named carnivore carnivore system microsoft windows-based workstation packet-sniffing software removable jaz disk drive computer must physically installed internet service provider isp location sniff traffic lan segment look email messages transit technology highly advanced—it used standard packet sniffer straightforward filtering critical components operation filtering criteria accurately match appropriate subject elaborate content model developed independent technical review carnivore justice department prepared 2000 several groups expressed concern regarding implementation usage possible abuses carnivore july 2000 electronic frontier foundation submitted statement subcommittee constitution committee judiciary united states house representatives detailing dangers system electronic privacy information center also made several releases dealing fbi countered concerns statements highlighting target-able nature carnivore assistant fbi director donald kerr quoted saying carnivore device works much like commercial sniffers network diagnostic tools used isps every day except provides fbi unique ability distinguish communications may lawfully intercepted may example court order provides lawful interception one type communication e.g. e-mail excludes communications e.g. online shopping carnivore tool configured intercept e-mails transmitted either named subject ... specialized network analyzer sniffer runs application program normal personal computer microsoft windows operating system works sniffing proper portions network packets copying storing packets match finely defined filter set programmed conformity court order filter set extremely complex provides fbi ability collect transmissions comply pen register court orders trap trace court orders title iii interception orders etc ... ... important distinguish meant sniffing problem discriminating users messages internet complex one however exactly carnivore search contents every message collect contain certain key words like bomb drugs selects messages based criteria expressly set court order example messages transmitted particular account particular user prolonged negative coverage press fbi changed name system carnivore benign-sounding dcs1000 dcs reported stand digital collection system system functions associated press reported mid-january 2005 fbi essentially abandoned use carnivore 2001 favor commercially available software narusinsight mass surveillance system report 2007 described successor system located inside internet provider network junction point router network switch capable indiscriminately storing data flowing provider network
|
Computer security
|
sekchek local sekchek security audit benchmarking toolset dating 1996 sekchek formed former auditors deloitte touche 1996 toolset set automated processes analyze logical security profile computer.. 20 march 2018 sekcheck website gave notice operations would cease 31 may 2018 reasons cited included sekcheks business model less relevant business environment 2018 surge compliance regulatory requirements including gdpr monetary difficulties due losses insolvency credit-card processor sekchek classic product gathered information host would sent encrypted sekchek report processing enable checking security policies correctly configured originally worked as/400 number platforms extended next two years encompass ed windows netware unix reports anonymously compared machines average similar industry computers company introduced local version product 2008 avoided need send data off-site windows utility specifically audit active directory ad domain level rather server level analyzed sam tool product initially marketed security evaluator noted providing comprehensive reports security vulnerability computer system
|
Computer security
|
virtual device virtual device unix file codice_1 codice_2 treated device far user level software concerned generated kernel without reference hardware instance codice_3 written kernel tells program wrote everything without actually writing anywhere read reading program told reached end file device file made mknod instance reference hardware dos- windows- os/2-like operating systems define nul device performs similar function implemented part file name processing – actual file exists name
|
Computer file systems
|
semantic service-oriented architecture semantic service oriented architecture ssoa architecture allows scalable controlled enterprise application integration solutions ssoa describes sophisticated approach enterprise-scale infrastructure leverages rich machine-interpretable descriptions data services processes enable software agents autonomously interact perform critical mission functions ssoa technically founded three notions ssoa combines implements computer science concepts robust extensible architecture capable enabling complex powerful functions health care industry ssoa hl7 long implemented protocols include loinc phin hipaa related standards series ssoa-related iso standards published financial services found iso website financial sectors also adopt emv standards facilitate european consumers part ssoa transport trade iso sections 03.220.20 35.240.60 general guidelines technology standards fields partially located 25.040.40 35.240.99
|
Web technology
|
