14,235 research outputs found

    Forensic Memory Analysis for Apple OS X

    Get PDF
    Analysis of raw memory dumps has become a critical capability in digital forensics because it gives insight into the state of a system that cannot be fully represented through traditional disk analysis. Interest in memory forensics has grown steadily in recent years, with a focus on the Microsoft Windows operating systems. However, similar capabilities for Linux and Apple OS X have lagged by comparison. The volafox open source project has begun work on structured memory analysis for OS X. The tool currently supports a limited set of kernel structures to parse hardware information, system build number, process listing, loaded kernel modules, syscall table, and socket connections. This research addresses one memory analysis deficiency on OS X by introducing a new volafox module for parsing file handles. When open files are mapped to a process, an examiner can learn which resources the process is accessing on disk. This listing is useful for determining what information may have been the target for exfilitration or modification on a compromised system. Comparing output of the developed module and the UNIX lsof (list open files) command on two version of OS X and two kernel architectures validates the methodology used to extract file handle information

    The Ultimate Reunion

    Get PDF

    Model For The Dynamics Of A Bubble Undergoing Small Shape Oscillations Between Elastic Layers

    Get PDF
    A model is presented for a pulsating and translating gas bubble in a channel formed by two soft elastic parallel layers. The bubble is free to undergo small shape deformations. Coupled nonlinear second-order differential equations are obtained for the shape and position of the bubble, and numerical integration of an expression for the liquid velocity at the layer interfaces yields an estimate of their displacement. Simulations reveal behavior consistent with laboratory observations.Applied Research Laboratorie

    Anti-Trust and Economic Theory: Some Observations from the US Experience

    Get PDF
    Recent developments in US anti-trust can be characterised as reflecting the uneasy interaction of two quite separate phenomena: first, the increased emphasis on economic analysis as the overriding organising principle of anti-trust policy and on economic efficiency as the primary (perhaps only) relevant goal for anti-trust; second, the long-standing reluctance of the federal judiciary to involve itself in any substantive economic analysis, and the preference, instead, for simple rules of thumb or ‘pigeon holes’ to sort out lawful from unlawful conduct. The result has been that while economics has played a major role, it has not influenced American anti-trust as thoroughly or as uniformly as might have been imagined; rather the extent and the nature of its influence have depended on the degree to which the relevant economics could be reduced to the kind of simple rules or pigeon holes that the judiciary favours. The present paper will illustrate that theme, first by reporting on the two developments separately and then by illustrating their joint influence with reference to two important areas of American anti-trust: predatory conduct and so-called vertical restraints. Finally, a contrast will be made between judicial development in those two areas and recent American merger policy which, it is argued, is carried out largely independently of the judiciary, and hence the opportunities for economics to influence the process are less inhibited by the judicial reluctance to undertake extensive economic analysis

    Predatory Pricing: Competing Economic Theories and the Evolution of Legal Standards

    Get PDF
    Recent years have witnessed a virtual explosion in the legal and economic literature dealing with predatory pricing. Equally dramatic has been the swift adoption by several courts of policy conclusions derived from this literature—a development that is startling, given the complexity and volume of the literature and the lack of consensus among legal and economic scholars. The result has been to raise an acute problem for lawyers and judges who must assess the validity and applicability of competing economic models, mold stubborn and unruly facts to fit abstract economic theories, translate economic theories into legal doctrines, and resolve puzzling cost accounting issues. The predatory pricing development also raises more fundamental questions. An emerging but unsettled economic theory has rapidly and pervasively transformed an entire body of law, and within the briefest period of time. The predatory pricing experience contains important lessons for the careful observer on the uses of economic theory in the formation of legal policy. This Article attempts to cut a path through the maze of literature and theories concerning predatory pricing. Both practical and theoretical considerations animate this study. On the practical level, the Article examines the application of the differing economic theories of predatory pricing, enabling the reader to utilize them in legal analysis and argumentation and to critically assess future developments. On the more theoretical level, the discussion of the predatory pricing development provides a vivid case study of the issues that confront courts when they attempt to base legal policy on unsettled economic theory. Part I examines the predatory pricing development in terms of economic theory, viewing that theory as objectively as possible. Part II explores the meaning of the differing theories of predation in pragmatic application to specific facts in judicial proceedings, followed by a more general discussion in Part III of the issues that confront courts when they use emerging economic theories as the foundation for legal policy

