1,386 research outputs found

    A Research on Sevvel Murugan’s Courage and Thiruseeralaivaai Origin through Paripadal - Based on the Historical Perspective of Human Civilization

    Get PDF
    Tamil one of the oldest languages ​​in the world. Sangam literatures, the oldest literature available in Tamil, which contains the collection of poems of Eighteen books called Ettuthogai and patthu paattu. Paripaadal was one of the book in Ettuthogai which having poems on Lord Murugan. In Tamilnadu, Lord murugan having six Holy places which called Arupadai veedu. A lot of Tamil literature has sung exclusively about Murugan's Arupadai veedu. Thiru seeralaivaai is one of the holy place of Lord Murugan.  The 5 th poem of the  Paripaadal, explaining the Sevvel Murugan’s courage and Origin of Thiruseeralaivaai. This article explaining the Sevvel Murugan’s courage and Thiruseeralaivaai Origin, Based on the historical perspective of human civilization through the 5th poem of Paripadal

    Patterns and patter - An investigation into SSH activity using Kippo Honeypots

    No full text
    This is an investigation of the activity detected on three honeypots that utilise the Kippo SSH honeypot system on VPS servers all on the same C class address. The systems ran on identical software bases and hardware configurations. The results are over the period 21st March 2013 until Tuesday 04 June 2013. The initial analysis covered in this paper examines behaviours and patterns detected of the attacking entities. The attack patterns were not consistent and there was large disparity in numbers and magnitude of attacks on all hosts. Some of these issues are explored in the paper

    Cervical growth in a young woman: a case report

    Get PDF
    Genital tuberculosis, a silent killer of menstrual function and fertility potential is common in developing countries like India. Cervical TB is extremely rare and it accounts for 0.1-0.65% of all the cases of tuberculosis and 5-24% of all the genital tuberculosis cases. The clinical presentation of genitourinary tuberculosis is variable in nature and it can also be asymptomatic. Here, we are reporting a rare case of cervical tuberculosis clinically masquerading as cervical malignancy presenting with secondary amenorrhoea

    Isolation, identification, synthesis, and bioefficacy of female Diacrisia obliqua (Arctiidae) sex pheromone blend. An Indian agricultural pest

    Get PDF
    Diacrisia obliqua is a polyphagous pest especially on oil seed crops. Adult female sex pheromone blend consists of five pheromone components, which include (3Z,6Z)-cis-9,10-epoxyl,3,6-henicosatriene and (3Z,6Z)-cis-9,10-epoxy3,6-henicosadiene. Synthesis of these enantiomers was achieved through alkylative epoxide rearrangement and stereoselective Wittig olefination reactions as key steps. Bioefficacy experiments both at laboratory and minifield were very positive

    Analysis of adnexal masses requiring reoperation following hysterectomy

    Get PDF
    Background: Generally, we would like to preserve ovaries during hysterectomy for benign conditions. Many of them come back with ovarian cysts and pain abdomen. Recently there were ten cases of residual ovaries requiring surgery during a year period which made us analyze these cases.Methods: This retrospective descriptive analysis was conducted in SRM Medical College Hospital and Research Centre. Data about residual ovaries requiring surgery were retrieved from the medical records department and operation records and analyzed.Results: There were ten cases of residual ovaries from January 2015 to December 2015 requiring surgery. In 70% of patients, residual ovary syndrome occurred within 5 years of hysterectomy. Majority (80%) of them were following abdominal hysterectomy. The most common symptom among these patients was chronic pelvic pain. Pelvic adhesions were present in most of the cases. Follicular cyst and hemorrhagic corpus luteum were the commonest pathological findings in the residual ovaries (50%). There were two cases of endometriotic cyst and a case of secondary malignant ovarian tumor with primary growth from stomach in a 40 year old woman for whom hysterectomy was performed five years ago for adenomyosis.Conclusions: When the ovaries are preserved the woman should be properly counseled and should undergo periodic clinical and ultrasonographic follow-up

    Why penetration testing is a limited use choice for sound cyber security practice

    Get PDF
    Penetration testing of networks is a process that is overused when demonstrating or evaluating the cyber security posture of an organisation. Most penetration testing is not aligned with the actual intent of the testing, but rather is driven by a management directive of wanting to be seen to be addressing the issue of cyber security. The use of penetration testing is commonly a reaction to an adverse audit outcome or as a result of being penetrated in the first place. Penetration testing used in this fashion delivers little or no value to the organisation being tested for a number of reasons. First, a test is only as good as the tools, the tester and the methodology being applied. Second, the results are largely temporal. That is, the test will likely only find known vulnerabilities that exist at one specific point in time and not larger longitudinal flaws with the cyber security of an organisation, one such flaw commonly being governance. Finally, in many cases, one has to question what the point is in breaking the already broken. Penetration testing has its place when used judiciously and as part of an overall review and audit of cyber security. It can be an invaluable tool to assess the ability of a system to survive a sustained attack if properly scoped and deployed. However, it is our assessment and judgement that this rarely occurs

    Canopy uptake dominates nighttime carbonyl sulfide fluxes in a boreal forest

    Get PDF
    Nighttime vegetative uptake of carbonyl sulfide (COS) can exist due to the incomplete closure of stomata and the light independence of the enzyme carbonic anhydrase, which complicates the use of COS as a tracer for gross primary productivity (GPP). In this study we derived nighttime COS fluxes in a boreal forest (the SMEAR II station in Hyytiälä, Finland; 61°51′ N, 24°17′ E; 181 m a.s.l.) from June to November 2015 using two different methods: eddy-covariance (EC) measurements (FCOS-EC) and the radon-tracer method (FCOS-Rn). The total nighttime COS fluxes averaged over the whole measurement period were −6.8 ± 2.2 and −7.9 ± 3.8 pmol m−2 s−1 for FCOS-Rn and FCOS-EC, respectively, which is 33–38 % of the average daytime fluxes and 21 % of the total daily COS uptake. The correlation of 222Rn (of which the source is the soil) with COS (average R2  =  0.58) was lower than with CO2 (0.70), suggesting that the main sink of COS is not located at the ground. These observations are supported by soil chamber measurements that show that soil contributes to only 34–40 % of the total nighttime COS uptake. We found a decrease in COS uptake with decreasing nighttime stomatal conductance and increasing vapor-pressure deficit and air temperature, driven by stomatal closure in response to a warm and dry period in August. We also discuss the effect that canopy layer mixing can have on the radon-tracer method and the sensitivity of (FCOS-EC) to atmospheric turbulence. Our results suggest that the nighttime uptake of COS is mainly driven by the tree foliage and is significant in a boreal forest, such that it needs to be taken into account when using COS as a tracer for GPP

    Exchanging demands: Weaknesses in SSL implementations for mobile platforms

    Get PDF
    The ActiveSync protocol’s implementation on some embedded devices leaves clients vulnerable to unauthorised remote policy enforcement. This paper discusses a proof of concept attack against the implementation of ActiveSync in common Smart phones including Android devices and iOS devices. A two‐phase approach to exploiting the ActiveSync protocol is introduced. Phase 1 details the usage of a man‐in‐the‐middle attack to gain a vantage point over the client device, whilst Phase 2 involves spoofing the server‐side ActiveSync responses to initiate the unauthorised policy enforcement. These vulnerabilities are demonstrated by experiment, highlighting how the system can be exploited to perform a remote factory reset upon an Exchange‐integrated Smart phone
    corecore