wimp software bundle acronym wimp solution stack software partially free open source software used run dynamic web sites servers expansion follows microsoft web platform installer tool install applications wimp-system lamp similar stack entirely free software linux replacing windows apache http server replacing iis wamp similar stack apache replacing iis
|
Web technology
|
security information management security information management sim information security industry term collection data log files central repository trend analysis sim products generally software agents running computer systems monitored send log information centralized server acting security console console typically displays reports charts graphs information often real time software agents incorporate local filters reduce manipulate data send server although typically forensic point view would collect audit accounting logs ensure recreate security incident security console monitored administrator reviews consolidated information takes action response alerts issued data sent server correlated analyzed normalized software agents common form usually xml data aggregated order reduce overall size terminology easily mistaken reference whole aspect protecting one infrastructure computer security breach due historic reasons terminology evolution sim refers part information security consists discovery 'bad behavior using data collection techniques term commonly used represent entire security infrastructure protects environment commonly called information security management infosec security information management also referred log management different sem security event management makes portion siem security information event management solution
|
Computer security
|
declaration recognising right flag states sea-coast declaration recognising right flag states sea-coast 1921 multilateral treaty legally recognised land-locked state could maritime flag state land-locked state could register ships sail sea flag 2013 declaration ratified 50 states international law recognises right state sail ships sea flag today land-locked states merchant vessel fleets include austria azerbaijan bolivia ethiopia hungary laos luxembourg mongolia moldova paraguay slovakia switzerland though ethiopia laos mongolia river/sea port high sea reached first two decades 20th century uncertainty whether land-locked state could register maritime ships authorise sail flag republic france united kingdom kingdom prussia argued right could exist would place land-locked state position unable control behavior ships bearing flag state inability unreservedly access ports sea prior world war switzerland denied several requests merchant ships fly swiss flag world war creation several new landlocked states czechoslovakia austria hungary caused great powers reconsider issue treaty versailles included provisions germany agreed allow landlocked states transit goods personnel across german territory freely seaports suggested states may also merchant vessels ports declaration created reflect new consensus concluded signed 20 april 1921 25 states barcelona spain league nations conference communications transit addendum longer barcelona convention statute regime navigable waterways international concern concluded day declaration entered force 8 october 1921 text declaration states undersigned duly authorised purpose declare states represent recognise flag flown vessels state sea-coast registered one specified place situated territory place shall serve port registry vessels. br barcelona april 20th 1921 done single copy english french texts shall authentic
|
Databases
|
riskified riskified privately held company provides software service saas fraud chargeback prevention technology riskified ’ technology uses behavioral analysis elastic linking proxy detection machine learning detect prevent fraud riskified backs transactions approved technology chargeback 100 money-back guarantee event fraud riskified founded 2012 eido gal assaf feldman. ref name= wsj-4/9/2018 /ref 2018 riskified secured 63.7 million funding
|
Computer security
|
malaysian identity card malaysian identity card compulsory identity card malaysian citizens aged 12 current identity card known mykad introduced national registration department malaysia 5 september 2001 one four msc malaysia flagship applications replacement high quality identity card kad pengenalan bermutu tinggi malaysia became first country world use identification card incorporates photo identification fingerprint biometric data in-built computer chip embedded piece plastic besides main purpose card validation tool proof citizenship birth certificate mykad may also serve valid driver license atm card electronic purse public key among applications part malaysian government multipurpose card gmpc initiative bearer chooses activate functions cards currently use soon introduced gmpc initiative share similar features term mykad compound two words ambiguous meanings namely kad kad initial mykad contact card solution developed manufactured iris corporation made pc dimensions iso/iec 7816 id-1 format standard credit card format initial card 32kb eeprom electronically erasable programmable read-only memory embedded chip running m-cos mykad chip operating system november 2002 capacity increased 64kb upgraded current version mykad hybrid card containing two chips contact contactless interfaces currently hybrid type mykad issued malaysian states employ touch n