id
stringlengths
1
6
revid
stringlengths
2
7
url
stringlengths
37
42
title
stringlengths
2
252
text
stringlengths
140
1.28M
299926
4364610
https://en.wikibooks.org/wiki?curid=299926
A-level Computing 2009/AQA/Problem Solving, Programming, Operating Systems, Databases and Networking/Problem Solving/Reverse Polish Notation
Reverse Polish notation (otherwise known as post-fix, RPN for short) is a way of representing mathematical equations. The notation is used because the format that the equation is in is easier for machines to interpret rather than the notation we are used to, infix notation, where the operator is in between the numbers. The equation can be complex or simple. RPN doesnt require brackets as the equations are layed out in such a format that it isn't required for machines to understand. The name RPN is named after Jan Łukasiewicz, a Polish logician who invented Polish notation (prefix notation) some time in the 1920s. Reverse Polish Notation. Reverse polish notation should be ordered like this: <FirstNumber> <SecondNumber> <Operation> Rather than the normal convention(infix) of: <FirstNumber> <Operation> <SecondNumber> Examples. YouTube Video Example. A video example can be seen here from Computerphile on Youtube: https://www.youtube.com/watch?v=7ha78yWRDlE
299953
75960
https://en.wikibooks.org/wiki?curid=299953
GLPK/Go
Go is an open source programming language. A Go language binding for GLPK has been published at https://github.com/lukpank/go-glpk. According to the author the binding is not yet complete but covers a useful part of the API .
299965
46022
https://en.wikibooks.org/wiki?curid=299965
Trainz/Content Manager Tips
Introduction. Running Content Manager can sometimes be frustrating given the kludgy nature of the user interface. The worst problems occur after downloading a route which suddenly bequeaths a variety of faulty content items, with some of that missing other dependencies, and so instead of playing, you have to track what is going on. Perhaps you do as I do and keep a log file or spreadsheet of downloads. Adding kuids to a list. Adding kuids to a Search list you want to keep static requires a trick--a double use of a kuid list.
299969
4206864
https://en.wikibooks.org/wiki?curid=299969
Structured Query Language/NULLs and the Three Valued Logic
The Problem. As mentioned in a of this wikibook and in wikipedia sometimes there is no value in a column of a row, or - to say it the other way round - the column stores the "NULL marker" (a flag to indicate the absence of any data), or - to use the notion of the SQL standard - the column stores the "NULL value". This NULL marker is very different from the numeric value zero or a string with a length of zero characters! Typically it occurs when an application yet hasn't stored anything in the column of this row. The existence of the NULL marker introduces a new fundamental problem. In the usual boolean logic, there are the two logical values TRUE and FALSE. Every comparison evaluates to one of the two - and the comparisons negation evaluates to the opposite one. If a comparison evaluates to TRUE, its negation evaluates to FALSE and vice versa. As an example, in the usual boolean logic, one of the following two comparisons is TRUE, and the other one is FALSE: 'x < 5', 'x >= 5'. Imagine now the new situation that x holds the NULL marker. It is not feasible that 'NULL < 5' is true (1). But can we say 'NULL < 5' is false (2) and its negation 'NULL >= 5' is true (3)? Is (3) more feasible than (1)? Of course not. (1) and (3) have the same 'degree of truth', so they shall evaluate to the same value. And this value must be different from TRUE and FALSE. Therefore the usual boolean logic is extended by a third logic value. It is named UNKNOWN. All comparisons to the NULL marker results per definition in this new value. And the well-known statement 'if a statement is true, its negation is false' gets lost because there is a third option. SQL's logic is an implementation of this so-called trivalent, ternary or three-valued logic (3VL). The existence of the NULL marker in SQL is not without controversy. But if NULLs are accepted, the 3VL is a necessity. This page proceeds in two stages: First, it explains the handling of NULLs concerning comparisons, grouping, etc. . Second, it explains the boolean logic for the cases where the new value UNKNOWN interacts with any other boolean value - including itself. Example Table. To demonstrate NULL behaviors, we define an example tables: t1, and t2. CREATE TABLE t1 ( id DECIMAL PRIMARY KEY, col_1 DECIMAL, col_2 VARCHAR(20), col_3 DECIMAL INSERT INTO t1 VALUES (1, 1, 'Hello World', 1); INSERT INTO t1 VALUES (2, 2, NULL, 2); INSERT INTO t1 VALUES (3, 3, 'Hello World', NULL); INSERT INTO t1 VALUES (4, 4, 'Hello World', NULL); INSERT INTO t1 VALUES (5, 5, 'Hello Their', NULL); INSERT INTO t1 VALUES (6, NULL, 'Hello World', NULL); INSERT INTO t1 VALUES (7, NULL, 'Hello World', NULL); INSERT INTO t1 VALUES (8, 8, 'Hello World', NULL); INSERT INTO t1 VALUES (18, 18, 'Hello World', NULL); CREATE TABLE t2 ( id DECIMAL PRIMARY KEY, col_x DECIMAL INSERT INTO t2 VALUES (1, 1); INSERT INTO t2 VALUES (2, NULL); INSERT INTO t2 VALUES (3, 3); INSERT INTO t2 VALUES (4, 4); INSERT INTO t2 VALUES (5, 5); INSERT INTO t2 VALUES (18, 18); COMMIT; Step 1: Evaluation of NULLs. Comparison Predicates, IS NULL Predicate. SQL knows the six comparison predicates <, <=, =, >=, > and <> (unequal). Their main purpose is the arithmetic comparison of numeric values. Each of them needs two variables or constants (infix notation). This implies that it is possible that one or even both operands hold the NULL marker. As stated before, the common and very simple rule is: "All comparisons to the NULL marker results per definition in this new value (unknown).". Here are some examples: * NULL = 5 evaluates to UNKNOWN. * 5 = NULL evaluates to UNKNOWN. * NULL <= 5 evaluates to UNKNOWN. * col_1 = 5 evaluates to UNKNOWN for rows where col_1 holds the NULL marker. * col_1 = col_2 evaluates to UNKNOWN for rows where col_1 or col_2 holds the NULL marker. * NULL = NULL evaluates to UNKNOWN. * col_1 = col_2 evaluates to UNKNOWN for rows where col_1 and col_2 holds the NULL marker. The WHERE clause returns such rows where it evaluates to TRUE. It does not return rows where it evaluates to FALSE or to UNKNOWN. In consequence, it is not guaranteed that the following SELECT will return the complete table "t1": -- This SELECT will not return such rows where col_1 holds the NULL marker. SELECT * FROM t1 WHERE col_1 > 5 OR col_1 = 5 OR col_1 < 5; Of course, there are use cases where rows with the NULL marker must be retrieved. Because the arithmetic comparisons are not able to do so, another language construct must do the job. It is the "IS NULL predicate". -- This SELECT will return exactly these rows where col_1 holds the NULL marker. SELECT * FROM t1 WHERE col_1 IS NULL; Other Predicates. For the other predicates, there is no simple rule of thumb. They must be explained one after the other. The IN predicate is a shortcut for a sequence of OR operations: Only the two comparisons 'col_1 = 3' and 'col_1 = 18' are able to retrieve rows (possibly many rows). The comparison 'col_1 = NULL' will never evaluate to TRUE. It's always UNKNOWN, even if col_1 holds the NULL marker. To retrieve those rows, it's necessary - as shown above - to use the 'IS NULL' predicate. -- Shortcut for: col_1 = 3 OR col_1 = 18 OR col_1 = NULL SELECT * FROM t1 WHERE col_1 IN (3, 18, NULL); -- the NULL case will never hit with the IN predicate! This is a little more complex. This will only return 1, 3, and 4, the items that don't have NULL in t2.col_x or t1.col_1. SELECT * FROM t1 WHERE col_1 IN (SELECT col_x FROM t2 WHERE id < 10); The subselect of an EXISTS predicate evaluates to TRUE if the cardinality of the retrieved rows is greater than 0, and to FALSE if the cardinality is 0. It is not possible that the UNKNOWN value occurs. -- The subselect to t2 can hit some rows - or not. If there are hits in the subselect, ALL rows of t1 -- are returned, else no rows of t1 are returned. SELECT * -- The select to table t1 FROM t1 WHERE EXISTS (SELECT * FROM t2 WHERE id < 10); -- The subselect to table t2 The LIKE predicate compares a column with a regular expression. If the column contains the NULL marker, the LIKE predicate returns the UNKNOWN value, which means that the row is not retrieved. -- The LIKE retrieves only rows where col_2 matches the WHERE statement and col_2 is not NULL. SELECT * FROM t1 WHERE col_2 LIKE 'Hello %'; Predefined Functions. The <code>COUNT(<column_name>), MIN(<column_name>), MAX(<column_name>), SUM(<column_name>)</code> and <code>AVG(<column_name>)</code> ignores such rows where <column_name> contains the NULL marker. On the other hand <code>COUNT(*)</code> includes all rows. If a parameter of one of the like <code>UPPER, TRIM, CONCAT, ABS, SQRT, ...</code> contains the NULL marker the resulting value is - in the most cases - the NULL marker. Grouping. There are some situations where column values are compared to each other to answer the question, whether they are distinct. For usual numbers and strings, the result of such decisions is obvious. But how shall the DBMS handle NULL markers? Are they distinct from each other, are they equal to each other or is there no answer to this question at all? To get results, which are expected by (nearly) every end-user, the standard defines "Two null values are not distinct.", they build a single group. <code>SELECT DISTINCT col_1 FROM t1;</code> retrieves one and only row for all rows where "col_1" holds the NULL marker. <code>... GROUP BY col_1 ...;</code> builds one and only one group for all rows where "col_1" holds the NULL marker. Step 2: Boolean Operations within three-valued logic (3VL). After we have seen how various comparisons and predicates on the NULL marker produce TRUE, FALSE, and UNKNOWN, it's necessary to explain the rules for the new logic value UNKNOWN. Inspection. A first elementary operation is the inspection of a truth value: is it TRUE, FALSE or UNKNOWN? Analogous to the "IS NULL predicate" there are three additional predicates: * IS [NOT] TRUE * IS [NOT] FALSE * IS [NOT] UNKNOWN -- Check for 'UNKNOWN' SELECT * FROM t1 WHERE (col_1 = col_3) IS UNKNOWN; -- parenthesis are not necessary -- ... is semantically equivalent to SELECT * FROM t1 WHERE col_1 IS NULL OR col_3 IS NULL; In the abstract syntax of logical systems "p" shall represent any of its truth values. Here is the three-valued logic truth table: All predicates lead to TRUE or FALSE and never to UNKNOWN. NOT. The next operation is the negation of the new value. Which values evaluate to 'NOT UNKNOWN'? The UNKNOWN value represents the impossibility to decide between TRUE and FALSE. It is not feasible that the negation of this impossibility leads to TRUE or FALSE. Likewise, it is UNKNOWN. -- Which rows will match? (1) SELECT * FROM t1 WHERE NOT col_2 = NULL; -- 'col_2 = NULL' evaluates to UNKNOWN in all cases, see above. -- Is this SELECT equivalent to the first one? (2) SELECT * FROM t1 EXCEPT SELECT * FROM t1 WHERE col_2 = NULL; -- No, it's different!! Independent from NULL markers in col_2, (1) retrieves -- absolutely NO row and (2) retrieves ALL rows. The above SELECT (1) will retrieve no rows as 'NOT col_2 = NULL' evaluates to the same as 'col_2 = NULL', namely UNKNOWN. And the SELECT (2) will retrieve all rows, as the part after EXCEPT will retrieve no rows, hence only the part before EXCEPT is relevant. In the abstract syntax of logical systems "p" shall represent any of its truth values and NOT "p" its negation. Herein the following table applies: AND, OR. There are the two binary operations AND and OR. They evaluate as follows: The precedence of the operations is defined as usual: IS predicate, NOT, AND, OR. Some Examples. -- Add a new row to the test data base INSERT INTO person (id, firstname, lastname) -- Omit some columns to generate NULL markers VALUES (99, 'Tommy', 'Test'); COMMIT; SELECT * FROM person -- focus all tests to the new row WHERE id = 99 -- (1): TRUE AND -- (3): (1) AND (2) ==> TRUE AND UNKNOWN ==> UNKNOWN date_of_birth = NULL -- (2): UNKNOWN ); -- no hit SELECT * FROM person WHERE id = 99 -- (1): TRUE AND -- (3): (1) AND (2) ==> TRUE AND TRUE ==> TRUE date_of_birth IS NULL -- (2): TRUE ); -- hit SELECT * FROM person WHERE id = 99 -- (1): TRUE OR -- (3): (1) OR (2) ==> TRUE OR UNKNOWN ==> TRUE date_of_birth = NULL -- (2): UNKNOWN ); -- hit SELECT * FROM person WHERE id = 99 -- (1): TRUE AND -- (4): (1) AND (3) ==> TRUE AND FALSE ==> FALSE NOT -- (3): NOT (2) ==> NOT TRUE ==> FALSE date_of_birth IS NULL -- (2): TRUE ); -- no hit (same as AND date_of_birth IS NOT NULL) -- Clean up the test database DELETE FROM person WHERE id = 99; DROP TABLE IF EXISTS t1, t2; COMMIT;
299997
480036
https://en.wikibooks.org/wiki?curid=299997
Biomedical Engineering Theory And Practice/Neuro engineering
See also Wikipedia, Neural Engineering. Neuroengineering is a discipline within biomedical engineering that uses engineering techniques to understand, repair, replace, or enhance neural systems. Overview and History of Neuroengineering. Definition and Basic Principle. Neural Engineering is the highly interdisciplinary field of neuroscience, electrical engineering, clinical neurology, materials science, nanotechnology computer engineering and so on. Prominent goals in the field is to better understand and to mimic the functioning and dysfunctioning of the nervous system and to engineer appropriate augmentation and/or substitution for dysfunctioning parts of the nervous system. Neural Engineering combines a broad range of engineering and basic science principles together with an wide range of biological and medical sciences. It connects basic and applied engineering and science R&D with basic and applied neuroscience. Background and History. Electricity (in the form of electric fish) was used by ancient Egyptians and Romans for therapeutic purposes. During the 1790s, Italian physician Luigi Galvani demonstrated the electrical basis of nerve impulses when he made frog muscles twitch by jolting them with a spark from an electrostatic machine. Scientific fellows generally accepted Galvani’s views; but Alessandro Volta demonstrated that the electricity did not come from the animal tissue but was by the contact of different metals, brass and iron, in a moist environment. On the other hand, in another experiment, Galvani caused muscular contraction by touching the exposed muscle of one frog with the nerve of another. And he proved for the first time that bioelectric forces exist within living tissue. Guillaume Duchenne (September 17, 1806, in Boulogne-sur-Mer – September 15, 1875, in Paris) revived Galvani's research. He was the first to describe several nervous and muscular disorders and, in advancing medical treatment for them, created electrodiagnosis and electrotherapy. In the mid-twentieth century, electrical recordings became popular as a window into neuronal function Electrical Stimulation of Central Nervous System. The different distribution of charges between the interior and the exterior of plasma membrane produce membrane potential (also transmembrane potential or membrane voltage). Two forces that establish and maintain resting membrane potential are passive (diffusion via channels) and active (sodium-potassium pump). With respect to the cytoplasmic side of neuron's membrane, typical values of the resting potential range from –70 to –80 millivolts. Like muscles, neurons use changes in their membrane potential as communication signals to receive, integrate, and send information. The difference in membrane potential can be produced by the permeability of the ions and the ion concentration on the two sides of the membrane. The opening and closing of ion channels can evoke a departure from the resting potential. This is called a hyperpolarization if the interior voltage becomes more negative (say from –70 mV to –80 mV) or depolarization if the interior voltage becomes less negative (say from –70 mV to –60 mV). In excitable cells, a clearly large depolarization can cause an action potential (long distance signals). But, the ion concentrations do not normally change very quickly. Therefore, graded potentials result from the passive electrical property of the neuronal membrane. Action Potential. There are cell-to-cell communication with excitable membranes. They do not decrease in strength with distance and are referred to as "nerve impulse" or "spikes". The temporal sequence of action potentials generated by a neuron is called its "spike train". Stimulus changes permeability of neuron's membrane by opening specific voltage-regulated gated channels located on axons. Axons only could generate action potentials. Generation of Action Potential (induced by depolarization) follows three sequential changes: 1.Sodium permeability increases and the membrane potential is on the contrary. 