Random Articles (Page 51)
Have a deep view into what people are curious about.
π Cold Boot Attack
In computer security, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer's random access memory by performing a hard reset of the target machine. Typically, cold boot attacks are used to retrieve encryption keys from a running operating system for malicious or criminal investigative reasons. The attack relies on the data remanence property of DRAM and SRAM to retrieve memory contents that remain readable in the seconds to minutes after power has been removed.
An attacker with physical access to a running computer typically executes a cold boot attack by cold-booting the machine and booting a lightweight operating system from a removable disk to dump the contents of pre-boot physical memory to a file. An attacker is then free to analyze the data dumped from memory to find sensitive data, such as the keys, using various forms of key finding attacks. Since cold boot attacks target random access memory, full disk encryption schemes, even with a trusted platform module installed are ineffective against this kind of attack. This is because the problem is fundamentally a hardware (insecure memory) and not a software issue. However, malicious access can be prevented by limiting physical access and using modern techniques to avoid storing sensitive data in random access memory.
Discussed on
- "Cold Boot Attack" | 2013-09-27 | 33 Upvotes 9 Comments
π Frankenstein Veto
A Frankenstein veto occurs when an American state Governor selectively deletes words from a bill, stitching together the remainder (Γ la Victor Frankenstein) to form a new bill different from that passed by the legislature.
In 2008, the state Constitution of Wisconsin was amended to place certain restrictions on the Frankenstein veto. With those changes, the governor of Wisconsin still has far greater veto powers than any other governor in the United States of America.
Discussed on
- "Frankenstein Veto" | 2020-02-09 | 177 Upvotes 87 Comments
π A Dog of Flanders
A Dog of Flanders is an 1872 novel by English author Marie Louise de la RamΓ©e published with her pseudonym "Ouida". It is about a Flemish boy named Nello and his dog, Patrasche and is set in Antwerp.
In Japan, Korea and the Philippines, the novel has been an extremely popular children's classic for decades and has been adapted into several Japanese films and anime. Since the 1980s, the Belgian board of tourism caught on to the phenomenon and built two monuments honoring the story to please East-Asian tourists. There is a small statue of Nello and Patrasche at the Kapelstraat in the Antwerp suburb of Hoboken, and a commemorative plaque in front of the Antwerp Cathedral donated by Toyota, that was later replaced by a marble statue of the two characters covered by a cobblestone blanket, created by the artist Batist Vermeulen.
Discussed on
- "A Dog of Flanders" | 2020-02-06 | 71 Upvotes 54 Comments
π List of Important Publications in Computer Science
This is a list of important publications in computer science, organized by field.
Some reasons why a particular publication might be regarded as important:
- Topic creator β A publication that created a new topic
- Breakthrough β A publication that changed scientific knowledge significantly
- Influence β A publication which has significantly influenced the world or has had a massive impact on the teaching of computer science.
Discussed on
- "List of important publications in computer science" | 2020-07-27 | 30 Upvotes 2 Comments
- "List of Important Publications in Computer Science" | 2011-08-14 | 58 Upvotes 6 Comments
π Rabin-Karp Algorithm for finding matching substrings in text
In computer science, the RabinβKarp algorithm or KarpβRabin algorithm is a string-searching algorithm created by Richard M. Karp and Michael O. RabinΒ (1987) that uses hashing to find an exact match of a pattern string in a text. It uses a rolling hash to quickly filter out positions of the text that cannot match the pattern, and then checks for a match at the remaining positions. Generalizations of the same idea can be used to find more than one match of a single pattern, or to find matches for more than one pattern.
To find a single match of a single pattern, the expected time of the algorithm is linear in the combined length of the pattern and text, although its worst-case time complexity is the product of the two lengths. To find multiple matches, the expected time is linear in the input lengths, plus the combined length of all the matches, which could be greater than linear. In contrast, the AhoβCorasick algorithm can find all matches of multiple patterns in worst-case time and space linear in the input length and the number of matches (instead of the total length of the matches).
A practical application of the algorithm is detecting plagiarism. Given source material, the algorithm can rapidly search through a paper for instances of sentences from the source material, ignoring details such as case and punctuation. Because of the abundance of the sought strings, single-string searching algorithms are impractical.
Discussed on
- "Rabin-Karp Algorithm for finding matching substrings in text" | 2018-11-20 | 10 Upvotes 1 Comments
π US Supreme Court upholds state power to enforce compulsory vaccination (1905)
Jacobson v. Massachusetts, 197 U.S. 11 (1905), was a United States Supreme Court case in which the Court upheld the authority of states to enforce compulsory vaccination laws. The Court's decision articulated the view that the freedom of the individual must sometimes be subordinated to the common welfare and is subject to the police power of the state.