go application mykad chip data retention 20 years card lifespan 10 years tested according iso 10373 standard malaysian citizens permanent residents 12 years old eligible mykad 2001 gradually replaced older malaysian identity card system use since 1949 british colonial rule intention becoming ubiquitous 2007 children issued mykid birth card upgraded mykad 12th birthday mykad must replaced person reaches 18 years old requirement photograph current adoption optional spurred waiving application fee rm20 rm50 31 december 2005 27 december 2005 1,180,208 malaysians still held old identity card waiving period ended 31 december 2005 new first-time application comes fee rm10 current format malaysian identity card number introduced 1990 features 12 digits separated three block hyphens illustrated format official format printed official identity documents e.g mykad however database purposes e.g sorting nric number may hyphens omitted hence first six digits signify person date birth format example person born 16 september 1963 would 630916 first six digits identity card person born 1 january 1900 would 000101 first digits person born 1 january 2000 cases person actual date birth according gregorian calendar uncertain date person first applied mykad used becomes person birthday official purposes noted asterisk pb seventh eighth digit based place birth person referred birth certificate upon application mykad policemen armed forces assigned unique digit 88 99 respectively throughout term service ending term service would gain mykad middle digits based place birth nowiki /nowiki ninth eleventh digit generic special number generated national registration department malaysia computer system g 12th digit represents gender person odd numbers g denote male even numbers denote female back card additional 2-digit number 12-digit number indicate number mykad person previously held prior 2001 originally person born abroad used digit 71 72 identity card number high quality identity card regardless without least one parent malaysian citizenship estimated 171,023 registered voters born abroad used digit 71 72 mykad however since 2001 baby born abroad 2001 referred according place birth rather general digit 71 72 mykad also affected person including citizen non-citizen born abroad regardless year birth applying mykad without holding high quality identity card 2001 despite person born abroad already high quality identity card means registered identity card 2001 still retain digit 71 72 used mykad identity card number high quality identity card use malaysia identity card 1990 2001 2001 person high quality identity card expected renew high quality identity card new mykad mykad project developed originally intended four functions four applications added initial release time functions still widely used widely promoted extensible design card may leading functionality creep applications envisaged government include mykad must carried times failure may incur fine rm3,000 rm20,000 jail term three years unauthorised people including security guards allowed retain mykads people authorised national registration department like police immigration officers muslim citizens islam printed card picture holder help enforcement shariah law applicable muslims state sabah sarawak maintain separate immigration controls citizens permanent residency state sabah sarawak denoted letters h k respectively bottom right corner card mykad public key infrastructure pki application allows two digital certificates inserted mykad holders apply purchase digital certificates two malaysia certification authority msctrustgate.com sdn bhd digicert sdn bhd.. pki allows easy securing private data public telecommunications networks thus allowing secure electronic transactions internet include citizens peninsular malaysia travelling sabah sarawak produce mykad arrival obtain document lieu internal travel document imm.114 social business visits three months sabah sarawak maintains separate immigration control system peninsular malaysians subject immigration control two states malaysia brunei signed frequent travellers cards ftc agreement 10 september 2007 allowing malaysian bruneian frequent travellers register use national identity cards travel malaysia brunei malaysia stopped issuing renewing restricted passports citizens peninsular malaysia travel singapore beginning 1 january 2005 malaysia considered negotiating singapore allow frequent malaysian travellers enter singapore using mykad however singapore rejected use mykad frequent malaysian travellers enter country citing security concerns myid malaysian government initiative implements national registration identity card number sole reference number malaysians transactions individual government agencies mykid chip-based children identity card personal identification document issued children age 12 introduced 1 january 2003 mykid contains features similar mykad except include photograph thumbprint biometric data registration new birth mykid processed application registration birth children born 2003 get mykid term kid refers mykid issued pink instead blue colour mykad visible data mykid block letters include mykid chip currently stores three types data benefits mykid mypr identity card personal identification issued residents malaysia permanent resident status residents malaysia permanent resident status required change identity card mypr effect 1 june 2006 mypr red visible data include mykas temporary resident identity card issued regulation 5 3 national registration regulations 1990 green expiry date indicated card mykas must renewed within five years mytentera replace current bat c 10 document malay borang angkatan tentera c 10 armed forces form c 10 mytentera silver feature malaysian armed forces logo back top-right corner also contain 12-digit military identification number similar nric number
