Filters








3,857 Hits in 7.1 sec

Adding Secure Deletion to Your Favorite File System

N. Joukov, E. Zadok
Third IEEE International Security in Storage Workshop (SISW'05)  
Purgefs can be automatically added to a number of existing and future file systems, including networked and stackable file systems.  ...  We have designed Purgefs: a file system extension that transparently overwrites files on the per-delete basis.  ...  We would like to thank Charles P. Wright for his help with the paper's preparation.  ... 
doi:10.1109/sisw.2005.1 dblp:conf/sisw/JoukovZ05 fatcat:pyqhxhkdrnha7gb3wlwqdfh5sa

PLAN: a web platform for automating high-throughput BLAST searches and for managing and mining results

Ji He, Xinbin Dai, Xuechun Zhao
2007 BMC Bioinformatics  
Full support on system utilization, installation, configuration and customization are provided to academic users.  ...  2) automated high-throughput BLAST searching, (3) indexing and searching of results, (4) filtering results online, (5) managing results of personal interest in favorite categories, (6) automated sequence  ...  Acknowledgements We would like to thank our colleagues at the Noble Foundation, particularly Drs. Francis Kirigwi, Haidi Tu and Jiangqi Wen for their valuable suggestions on the system, and Drs.  ... 
doi:10.1186/1471-2105-8-53 pmid:17291345 pmcid:PMC1800871 fatcat:ajrcqnqqhbe6dkhgk75ibgloae

E-Mail Security and Privacy [chapter]

Stewart Miller
1998 Handbook of Enterprise Operations Management  
Learn more about RSA cryptography at the RSA Security Web site (www .rsasecurity.com).  ...  The attacker gains access to your system and starts deleting things. He deletes data files, program files, even the system files necessary to keep your computer up and running.  ...  You'll see the following choices: Clean Attempts to remove the virus code from the infected file. Delete Completely deletes the infected file from your system.  ... 
doi:10.1201/9781420052169.ch48 fatcat:dr2f2bn4tfhkzkinku62hkn74e

A Practical Approach for Evidence Gathering in Windows Environment

Kaveesh Dashora, Deepak Singh Tomar, J.L. Rana
2010 International Journal of Computer Applications  
Windows is more popular due to the ease in use, and effective GUI; due to the unavailability of windows component source code the crime investigations in windows environment is a tedious and hectic job  ...  In this paper a prototype model is developed and implemented to extract the various sources of evidence in windows environment.  ...  Attacker adds malicious files or deletes/changes/renames the important/critical system files Evidence can be found out at the Windows Security Event Logs and File System/Process Logger Logs.  ... 
doi:10.5120/948-1326 fatcat:q257eaq42fhhneyazscvwcvqtm

The Skeptical Technophile: iPad Review

Jeffrey D. Robinson
2012 Journal of digital imaging  
The iPad Dropbox app gives access to your Dropbox files while online and allows you to select favorite files to save on the iPad for offline access.  ...  However, you cannot save to, delete, or rearrange online Dropbox files from the iPad.  ... 
doi:10.1007/s10278-012-9467-5 pmid:22395796 pmcid:PMC3348982 fatcat:div2ppzzwnakliddupprrmqwhe

How and Why to Keep the NSA Out of Your Private Stuff ? Even If You?ve \"Got Nothing to Hide\" [Opinion]

Katherine Albrecht, Liz McIntyre
2014 IEEE technology & society magazine  
To everyone's relief, our favorite whistleblower confirmed: "Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on."  ...  Set your browser privacy options to reject third-party cookies, block mar- keting cookies, and delete cookies each time you close your browser.  ... 
doi:10.1109/mts.2014.2369571 fatcat:jhmr23brl5dutb3wxxkucrnvjm

Design and Implementation of Tibetan Online Trading System Based on iOS Platform

Mengli Sun, Xiangzhen He, Liang Chen, Na Xu, Yajing Ma
2018 IOP Conference Series: Materials Science and Engineering  
This article aims at to design the online version of the Tibetan trading system for the iOS system and make a basic exposition of the system requirements analysis, basic design and implementation, system  ...  testing and so on, so as to realize the Tibetan users' shopping Function on the iPhone and iPad terminals, so that users get more convenient and efficient shopping experience.  ...  Users can also click here to view the product details. Users can also delete items in my favorites list to add items to the shopping cart.  ... 
doi:10.1088/1757-899x/381/1/012135 fatcat:br5cpisoyre6vh33c7z4mcw5aa

Analysis and Implementation of Distinct Steganographic Methods [article]