Discussed on
- "US Supreme Court upholds state power to enforce compulsory vaccination (1905)" | 2020-05-18 | 34 Upvotes 5 Comments
π Project Cybersyn (1971)
Project Cybersyn was a Chilean project from 1971β1973 during the presidency of Salvador Allende aimed at constructing a distributed decision support system to aid in the management of the national economy. The project consisted of four modules: an economic simulator, custom software to check factory performance, an operations room, and a national network of telex machines that were linked to one mainframe computer.
Project Cybersyn was based on viable system model theory approach to organizational design, and featured innovative technology for its time: it included a network of telex machines (Cybernet) in state-run enterprises that would transmit and receive information with the government in Santiago. Information from the field would be fed into statistical modeling software (Cyberstride) that would monitor production indicators, such as raw material supplies or high rates of worker absenteeism, in "almost" real time, alerting the workers in the first case and, in abnormal situations, if those parameters fell outside acceptable ranges by a very large degree, also the central government. The information would also be input into economic simulation software (CHECO, for CHilean ECOnomic simulator) that the government could use to forecast the possible outcome of economic decisions. Finally, a sophisticated operations room (Opsroom) would provide a space where managers could see relevant economic data, formulate feasible responses to emergencies, and transmit advice and directives to enterprises and factories in alarm situations by using the telex network.
The principal architect of the system was British operations research scientist Stafford Beer, and the system embodied his notions of organisational cybernetics in industrial management. One of its main objectives was to devolve decision-making power within industrial enterprises to their workforce in order to develop self-regulation of factories.
Discussed on
- "Project Cybersyn" | 2020-10-13 | 212 Upvotes 114 Comments
- "Project Cybersyn (1971)" | 2014-03-14 | 70 Upvotes 36 Comments
- "Computer-controlled socialist economy gets destroyed on 9/11... 1973" | 2011-09-29 | 12 Upvotes 8 Comments
- "Project Cybersyn" | 2010-08-27 | 12 Upvotes 3 Comments
- "Project Cybersyn: real-time computer control of a planned economy (1970-1973)" | 2010-03-14 | 56 Upvotes 33 Comments
π Tupolev Tu-144
The Tupolev Tu-144 (Russian: TyΠΏΠΎΠ»Π΅Π² Π’Ρ-144; NATO reporting name: Charger) is a retired jet airliner and commercial supersonic transport aircraft (SST). It was the world's first commercial SST (maiden flight β 31 December 1968), the second being the Anglo-French Concorde (maiden flight β 2 March 1969). The design was a product of the Tupolev design bureau, headed by Alexei Tupolev, of the Soviet Union and manufactured by the Voronezh Aircraft Production Association in Voronezh, Russia. It conducted 102 commercial flights, of which only 55 carried passengers, at an average service altitude of 16,000 metres (52,000Β ft) and cruised at a speed of around 2,000 kilometres per hour (1,200Β mph) (Mach 1.6).
The prototype's first flight was made on 31 December 1968, near Moscow from Zhukovsky Airport, two months before the first flight of Concorde. The Tu-144 first went supersonic on 5 June 1969 (Concorde first went supersonic on 1 October 1969), and on 26 May 1970 became the world's first commercial transport to exceed Mach 2. The aircraft used a new construction technique which resulted in large unexpected cracks, which resulted in several crashes. A Tu-144 crashed in 1973 at the Paris Air Show, delaying its further development. The aircraft was introduced into commercial service on 26 December 1975. In May 1978, another Tu-144 (an improved version, the Tu-144D) crashed on a test flight while being delivered. The aircraft remained in use as a cargo aircraft until 1983, when the Tu-144 commercial fleet was grounded. The Tu-144 was later used by the Soviet space program to train pilots of the Buran spacecraft, and by NASA for supersonic research until 1999, when the Tu-144 made its last flight (26 June 1999).
Discussed on
- "Tupolev Tu-144" | 2013-10-20 | 39 Upvotes 18 Comments
π TV detector van
TV detector vans are vans, which, according to the BBC, contain equipment that can detect the presence of television sets in use. The vans are operated by contractors working for the BBC, to enforce the television licensing system in the UK, the Channel Islands and on the Isle of Man. The veracity of their operation has been called into question in the media.
Discussed on
- "TV Detector Vans" | 2023-12-14 | 71 Upvotes 81 Comments
- "TV detector van" | 2019-08-08 | 151 Upvotes 327 Comments
π List of countries that prohibit camouflage clothing
The following nations prohibit civilians wearing or possessing camouflage print clothing:
- Azerbaijan
- Antigua and Barbuda
- Bahamas
- Barbados
- Dominica
- Ghana
- Grenada
- Jamaica
- Nigeria
- Oman
- Philippines (uniforms only)
- Saint Lucia
- Saint Vincent and the Grenadines
- Saudi Arabia
- Trinidad and Tobago
- Uganda
- Zambia
- Zimbabwe
Discussed on
- "List of countries that prohibit camouflage clothing" | 2024-03-27 | 22 Upvotes 15 Comments