|
Computer security
|
saltzer schroeder design principles saltzer schroeder design principles design principles enumerated jerome saltzer michael schroeder 1975 article protection information computer systems experience important design secure software systems
|
Computer security
|
i.mx i.mx range family freescale semiconductor part nxp proprietary microcontrollers multimedia applications based arm architecture focused low-power consumption i.mx application processors socs system-on-chip integrate many processing units one die like main cpu video processing unit graphics processing unit instance i.mx products qualified automotive industrial consumer markets guaranteed production lifetime 10 15 years.many devices use i.mx processors ford sync kobo ereader amazon kindle zune except zune hd sony reader onyx boox readers/tablets solidrun som including cubox logitech harmony remote controls squeezebox radio toshiba gigabeat mp4 players i.mx range previously known dragonball mx family fifth generation dragonball microcontrollers i.mx originally stood innovative multimedia extension i.mx solutions consist hardware processors development boards software optimized processor launched 2001/2002 i.mx1x series based arm920t architecture i.mx2x series family processors based arm9 architecture arm926ej-s designed cmos 90 nm process i.mx21 family designed low power handheld devices launched 2003 i.mx27 family designed videotelephony video surveillance launched 2007 i.mx25 family launched 2009 especially integrates key security features hardware high-end member family i.mx258 integrates 400 mhz arm9 cpu platform lcdc lcd controller security block supports mddr-sdram 133 mhz i.mx233 processor formerly known sigmatel stmp3780 stmp37xx family launched 2009 integrates power management unit pmu stereo audio codec within silicon unique integration removes need external power management chip audio codec chip i.mx28 family launched 2010 especially integrates key security features hardware adc power management unit supports mddr lv-ddr2 ddr2-sdram 200 mhz i.mx3x series family processors based arm11 architecture arm1136jf-s mainly designed cmos 90 nm process i.mx31 launched 2005 integrates 532 mhz arm1136 cpu platform vector floating point unit l1 caches 128kb l2 caches video processing unit vpu 3d gpu opengl es 1.1 ipu security block supports mddr-sdram 133 mhz i.mx37 processor designed portable media players launched 2008 supports mddr-sdram 133 mhz i.mx35 family replacement i.mx31 launched 2009 high-end member family i.mx357 integrates 532 mhz arm1136 cpu platform vector floating point unit l1 caches 128kb l2 cache 2.5d gpu openvg 1.1 ipu security block supports ddr2-sdram 133 mhz i.mx5x series based arm cortex a8 core comprises two families i.mx51 family high-end multimedia devices like smartbook automotive infotainment i.mx50 family ereaders designed cmos 65 nm process models imageon z460 gpu high-end member family i.mx515 integrates 800 mhz arm cortex a8 cpu platform neon co-processor vector floating point unit l1 caches 256kb l2 cache multi-format hd 720p decode d1 encode hardware video codecs vpu video processing unit imageon 3d gpu opengl es 2.0 2.5d gpu openvg 1.1 ipu security block especially supports ddr2 sdram 200 mhz imx51 family launched 2009 i.mx508 processor result freescale collaboration e ink dedicated ereaders launched 2010 integrates e ink display controller within silicon save bom cost space pcb especially supports lp-ddr2 sdram 400 mhz i.mx535 announced june 2010 shipped since first quarter 2011 i.mx 6 series based arm cortex a9 solo dual quad cores cases cortex a7 typically comes one vivante gpus designed cmos 40 nm process i.mx 6 solo dual quad announced january 2011 consumer electronics show las vegas i.mx 7 series based low-power arm cortex a7 cpu core secondary arm cortex m4 real-time co-processor designed 28 nm fully depleted silicon-on-insulator fdsoi process far low-powered single dual-core models designed iot applications released i.mx 7solo i.mx 7dual announced september 2013 i.mx 8 series suffers poor naming convention three major different series series differs significantly pin compatible within series versions pin compatible series also suffix quad dual plus max combination thereof example quadmax dualplus i.mx 8 series many variants clear name corresponds feature set previous cpu series naming convention clearly corresponds function feature set case i.mx 8 i.mx 8 series announced september 2013 based armv8-a 64-bit cpu architecture nxp written i.mx 8 series designed driver information systems car computers applications released may 2016 i.mx 8 became available multisensory enablement kit mek based i.mx 8 slides nxp ftf found web indicated initial total 5 variants main level categorization dual quad varying cpu gpu capabilities cpu suggested include varying counts cortex-a72 cortex-a53 