Unal Tatar, Tolga Mataracioglu
2011 arXiv   pre-print
Those methods include hiding in text, hiding in audio file, hiding in file system, and hiding in image files.  ...  This property comes with NTFS file systems and is called alternate data streams (ADS).  ...  Figure 9 gives us the commands so as to do this: After adding this site to the Favorites in Internet Explorer, run the first command in Figure 11 , so you can detect ADS's in the relevant directory.  ... 
arXiv:1108.2153v1 fatcat:w2pblhuq6zg4hed7dmp4ruomjm

E-Commerce Online Purchasing Based On Comparison

Alvin Ben Mathew
2016 INTERNATIONAL JOURNAL OF EMERGING TRENDS IN SCIENCE AND TECHNOLOGY  
The system accepts the customer's submission of a purchase order for the item in response to a time of submission being before the order cutoff time.  ...  An online shopping system that permits a customer to submit online orders for items and/or services from a store that serves both walk-in customers and online customers.  ...  For example, you can drag a file to the Recycle Bin to delete the file, or dag a file to a folder to copy o move it to that location.  ... 
doi:10.18535/ijetst/v3i05.21 fatcat:wth2l7btsvf3vpq4s3nxmylybm

Go ahead, visit those web sites, you can't get hurt… can you?

James S. Rothfuss, Jeffrey Parrett
1998 Computer fraud & security  
Of even more concern is a web sites' potential ability to exert control over the local computer.  ...  This paper tries to consolidate some of the current concerns that you should consider as you jump into the surf.  ...  Once you have examined the cookies on your system its simply a matter of deleting the cookie file to remove them (remember you must quit your browser or it will recreate the cookies file from what is currently  ... 
doi:10.1016/s1361-3723(00)87010-4 fatcat:eie7cxezkjhsddhrysggaewpfm

Nuclear Data for Astrophysics Research: A New Online Paradigm

Michael S. Smith
2011 Journal of the Korean Physical Society  
Working online, "cloud computing", may be the methodology breakthrough needed to ensure that the latest nuclear data quickly gets into astrophysics codes.  ...  While new nuclear information is being generated at an ever-increasing rate, the methods to process this information into astrophysical simulations have changed little over the decades and cannot keep  ...  We also added a commenting feature so that Users can comment on datasets in our system.  ... 
doi:10.3938/jkps.59.761 fatcat:ngnam4wi25aq7gic7dpf4ghkge

Application Research of Cloud-based Education Network Platform

Hui Zhou, Hong Zeng, Shigang Qín
2014 TELKOMNIKA Indonesian Journal of Electrical Engineering  
There are mass templates in the "dress space", which can be selected freely according to your own personality, and the module can be added or deleted.  ...  You can add to favorite and classify any articles, videos and pictures, and go to "My Learning Space" to further classify and manage your favorite content, thus making it easy to build and converge on  ... 
doi:10.11591/telkomnika.v12i5.4382 fatcat:6des27k2ebggja5n2rvmmprpxq

SharePoint Administration Guide [chapter]

Matthew Katzer, Don Crawford
2013 Office 365  
Your new document library has been added to your site. Edit Links: Edit the Top link Bar The top link bar is designed for easy access to other parts of your system.  ...  Do not place huge working files that have to be moved to edit (SharePoint is a good place for archiving your larger files). 3.  ... 
doi:10.1007/978-1-4302-6527-6_5 fatcat:yzf37x5icneepm5uwbvjoe7vrm

Americans' attitudes about internet behavioral advertising practices

Aleecia M. McDonald, Lorrie Faith Cranor
2010 Proceedings of the 9th annual ACM workshop on Privacy in the electronic society - WPES '10  
Only 11% say they would pay to avoid ads.  ...  past, but only 39% believe there are currently ads based on email content, and only 9% think it is ok to see ads based on email content as long as their email service is free.  ...  We asked about ads based on content in hosted email, which describes systems in use like Gmail: Imagine you are online and your email provider displays ads to you.  ... 
doi:10.1145/1866919.1866929 dblp:conf/wpes/McDonaldC10 fatcat:4tsh4y34zbdprb7ftzmuz44ray

Polite computing

Brian Whitworth
2005 Behavior and Information Technology  
Politeness is defined, in information terms, as offering the locus of control of a social interaction to another party.  ...  Operating systems could support application politeness by providing an application source registry and a general meta-choice console.  ...  It can separate optional from essential choices, so permission to install may imply hard drive, registry and start menu access, but not desktop, system tray, favorites or file associations access.  ... 
doi:10.1080/01449290512331333700 fatcat:2mpmmtwdm5e25moqexsxbnrlju
« Previous Showing results 1 — 15 out of 3,857 results