2.Sodium permeability decreases. 3.Potassium permeability increases and repolarization happens. Graded Potential. Voltage impulses in neuronal dendrites with various strength. Stimulation (by another neuron or as a special receptor) of the dendrites in a neuron produce a graded potential. Stimulation can occur in various ways like chemical stimulation (neurotransmitters, etc.), mechanical stimulation (certain pain receptors, hair receptor, etc.), light stimulation (photoreceptors) and a few others. Anyways, these stimulation bring the same result. Certain receptor protein ion channels on the dendrites are activated, and opened. This causes an influx (or efflux) of ions. It can cause either a depolarization (become less negative,-70 to -60mV,an excitatory response that may lead to an action potential) or hyperpolarization (become more negative, -70 to -80mV, an inhibitory response which makes it harder for an action potential to occur) according to the ion let in (or out). The more receptor protein ion channels that are stimulated the stronger, or more intense the signal. A slight stimulation of a receptor protein ion channel will often open the channel and accept ions. However, a depolarization of threshold strength to reach the axon hillock, it generally needs multiple depolarizing receptor protein ion channels to open. Therefore, graded potentials are accumulated. The total polarizing effect of the ion channels adds together.One channel cannot stimulate an action potential, It takes multiple channels working together to depolarize a membrane enough to cause and action potential. Graded potentials (or receptor potentials) are short lived depolarizations or hyperpolarizations of an area of membrane. These changes cause local flows of current that decrease with distance. The graded potential is proportional to a direct reflection of the intensity or strength of the stimulus. The more intense the stimulus, the more ion channels that are opened, and the greater the voltage change (hyper or de- polarization) and the farther the current flows. Stimulated polarization happens as ions rush in. These ions accumulate near to the stimulated area. From there the surplus of ions radiates out in all directions, polarizing adjoining membranes. As this polarization spreads like a wave it leaves behind it a wake of formerly polarized membrane that very quickly returns to resting membrane potential. Transmission at Synapses. Like wires in our home's electrical system, nerve cells are connected to one another in circuits called neural pathways. Unlike wires in our home, nerve cells do not touch, but come close together at synapses. At the synapse, the two nerve cells are separated by synaptic cleft. The sending neuron is called the presynaptic cell, while the receiving one is called the postsynaptic cell. Nerve cells send chemical messages with neurotransmitters in a one-way direction through the synapse from presynaptic cell to postsynaptic cell. The transmission process at synapses that uses the neurotransmitter is follows: Synthesis and storage of neurotransmitter. Neurotransmitter synthesized in neurons are divided into two major categories: small-molecule neurotransmitter and neuropeptide. Small-molecule neurotransmitters are synthesized within the axon terminal(e.g.acetylcholine (ACh)). Some of the precursors for the synthesis of these molecules are taken up by selective transporters on the membrane of the terminal. Others are byproducts of cellular processes within the neuron and are thus readily available. Neuropeptide are different from small-molecule neurotransmitters in both size and in the way of the synthesis. Neuropeptides generally range from 3 to 36 amino acids in length. So, they are larger than small-molecule neurotransmitters. Small neurotansmitters are made within the axon terminal as they need the simple enzymatic reactions but neuropeptides are made in the cell body as their synthesis requires peptide bond formation.The synthesis of a neuropeptide is similar to the process of any secretory protein within the cell. First, within the cell nucleus, during which a specific peptide-coding sequence of DNA,gene transcription takes place and It is used as a template to build a corresponding strand of messenger RNA. The mRNA then travels to a ribosome, where the process of translation begins. During translation, the sequence of the mRNA act as a code to string together a corresponding sequence of amino acids that will become the neuropeptide needed at the terminal. Before this molecule can be transported to the terminal for release into the synaptic cleft, it must be processed in the endoplasmic reticulum (ER), packaged in the golgi apparatus, and transported in storage vesicles down the axon to the terminal. Once they are synthesized, neurotransmitters, both small molecules and neuropeptides, are stored in vesicles within the axon terminal until an action potential arrives and they are released. Most small-molecule neurotransmitters are stored in small vesicles in the range of 40~60 nm in diameter.The vesicles that store neuropeptides are larger, ranging from 90 to 250 nm in diameter. Neurotransmitter Release. Neurotransmitter-including vesicles are stored at the terminal of the neuron in active zone or near active zone. These vesicles are held in place by Ca2+-sensitive vesicle membrane proteins binding to actin filaments, microtubules, and various components of the cytoskeleton. When an action potential reaches the terminal of a presynaptic neuron, voltage-dependent calcium (Ca2+) channels in the pre-synaptic membrane open and Ca2+ rushes in. This influx of calcium ions triggers a series of events, which eventually release the neurotransmitter from a storage vesicle into the synaptic cleft. Neurotransmitter Postsynaptic Receptors. After release into the synaptic cleft, neurotransmitters communicate with receptor proteins on the membrane of the postsynaptic cell, causing ionic channels on the membrane to open or close. When these channels open, depolarization occurs, involving the initiation of another action potential. There are two types of postsynaptic receptors that recognize neurotransmitters: Ionotropic receptors called ligand-gated ion channels and metabotropic receptors called G-protein linked receptors. Inactivation of Neurotransmitters. After the recognition of a neurotransmitter molecule by a post-synaptic receptor, it is released back into the synaptic cleft. Once in the synapse, it must be chemically inactivated or quickly removed in order to avoid constant stimulation of the post-synaptic cell and an excessive firing of action potentials. Neurotransmitter. Neurotransmitters are the brain chemicals that communicate information throughout our brain and body. Communication of information between neurons is done by movement of neurotransmitter across a small gap called the synapse. Neurotransmitters are released from one neuron at the presynaptic nerve terminal. Neurotransmitter agents include agonists, antagonists, degradation inhibitors, uptake inhibitors, depleters, precursors, and modulators of receptor function. Neurotransmitters can be divided into amino acids, peptides, and monoamines. Table: Selected neurotransmitter and function How it works. Neuromodulation and Neuroaugmentation. Neuromodulation is defined as “the alteration of nerve activity through the delivery of electrical stimulation or chemical agents to targeted sites of the body,”by the International Neuromodulation Society. It is carried out to normalize – or modulate – nerve function. Neuromodulation is the process in which diverse neurotransmitters in the nervous system control various populations of neurons (one neuron uses different neurotransmitters to connect to several neurons). Neuromodulation can involve electromagnetic stimuli such as a strong magnetic field repetitive transcranial magnetic stimulation, a very small electric current or, potentially, light optogenetics.Neuromodulation use medical device technologies to enhance or suppress activity of the nervous system for the treatment of disease. These technologies contain implantable as well as non-implantable devices that deliver electrical, chemical or other agents to reversibly modify brain and nerve cell activity. Neuromuscular Electrical Stimulation(NMES). Neuromuscular electrical stimulation can be widely categorized as functional or therapeutic. Therapeutic neuromuscular stimulation refers to the use of stimulation of paralyzed muscles to minimize specific impairments like motor weakness, spasticity, limited range of motion and cardiovascular deconditioning. Functional neuromuscular stimulation(FNS) refers to the use of stimulation to activate paralyzed muscles at an exact sequence to assist in the performance of daily lives(ADLs) or to provide stability to a joint to maintain original biomechanical property and the function. Devices or systems that provide FNS are called as neuroprosthetics. Neuroregeneration. Neuroregeneration indicates to the regrowth or repair of nervous tissues, cells or cell products. The processes that occur in regeneration can be divided into the following major events: Wallerian degeneration, axon regeneration/growth, and nerve reinnervation. In other views, neuroregneration contains neurogenesis, neuroplasticity, and neurorestoration--implantation of viable cells as a therapeutical approach. Neuroregeneration mechanisms are very different between the peripheral nervous system (PNS) and the central nervous system (CNS) in view of the extents and the speeds. Peripheral nervous system regeneration. Peripheral nerve damage is classified in the Seddon classification based on the extent of damage to the nerve and the surrounding connective tissue.The lowest degree of nerve injury with a temporary interruption of conduction without loss of axonal continuity is called neurapraxia. The second degree called axonotmesis is related to the loss of the relative continuity of the axon and its covering of myelin, but it preserves the connective tissue framework of the nerve (the encapsulating tissue, the epineurium and perineurium, are preserved).. The last degree called neurotmesis is a total severance or disruption of the entire nerve fiber. Unlike in the central nervous system, regeneration in the peripheral nervous system is possible. Wallerian degeneration occurs before nerve regeneration. During Wallerian degeneration Schwann cells and macrophages interact to remove specially myelin and the damaged axon, from the distal injury site. Bands of Büngner are formed when un-innervated Schwann cells proliferate and the remaining connective tissue basement membrane forms endoneurial tubes. Bands of Büngner are important in order to guide the regrowing axon. At the neuronal cell body, a chromatolysis occurs in which the nucleus moves to the periphery of the cell body and the endoplasmic reticulum breaks up and disperses. Nerve damage change the metabolic function of the cell. The cell tries to produce molecules for growth and repair instead of producing molecules for synaptic transmission. These factors contains GAP-43, tubulin and actin. When the cell is ready for axon regeneration, chromatolysis is reversed. Axon regeneration is characterized by the formation of a growth cone. The growth cones are located on the very tips of nerve cells on structures called axons and dendrites. They include bundles of actin filaments (F-actin) that give them shape and support. The growth cone interacts with molecules produced by Schwann cells such as laminin and fibronectin. Central nervous system regeneration. Unlike peripheral nervous system regeneration, that of the central nervous system is not followed by extensive regeneration. It is limited by the inhibitory influences of the glial and extracellular environment. Regeneration in the central nervous system (CNS) would be possible that new neurons, generated from proliferation of endogenous stem/progenitor cells or under administration of exogenous stem/precursor cells with potential to substitute for lost tissue, will differentiate, survive, and integrate into existing neural networks and that axons regenerate. Since several studies have reported about the existence of adult neural stem cells, the concepts of neuroplasticity and neural stem cells based on neural tissue engineering led to the idea of neurorestoration as an substutive therapy for neurodegenerative disorders in CNS . Research and Application. Neural Imaging. Neuroimaging contains a variety of techniques to directly or indirectly image of the structure, function/pharmacology of thenervous system. It is a relatively new fields within medicine, neuroscience and psychology. Physicians who specialize in the performance and interpretation of neuroimaging in the clinical setting are neuroradiologists. Neuroimaging is classified into two categories: Neural Networks. See also Artificial neural network A Neural Networks(An Artificial Neural Network:ANN) is an information processing paradigm that is inspired by animals central nervous systems, such as the brain, process information. The key element of this paradigm is the novel structure of the information processing system. It is composed of a large number of highly interconnected neurons which can compute values from inputs. The first artificial neuron was developed in 1943 by the neurophysiologist Warren McCulloch and the logician Walter Pits. Many important studies have been boosted by cheap computer emulations. Neural network studies slow down after publishing machine learning research by Marvin Minsky and Seymour Papert (1969). They found out two key issues with the computational machines that processed neural networks. The first issue was that single-layer neural networks could not process the exclusive-or circuit. The second issue was that computers were not sophisticated enough to effectively handle the long run time required by large neural networks. Neural network research slowed until computers got greater processing power. Also key later advances was the backpropagation algorithm which effectively solved the exclusive-or problem (Werbos 1975). Artificial Neurons. An artificial neuron is a mathematical function as a model of biological neurons. Artificial neurons are the constitutive units in an artificial neural network. For a given artificial neuron, let suppose that there are "m" + 1 inputs with signals "x"0 through "x""m" and weights "w"0 through "w""m". Usually, the "x"0 input would be the value +1, which makes it a "bias" input with "w""k"0 = "b""k". This leaves only "m" actual inputs to the neuron: from "x"1 to "x""m". The output of "k"th neuron is: <math>y_k = \varphi \left(\sum_{j=0}^m w_{kj} x_j \right)</math> Where <math>\varphi</math> (phi) is the transfer function. The output is similar to the axon of a biological neuron, and its value propagates to input of the next layer, through a synapse. It may also exit the system, as part of an output vector. Its transfer function weights are calculated and threshold value are predetermined. The limitation is simple artificial neurons, such as the McCulloch–Pitts model, are sometimes expressed as "caricature models", since they try to reflect one or more neurophysiological observations, but without regard to realism. Neural Interface. Neural interface system provides a direct communication pathway between the nervous system and the outside world by stimulating or by recording from neural tissue to help people with sensory, motor, or other disabilities of neural function. These research is called a new branch of experimental neuroscience, variously named brain-machine interfaces (BMIs), brain-computer interfaces (BCIs), neural prostheses, or neural interface systems (NISs). An electronics package in each device activates