cortex-m4 gpu either 1 2 units vivante gc7000vx publications supported general image even including photos evaluation kit named multisensory enablement kit mek got later promoted development support product nxp i.mx 8 announced q1 2017 based around 3 products two variants include four cortex-a53 versions includes one two cortex-a72 cpu cores versions includes two cortex-m4f cpu cores i.mx 8 socs include vivante gc7000 series gpus quadplus using gc7000lite cores 'quadmax includes two full gc7000 gpus standard key features advanced security ethernet avb usb 3.0 phy mmc/sdio uart spi i²c i²s timers secure rtc media processor engine neon™ integrated power management nowiki /nowiki pre-production main features i.mx 8m series announced january 4 ces 2017 main features i.mx 8m mini nxp ’ first embedded multi-core heterogeneous applications processors built using advanced 14lpc finfet process technology i.mx 8m mini family processors brings together high-performance computing power efficiency enhanced system reliability embedded security needed drive growth fast-growing edge node computing streaming multimedia machine learning applications heart scalable core complex four arm cortex-a53 cores running 2 ghz plus cortex-m4 based real-time processing domain 400+mhz i.mx 8m mini core options optimized low-power offer breadth processing power necessary consumer audio industrial machine learning training inferencing across range cloud providers i.mx 8m mini also packs-in hardware 1080p video acceleration enable two-way video applications 2d 3d graphics provide rich visual hmi experience advanced audio capabilities enable audio-rich applications extensive selection high-speed interfaces enabling broader system connectivity targeting industrial level qualification i.mx 8m mini family may used general embedded consumer industrial application features i.mx 8x series announced march 14 2017 main features automotive market similar series currently using arm cortex-a53 and/or arm cortex-m4 cores got presented mid-2015 using prefix s32 freescale proposes layered approach software selection software components optimized chips i.mx board support packages bsp common across i.mx nodes consists kernel optimization hardware drivers unit tests company also provides portfolio multimedia codecs arm video processing unit accelerated i.mx solution also includes middleware reuse open source frameworks like multimedia framework plugins power management security/drm graphics opengl/openvg software solutions i.mx publicly available company website freescale i.mx development kits include linux software stack gnome mobile environment i.mx51 family reference user interface ubuntu last ubuntu version supported 10.04.1 still available mirrors ubuntu dropped official i.mx51 family support since version 10.10 since ubuntu 11.10 support i.mx53 quickstart board available preinstalled desktop server sd card openembedded linux distribution supports several i.mx platforms commercial linux support available companies like lanedo timesys montavista wind river systems mentor graphics support freescale i.mx51 added freebsd 2013-03-20 support members i.mx5 family added since support freescale i.mx 6 family added freebsd 2013-10-31 netbsd 6.0 comes support freescale i.mx51 version 7.0 support i.mx 6 based boards added support freescale i.mx 6 series soc added openbsd head 2013-09-06. i.mx support risc-os available since 2019 freescale i.mx development kits include wince february 2010 freescale launched android platform i.mx5x family early 2010 freescale demoed chromium os running i.mx515 processor company disclosed plans chromium chrome freescale range partners providing real-time operating systems software solutions running i.mx processors trinity convergence adeneo thundersoft intrinsyc wind river systems qnx green hills mentor graphics wolfssl includes support i.mx6 following versions including wolfssl v3.14.0 wolfssl also provides additional support using cryptographic assistance assurance module caam i.mx6 january 2010 freescale announced first platform smart application blueprint rapid engineering sabre series smartbook tablet form factor 7 touch screen resistive running i.mx515 february 2010 freescale demoed sabre platform ereaders based i.mx515 many reference boards mentioned supported freescale i.mx community website include
|
Computer architecture
|
ana programming language contexts solar physics data analysis ana computer language designed array processing image data analysis name acronym non acronym ana began fork early version idl diverged significantly since common use lockheed-martin space applications laboratory institutions analyze data trace spacecraft commonly used elsewhere ana appears intended free software though distributed recognized foss license available source code primarily solarsoft distribution system commonly used application written ana trace image browser designed browsing viewing time-lapse movies collected trace soho yohkoh observatories ana homepage
|
Programming language topics
|
