Random Articles (Page 51)

Have a deep view into what people are curious about.

πŸ”— Cold Boot Attack

πŸ”— Computer Security πŸ”— Computer Security/Computing πŸ”— Cryptography πŸ”— Cryptography/Computer science

In computer security, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer's random access memory by performing a hard reset of the target machine. Typically, cold boot attacks are used to retrieve encryption keys from a running operating system for malicious or criminal investigative reasons. The attack relies on the data remanence property of DRAM and SRAM to retrieve memory contents that remain readable in the seconds to minutes after power has been removed.

An attacker with physical access to a running computer typically executes a cold boot attack by cold-booting the machine and booting a lightweight operating system from a removable disk to dump the contents of pre-boot physical memory to a file. An attacker is then free to analyze the data dumped from memory to find sensitive data, such as the keys, using various forms of key finding attacks. Since cold boot attacks target random access memory, full disk encryption schemes, even with a trusted platform module installed are ineffective against this kind of attack. This is because the problem is fundamentally a hardware (insecure memory) and not a software issue. However, malicious access can be prevented by limiting physical access and using modern techniques to avoid storing sensitive data in random access memory.

Discussed on

πŸ”— Frankenstein Veto

πŸ”— Law πŸ”— Wisconsin

A Frankenstein veto occurs when an American state Governor selectively deletes words from a bill, stitching together the remainder (Γ  la Victor Frankenstein) to form a new bill different from that passed by the legislature.

In 2008, the state Constitution of Wisconsin was amended to place certain restrictions on the Frankenstein veto. With those changes, the governor of Wisconsin still has far greater veto powers than any other governor in the United States of America.

Discussed on

πŸ”— A Dog of Flanders

πŸ”— Novels πŸ”— Children's literature πŸ”— Dogs πŸ”— Novels/19th century

A Dog of Flanders is an 1872 novel by English author Marie Louise de la RamΓ©e published with her pseudonym "Ouida". It is about a Flemish boy named Nello and his dog, Patrasche and is set in Antwerp.

In Japan, Korea and the Philippines, the novel has been an extremely popular children's classic for decades and has been adapted into several Japanese films and anime. Since the 1980s, the Belgian board of tourism caught on to the phenomenon and built two monuments honoring the story to please East-Asian tourists. There is a small statue of Nello and Patrasche at the Kapelstraat in the Antwerp suburb of Hoboken, and a commemorative plaque in front of the Antwerp Cathedral donated by Toyota, that was later replaced by a marble statue of the two characters covered by a cobblestone blanket, created by the artist Batist Vermeulen.

Discussed on

πŸ”— List of Important Publications in Computer Science

πŸ”— Computing πŸ”— Computer science πŸ”— Lists πŸ”— History of Science πŸ”— Bibliographies πŸ”— Bibliographies/Science

This is a list of important publications in computer science, organized by field.

Some reasons why a particular publication might be regarded as important:

  • Topic creator – A publication that created a new topic
  • Breakthrough – A publication that changed scientific knowledge significantly
  • Influence – A publication which has significantly influenced the world or has had a massive impact on the teaching of computer science.

Discussed on

πŸ”— Rabin-Karp Algorithm for finding matching substrings in text

πŸ”— Computing πŸ”— Computer science πŸ”— Computing/Software πŸ”— Computing/Computer science

In computer science, the Rabin–Karp algorithm or Karp–Rabin algorithm is a string-searching algorithm created by Richard M. Karp and Michael O. RabinΒ (1987) that uses hashing to find an exact match of a pattern string in a text. It uses a rolling hash to quickly filter out positions of the text that cannot match the pattern, and then checks for a match at the remaining positions. Generalizations of the same idea can be used to find more than one match of a single pattern, or to find matches for more than one pattern.

To find a single match of a single pattern, the expected time of the algorithm is linear in the combined length of the pattern and text, although its worst-case time complexity is the product of the two lengths. To find multiple matches, the expected time is linear in the input lengths, plus the combined length of all the matches, which could be greater than linear. In contrast, the Aho–Corasick algorithm can find all matches of multiple patterns in worst-case time and space linear in the input length and the number of matches (instead of the total length of the matches).

A practical application of the algorithm is detecting plagiarism. Given source material, the algorithm can rapidly search through a paper for instances of sentences from the source material, ignoring details such as case and punctuation. Because of the abundance of the sought strings, single-string searching algorithms are impractical.

Discussed on

πŸ”— US Supreme Court upholds state power to enforce compulsory vaccination (1905)

πŸ”— Law πŸ”— U.S. Supreme Court cases

Jacobson v. Massachusetts, 197 U.S. 11 (1905), was a United States Supreme Court case in which the Court upheld the authority of states to enforce compulsory vaccination laws. The Court's decision articulated the view that the freedom of the individual must sometimes be subordinated to the common welfare and is subject to the police power of the state.

