245 research outputs found

    CERN UNIX user guide

    Get PDF

    The Novice's Guide to the UNIX at the AI Laboratory Version 1.0

    Get PDF
    This is a manual for complete beginners. It requires little knowledge of the MIT computer systems, and assumes no knowledge of the UNIX operating system. This guide will show you how to log onto the AI Lab's SUN system using a SUN III or similar workstation or a non-dedicated terminal. Many of the techniques described will be applicable to other computers running UNIX. You will learn how to use various operating system and network features, send and receive electronic mail, create and edit files using GNU EMACS, process text using YTEX, and print your files.MIT Artificial Intelligence Laborator

    The NASA master directory: Quick reference guide

    Get PDF
    This is a quick reference guide to the NASA Master Directory (MD), which is a free, online, multidisciplinary directory of space and Earth science data sets (NASA and non-NASA data) that are of potential interest to the NASA-sponsored research community. The MD contains high-level descriptions of data sets, other data systems and archives, and campaigns and projects. It provides mechanisms for searching for data sets by important criteria such as geophysical parameters, time, and spatial coverage, and provides information on ordering the data. It also provides automatic connections to a number of data systems such as the NASA Climate Data System, the Planetary Data System, the NASA Ocean Data System, the Pilot Land Data System, and others. The MD includes general information about many data systems, data centers, and coordinated data analysis projects, It represents the first major step in the Catalog Interoperability project, whose objective is to enable researchers to quickly and efficiently identify, obtain information about, and get access to space and Earth science data. The guide describes how to access, use, and exit the MD and lists its features

    Gaming LAN setup with Local and Remote Access and Downloads

    Get PDF
    The Gaming LAN Setup project aims to design and implement a basic functioning, hardened network that could be utilized locally and remotely to allow users access to respective servers for the option to host a session or join. Users will have the ability to securely log into the internal network to download files via a web interface. The network allows the designated user to take a management position in order to perform basic penetration testing and discover vulnerabilities through various scans to maintain the networ

    Heterogeneous internetworking model with enhanced routing security and management functions

    Get PDF

    Handbook of solar-terrestrial data systems, version 1

    Get PDF
    The interaction between the solar wind and the earth's magnetic field creates a large magnetic cavity which is termed the magnetosphere. Energy derived from the solar wind is ultimately dissipated by particle acceleration-precipitation and Joule heating in the magnetosphere-ionosphere. The rate of energy dissipation is highly variable, with peak levels during geomagnetic storms and substorms. The degree to which solar wind and magnetospheric conditions control the energy dissipation processes remains one of the major outstanding questions in magnetospheric physics. A conference on Solar Wind-Magnetospheric Coupling was convened to discuss these issues and this handbook is the result

    Web-based relay management with biometric authentication

    Get PDF
    This thesis proposes a web-based system for managing digital relay settings. These relays are deployed in the power system to protect sensitive and expensive equipment from physical damage during system faults and overload conditions. Providing this capability exposes these devices to the same cyber security threats that corporations have faced for many years.;This thesis investigates the risks and requirements for deploying the proposed system. A breakdown in the protection that these relays provide would cause power outages. The cost of outages can be significant. Therefore cyber security is critical in the system design. Cyber security requirements for the power industry identify access control as an important aspect for the protection of its infrastructure. If properly implemented, biometrics can be used to strengthen access control to computer systems.;The web-based relay management system uses fingerprint authentication along with a username and password to provide access control. Website users are given access to functionality based on user roles. Only high level users may attempt relay setting modification. The relay management system interacts with a database that stores the current relay settings, relay setting restrictions, and a queue of relay updates. A process is implemented to verify attempted setting changes against these setting restrictions. This provides an extra security layer if users attempt harmful changes to protection schemes. Valid setting changes are added to the queue and a separate relay update program communicates these changes to the relay. The database and relay update program protect the relays from direct modification. These features combined with biometric authentication provide a strong layered scheme for protecting relays, while supplying an easy to use interface for remotely using their capabilities

    Secure Network Access via LDAP

    Get PDF
    Networks need the ability to be access by secure accounts and users. The goal of this project is to configure and expand on LDAP configurations with considerations for AAA via TACACS+ and Radius for network equipment. This will provide adequate security for any given network in terms of access and prevent lose of access to devices which happens all to often with locally configured accounts on devices

    Fat or thin? Is the verdict in?

    Get PDF
    ABSTRACT Thin client or network computing is a hot topic. The hype claims lower total cost of ownership, faster applications deployment and reduced management pain, compared to traditional computing architectures. Early in 1998 the Flinders University Library installed network computers in the Central and branch libraries for student access to the Internet. This paper is a review of network computers in the light of our experience over the past two years. Do network computers offer all that is claimed in the hype? Are there hidden costs? What are the issues of configuration, server scaling, network performance and fault diagnosis? Do they have a future in the Library arena

    Organizing information on the next generation web - Design and implementation of a new bookmark structure

    Get PDF
    The next-generation Web will increase the need for a highly organized and ever evolving method to store references to Web objects. These requirements could be realized by the development of a new bookmark structure. This paper endeavors to identify the key requirements of such a bookmark, specifically in relation to Web documents, and sets out a suggested design through which these needs may be accomplished. A prototype developed offers such features as the sharing of bookmarks between users and groups of users. Bookmarks for Web documents in this prototype allow more specific information to be stored such as: URL, the document type, the document title, keywords, a summary, user annotations, date added, date last visited and date last modified. Individuals may access the service from anywhere on the Internet, as long as they have a Java-enabled Web browser
    corecore