link access procedure modems link access procedure modems lapm part v.42 error correction protocol modems lapm error control protocol defined itu-t recommendations v.42 like many data link layer protocols variant hdlc like microcom networking protocols preceded lapm uses cyclic redundancy checking crc retransmission corrupted data arq ensure data reliability error control protocols lapm use frames variable lengths beginning header ending frame check sequence trailer cyclic redundancy check correctly received packets acknowledged unacknowledged packets automatically retransmitted arq larger payload included frame smaller relative cost transmitting header trailer bits usually lapm adds 5 percent framing overhead noticeable improvement fixed 25 overhead start stop bits required direct asynchronous serial communication obviously large frames impose cost form communication latency lapm optional selective reject srej functionality allows resend corrupted frames providing faster recovery error itu-t v.42 lapm procedure considered robust microcom networking protocols mnp preceded sophisticated powerful data compression option v.42bis allowing much greater data throughput v.42bis added string compression algorithm called btlz british telecom lempel ziv frequently occurring strings characters replaced code words dictionary strings dynamically maintained transmission keeps track changes data new strings added old strings deleted data may always compressible example encrypted pre-compressed data modem ability switch compressed uncompressed modes operation compression performance continually monitored compression obtained modem transmits data uncompressed form even uncompressed mode modem monitors characteristics data switches compression back soon benefit achieved
|
Internet protocols
|
opencube technologies open cube solutions llc french company headquartered toulouse member group evs broadcast equipment established april 2003 open cube technologies develops manufactures licenses supports wide range software hardware broadcast cinema industries active computing broadcast video opencube technologies provides mxf-format solutions mxf server mxf player mxf converter mxf toolkit media content management services opencube acquired evs broadcast equipment 2010 part evs media division company awarded 2008 satis salon international de l'audiovisuel paris product p2softhd customers airbus mtv 20th century fox
|
Distributed computing architecture
|
ws-secureconversation ws-secureconversation web services specification created ibm others works conjunction ws-security ws-trust ws-policy allow creation sharing security contexts extending use cases ws-security purpose ws-secureconversation establish security contexts multiple soap message exchanges reducing overhead key establishment ws-secureconversation meant provide extensible framework flexible syntax one could implement various security mechanisms guarantee security implementor ensure result vulnerable attack following pattern similar tls ws-secureconversation establishes kind session key processing overhead key establishment reduced significantly compared ws-security case frequent message exchanges however new layer put top ws-security implies ws-* protocols like ws-addressing ws-trust importance performance compared added complexity dependencies see performance section ws-security following specifications associated ws-secureconversation
|
Web technology
|
internet leak internet leak occurs party confidential information released public internet various types information data leaked internet common personal information computer software source code artistic works books albums example musical album leaked made available public internet official release date source code leaks usually caused misconfiguration software like cvs ftp allow people get source files exploiting software bugs employees access sources part revealing code order harm company many cases source code leaks history software development sometimes software developers intentionally leak source code effort prevent software product becoming abandonware reached end-of-life allowing community continue development support reasons leaking instead proper release public domain open-source include scattered lost intellectual property rights example video game falcon 4.0 became available 2000 another one dark reign 2 released anonymous former pandemic studios developer 2011 another notable example archive infocom video games source code appeared anonymous infocom source archived internet archive 2008
|
Computer security
|
dell emc scaleio dell emc scaleio rebranded vxflex os software-defined storage product dell emc creates server-based storage area network san local application server storage using existing customer hardware emc servers converts direct-attached storage shared block storage scaleio scale three compute/storage nodes 1,000 nodes drive 240 million iops performance developers deploy scaleio software on-prem commodity infrastructure cloud port applications back production scaleio instance september 2015 scaleio also available company bundled emc commodity computing servers officially called vxflex ready nodes vxflex appliance vxflex integrated rack scaleio deployed storage converged infrastructure combining storage computational networking resources single block capacity performance available resources aggregated made available every participating scaleio server application storage tiers created media types drive types match ideal performance capacity characteristics best suit application needs available free testing community support paid-for emc-supported option scaleio founded 2011 boaz palgi erez webman lior bahat eran