πŸ”— Project Cybersyn (1971)

πŸ”— Computing πŸ”— Economics πŸ”— Systems πŸ”— Systems/Cybernetics πŸ”— Chile

Project Cybersyn was a Chilean project from 1971–1973 during the presidency of Salvador Allende aimed at constructing a distributed decision support system to aid in the management of the national economy. The project consisted of four modules: an economic simulator, custom software to check factory performance, an operations room, and a national network of telex machines that were linked to one mainframe computer.

Project Cybersyn was based on viable system model theory approach to organizational design, and featured innovative technology for its time: it included a network of telex machines (Cybernet) in state-run enterprises that would transmit and receive information with the government in Santiago. Information from the field would be fed into statistical modeling software (Cyberstride) that would monitor production indicators, such as raw material supplies or high rates of worker absenteeism, in "almost" real time, alerting the workers in the first case and, in abnormal situations, if those parameters fell outside acceptable ranges by a very large degree, also the central government. The information would also be input into economic simulation software (CHECO, for CHilean ECOnomic simulator) that the government could use to forecast the possible outcome of economic decisions. Finally, a sophisticated operations room (Opsroom) would provide a space where managers could see relevant economic data, formulate feasible responses to emergencies, and transmit advice and directives to enterprises and factories in alarm situations by using the telex network.

The principal architect of the system was British operations research scientist Stafford Beer, and the system embodied his notions of organisational cybernetics in industrial management. One of its main objectives was to devolve decision-making power within industrial enterprises to their workforce in order to develop self-regulation of factories.

Discussed on

πŸ”— Tupolev Tu-144

πŸ”— Aviation πŸ”— Soviet Union πŸ”— Russia πŸ”— Russia/technology and engineering in Russia πŸ”— Military history πŸ”— Military history/Military aviation πŸ”— Aviation/aircraft πŸ”— Military history/Cold War πŸ”— Russia/Russian, Soviet, and CIS military history πŸ”— Military history/Russian, Soviet and CIS military history πŸ”— Russia/history of Russia πŸ”— Aviation/Soviet aviation πŸ”— Soviet Union/Russian, Soviet and CIS military history

The Tupolev Tu-144 (Russian: TyΠΏΠΎΠ»Π΅Π² Π’Ρƒ-144; NATO reporting name: Charger) is a retired jet airliner and commercial supersonic transport aircraft (SST). It was the world's first commercial SST (maiden flight – 31 December 1968), the second being the Anglo-French Concorde (maiden flight – 2 March 1969). The design was a product of the Tupolev design bureau, headed by Alexei Tupolev, of the Soviet Union and manufactured by the Voronezh Aircraft Production Association in Voronezh, Russia. It conducted 102 commercial flights, of which only 55 carried passengers, at an average service altitude of 16,000 metres (52,000Β ft) and cruised at a speed of around 2,000 kilometres per hour (1,200Β mph) (Mach 1.6).

The prototype's first flight was made on 31 December 1968, near Moscow from Zhukovsky Airport, two months before the first flight of Concorde. The Tu-144 first went supersonic on 5 June 1969 (Concorde first went supersonic on 1 October 1969), and on 26 May 1970 became the world's first commercial transport to exceed Mach 2. The aircraft used a new construction technique which resulted in large unexpected cracks, which resulted in several crashes. A Tu-144 crashed in 1973 at the Paris Air Show, delaying its further development. The aircraft was introduced into commercial service on 26 December 1975. In May 1978, another Tu-144 (an improved version, the Tu-144D) crashed on a test flight while being delivered. The aircraft remained in use as a cargo aircraft until 1983, when the Tu-144 commercial fleet was grounded. The Tu-144 was later used by the Soviet space program to train pilots of the Buran spacecraft, and by NASA for supersonic research until 1999, when the Tu-144 made its last flight (26 June 1999).

Discussed on

πŸ”— TV detector van

πŸ”— Television

TV detector vans are vans, which, according to the BBC, contain equipment that can detect the presence of television sets in use. The vans are operated by contractors working for the BBC, to enforce the television licensing system in the UK, the Channel Islands and on the Isle of Man. The veracity of their operation has been called into question in the media.

Discussed on

πŸ”— List of countries that prohibit camouflage clothing

πŸ”— Lists πŸ”— Countries

The following nations prohibit civilians wearing or possessing camouflage print clothing:

  • Azerbaijan
  • Antigua and Barbuda
  • Bahamas
  • Barbados
  • Dominica
  • Ghana
  • Grenada
  • Jamaica
  • Nigeria
  • Oman
  • Philippines (uniforms only)
  • Saint Lucia
  • Saint Vincent and the Grenadines
  • Saudi Arabia
  • Trinidad and Tobago
  • Uganda
  • Zambia
  • Zimbabwe

Discussed on