an array of tiny electrodes that contact healthy neurons in the body. Signals by the electrodes bypass damaged areas of the brain or part of the nervous system to restore function, block pain, or prevent seizures. Although electrical stimulation systems have already broadly used for clinical application, neural interfaces that record and decipher neural signals are just starting for clinically systems to assist impaired people. The examples of the successful neural interfaces include the cochlear implant to provides a sense of sound to people with severe hearing impairment and the deep brain stimulator (DBS) to help prevent seizures in patients with epilepsy and Parkinson’s disease. Since the late 1990, neural interface studies have developed remarkably on the basis of the closed-loop control using neuronal spikes. Chapin and colleagues showed a rat's ability to control a one-dimensional feeder through multielectrode recordings from sensorimotor cortex. After that, a lot of studies(Carmena et al. 2003, Musallam et al. 2004, Santhanam et al. 2006,Taylor et al. 2002 and so on) demonstrated that closed-loop control in primates is available. The common closed-loop neural interface system is composed of four components: (1) a recording array that extracts neural signals, (2) a decoding algorithm that translates these neural signals into a set of command signals, (3)an output device that is controlled by these command signals, and (4) sensory feedback in the form of vision and potentially other sensory modalities. Neural implants must be designed to be as tiny as possible so as to be minimally invasive, in special areas srrounding the brain, eyes or cochlea. These implants communicate with their prosthetic counterparts wirelessly. In addition, power is currently received through wireless power transmission through the skin. Usually, the tissue near the implant is highly sensitive to temperature rise. It means that power consumption must be minimal to avoid tissue damage. Input Electrode. Intracranial electrodes is composed of conductive electrode arrays implanted on a polymer or silicon, or a wire electrode with an exposed tip and insulation for the part that stimulation or recording is not needed. Current implantable microelectrodes could not record single- or multi-unit activity depending on a chronic scale. Lebedev and Nicolelis reviewed the specific needs in the field to truly improve the technology to the level of clinical implementation. In short, the 4 requirements in their review are: Hardware. Chips have incorporated a various amount of data compression on chip, containing spike sorting (Chae et al., 2009). While a lot of systems have too high power consumption in order to be powered from a battery implant, Sarpeshkar et al have fabricated amplifiers and analog to digital converters at a power costless than 9 uW per 20 ksps channel. Although the small area and low power consumption of available integrated circuits is enough to process most of channels of neural data, some problem should be resolved. For instance, how long the implant can stay in the body? Electronics coated with 6 um parylene C have been proved to work for up to 276 days. Commercial systems such as Plexon, Tucker Davis, NeuroLynx, and so on depend on hermetically sealed feed-through connectors into a welded titanium casing, in which the electronics are housed. But, Brain machine interfaces which use hundreds of electrodes and high-density miniature hermetic feedthroughs do not exist yet. Neurorobotics. Neurorobotics is the part of neuroscience with robotics, dealing with the study and application of science and technology of embodied autonomous neural systems like brain-inspired algorithms. Neurorobotics starts from the idea "the brain is embodied and the body is embedded in the environment." A simulated environment can provide unintentional biases to the model. In addition, real environments are unpredictable, multimodal, and noisy; an artificial design of such an environment would be difficult to simulate. Therefore, most neurorobots need to work with the real world, instead of a simulated environment. There are a lot of classes of neurobiologically inspired robotic devices. The three common types of neurorobots are used to study motor control, memory, and action selection. Motor control and locomotion. Neurorobots have proved good for studying animal locomotion and motor control, and for developing robot controllers. Locomotion control in robots is designed by a number of neurologically inspired theories based on the action of motor systems. Neural models of central pattern generators, clumps of motorneurons capable of driving a repetitive behavior, have been used for the vertebrate-legged locomotion like four-legged walking robots . Another method for motor control is to use a predictive controller to convert awkward, error prone movements into smooth, accurate movements. Using these ideas, the robot designed to avoid obstacles , produce accurate eye and generate adaptive arm movements . Learning and memory systems. Robots designed to test theories of animal memory systems. Currently, many studies focus on the memory system of rats, the rat hippocampus, dealing with place cells, which fire specifically at a spatial location that has been learned. Value systems and action selection. Action selection studies deal with negative or positive feedback to an action and its outcome. Examples of this studies in the brain contain the dopaminergic, cholinergic, and noradrenergic systems as neurotransmitters such as dopamine or acetylcholine positively reinforce neural signals that are beneficial. One study of such interaction involved the robot Darwin VII, which used visual, auditory, and a simulated taste input to "eat" conductive metal blocks. The randomly chosen good blocks had a striped pattern on them while the bad blocks had a circular shape on them. The taste sense was simulated by conductivity of the blocks. Doya’s group has been studying the effect of multiple neuromodulators in the “Cyber-rodent” such as two-wheeled robots that move autonomously in an environment . These robots could move for self-preservation and self-reproduction exemplified by searching for and recharging from battery packs on the floor and then communicating this information to other robots through their infrared communication ports. Including examining how neuromodulators such as dopamine can influence decision making, neuroroboticists have been investigating the basal ganglia as a model that mediates action selection . Prescott and colleagues embedded a model of the basal ganglia in a robot that had to select from several actions relying on the environment. Neural tissue regeneration. Surgical connection in PNS. In the peripheral nervous system, nerves can regenerate on their own if injuries are small. However, In the case of a small gap like between the proximal and distal nerve ends, it is possible to surgically reconnect the severed nerve by taking the two ends of the nerve and suturing them together. When suturing the nerves together, the fascicles of the nerve are each reconnected, bridging the nerve together. This method does not work over gaps of longer distances because of the tension that should stay on the nerve endings. This tension interrupt the nerve regeneration. Tissue grafts in PNS. Tissue grafts use nerves or other materials to bridge the two ends of the severed nerve. Tissue grafts are categorized into autologous tissue grafts, nonautologous tissue grafts, and acellular grafts. Autologous tissue grafts means the transfer of tissue from one site to another on the same body. These autologous nerve grafts are the current standard for PNS nerve grafting as it is highly biocompatible, but there are some problem related to harvesting the nerve from the patients themselves and storing a large amount of autologous grafts for future use. nonautologous tissue grafts and acellular grafts (containing ECM-based materials) are tissues that do not come from the patient, but can be harvested from cadavers or animals. As they are not from the patients, it is easy to get it but these tissue have some difficulty in the potential of disease transmission. Currently, there are on being investigated to increase the efficacy of nonautologous tissue grafts. Nerve guidance channel. A nerve guidance conduit as opposed to an autograft is an artificial means of guiding axonal regrowth to help nerve regeneration and is one of clinical treatments for nerve injuries. Because of the limited availability of donor tissue and functional recovery in autografting, neural tissue engineering studies has focused on the bioartificial nerve guidance conduits as an alternative treatment. Similar techniques are also being studied for nerve repair in the spinal cord but nerve regeneration in the central nervous system would be challenged because its axons do not regenerate in their native environment. Guidance methods reduce scarring of the nerves, increasing the functionality of the nerves to transmit action potentials after reconnection. In this method, two types of materials are used:natural materials and synthetic materials. Biological materials mostly have good biocompatibility and can be easily degraded as it is from nature. However, unfortunately, it has the limitation in order to control mechanical properties and degradation rates. Besides, there is always the possibility that naturally-derived materials may cause an immune response or contain microbes. In the production of naturally-derived materials there will be unexpected results in large-scale purification process. Some other problems is plaguing natural polymers could not support growth across long lesion gaps due to the possibility of collapse, scar formation, and early re-absorption. Biological materials that have the potential to promote nerve repair are polysialic acid (PSA),collagen,spider silk fiber,silkworm silk fibroin, chitosan, aragonite, alginate, hyaluronic acid, glycosaminoglycans, Laminin, chitosan and so on. Synthetic materials also provide an another method for tissue regeneration. synthetic polymers may be non-degradable or degradable. But, for neural tissue engineering degradable materials are preferred as long-term effects such as inflammation and scar could damage nerve function. Mechanical properties and degradation rates of the polymers can be controlled according to the purpose, and they eliminate the concern for immunogenicity. There are many different synthetic materials currently being used in neural tissue engineering. However, the problem is a lack of biocompatibility and bioactivity of these materials. It means these polymers are not perfect for promoting cell attachment, proliferation, and differentiation. Currently, the materials most commonly researched mainly focus on biodegradable polyesters such as copolymer or blend of poly lactic acid, poly glycolic acid, polycaprolactone, polyethyleneglycol(FDA approved), biodegradable polyurethane, other polymers, and biodegradable glass are also being investigated. Other potentials for synthetic materials are conducting polymers and biologically modified polymers to promote cell axon growth and maintain the axon channel. Implantation of stem cells or neural tissue. It is possible to artificially create tissue outside of the body to implant into the injury site. This method could treat injuries with large cavities, where a lot of neural tissue needs to be replaced and regenerated. Neural tissue could be grown in vitro with neural stem or progenitor cells in a 3D scaffold, forming embryoid bodies (EBs). These EBs is composed of a sphere of stem cells, where the inner cells are undifferentiated neural cells, and the surrounding cells are more differentiated. 3D scaffolds is for transplant of tissue to the injury site and building the suitable interface between the artificial and the brain tissue. The scaffolds should be biodegradable and biocompatible. It need to fit injury site, close to existing tissue and support growing cells and tissues. The combination of using the stem cells and scaffolds increase the survival of the stem cells in the injury site, increasing the efficacy of the treatment. Table. Preparation of scaffold Delivery of molecules. Molecules that enhance the regeneration of neural tissue, including pharmaceutical drugs, growth factors known as morphogens, and miRNA can also be directly injected to the injury site of the damaged CNS tissue. The strategies for brain drug delivery may be widely categorized into invasive (neurosurgical-based), pharmacologic-based, or physiologic-based. The neurosurgical-based strategies contain intraventricular drug infusion, intracerebral implants, and BBB disruption. The pharmacologic-based strategies include the use of particles such as microspheres, nanospheres made by emulsion, spraydrying, dispersion and so on. Neural enhancement. Neural enhancement or human enhancement can be used for treating illness and disability, but also for enhancing human characteristics and capacities. In some circles, the "human enhancement technologies" is synonymous with emerging technologies or converging technologies or transhumanism. In other views, "Human enhancement" is roughly synonymous with human genetic engineering, it refers usually to the general application of the combination of nanotechnology, biotechnology, information technology and cognitive science(NBIC) to improve human lives. Deep brain stimulation has already proved to provide therapeutic benefits for the patients currently using this treatment for Parkinson's disease, essential tremor, dystonia, chronic pain, major depression and OCD. Ethical issues with human enhancement would be that neural engineers need to grapple with as they develop techniques. Some controversial idea is that human enhancement maintain or modify their own minds and bodies. In addition, there are fear that some enhancements will create unfair physical or mental advantages to those who can and will use them and will increase the gap between the "haves" and "have-nots". However,some advocates advance "human enhancement technologies" and prefer the term "enablement" to "enhancement". And they try to defend and develop independent safety testing of the technologies and affordable, universal access to these technologies. Deep brain stimulation. Deep brain stimulation (DBS) is a neurosurgical procedure which implant a tiny medical device called a brain pacemaker, which sends electrical impulses through implanted electrodes to specific area of the brain for the treatment of movement and affective disorders.The Food and Drug Administration (FDA) approved DBS as a treatment for Parkinson's disease in 2002, dystonia in 2003, and obsessive-compulsive disorder (OCD) in 2009. DBS has been also used to treat diverse affective disorders, including major depression but these applications of DBS have yet been FDA-approved. The deep brain stimulation system is composed of three components: the implanted pulse generator (IPG), the lead, and the extension. The IPG is a battery -powered neurostimulator enclosed in a titanium housing, which sends electrical pulses to the brain to interfere with neural activity at the target site. The lead is a coiled wire insulated in biocompatible but nondegradable polymer like polyurethane with four platinum or iridium electrodes and is placed in one or two different nuclei of the brain. The lead is connected to the IPG by the extension. It is an insulated wire that runs below the skin, from the head, down the side of the neck, behind the ear to the IPG, which is placed below the clavicle or, in some cases, the abdomen.The leads are placed in the brain according to the type of symptoms to be addressed. The IPG can be calibrated by a neurologist,nurse, or trained technician. All three components are surgically implanted in the brain. Lead implantation may cause local anesthesia or general anesthesia ("asleep DBS"). A hole about 14 mm in diameter is drilled in the skull and the probe electrode is inserted. During the awake procedure with local anesthesia, feedback from the patient determines the best placement of the permanent electrode. During the asleep procedure, intraoperative MRI guidance is used for the determination of the electrode. Generally, the IPG and extension leads are installed under general anesthesia.