    Acquiring OS X File Handles through Forensic Memory Analysis

    Get PDF
    Memory analysis has become a critical capability in digital forensics because it provides insight into system state that cannot be fully represented through traditional media analysis. The volafox open source project has begun the work of structured memory analysis for OS X with support for a limited set of kernel structures. This paper addresses one memory analysis deficiency on OS X with the introduction of a new volafox module for parsing file handles associated with running processes. The developed module outputs information comparable to the UNIX lsof (list open files) command, which is used to validate the results

    Frequency and risk factors for incident and redetected Chlamydia trachomatis infection in sexually active, young, multi-ethnic women: a community based cohort study.

    Get PDF
    OBJECTIVE: To investigate the frequency and risk factors for incident and redetected Chlamydia trachomatis infection in sexually active, young, multi-ethnic women in the community. DESIGN: Cohort study. SETTING: 20 London universities and Further Education colleges. PARTICIPANTS: 954 sexually experienced women, mean age 21.5 years (range 16-27), 26% from ethnic minorities, who were recruited to the Prevention of Pelvic Infection (POPI) chlamydia screening trial between 2004 and 2006, and returned repeat postal self-taken vaginal swabs 11-32 (median 16) months after recruitment. RESULTS: The estimated annual incidence of chlamydia infection among 907 women who tested negative at baseline was 3.4 per 100 person-years (95% CI 2.5 to 4.6 per 100 person-years), but 6.6 per 100 person-years (95% CI 4.5 to 9.3 per 100 person-years) in the 326 teenagers (<20 years). Predictors of incident chlamydia infection were age <20 years (relative risk (RR) 4.0, 95% CI 2.1 to 7.5), and (after adjusting for age) a new sexual partner during 12 months follow-up (RR 4.4, 95% CI 2.0 to 9.9), smoking (RR 2.2 95% CI 1.2 to 3.9), concurrent bacterial vaginosis (RR 2.0 95% CI 1.1 to 3.9) and high risk carcinogenic human papillomavirus (RR 2.2, 95% CI 1.1 to 4.3). Of 47 women positive for chlamydia at baseline, 12 (25.5%, 95% CI 13.9% to 40.3%) had redetected infection at a median of 16 months follow-up. Taking into account follow-up time (65 person-years), the annual redetection rate was 18.5 per 100 person-years (95% CI 9.9 to 30.0 per 100 person-years). CONCLUSIONS: One in four women with chlamydia infection at baseline retested positive, supporting recent recommendations to routinely retest chlamydia positives

    The N-end rule pathway controls multiple functions during Arabidopsis shoot and leaf development

    Get PDF
    The ubiquitin-dependent N-end rule pathway relates the in vivo half-life of a protein to the identity of its N-terminal residue. This proteolytic system is present in all organisms examined and has been shown to have a multitude of functions in animals and fungi. In plants, however, the functional understanding of the N-end rule pathway is only beginning. The N-end rule has a hierarchic structure. Destabilizing activity of N-terminal Asp, Glu, and (oxidized) Cys requires their conjugation to Arg by an arginyl–tRNA–protein transferase (R-transferase). The resulting N-terminal Arg is recognized by the pathway's E3 ubiquitin ligases, called “N-recognins.” Here, we show that the Arabidopsis R-transferases AtATE1 and AtATE2 regulate various aspects of leaf and shoot development. We also show that the previously identified N-recognin PROTEOLYSIS6 (PRT6) mediates these R-transferase-dependent activities. We further demonstrate that the arginylation branch of the N-end rule pathway plays a role in repressing the meristem-promoting BREVIPEDICELLUS (BP) gene in developing leaves. BP expression is known to be excluded from Arabidopsis leaves by the activities of the ASYMMETRIC LEAVES1 (AS1) transcription factor complex and the phytohormone auxin. Our results suggest that AtATE1 and AtATE2 act redundantly with AS1, but independently of auxin, in the control of leaf development

    Predatory Pricing: Competing Economic Theories and the Evolution of Legal Standards

    Get PDF
    corecore