borovik erez ungar israel software designed high performance large systems company backed venture capital firms including greylock partners norwest venture partners product announced november 2012 emc corporation bought scaleio june 2013 200 million six months company emerged stealth mode emc began promoting scaleio 2014 2015 marketing competition emc ’ data storage arrays also 2015 emc introduced model vce company converged infrastructure hardware supported scaleio storage 2015 trade show emc announced scaleio would made freely available developers testing may 2015 developers could download scaleio software september 2015 emc announced availability previously software-only scaleio pre-bundled emc commodity hardware called emc scaleio node may 2017 dell emc announced scaleio.next featuring inline compression thin provisioning flash-based snapshots new release features enhanced snapshot tools features full support vmware virtual volumes vvols well volume migration deployments want take advantage lower cost media low-priority data march 2018 scaleio rebranded vxflex os continues software defined storage vxflex ready nodes vxflex appliance new vxflex integrated system vxrack flex april 2019 vxflex os 3.0 scaleio 3.0 released emc scaleio uses storage compute resources commodity hardware combines hdds ssds pcie flash cards create virtual pool block storage varying performance tiers features on-demand performance storage scalability well enterprise-grade data protection multi-tenant capabilities add-on enterprise features qos thin provisioning snapshots scaleio operates multiple hardware platforms supports physical and/or virtual application servers scaleio works installing software components application hosts application hosts contribute internal disks direct attached storage resources scaleio cluster installing sds software hosts presented volumes scaleio cluster leveraging sdc software components run alongside applications server physical virtual cloud using type storage media disk drives flash drives pcie flash cards cloud storage scaleio architecture built two components data client data server scaleio data client sdc lightweight device driver situated host whose application file system requires access scaleio virtual san block devices sdc exposes block devices representing scaleio volumes currently mapped host sdcs maintain small in-memory map able maintain mapping petabytes data megabytes ram inter-node protocol used sdcs simpler iscsi uses fewer network resources scaleio data server sds situated host contributes local storage central scaleio virtual san node part loosely coupled cluster performance expected increase servers storage devices added cluster additional storage compute resources i.e. additional servers drives added modularly every server scaleio cluster used processing i/o operations making i/o throughput accessible application within cluster needed rebuilds rebalances processed background workloads evenly shared parallel i/o architecture scaleio deployed either two-layer multi-server cluster application storage installed separate servers hyper-converged option application storage installed servers scaleio cluster creating low-footprint low-cost scalable single-layer architecture capacity performance available resources aggregated made available every participating scaleio server application storage tiers created media types drive types match ideal performance capacity characteristics best suit application needs storage compute resources added removed scaleio cluster needed downtime minimal impact application performance self-healing auto-balancing capability scaleio cluster ensures data automatically rebuilt rebalanced across resources components added removed failed every server local storage device cluster used parallel process i/o operations protect data system performance scales linearly additional servers storage devices added configuration scaleio software takes data chunk written spreads across many nodes mirroring well makes data rebuilds disk loss fast several nodes contribute smaller faster parallel rebuild efforts whole scaleio supports vmware hyper-v xen kvm hypervisors also supports openstack windows red hat sles centos coreos docker app needing block storage use including oracle databases closely integrated vmware virtual san sdc functionality moved vmware kernel
|
Computer file systems
|
srizbi botnet srizbi botnet considered one world largest botnets responsible sending half spam sent major botnets combined botnets consist computers infected srizbi trojan sent spam command srizbi suffered massive setback november 2008 hosting provider janka cartel taken global spam volumes reduced 93 result action size srizbi botnet estimated around 450,000 compromised machines estimation differences smaller 5 among various sources botnet reported capable sending around 60 trillion janka threats day half total approximately 100 trillion janka threats sent every day comparison highly publicized storm botnet manages reach around 20 total number spam sent peak periods srizbi botnet showed relative decline aggressive growth number spam messages sent mid-2008 july 13 2008 botnet believed responsible roughly 40 spam net sharp decline almost 60 share may earliest reports srizbi trojan outbreaks around june 2007 small differences detection dates across antivirus software vendors