299999
3395618
https://en.wikibooks.org/wiki?curid=299999
Biomedical Engineering Theory And Practice/Physiolgocial System
Cardiovascular Structure and Function. As all the cell in the human body could not exchange with nutrients, oxygen, carbon dioxide, and the waste products of metabolism, energy and momentum, the high way network in the physiological system transport the mass between the cell in order to hold all the body. This high way network, called cardiovascular system, includes a pumping station, the heart; a working fluid, blood; a complex branching configuration of distributing and collecting pipes and channels, blood vessels; and a complicated means for intrinsic (inherent) and extrinsic (autonomic and endocrine) control. The blood. The blood supplies oxygen and nutrients including constitutional elements to tissues and remove waste products. Blood also transport hormones and other substances to tissues and organs. Blood consists of plasma(55% of blood volume) and blood cell or hematocytes (approximately, %8±1 of body weight). Hematocytes are suspended in continus plasma fluid and could divided into red blood cells (erythrocytes, totalling nearly 95% of the formed elements), white blood cells(leukocytes, averaging <0.15% of all hematocytes), and platelets (thrombocytes, on the order of 5% of all blood cells). Hematocytes are derived in the active (“red”) bone marrow from undifferentiated stem cells (called hemocytoblasts) and matured through hematocytopoiesis. Endocrine System. 'See also Wikipedia,endocrine system and Human Physiology/The endocrine system The endocrine system means the collection of glands of an organism that secrete hormones(in other words, produce messengers like small molecules) directly into the circulatory system to be carried toward a distant target organ. In order to grow, maintain a constant temperature, produce offspring, or perform the basic actions and functions, essentially, hormones like small chemicals(in other words, messengers) should enter the blood stream. So, the endocrine system could provides an electrochemical connection from the hypothalamus of the brain to all the organs for controlling the body metabolism, growth and development, and reproduction. The endocrinology is a relatively long history. But In the late 1960s as sensitive and relatively specific analytical methods introduced, the measurement of low concentrations of circulating hormones is easier and cheaper. Since then, it is easier to understand endocrine physiology and mechanisms of regulation and control. Competitive protein binding and radioimmunoassays brought progress of the study about the physiology of individual endocrine glands and of the neural control of the pituitary gland and the overall feedback control of the endocrine system. Cellular and molecular biology and recombinant DNA technology helped the endocrine system research, too. At the same time, the interactive researches between mathematical modeling and experimental studies make it possible to understand endocrine dynamics. Hormones and signal, interaction between the tissue and the cell. Hormones can be classified into four groups (1) steroid hormones, (2) peptide and protein hormones, (3) amino acids derivatives, principally the aromatic amino acid tyrosine, and (4) the eicosanoids (fatty acid derivatives). 1. Steroids are lipids, more specifically, derivatives of cholesterol produced by chemical modification. 2. Peptide and protein hormones are synthesized in the cellular endoplasmic reticulum and then transferred to the Golgi apparatus where they are packaged into secretory vesicles for export. 3. Amino acid derivatives: There are two groups of hormones derived from the amino acid tyrosine;thyroid hormones and catecholamines. Thyroid hormones are basically a “double” tyrosine ring incorporating three or four iodine atoms. Catecholamines include epinephrine and norepinephrine that have the capability of functioning as both hormones and neurotransmitters. 4. Eicosanoids are large groups of polyunsaturated fatty acids derivatives like the prostaglandins, prostacyclins, leukotrienes, and thromboxanes. Nervous System. The nervous system can be defined as the network of nerve cells and fibers that that sends messages for controlling movement and feeling between the brain and the other parts of the body. This nervous system is composed of the brain and spinal cord, nerves, ganglia, and parts of the receptor organs and that receives and interprets stimulus and transmits impulses to the effector organs.
300000
973
https://en.wikibooks.org/wiki?curid=300000
Learning C With Game Concepts/Designing A Roleplaying Game
Now that we've covered the basics of compilation and modularity (we'll refine that section later) lets move on to game design. Our game will be implemented using the terminal and will not rely on any third party libraries, save for the ones that come with C by default. We'll take a approach to creating our Role-playing Game (hereafter referred to as an RPG). Specifications. When undergoing a new project of some complexity, it is important to do some brainstorming about what your program will do and how you'll implement it. While that may sound painfully obvious, it is often tempting to jump right into coding and implement ideas as they pop into your head. It isn't until the code becomes hundreds of lines long does it become clear that organizing your thoughts is necessary. The initial brainstorming phase takes the main idea, an RPG in this case, and breaks it down into more elementary pieces. For each element, we either break it down into still smaller elements, or give a short summary of how we might implement it. In a commercial environment, this brainstorming session produces a . At the heart of every RPG, we have players. Players shouldː Statsː Easy. Just a variable telling us what the stat is for (like, health) and containing an integer value. Talkingː To facilitate conversation, players need scripted dialog. This dialog could be stored with the main character, or the person with whom the main character will interact, and in the case of the latter, must be accessible by the main character. Fightingː A function, that when given a player (to attack) initiates a battle sequence, that persists until someone retreats or a player's health is reduced to 0. Mapping: A vast and epic journey involves many locations. Each location node tells us what the player sees once he reaches that location, and where he can go from there. Each location node has the same structure. This new node will be structured the same as the first, but contain different information. Each location node is assigned a unique location ID that tells the computer where another location node can be found. "Where he can go" is traditionally an array of up to 10 location IDs, to allow the player to go up to 10 directions -- up, down, north, south, east, northeast, etc. Movingː A player should contain a node for a linked list or binary tree. The first location ID tells us where the player is currently. The second location ID tells us where the player came from (so players can say "go back"). Moving will involve changing the player's location (Swamp, let's say), to the location ID of another node (Forest). If that sounds confusing, don't worry, I'll make pictures to illustrate the concept. ː) Inventoryː Inventory will start out as a doubly linked list. An item node contains an item (Health Potion), the number of that item, a description of the item, and two links. One link to the previous item in the list, and a second link to the next item in the list. This preliminary specification acts as a blueprint for the next phase, the actual coding portion. Now that we've broken the main idea into smaller elements, we can focus on creating separate modules that enable these things. As an example, we will implement the player and player functions in the Main file for testing. Once we're positive that our code is working properly, we can migrate our datatypes and functions into a Header file, which we'll call whenever we want to create and manipulate players. Doing this will significantly reduce the amount of code to look at in the main file, and keeping player functions in the player header file will give us a logical place to look for, add, remove, and improve player functions. As we progress, we may think of new things to add to our specification. Player Implementation. Because a player is too complex to represent with a single variable, we must create a Structure. Structures are complex datatypes that can hold several datatypes at once. Below, is a rudimentary example of a player structure. struct playerStructure { char name[50]; int health; int mana; Using the keyword struct, we declare a complex datatype called playerStructure. Within the curly braces, we define it with all the datatypes needs to hold for us. This structure can be used to create new structures just like it. Let's use it to make a Hero and display his stats. "player.c" struct playerStructure { char name[50]; int health; int mana; } Hero; // Function Prototype void DisplayStats (struct playerStructure Target); int main { // Assign stats strcpy(Hero.name, "Sir Leeroy"); Hero.health = 60; Hero.mana = 30; DisplayStats(Hero); return(0); // Takes a player as an argument and prints their name, health, and mana. Returns nothing. void DisplayStats (struct playerStructure Target) { // We don't want to keep retyping all this. printf("Name: %s\nHealth: %d\nMana: %d\n", Target.name, Target.health, Target.mana); Let's review what our code does. We've included a new standard library called <string.h> which contains functions that are helpful in working with strings. Next, we define the complex datatype playerStructure and immediately declare a playerStructure called Hero right after it. Be aware, the semicolon is always necessary after defining the struct. Unlike higher level languages, strings cannot be assigned in C using the assignment operator =, only the individual characters that make up the string can be assigned. Since name is 50 characters long, imagine that we have 50 blank spaces. To assign "Sir Leeroy" to our array, we must assign each character to a blank space, in order, like so: name[0] = 'S' name[1] = 'i' name[2] = 'r' name[3] = ' ' name[4] = 'L' name[5] = 'e' name[6] = 'e' name[7] = 'r' name[8] = 'o' name[9] = 'y' name[10] = '\0' // End of string marker The function Strcpy essentially loops through the array until it reaches the end of string marker for either arguments and assigns characters one at a time, filling the rest with blanks if the string is smaller than the size of the array we're storing it in. The variables in our structure, Player, are called members, and they are accessed via the syntax struct.member. Now our game would be boring, and tranquil, if it just had a Hero and no enemies. In order to do add more players, we would need to type "struct playerStructure variableName" to declare new players. That's tedious and prone to mistakes. Instead, it would be much better if we had a special name for our player datatype that we could call as wisfully as char or int or float. That's easily done using the keyword typedefǃ Like before, we define the complex datatype playerstructure, but instead of declaring a playerStructure afterward, we create a keyword that can declare them whenever we want. "player2.c" typedef struct playerStructure { char name[50]; int health; int mana; } player; // Function Prototype void DisplayStats (player Target); int main { player Hero, Villain; // Hero strcpy(Hero.name, "Sir Leeroy"); Hero.health = 60; Hero.mana = 30; // Villain strcpy(Villain.name, "Sir Jenkins"); Villain.health = 70; Villain.mana = 20; DisplayStats(Hero); DisplayStats(Villain); return(0); // Takes a player as an argument and prints their name, health, and mana. Returns nothing. void DisplayStats (player Target) { printf("Name: %s\nHealth: %d\nMana: %d\n", Target.name, Target.health, Target.mana); There is still the problem of creating players. We could define every single player who will make an appearance in our game at the start of our program. As long as the list of players is short, that might be bearable, but each of those players occupies memory whether they are used or unused. Historically, this would be problematic due to the scarcity of memory on old computers. Nowadays, memory is relatively abundant, but for the sake of scalability, and because users will have other applications running in the background, we'll want to be efficient with our memory usage and use it dynamically. Dynamically allocating memory is accomplished through the use of the malloc, a function included in <stdlib.h>. Given a number of bytes to return, malloc finds unused memory and hands us the address to it. To work with this memory address, we use a special datatype called a pointer, that is designed to hold memory addresses. Pointers are declared like any other datatype, except we put an asterisk (*) in front of the variable name. Consider this line of codeː player *Hero = malloc(sizeof(player)); This is the standard way of declaring a pointer and assigning it a memory address. The asterisk tells us that instead of declaring a player, with a fixed, unchangeable address in memory, we want a variable that can point to any player's address. Uninitialized pointers have NULL as their value, meaning they don't point to an address. Since it would be difficult to memorize how many bytes are in a single datatype, let alone our player structure, we use the sizeof function to figure that out for us. Sizeof returns the number of bytes in player to malloc, which finds enough free memory for a player structure and returns the address to our pointer. If malloc returns the memory address 502, Hero will now point to a player who exists at 502. Pointers to structures have a unique way of calling members. Instead of a period, we now use an arrow (->). player *Hero = malloc(sizeof(player)); strcpy(Hero->name, "Leeroy"); Hero->health = 60; Hero->mana = 30; Remember, pointers don't contain values like integers and chars, they just tell the computer where to find those values. When we change a value our pointer points to, we're telling the computer "Hey, the value I want you to change lives at this address (502), I'm just directing traffic." So when you think of pointers, think "Directing Traffic". Here's a table to show what pointer declarations of various types meanː Now that we're using pointers, we can write a function to dynamically allocate players. And while we're at it, let's add some new ideas to our specification. Players shouldː "dynamicPlayers.c" // Classes are enumerated. WARRIOR = 0; RANGER = 1, etc. typedef enum ClassEnum { WARRIOR, RANGER, MAGE, ACCOUNTANT } class; typedef struct playerStructure { char name[50]; class class; int health; int mana; } player; // Function Prototypes void DisplayStats(player *target); int SetName(player *target, char name[50]); player* NewPlayer(class class, char name[50]); // Creates player and sets class. int main { player *Hero = NewPlayer(WARRIOR, "Sir Leeroy"); player *Villain = NewPlayer(RANGER, "Sir Jenkins"); DisplayStats(Hero); DisplayStats(Villain); return(0); // Creates player and sets class. player* NewPlayer(class class, char name[50]) { // Allocate memory to player pointer. player *tempPlayer = malloc(sizeof(player)); SetName(tempPlayer, name); // Assign stats based on the given class. switch(class) { case WARRIOR: tempPlayer->health = 60; tempPlayer->mana = 0; tempPlayer->class = WARRIOR; break; case RANGER: tempPlayer->health = 35; tempPlayer->mana = 0; tempPlayer->class = RANGER; break; case MAGE: tempPlayer->health = 20; tempPlayer->mana = 60; tempPlayer->class = MAGE; break; case ACCOUNTANT: tempPlayer->health = 100; tempPlayer->mana = 100; tempPlayer->class = ACCOUNTANT; break; default: tempPlayer->health = 10; tempPlayer->mana = 0; break; return(tempPlayer); // Return memory address of player. void DisplayStats(player *target) { printf("%s\nHealth: %d\nMana: %d\n\n", target->name, target->health, target->mana); int SetName(player *target, char name[50]) { strcpy(target->name, name); return(0); Before we move on to the next major development, you'll want to modularize what you've written. Start by making two header files, one named "gameProperties.h" and another called "players.h". In the game properties file, place your playerStructure and classEnum typedefs. The datatypes defined here will have the possibility of appearing in any other headers we may create. Therefore, this will always be the first header we call. Next, all functions related to creating and modifying players, as well as their prototypes, will go in our players header file. Fight System. Rome wasn't built in a day and neither are good fight systems, but we'll try our best. Now that we have an enemy we are obligated to engage him in a friendly bout of fisticuffs. For our players to fight, we'll need to include two additional stats in our player structure, Attack and Defense. In our specification, all that our Fight function entailed was an argument of two players, but with further thought, lets do damage based on an EffectiveAttack, which is Attack minus Defense. In the gameProperties header, modify playerStructure for two more integer variables, "attack" and "defense". "gameProperties.h" // Classes are enumerated. WARRIOR = 0; RANGER = 1, etc. typedef enum ClassEnum { WARRIOR, RANGER, MAGE, ACCOUNTANT } class; // Player Structure typedef struct playerStructure { char name[50]; class class; int health; int mana; int attack; // NEWː Attack power. int defense; // NEWː Resistance to attack. } player; In the players header file, modify the case statements to assign values to the attack and defense attributes. "players.h" // Creates player and sets class. player* NewPlayer(class class, char name[50]) { // Allocate memory to player pointer. player *tempPlayer = malloc(sizeof(player)); SetName(tempPlayer, name); // Assign stats based on the given class. switch(class) { case WARRIOR: tempPlayer->health = 60; tempPlayer->mana = 0; tempPlayer->attack = 3; tempPlayer->defense = 5; tempPlayer->class = WARRIOR; break; case RANGER: tempPlayer->health = 35; tempPlayer->mana = 0; tempPlayer->attack = 3; tempPlayer->defense = 2; tempPlayer->class = RANGER; break; case MAGE: tempPlayer->health = 20; tempPlayer->mana = 60; tempPlayer->attack = 5; tempPlayer->defense = 0; tempPlayer->class = MAGE; break; case ACCOUNTANT: tempPlayer->health = 100; tempPlayer->mana = 100; tempPlayer->attack = 5; tempPlayer->defense = 5; tempPlayer->class = ACCOUNTANT; break; default: tempPlayer->health = 10; tempPlayer->mana = 0; tempPlayer->attack = 0; tempPlayer->defense = 0; break; return(tempPlayer); // Return memory address of player. void DisplayStats(player *target) { printf("%s\nHealth: %d\nMana: %d\n\n", target->name, target->health, target->mana); int SetName(player *target, char name[50]) { strcpy(target->name, name); return(0); Finally, include your header files in your main program. Instead of sharp brackets <> we use quotation marks instead. If the headers are located in the same folder as the executable, you only need to provide the name. If your header file is in a folder somewhere else, you'll need to provide the full path of the file location. Let's also develop a rudimentary fight system to make use the attack and defense attributes. "player3.c" // Function Prototype int Fight (player *Attacker, player ̈*Target); int main { player *Hero = NewPlayer(WARRIOR, "Sir Leeroy"); player *Villain = NewPlayer(RANGER, "Sir Jenkins"); DisplayStats(Villain); // Before the fight. Fight(Hero, Villain); // FIGHTǃ DisplayStats(Villain); // After the fight. return(0); int Fight (player *Attacker, player *Target) { int EffectiveAttack; // How much damage we can deal is the difference between the attack of the attacker // And the defense of the target. In this case 5 - 1 = 4 = EffectiveAttack. EffectiveAttack = Attacker->attack - Target->defense; Target->health = Target->health - EffectiveAttack; return(0); If we run compile and run this we get this outputː Name: Sir Jenkins Health: 35 Mana: 0 Name: Sir Jenkins Health: 34 // An impressive 1 damage dealt. Mana: 0 TODOː Adjust class stats to something more diverse. Now that we've figured out how to deal damage, lets expand on our earlier specificationː Fight shouldː I'll refrain from posting the whole program when possible but I encourage you to continue making incremental changes and compiling/running the main program as we go along. For the battle sequence, we will modify the Fight function to loop until the Target's health reaches 0, whereupon a winner is named. A user interface will be provided by a "Fight Menu" which will pair a number with an action. It is our responsibility to modify this menu as new actions are added and make sure each individual action works when called. When the User chooses an action, the associated number is handed to a Switch, which compares a given variable to a series of Cases. Each case has a number or character (strings aren't allowed) that is used for the aforementioned comparison. If Switch finds a match, it evaluates all the statements in that Case. We must use the keyword break to tell the switch to stop evaluating commands, or else it will move the to next case and execute those statements (sometimes that's useful, but not for our purpose). If Switch cannot match a variable to a case, then it looks for a special case called default and evalutes it instead. We'll always want to have a default present to handle unexpected input. int Fight(player *Attacker, player *Target) { int EffectiveAttack = Attacker->attack - Target->defense; while (Target->health > 0) { DisplayFightMenu; // Get input. int choice; printf("» "); // Indication the user should type something. fgets(line, sizeof(line), stdin); sscanf(line, "%d", &choice); switch (choice) { case 1: Target->health = Target->health - EffectiveAttack; printf("%s inflicted %d damage to %s.\n", Attacker->name, EffectiveAttack, Target->name); DisplayStats(Target); break; case 2: printf("Running away!\n"); return(0); default: printf("Bad input. Try again.\n"); break; // Victoryǃ if (Target->health <= 0) { printf("%s has bested %s in combat.\n", Attacker->name, Target->name) ; return(0); void DisplayFightMenu { printf("1) Attack\n2) Run\n"); Testing the integrity of the program requires running it a few times after compilation. First we can see that if we enter random input like "123" or "Fish" we invoke the default case and are forced to pick another answer. Second, entering 2 will cause us to run away from the fight. Third, if we continue to enter 1, eventually Sir Leeroy will whittle down all of Sir Jenkin's health and be declared winner. Modifying the attack value on Sir Leeroy can help if you're impatient ː) However, Sir Jenkins is still unable to defend himself, which makes for a very unsporting match. Even if Sir Jenkins was given a turn, the user would still be prompted to act on his behalf. The turn-based problem is solved by the idea proposed in the specification, that we swap the memory addresses of the Attacker and Target pointers on each loop. The solution to the problem of autonomy is to add a new property to our player structure, namely, a bool. A bool has a binary value, true or false, and, for us, it answers the simple question "To Autopilot or not to autopilot?". With the autopilot bool set to true, the Fight function, when modified by us to check for it, will know that they must automate the actions of these characters. To use bool datatypes, we need to include a new header called <stdbool.h>. Bools are declared with the bool keyword and can only be assigned true or false values. Add the following line underneath "int defense" in your playerStructure from the "gameProperties.h". bool autoPilot; Next, add this snippet of code to the NewPlayer function from the "Players.h" below the call to SetName. static int PlayersCreated = 0; // Keep track of players created. if (PlayersCreated > 0) { tempPlayer->autoPilot = true; } else { tempPlayer->autoPilot = false; PlayersCreate. The above code creates a persistent variable using the keyword static. Normally, once a function is called, the local variables disappear. By contrast, static variables maintain their value beyond the life of the function, and when a function starts again, it's value isn't reset. Autopilot is only turned on for players created after the first, main character. That done, consider the following program. We've added our bools and IF statements to determine whether the player needs automating or prompting. The victory IF is moved inside the while loop, and declares victory if the condition is met, else, it swaps players for the next loop. "player4.c" // Function Prototype void DisplayStats(player Target); int Fight(player *Attacker, player *Target); void DisplayFightMenu(void); // Global Variables char line[50]; // This will contain our input. int main { player *Hero = NewPlayer(WARRIOR, "Sir Leeroy"); player *Villain = NewPlayer(RANGER, "Sir Jenkins"); DisplayStats(Villain); // Before the fight. Fight(Hero, Villain); // FIGHTǃ return(0); int Fight(player *Attacker, player *Target) { int EffectiveAttack = Attacker->attack - Target->defense; while (Target->health > 0) { // Get user input if autopilot is set to false. if (Attacker->autoPilot == false) { DisplayFightMenu; int choice; printf("» "); // Sharp brackets indicate that the user should type something. fgets(line, sizeof(line), stdin); sscanf(line, "%d", &choice); switch (choice) { case 1: Target->health = Target->health - EffectiveAttack; printf("%s inflicted %d damage to %s.\n", Attacker->name, EffectiveAttack, Target->name); DisplayStats(Target); break; case 2: printf("Running away!\n"); return(0); default: printf("Bad input. Try again.\n"); break; } else { // Autopilot. Userless player acts independently. Target->health = Target->health - EffectiveAttack; printf("%s inflicted %d damage to %s.\n", Attacker->name, EffectiveAttack, Target->name); DisplayStats(Target); // Once turn is finished, check to see if someone has one, otherwise, swap and continue. if (Target->health <= 0) { printf("%s has bested %s in combat.\n", Attacker->name, Target->name) ; } else { // Swap attacker and target. player *tmp = Attacker; Attacker = Target; Target = tmp; return(0); void DisplayFightMenu (void) { printf("1) Attack\n2) Run\n"); Now that we've created a very rudimentary system for fighting, it is time once again to modularize. Take the Fight and DisplayFightMenu functions and put them in a new header file called "fightSys.h". This new header will contain all functions related to fighting and will be included in the next iteration of our Main program.
300013
3226541
https://en.wikibooks.org/wiki?curid=300013
A-level Computing 2009/AQA/Problem Solving, Programming, Operating Systems, Databases and Networking/Problem Solving/Backus-Naur Form (BNF)
Backus-Naur Form (also known as Backus Normal Form (BNF) or BNF for short) is a notation technique to express syntax of languages in computing. The expression is put in lists and can be used to see if syntax that is written is valid. Backus-Naur means "not in normal form compared to convention". Structure and Layout. Symbols. BNF is represented using the following symbols: ::= 'is defined as' | 'or' <> category names The way that these symbols are laid out are as such: <Parent Expression> ::= <Child Expression 1> | <Child Expression 2> In plain English, the expression above means "The parent expression is defined as the child expression 1 or the child expression 2". This means that to make up the parent expression, it must have a child expression and a child expression is made up of other things. Example. In this example, The BNF structure is breaking down the syntax to create <Address> ::= <House Number> <Street Name> <Town Name> <City Name> <Country> <Postcode> | <House Number> <Street Name> <City Name> <Country> <Post Code> <Postcode> ::= <Area Code> <Street Code> <Area Code> ::= <City Prefix> <digit> | <City Prefix> <digit> <digit> <Street Name> ::= <Name> <Street Type> <Flat Number> ::= <character> | <digit> <House number>::= <digit> | <digit> <House number> <Street Type> ::= <string> <City Prefix> ::= <string> <Street Code> ::= <string> <Town Name> ::= <string> <City Name> ::= <string> <Country> ::= <string> <Name>::= <string>
300021
46022
https://en.wikibooks.org/wiki?curid=300021
A-level Graphic Products/Edexcel
This is a book about A-Level Graphic Products. It aims to fit in with the Edexcel GCE A-Level Product Design syllabus but is not endorsed by Edexcel. It should be useful as a revision guide or to find alternative explanations to the ones in your textbook. If you haven't heard of an A-Level then this book probably won't be of much interest to you but you can find out about them at Wikipedia. Please note that the last opportunity for the sitting of the GCE EDEXCEL GRAPHIC PRODUCTS qualfication (9GR01,9RM01,8GR01 & 8RM01) is JUNE 2017 for AS candidates and JUNE 2018 for A2 candidates. After this, EDEXCEL is replacing the qualification with the new 2017 - 9DT0 course. This textbook has been designed specifically for the older qualification. If any part of this book "is" unclear or even wrong then please post a comment on the discussion page or simply fix it yourself! In particular, please say if the book assumes any knowledge or skills which not all A-Level Product Design students have. __NOEDITSECTION__ AS modules. 50% of GCE OR individual AS qualification 60% of AS qualification, 30% of total GCE 40% of AS qualification, 20% of total GCE A2 modules. 50% of GCE 60% of A2 marks, 30% of total GCE 40% of A2 marks, 20% of total GCE External links. Question past papers: http://www.edexcel.com/quals/gce/gce08/dt/product/Pages/default.aspx (Just make sure you don't select resistant materials)
300028
3226541
https://en.wikibooks.org/wiki?curid=300028
A-level Computing 2009/AQA/Problem Solving, Programming, Operating Systems, Databases and Networking/Problem Solving/Finite State Machines
Finite State Machines in unit 3 are exactly alike as you have learnt from unit 1. They are just slightly more complex with a few more states. To recap your memory, visit the unit 1 page here.