however reports indicate first released version already assembled 31 march 2007 srizbi botnet experts considered second largest botnet internet however controversy surrounding kraken botnet may srizbi largest botnet srizbi botnet consists computers infected srizbi trojan horse trojan horse deployed onto victim computer mpack malware kit past editions used n404 web exploit kit malware kit spread kit usage deprecated favor mpack distribution malware kits partially achieved utilizing botnet botnet known send spam containing links fake videos celebrities include link pointing malware kit similar attempts taken subjects illegal software sales personal messages apart self-propagation mpack kit also known much aggressive spreading tactics notably compromise 10,000 websites june 2007 domains included surprising number pornographic websites ended forwarding unsuspecting visitor websites containing mpack program computer becomes infected trojan horse computer becomes known zombie command controller botnet commonly referred botnet herder operation srizbi botnet based upon number servers control utilization individual bots botnet servers redundant copies protects botnet crippled case system failure legal action takes server server-side srizbi botnet handled program called reactor mailer python-based web component responsible coordinating spam sent individual bots botnet reactor mailer existed since 2004 currently third release also used control srizbi botnet software allows secure login allows multiple accounts strongly suggests access botnet spam capacity sold external parties software service reinforced evidence showing srizbi botnet runs multiple batches spam time blocks ip addresses observed sending different types spam one time user granted access utilize software create message want send test spamassassin score send users list email addresses suspicion arisen writer reactor mailer program might person responsible srizbi trojan code analysis shows code fingerprint matches two programs claim indeed true coder might well responsible trojan behind another botnet named rustock according symantec code used srizbi trojan similar code found rustock trojan could well improved version latter srizbi trojan client side program responsible sending spam infected machines trojan credited extremely efficient task explains srizbi capable sending high volumes spam without huge numerical advantage number infected computers apart efficient spam engine trojan also capable hiding user system including products designed remove trojan system trojan fully executed kernel mode noted employ rootkit technologies prevent form detection patching ntfs file system drivers trojan make files invisible operating system human user utilizing system trojan also capable hiding network traffic generates directly attaching ndis tcp/ip drivers process feature currently unique trojan procedure proven allow trojan bypass firewall sniffer protection provided locally system bot place operational contact one hardcoded servers list carries server supply bot zip file containing number files required bot start spamming business following files identified downloaded files received bot first initialize software routine allows remove files critical revealing spam rootkit applications srizbi botnet basis several incidents received media coverage several notable ones described means complete list incidents list major ones october 2007 several anti-spam firms noticed unusual political spam campaign emerging unlike usual messages counterfeit watches stocks penis enlargement mail contained promotional information united states presidential candidate ron paul ron paul camp dismissed spam related official presidential campaign spokesman told press true could done well-intentioned yet misguided supporter someone bad intentions trying embarrass campaign either way independent work connection spam ultimately confirmed come srizbi network capture one control servers involved investigators learned spam message sent 160 million email addresses 3,000 bot computers spammer identified internet handle nenastnyj ненастный means rainy foul rainy day foul weather russian real identity determined week 20 june 2008 srizbi managed triple number malicious spam sent average 3 9.9 largely due effort particular spam wave aggressive attempt increase size srizbi botnet sending emails users warned videotaped naked sending message kind spam referred stupid theme attempt get people click malicious link included mail realizing message likely spam old social engineering technique remains proven method infection spammers size operation shows power monetary income botnet closely based upon spam capacity infected computers translate directly greater revenue botnet controller also shows power botnets increase size mainly using part strength numbers removal control servers hosted mccolo late november 2008 control botnet transferred servers hosted estonia accomplished mechanism trojan horse queried algorithmically generated set domain names one registered individuals controlling botnet united states computer security firm fireeye inc. kept system controllers hands period two weeks preemptively registering generated domain names position sustain effort however spamming activity greatly reduced control server transfer
|
Computer security
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.