300034
3332924
https://en.wikibooks.org/wiki?curid=300034
Biomedical Engineering Theory And Practice/Physiological System
Cardiovascular Structure and Function. As all the cell in the human body could not exchange with nutrients, oxygen, carbon dioxide, and the waste products of metabolism, energy and momentum, the high way network in the physiological system transport the mass between the cell in order to hold all the body. This high way network, called cardiovascular system, includes a pumping station, the heart; a working fluid, blood; a complex branching configuration of distributing and collecting pipes and channels, blood vessels; and a complicated means for intrinsic (inherent) and extrinsic (autonomic and endocrine) control. The blood. The blood supplies oxygen and nutrients including constitutional elements to tissues and remove waste products. Blood also transport hormones and other substances to tissues and organs. Blood consists of plasma(55% of blood volume) and blood cell or hematocytes (approximately, %8±1 of body weight). Hematocytes are suspended in continus plasma fluid and could divided into red blood cells (erythrocytes, totalling nearly 95% of the formed elements), white blood cells(leukocytes, averaging <0.15% of all hematocytes), and platelets (thrombocytes, on the order of 5% of all blood cells). Hematocytes are derived in the active (“red”) bone marrow from undifferentiated stem cells (called hemocytoblasts) and matured through hematocytopoiesis. The Heart. The human heart occupies about 0.47% of the body weight and it rests on the diaphragm, between the lower part of the two lungs. This small important organ protected by the third and sixth ribs in the central portion of the thoracic cavity of the body. The heart is divided by a tough muscular wall- the interatrial-interventricular septum.The left side of the heart drives oxygen-rich blood through the aortic semilunar outlet valve into the systemic circulation, which carries the fluid to the whole body. The right side of the heart drives this oxygen-poor blood through the pulmonary semilunar (pulmonic) outlet valve into the pulmonary circulation, which carries the fluid to the lungs. Through breathing, the oxygen is supplied and the carbon dioxide is purged.After that, the blood goes to the heart and the cycles begin all over again. The blood vessel. Blood vessels are the ‘road’ of the blood that is distributed inside the body through human circulatory system. Through these vessels, the blood is sent to the whole body and help optimizing the organ’s function. There are three main types of blood vessels: the arteries, which transport the blood away from the heart; the capillaries, which can the actual exchange of water and chemicals between the blood and the tissues; and the veins, which carry blood from the capillaries back toward the heart. The arteries and veins have three layers Endocrine System. 'See also Wikipedia,endocrine system and Human Physiology/The endocrine system The endocrine system means the collection of glands of an organism that secrete hormones(in other words, produce messengers like small molecules) directly into the circulatory system to be carried toward a distant target organ. In order to grow, maintain a constant temperature, produce offspring, or perform the basic actions and functions, essentially, hormones like small chemicals(in other words, messengers) should enter the blood stream. So, the endocrine system could provides an electrochemical connection from the hypothalamus of the brain to all the organs for controlling the body metabolism, growth and development, and reproduction. The endocrinology is a relatively long history. But In the late 1960s as sensitive and relatively specific analytical methods introduced, the measurement of low concentrations of circulating hormones is easier and cheaper. Since then, it is easier to understand endocrine physiology and mechanisms of regulation and control. Competitive protein binding and radioimmunoassays brought progress of the study about the physiology of individual endocrine glands and of the neural control of the pituitary gland and the overall feedback control of the endocrine system. Cellular and molecular biology and recombinant DNA technology helped the endocrine system research, too. At the same time, the interactive researches between mathematical modeling and experimental studies make it possible to understand endocrine dynamics. Hormones and signal, interaction between the tissue and the cell. Hormones can be classified into four groups according to the molecular structure and characteristics: (1) steroid hormones, (2) peptide and protein hormones, (3) amino acids derivatives, principally the aromatic amino acid tyrosine, and (4) the eicosanoids (fatty acid derivatives). 1. Steroids are lipids, more specifically, derivatives of cholesterol produced by chemical modification. 2. Peptide and protein hormones are synthesized in the cellular endoplasmic reticulum and then transferred to the Golgi apparatus where they are packaged into secretory vesicles for export. 3. Amino acid derivatives: There are two groups of hormones derived from the amino acid tyrosine;thyroid hormones and catecholamines. Thyroid hormones are basically a “double” tyrosine ring incorporating three or four iodine atoms. Catecholamines include epinephrine and norepinephrine that have the capability of functioning as both hormones and neurotransmitters. 4. Eicosanoids are large groups of polyunsaturated fatty acids derivatives like the prostaglandins, prostacyclins, leukotrienes, and thromboxanes. Nervous System. Nervous System Organization. The nervous system can be defined as the network of nerve cells and fibers that sends messages for controlling movement and feeling between the brain and the other parts of the body. This nervous system is divided into two main parts, the central nervous system (CNS) and the peripheral nervous system (PNS). The three basic functions of the nervous system: The Central Nervous System. The CNS consists of the brain and spinal cord. It is integrative and control centers. The Peripheral Nervous System. The peripheral nervous system is the part of the nervous system that is composed of the nerves and ganglia outside of the brain and spinal cord. The main function of the PNS is to make communication lines between CNS and the rest of body. The peripheral nervous system is divided into sensory (afferent) division and motor (efferent) division. The main function of the sensory (afferent) division is to conduct impulses from receptors to the CNS. The sensory division consist of somatic (skin, muscle, joints) and visceral (organs) sensory neurons. The motor (efferent) division is composed of motor neurons. It conducts impulses from the CNS to effectors (muscles and gland). The motor division could be divided into the somatic nervous system and the autonomic nervous system(ANS) whether it is voluntary or not. The somatic nervous system provide voluntary control and conducts impulses from CNS to skeletal muscles. The autonomic nervous systems are involuntary but they can often work in conjunction with the somatic nervous system as ,within both systems, there are inhibitory and excitatory synapses between neurons. The main function of ANS is to conduct impulses from CNS to cardiac muscles, smooth muscles, and glands. The ANS is divided into three main sub-systems: the parasympathetic nervous system (PSNS), sympathetic nervous system (SNS), and the enteric nervous system (ENS). Depending on the circumstances, these sub-systems may work independently or co-operatively. ENS is composed of a mesh-like system of neurons that controls the function of the gastrointestinal system. The parasympathetic system is responsible for stimulation of "rest-and-digest" or "feed and breed". The sympathetic nervous system is related to stimulate activities associated with the fight-or-flight response(also called the fight, flight, freeze, or fawn response [in PTSD], hyperarousal, or the acute stress response). Nervous Tissue. The nervous tissue is the main component of the central nervous system and the branching peripheral nerves of the peripheral nervous system. It is densely packed and intertwined and composed of neurons and neuroglial(supporting) cells. Neuroglial cells. Neuroglia cells(also called glial cells) are non-neuronal cells that maintain homeostasis, form myelin, and support and protect neurons in the brain and peripheral nervous system. In PNS, neuroglial cells consist of Schwann cells,satellite cells and enteric glial cells. The Schwann cells form myelin sheath around large nerve fibers in PNS and is also have phagocytotic activity and clear cellular debris that allows for regrowth of PNS neurons. The Satellite cells are small cells that surround neurons in sensory, sympathetic, and parasympathetic ganglia. It may aid in controlling chemical environment of neurons. The enteric glial cells could be found in the intrinsic ganglia of the digestive system. They may have many roles in the enteric system, some related to homeostasis and muscular digestive processes. In CNS, there are Astrocytes, Microglia, Ependymal Cells and Oligodendrocytes as supporting cells. Astrocytes occupy half of neural volume and project with bulbous ends that cling to neurons and capillaries (therefore connecting neurons to blood/nutrient supply). It controls chemical environment around neurons (buffer K+ in extracellular space and/or recapture neurotransmitters released). Microglia are the resident macrophages of the brain and spinal cord and act as the first and main form of active immune defense in the CNS. Oligodendrocytes provide support and insulation to axons in the central nervous system of some vertebrates, equivalent to the function of Schwann cells in the PNS. Oligodendrocytes do this by creating the myelin sheath, which is 80% lipid and 20% protein. Ependymal cells is the thin epithelium-like lining the spinal cord and the ventricular system of the brain. They creates a barrier between CNS cavities and tissues surrounding cavities. Their cilia circulates the cerebrospinal fluid and protect the brain. Neurons. The neurons is an electrically excitable cell that send messages through electrochemical processes.The human brain has approximately 100 billion neurons. These neurons are amitotic and have a high metabolic rate. Neurons are structurally composed of cell body(soma) and one or more process. Nerve Fibre and Connective Tissue. A nerve contains two types of tissue: nerve fiber and connective tissue. Nerve fibre is the organ that make up peripheral connective tissue(PNS). It consists of an axon or long dendrite, myelin sheath (if existent) and their Schwann cells. They serve as an information pipelines that let the brain and the spinal cord communicate with the other tissues and organs. Vision System. 'See also Wikipedia,Visual System The visual system is composed of three things: the central nervous system, eyes and light. It detects and interprets the information about the visual objects from visible light and guide body movements in relation to visual objects. Eye. The light reflects off the visual image and comes back to your eye. Light then enters through the outer part of the eye, called the cornea. The cornea is clear like a window. The cornea helps the eye to focus. “To focus” means to make things look sharp and clear as the film and the electronic sensor in the camera does. After then, the light rays go through an opening called the pupil which is the dark round circle in the middle of the colored part of your eye . The colored part is called the iris. When the light is bright, the iris loses the pupil until the right amount of light gets in. When the light is dim, the iris is reverse to let in more light. The function of iris in eyes is the same to the iris in camera. The eye has a lens to focus the rays of light. The lens of the eye is behind the iris. Light passes through the lens on its way to the back of the eye. Retina. In the back of eyes, lining the inside of the eye is the retina.The retina includes 130 million tiny photoreceptor cells which contain particular protein molecules called opsins. An opsin absorbs a photon (a particle of light) and transmits a signal to the cell through a signal transduction pathway. In human opsin, two types of opsins participate in conscious vision: rod opsins and cone opsins. Rod opsins (rhodopsins, usually denoted Rh),employed in night vision, are thermally stable, and are found in the rod photoreceptor cells. Cone opsins, used in color vision, are less-stable opsins in the cone photoreceptor cells. Cone opsins could be subdivided according to their absorption maxima (λmax), the wavelength at which the highest light absorption is observed. So, humans have four opsins as follows: In the retina, the photo-receptors synapse directly onto bipolar cells, which in turn synapse onto ganglion cells of the outermost layer, which will then conduct action potentials to the brain. Based on their projections and functions, there are five different populations of ganglion cells that send visual (image-forming and non-image-forming) information to the brain: Auditory System. The Peripheral Auditory System. Outer ear. The sounds are collected by the pinna, the visible part of the external ear and guided to the middle ear by the external auditory canal, a deceptively simple tube. The ear canal amplifies sounds between 3 and 12 kHz. At the far end of the ear canal is the tympanic membrane, which marks the beginning of the middle ear. Middle ear. The middle ear is composed of the ear drum (tympanic membrane), attached to the inner ear through a delicate bone structure (malleus, incus and stapes). The middle ear bones (ossicles) and the muscles which keeps them in place are the smallest in the human body. One of the main functions of the middle ear is to transfer the sound from the air to the fluids in the inner ear efficiently. If the sound were to have an impact directly on the inner ear, most of it would simply be reflected back because acoustical impedance of the air is different from that of the fluids. The middle ear behaves as an impedance-matching device that improves sound transmission, reduces the amount of reflect sound and protects the inner ear from excessive sound pressure. This protection is controlled by the brain through the middle ear’s muscles to tense and untense the bone structure with a reaction speed as fast as 10 milliseconds. The middle ear’s connection to the inner ear is the smallest bone in the human body: the stapes (or stirrup bone). It is about 3 mm long and weighs about 3 mg. Inner ear. The inner ear consists of the cochlea and the auditory nerve for hearing and vestibular system for balance. The cochlea, snail-shaped, bony structure, converts sound pressure patterns from the outer ear into electrochemical impulses which are passed on to the brain via the auditory nerve. The vestibular system consists of a series of fluid-filled compartments (three semi-circular canals and two larger divisions) that contain the sense organs for balance and movement. The vestibular sensors detect angular movements, direction and velocity of the head. This information about equilibrium is sent to the brain by the vestibular nerves. The Central Auditory System. The encoded sound information enter the vestibulocochlear nerve, through intermediate stations such as the cochlear nuclei and superior olivary complex of the brainstem and the inferior colliculus of the midbrain and it is further processed at each waypoint. Finally, the information reaches the thalamus, and from there it is relayed to the cortex. In the human brain, the primary auditory cortex is placed in the temporal lobe. Gastrointestinal System. The gastrointestinal tract (GIT) is composed of a hollow muscular tube from the oral cavity, where food enters the mouth, continuing through the pharynx, oesophagus, stomach and intestines to the rectum and anus, where food is expelled. There are a variety of accessory organs that help the tract by secreting enzymes to enhance breaking down food into its component nutrients. Thus the salivary glands, liver, pancreas and gall bladder have functions in the digestive system. Food is propelled along the length of the GIT by peristaltic movements of the muscular walls. The whole digestive tract is about nine metres long. The tract is divided into upper and lower tracts, and the intestines parts. Oral cavity. Oral cavity is known as mouth buccal cavityor in Latin cavum oris.The oral cavity is the first part of the alimentary canal that take food and saliva. It is lined by a stratified squamous oral mucosa with keratin covering those areas subject to significant abrasion, such as the tongue, hard palate and roof of the mouth. Mastication indicates the mechanical breakdown of food by chewing and chopping actions of the teeth. The tongue, a strong muscular organ, let the food bolus to come in contact with the teeth. It is also the sensing organ of the mouth for touch, temperature and taste using its specialised sensors known as papillae. Human saliva is 99.5% water, while the other 0.5% consists of electrolytes, mucus, glycoproteins, enzymes, and antiseptic compounds such as secretory IgA and lysozyme. Insalivation means the mixing of the oral cavity contents with salivary gland secretions. The mucin (a glycoprotein) in saliva acts as a lubricant. The oral cavity plays a limited role in the digestion of carbohydrates. The enzyme serum amylase, a component of saliva, starts the process of digestion of complex carbohydrates. The final function of the oral cavity is to absorb small molecules such as glucose and water, across the mucosa. From the mouth, food passes through the pharynx and oesophagus via the action of swallowing. Salivary glands. Three pairs of salivary glands work with the oral cavity. Each is a complex gland with a lot of acini lined by secretory epithelium. The acini secrete their contents into specialized ducts. Each gland is divided into smaller lobes. Salivation occurs because of the taste, smell or even watching food. This occurs in response to nerve signals that indicate the salivary glands to secrete saliva to prepare and moisten the mouth. Each pair of salivary glands secretes saliva with slightly different compositions. They also secrete amylase, an enzyme that degrades starch into maltose. Parotids. The parotid gland is a major salivary gland in humans. The parotid glands are largest(in saliva gland), bilateral and irregular shaped glands located inferior and anterior to the external acoustic meatus draining their secretions into the vestibule of oral cavity through Stensen duct or parotid duct. They provides 25% of the total salivary volume. They are situated below the zygomatic arch (cheekbone) and cover part of the mandible (lower jaw bone). An enlarged parotid gland can be easier felt when one clenches their teeth. The parotids secretes salivary alpha-amylase (sAA). Immunoglobins are secreted help to fight microorganisms and a-amylase proteins start to break down complex carbohydrates Submandibular. The paired submandibular glands or submaxillary glands are major salivary glands located beneath the lower jaws, superior to the digastric muscles. They secrete around 60–67% of the total volume of saliva although they are much smaller than the parotid glands. These glands produce a more viscostic(thick) secretion, rich in mucin and with a little bit protein. Mucin is a glycoprotein which act as the lubrication of the food bolus as it travels through the esophagus. . Sublingual. The sublinguals are the smallest salivary glands, covered by a thin layer of tissue at the floor of the mouth. They produce only about 5% of the saliva volume. Their secretions produced are very sticky due to the large amount of mucin. They aid in buffering and lubrication. Upper gastrointestinal tract. The upper gastrointestinal tract is composed of the esophagus, stomach, and duodenum. Esophagus. It is known as the foodpipe or gullet. The Esophagus is a fibromuscular tube of about 25cm in length and 2cm in diameter. It extends generally from around the level of the sixth cervical vertebra (C6) behind the cricoid cartilage, enters the diaphragm at about the level of the tenth thoracic vertebra (T10), and ends at the cardia of the stomach, at the level of the eleventh thoracic vertebra (T11). The wall of the oesophagus from the lumen outwards is made up of mucosa, sub-mucosa (connective tissue), layers of muscle fibers between layers of fibrous tissue, and an outer layer of connective tissue.This muscle are supplied by the oesophageal nerve plexus. This nerve plexus surrounds the lower portion of the oesophagus. The oesophagus functions primarily as a transport medium between compartments.The esophagus has a rich blood supply and vascular drainage. It is clinically investigated through X-rays using barium, endoscopy, and CT scans. Stomach. The stomach is a J shaped expanded bag, located just left of the midline between the oesophagus and the duodenum (the first part of the small intestine). It secretes protein-digesting enzymes called proteases and strong acids to help food digestion through segmentation before sending partially digested food (chyme) to the small intestines. It is divided into four main regions and has two borders called the greater and lesser curvatures. The functions of the stomach is as follows: Liver. The liver is a large, reddish-brown organ located in the right upper quadrant of the abdomen. It is covered by a strong capsule and divided into four lobes namely the right, left, caudate and quadrate lobes.The liver function is various by the liver cells or hepatocytes. Currently, there is no artificial organ or device conducting all the functions of the liver. Some functions can be carried out by liver dialysis, an experimental treatment for liver failure. But the liver is the only human internal organ could naturally regenerate from lost tissue; as little as 25% of a liver can regenerate into a whole liver. Regeneration is very speedy. The liver would return to a normal size within two weeks although the removal is greater than 50% of the liver by mass.This is due to the hepatocytes which go from the quiescent G0 phase to the G1 phase and undergo mitosis. This process is activated by the p75 receptors. The liver is thought to have over 500 separate functions, usually working with other systems and organs. Gall bladder. The gallbladder is a small organ where bile is stored, before it is released into the small intestine. It is a hollow, pear shaped organ that sits in a depression on the posterior surface of the liver’s right lobe.In adults, the gallbladder is 8cm(3.1 in) in length and 4cm(1.6 in) in diameter when fully extended. The gallbladder can store about 100mL. It is divided into a fundus, body and neck . It empties via the cystic duct into the biliary duct system. The main functions of the gall bladder are storage and concentration of bile produced by liver. Bile is released from the gall bladder by contraction of its muscular walls in response to hormone signals from the duodenum because of food. The Gallbladder bile is composed of 92% water, 6% bile salts, 0.3% bilirubin, 0.9-2.4% fats (Cholesterol, fatty acids and lecithin), and 200 mEq/L inorganic salts. Pancreas. The pancreas is a lobular, pinkish-grey organ located in the abdominal cavity behind the stomach. Its head communicates with the duodenum and its tail extends to the spleen. The organ is about 5.75-9.5 cm in length with a long, slender body connecting the head and tail segments. The pancreas has both exocrine and endocrine functions. Endocrine indicates production of hormones which occurs in about a million cell clusters called islets of Langerhans. Four main cell types exist in the islets and can be classified by their secretion: α cells secrete glucagon (increase glucose in blood), β cells secrete insulin (decrease glucose in blood), Δ cells secrete somatostatin (regulates/stops α and β cells) and PP cells, or γ (gamma) cells, secrete pancreatic polypeptide. . The exocrine (secretrory) portion occupies 80-85% of the pancreas. It is composed of numerous acini (small glands) that secrete fluid into ducts which eventually lead to the duodenum. The fluid contains digestive enzymes that pass to the small intestine. These enzymes enhance breaking down the carbohydrates, proteins and lipids (fats) in the chyme. Lower gastrointestinal tract. The lower gastrointestinal tract includes most of the small intestine and all of the large intestine . The small intestine consists of the duodenum, jejunum and ileum while the large intestine consists of the cecum, colon, rectum, and anal canal. Small Intestine. The small intestine starts from the duodenum, which receives food from the stomach. It averages 5.5~6m in length, extending from the pyloric sphincter of the stomach to the ileo-caecal valve separating the ileum from the caecum. The small intestine is compressed into a lot of folds and occupies a large portion of the abdominal cavity. Large Intestine. The large intestine is horse-shoe shaped and extends around the small intestine like a frame. Its function is to absorb body water from the matter, and then to pass useless waste material from the body. It is subdivided into the appendix, caecum, ascending, transverse, descending and sigmoid colon, and the rectum. It has a length of about 1.5m and a width of 7.5cm. Layers of Gastrointestinal Tract(GI). The gastrointestinal tract is a muscular tube lined by epithelium, a special layer of cells. The contents of the tube are considered external to the body and are continuous with the outside at the mouth and the anus. The GI tract can be divided into four concentric layers as follows : Mucosa. The innermost layer of the gastrointestinal tract is surrounding the lumen, or open space within the tube. This layer contacts with digested food (chyme). The mucosa cosists of: Submucosa. The submucosa surrounds the muscularis mucosa and consists of fat,dense, irregular fibrous connective tissue and larger vessels , lymphatics, and nerves branching into the mucosa. At its outer margin there is a specialized nerve plexus(enteric nervous plexus) called the submucosal plexus or Meissner plexus. This supplies the mucosa and submucosa. Muscularis externa. This smooth muscle layer consists of inner circular and outer longitudinal layers of muscle fibres separated by the myenteric plexus or Auerbach plexus. Neural innervations control the contraction of these muscles. The coordinated contractions of these layers is called peristalsis and moves the food down through the tract. From the mouth down to the stomach, Food is called a bolus(ball of food). After the stomach, the food is partially digested and semi-liquid, and is called as chyme. In the large intestine the remaining semi-solid substance is referred to as faeces. Adventitia or serosa. Adventitia is the outermost connective tissue covering of an organ, vessel, or other structure. It is also called the tunica adventitia or the tunica externa. In GI tract, the muscularis externa is covered mostly by serosa. But, at the oral cavity, thoracic esophagus, ascending colon, descending colon and the rectum, the muscularis externa is bounded by adventitia. (The muscularis externa of the duodenum is covered by both tissue types.) Generally, if it belong to the digestive tract that is free to move, it is bounded by serosa, but if it is relatively rigidly fixed, it is covered by adventitia. See also Wikipedia,Electrogastrogram Respiratory System. The Respiratory System is indispensable to every human. Through the respiratory system, oxygen enters our bodies and carbon dioxide leaves our bodies. The respiratory system is composed of the air pathways,the lungs, alveoli, pulmonary vasculature, respiratory muscles, and surrounding tissues and structures.
300038
396820
https://en.wikibooks.org/wiki?curid=300038
Beekeeping/Swarm Prevention
It is important to both understand the mechanisms that cause swarming, and the differences between swarm prevention and control. Swarming. Swarming is a natural reproductive urge, which causes an increase in the number of colonies. While beekeepers try to minimise the swarming instinct, it can never be completely removed, as this would lead to a demise of colonies outside of a managed environment. Swarms generally leave the colony the day after queen cells are capped, which happens around 8-9 days. This means that, during swarm season, beekeepers must inspect colonies every 8-9 days to avoid losing swarms. There are a variety of factors involved in causing swarming, including: However, the prime factor is the level of queen pheromone being received by adult worker bees during trophallaxis and interaction with the queen and other workers in the colony. A drop in the level of pheromone causes swarming tendencies - this being triggered by many of the factors listed above (e.g. an old queen produces less pheromone, a high level of workers 'dilutes' the available pheromone across the hive, etc). Swarm Prevention. Swarm prevention involves taking steps to reduce or remove the swarming instinct. Some methods of swarm prevention are as follows: Increase colony space. Adding more brood boxes or supers to a hive allows freer movement of bees, and increases the available space for laying brood, storing honey, and eases adult bee movement in the hive. It is common for beekeepers to refer to the "Rule of 7's" when inspecting a hive - that is if there are 7 or more frames covered in bees, or filled with brood or stores, it is time to add more boxes as appropriate. A variant of this technique is to swap around frames or boxes in a hive. For example, if in a double brood box, the top box is congested while the bottom box is empty, they can be swapped around - or some full frames can be exchanged with empty frames between boxes. Removal of Queen Cells. In some circumstances, the removal of 'dry' (no brood present) queen cells or very young queen cells can delay the urge to swarm. However, this operation should not be performed more than 2-3 times in a colony, since a colony may eventually swarm anyway, leaving the original hive lacking a replacement queen. It is also important to inspect all frames very carefully, as a single queen cell is enough to trigger swarming. Queen Clipping. Queen clipping involves clipping the tip off one of the queen's wings, making her unable to fly (or at least unable to fly great distances). This means that should a colony swarm, the queen will be unable to join the swarm, and eventually the swarm will return to the hive. This allows beekeepers to switch from a 9-day inspection cycle to a 14-day cycle, since action only needs to be taken before the new queen cells hatch (at which point either the queens will fight, or the virgin queen will swarm). A clipped queen can still be lost, since having left the hive, she may be unable to return to it. However in many cases the loss of a queen is preferred to the loss of a queen *and* accompanying swarm. Swarm Control. Swarm control refers to methods which prevent the swarming urge completely - usually by simulating some of the conditions of a swarm. There are many methods of swarm control available, but they each derive from one of three 'original' swarm control methods. Pagden Method. The Pagden method is one of the oldest and most commonly used swarm control methods. The end result is as follows: The main variant of the Pagden Method is the Heddon Method. Heddon Method. This variant aims to maintain the number of flying bees in the queen-right hive by 'bleeding' them into the original hive. This helps to support the honey harvest during a flow. The same procedure is followed as above, but with a minor change. Demaree Method. The Demaree method was originally designed to remove the need to split a colony in 2 when swarming, allowing all the bees to continue to work in one hive, improving yields. Unlike the Pagden method, the Demaree method increases the height of a single hive, rather than adding a second hive to an apiary. This can be useful in terms of saving on buying new equipment, and in cases of limited space. The Demaree method is more successful when performed before the first signs of swarming are seen - i.e. before queen cells are being built. However it will still work provided the queen cells are not too far developed. Nurse bees will move up to the top box to care for the brood, while flying bees will move to the bottom box to continue foraging. The absence of a laying queen will cause the top box to slowly empty as brood hatches. Brood will gradually build up in the bottom box. The absence of queen pheromones in the top box (due to reduced trophallaxis, and lack of footprint pheromone) will cause the bees in the top box to begin to develop queen cells. The beekeeper now has several options: Care must be taken in all cases not to allow queen cells in the top box to hatch, or the presence of a virgin queen may cause the colony to swarm. However, there are some techniques which can be used to manage a 2-queen colony. In this case, a top entrance and second queen excluder would be needed under the top brood box to prevent the new queen laying in the supers. When the bottom box begins to become crowded, the now empty top box can be substituted for the bottom box, repeating the procedure. It is not usually necessary to repeat this more than twice in a season. The beekeeper should visit the hive every 5-7 days to remove the roof and release any drones which have emerged in the top box, since they will be unable to leave through the bottom entrance due to the presence of the queen excluder. Snelgrove Method. The Snelgrove method is similar to the Demaree method in that it maintains a single 'tower' hive on one location - however it uses a special Snelgrove Board fitted with a series of doors to control the population in each part of the split. The Snelgrove board is a double-sided crown board with bee-space above and below a central rim. Pairs of doors are placed on 3 sides of the board, with each pair giving access to the upper and lower parts of the hive. The Snelgrove is similar to the Demaree, but with one extra step in the initial setup: The following sequence of door manipulation is used to 'bleed' foraging bees from the top box into the bottom box, starting with all doors closed: The hive now consists of 2 colonies - the lower colony (with the original queen) using the front door, and the upper colony (queenless) using the rear door. The beekeeper can either allow queen cells to develop and emerge in the top box, and treat this as a second hive, or remove any queen cells and the Snelgrove board, and manage the upper box as in the Demaree system (on top of supers), or add it back directly on top of the lower box as a double-brood hive. In these cases, due to the period of separation due to the Snelgrove board, the use of newspaper for merging is advised. Taranov Method. The Taranov method is named after its Russian inventor, G. F. Taranov. It attempts to mimic the behaviour of the bees wishing to swarm to separate out the young, swarming bees, from the older, non-swarming bees. It is best to do this operation late in the day, so that the urge of the newly swarmed bees to fly and return is reduced.
300049
3226541
https://en.wikibooks.org/wiki?curid=300049
A-level Computing 2009/AQA/Problem Solving, Programming, Operating Systems, Databases and Networking/Problem Solving/Big O Notation
Big O Notation (also known as Big-O Notation) is a mathematical way of describing the limiting behaviours of a function. In other words, it is a way of defining how efficient an algorithm is by how "fast" it will run. Timing. You can work out the time that an algorithm takes to run by timing it: Dim timer As New Stopwatch timer.Start For x = 1 to 1000000000 'count to one billion! Next timer.Stop ' Get the elapsed time as a TimeSpan value. Dim el As TimeSpan = stopWatch.Elapsed ' Format and display the TimeSpan value. Dim formattedTime As String = String.Format("{0}:{1}:{2}.{3}", el.Hours, el.Minutes, el.Seconds, el.Milliseconds / 10) Console.WriteLine("Time Elapsed: " + formattedTime) However, this isn't always suitable. What happens if you run some code on a 33 MHz processor, and some code on a 3.4 GHz processor. Timing a function tells you a lot about the speed of a computer and very little about the speed of an algorithm. Refining algorithms. dim N as integer = 7483647 dim sum as double= 0 for i = 1 to N sum = sum + i loop console.writeline(sum) optimised version dim N as integer = 7483647 dim sum as double = N * (1 + N) / 2 console.writeline(sum)
300068
46022
https://en.wikibooks.org/wiki?curid=300068
Pinyin/News summary/2014
"See also" 2014-12-31. China's industry shrinks. 中国工业收缩 Zhōngguó gōngyè shōusuō HSBC's survey showed that China's manufacturing activity shrank for the first time in seven months in December. HSBC 调查显示12月份中国制造业活动7个月以来首次收缩。 HSBC diàochá xiǎnshì 12 yuèfèn Zhōngguó zhìzàoyè huódòng 7 gè yuè yǐlái shǒucì shōusuō. Special economic zones create miracles. jingjih tehqu chuahngzaoh qirjih In 1980s, China set up Shenzhen, Zhuhai, Shantou, Xiamen and Hainan special economic zones. In the past 3 decades, these special economic zones have created miracles that make China became the second largest economy of the world. 80 niarndaih ZG jiahnlih Shenzhehn, Zhuhaai, Shahntour, Xiahmern her Haainarn jingjih tehqu. guohquh 30 niarn zhehxie jingjih tehqu chuahngzaoh qirjih, shii ZG cherngweir shihjieh dih-2 dah jingjihtii. 2014-12-30. Ebola kills 7,500. Ebola shasii 7500 Ebola has killed more than 7,500 people in 2014, leading to an international threat. 2014 niarn Ebola shasii chaoguoh 7500 rern, duih guorjih zaohcherng weixier. Afghanistan's bloody year 2014. Afghanistan xuehxing de 2014 niarn Afghanistan's violence has increased rapidly in the year of 2014, with at least 4,600 Afghanistan soldiers having been killed by the Taliban. It is the bloodiest year since 2001. 2014 niarn Afghanistan de baohlih xuhnsuh zengjia, zhihshaao 4600 geh Afghanistan junrern beih Taliban shasii, shih 2001 niarn yiilair zuih xuehxing de yi niarn. 2014-12-29. Guangzhou-Guiyang highspeed rail opened. Guaangzhou-Guihyarng gaotiee tongche China's Guangzhou-Guiyang highspeed rail with 856km long, spends RMB125.9bn. It reduces travel time from 22 hours to 4 hours and 9 minutes. ZG Guaangzhou-Guihyarng gaotiee, charng 856km, haohzi RMB125.9bn, lvvtur shirjian corng 21 xiaaoshir suojiaan zhih 4 xiaaoshir 9 fenzhong. China completes USD80bn canal. ZG USD80bn yuhnher warncherng China has completed its largest canal with 1,200km long, spends USD80bn, delivering water from Chang Jiang and Huang He rivers to Beijing. ZG zuih dah yuhnher warncherng, charng 1200km, haohzi USD80bn, baa Charng Jiang her Huarng Her de shuii yuhn waang Beeijing. Smoking damages the whole body. xiyan suunhaih quarnshen Study shows that besides smoking can damage heart and lung, also can damage bones, muscles, brain, teeth and eyes. yarnjiu xiaanshih xiyan churle huih suunhaih xin-feih, yee huih suunhaih guuger, jirouh, naaobuh, yarchii her yaanjing. 2014-12-27. Nicaragua Canal begins construction. Nicaragua Yuhnher dohnggong Nicaragua has announced to start building of the Nicaragua Canal linking the Atlantic and Pacific Oceans. The canal to be built by China, spending USD50bn. It will be longer, deeper and wider than the Panama Canal. Nicaragua xuanbuh liarnjie Dahxi Yarng her Taihpirng Yarng de Nicaragua Yuhnher dohnggong. Yuhnher your ZG jiahnzaoh, haohzi USD50bn, bii Panama Yuhnher gehng charng, gehng shen, gehng kuan. 2014-12-26. China buys 60 Boeing 737. ZG maai 60 jiah Boeing 737 China's national airline, China Air, buys 60 Boeing 737 airplanes, total amount more than USD6bn. ZG guorjia harngkong, ZG Harngkong, maai 60 jiah Boeing 737 feiji, zoongzhir chaoguoh USD6bn. India rebel army kills 72. India 叛军杀72人 India pànjūn shā 72 rén Rebel army has attacked villages in India's northeastern province Assam, killing at least 72 people. India 东北部 Assam 省叛军袭击乡村,杀死至少72人。 India dōngběibù Assam shěng pànjūn xíjí xiāngcūn, shā sǐ zhìshǎo 72 rén. AU soldiers killed. AU 军人被杀 AU jūnrén bèi shā Islamic fighters have attacked the military headquarters in Somalia's capital Mogadishu , killing at least 3 African Union's soldiers. Islam 战士袭击 Somalia 首都 Mogadishu 的军事总部,杀死至少3个非洲联盟军人。 Islam zhànshì xíjí Somalia shǒudū Mogadishu de jūnshì zǒngbù, shā sǐ zhìshǎo 3 gè Fēizhōu Liánméng jūnrén. 2014-12-23. Exercise keeps body fit. 运动使身材好 Yùndòng shǐ shēncái hǎo Studies have shown that doing exercise leads to sleep well, prevents diseases, and keeps body fit. 研究显示运动使睡得好、预防疾病、身材好。 Yánjiū xiǎnshì yùndòng shǐ shuì dé hǎo, yùfáng jíbìng, shēncái hǎo. Insufficient sleep causes obesity. 睡眠不足导致痴肥 Shuìmián bùzú dǎozhì chīféi A study shows that not enough sleep can cause cardiovascular disease, metabolic diseases such as obesity and diabetes, and cancer. 研究显示睡眠不足可导致心血管病,代谢病如痴肥和糖尿病,和癌症。 Yánjiū xiǎnshì shuìmián bùzú kě dǎozhì xīnxuèguǎnbìng, dàixièbìng rú chīféi hé tángniàobìng, hé áizhèng. 2014-12-16. Executed Chinese teenage innocent. beih chuujuer ZG qingniarn wurgu A court in China has found an 18-year-old young man is not guilty, 18 years after he was executed. The young man had tried to help save a woman who was raped and killed, but the young man had been arrested by the police, and sentenced to death penalty. The court has compensated the victim's family RMB30,000. ZG faayuahn pirngfaan 18 niarn qiarn beih chuujuer de 18 suih narn qingniarn wurzuih. narn qingniarn shihtur zheengjiuh beih jiansha nvvrern, queh beih jiingfang jubuu bihng pahn siixirng. faayuahn peircharng shouhhaihrern jiashuu RMB30,000. 2014-12-08. Paris to ban diesel cars. Paris jihnzhii chairyour che The mayor of Paris plans to ban diesel cars in the capital of France, Paris, by 2020 for fighting pollution. Paris shihzhaang jihhuah 2020 niarn zaih Faaguor shooudu Paris jihnzhii chairyour che duihkahng wuraan. 2014-12-05. Obesity causes disability. chifeir daaozhih carnfeih Study shows that obesity causes cardiovascular disease, diabetes, disability and death. yarnjiu xiaanshih chifeir daaozhih xinxuehguaanbihng, tarngniaohbihng, carnfeih her siiwarng. 2014-11-25. China manufacturing slows down. ZG gongyeh fahnghuaan China's industrial activity slows down in November. Manufacturing sector is a key driver of China's economy, which affects global economic growth. Zhongguor Shiryiyueh gongyeh fahnghuaan. gongyeh shih ZG jingjih de zhuuyaoh dohnglih, yiingxiaang quarnqiur jingjih zengzhaang. 2014-11-14. China's economy slows down. Zhongguor jingjih fahnghuaan Economic data shows that China's economic growth is slowing down. jingjih shuhjuh xiaanshih Zhongguor jingjih zengzhaang fahnghuaan. 2014-11-13. Ebola kills more than 5,000. Ebola sii chaoguoh 5,000 The death number of people of the Ebola outbreak has exceeded 5,000. This is the worst Ebola outbreak in the history. zheh cih Ebola yihzhehng siiwarng rernshuh yiijing chaoguoh 5,000, shih lihshii shahng zuih yarnzhohng de. 2014-11-11. Afghanistan Taliban kills 10 policemen. Afghanistan Taliban sha 10 jiingchar A Taliban suicide bomber has attacked a police headquarters in eastern Afghanistan, killing at least 7 policemen. Another Taliban's remote-controlled bomb has killed at least 3 policemen. Taliban zihsha zhahdahn xirji Afghanistan dongbuh jiingchar zoongjur, zhahsii zhihshaao 7 geh jiingchar. lihngyi Taliban yaorkohng zhahdahn zhahsii zhihshaao 3 geh jiingchar. 2014-10-14. Taliban kills 22 Afghanistan soldiers. Taliban sha 22 Afghanistan shihbing Taliban has attacked a convoy in northern Afghanistan, killing at least 22 government soldiers. Taliban xirji Afghanistan beeibuh yi geh cheduih, shasii zhihshaao 22 geh zhehngfuujun. 2014-10-12. Police chief of Iraq's Anbar province killed. Iraq de Anbar Sheeng jiingzhaang beihsha The police chief of Iraq's Anbar province has been killed in a bomb attack, as Islamic State's troops are advancing. At least 75 people have been killed in bomb attacks in Iraq this weekend alone. Islamic State de junduih tuijihn zhijih, Iraq de Anbar Sheeng jiingzhaang beih zhahdahn zhahsii. guangshih zheh geh zhoumoh, Iraq zhihshaao 75 rern beih zhahdahn zhahsii. Stock markets fall sharply. guupiaoh dahfur xiahdie European and US stock markets have seen sharp falls as fears have deepened over prospects for the global economy. youryur duih shihjieh jingjih qiarnjiing de youlvh jiajuh, Ou-Meei guupiaoh shihchaang dahfurduh xiahdie. Boko Haram releases Chinese hostages. Boko Haram shihfahng ZG rernzhih 10 Chinese workers kidnapped by Boko Haram have been released and arrived Cameroon's capital. Boko Haram jierchir de 10 geh ZG gongrern beih shihfahng daohdar Cameroon shooudu. 2014-10-11. China has confidence in HK stability. ZG yoou xihnxin HK weendihng China's Premier Li Keqiang says that China can keep Hong Kong's stable, as the demonstration in the region reached a third week. Xianggaang shihwei jihnruh dih-3 zhou, ZG zoonglii Lii Kehqiarng shuo ZG nerng weirchir HK weendihng. Ebola deaths exceed 4,000. Ebola sii chaoguoh 4000 The number of deaths of people caused by the Ebola outbreak has risen more than 4,000, most of them in West Africa. Ebola wenyih daaozhih de siiwarng rernshuh shahngsheng chaoguoh 4000, dahbuhfehn zaih Xifei. 2014-10-10. Smog spreads over northern China. Huarbeei yanwuh-mirmahn Air pollution in parts of northern China is very serious. Beijing, Tianjin and Hebei have issued an orange alert, the second highest. The elderly and those with heart or lung problems have been advised to stay indoors. Huarbeei buhfehn dihqu kongqih wuraan heen yarnzhohng. Beeijing, Tianjin, Herbeei fachu dih-2 gao de huarngseh jiingbaoh. laaorern, xinzahng her huxi jirbihng huahnzhee beih quahnyuh liur zaih shihneih. 2014-10-09. Tens of thousands displaced by China quake. ZG dihzhehn jii-wahn rern shusahn A 6 magnitude earthquake has attacked the southern province of Yunnan in China, killing 1 person, injuring hundreds, and displacing tens of thousands of people. ZG narnbuh Yurnnarn Sheeng 6 jir dihzhehn, 1 rern siiwarng, jii-baai rern shouhshang, jii-wahn rern shusahn. UK sends troops to tackle Ebola. UK paih junduih duihfuh Ebola The UK is sending 750 army members to Africa to cope with the Ebola outbreak. Yingguor paih 750 geh junrern daoh Feizhou duihfuh Ebola baohfa. 2014-10-07. Bad news hit stock markets. huaih xiaoxi daaji guupiaoh Global stock markets have been hit by worries over global economic growth following a series of bad news. yixihlieh huaih xiaoxi daaozhih quarnqiur jingjih zengzhaang de youlvh, daaji quarnqiur guupiaoh shihchaang. Colombia lightning kills 11 people. Colombia 闪电杀11人 Colombia shǎndiàn shā 11 rén Lightning has attacked a temple in northern Colombia, killing 11 people and injuring 15 others. Colombia 北部闪电袭击庙宇,杀死11人,15人受伤。 Colombia běibù shǎndiàn xíjí miàoyǔ, shāsǐ 11 rén, 15 rén shòushāng. 2014-10-06. IS occupies key town in Syria. IS 占领 Syria 重镇 IS zhànlǐng Syria zhòngzhèn Islamic State's troops are reported to have seized the town of Kobane in notherh Syria near the border with Turkey. 据报 Islam 国军队夺得 Syria 北部靠近 Turkey 边境的市镇 Kobane。 Jùbào Islam Guó jūnduì duódé Syria běibù kàojìn Turkey biānjìng de shìzhèn Kobane. 2014-10-03. India stampede kills dozens. India rern-caai-rern, jii-shir sii At least 32 people have died in a stampede at a Hindu religious festival in the province of Bihar in northern India. India beeibuh sheengfehn Bihar yi geh Hindu zongjiaoh jierrih rern-caai-rern, zhihshaao 32 rern siiwarng. UN soldiers killed in Mali. Mali UN 军人被杀 Mali UN jūnrén bèishā Al-Qaeda related Islamic rebel army has attacked a convoy in northeast Mali, killing 9 UN soldiers. Mali 东北部 al-Qaeda 有关的 Islam 叛军袭击车队,杀死9个 UN 士兵。 Mali dōngběibù al-Qaeda yǒuguān de Islam pànjūn xíjī chēduì, shāsǐ 9 ge UN shìbīng. IS attacks Syria key town. IS jihngong Syria zhohngzhehn Islamic State's troops have stepped up attack on the town of Kobane in northern Syria near the border with Turkey. Islam Guor junduih jiaqiarng jihngong Syria beeibuh kaohjihn Turkey bianjieh de shihzhehn Kobane. Taliban kills Afghanistan soldiers. Taliban sha Afghanistan shihbing Taliban's suicide bombings have attacked army buses in Afghanistan's capital Kabul, killing at least 10 soldiers and injuring many. Afghanistan shooudu Taliban zihsha zhahdahn xirji junche, zhahsii zhihshaao 10 geh shihbing, duo geh shouhshang. 2014-10-02. Libya soldiers killed by bombings. zhahdahn zhahsii Libya shihbing Car bombings have attacked a checkpoint near the airport of the eastern city of Benghazi in Libya, killing at least 7 soldiers and injuring about 60. qihche zhahdahn xirji Libya dongbuh cherngshih Benghazi jichaang fuhjihn guanqiaa, zhahsii zhihshaao 7 geh shihbing, yue 60 geh shouhshang. 2014-09-26. Cancer kills three 9/11 firefighters on the same day. 3 geh 9/11 xiaofarngyuarn torngrih sii yur airzhehng Three firefighters who were on duty at Ground Zero during the 9/11 attacks have died on the same day from cancer. 9/11 xirji qijian zaih Ground Zero zhirban de 3 geh xiaofarngyuarn torngrih sii yur airzhehng. 2014-09-25. China's richest person. Zhongguor shooufuh Jack Ma, the Executive Chairman of Alibaba Group, is the richest person of China, with a wealth of 150 billion Renminbi. Jack Ma, Alibaba Jirtuarn Doongshihzhaang, Zhongguor shooufuh, yongyoou cairfuh 1500 yih Rernmirnbih. 2014-09-21. Bomb kills policemen in Cairo. Cairo zhahdahn sha jiingchar A bomb has exploded near the Egyptian foreign ministry in Cairo, killing at least 2 police officers. Rebel army has attacked the military frequently after Egypt's people-elected president Mohammed Morsi was overthrown in a military coup. Cairo de Egypt waihjiaobuh fuhjihn yi geh zhahdahn zhahsii zhihshaao 2 geh jiingchar. Egypt mirnxuaan zoongtoong Mohammed Morsi beih junshih zhehngbiahn tuifan houh, pahnjun jingcharng xirji junfang. 2014-09-15. Migrant boat sinking kills 500. yirmirn chuarn chernmoh 500 sii A migrant boat has sunk off the coast of Malta, killing about 500 people. Malta haaimiahn yirmirn chuarn chernmoh, yue 500 rern siiwarng. Walking or cycling is good for health. zoouluh huoh qirche yoouyih jiahnkang A study suggests that walking or cycling to work is beneficial to health. yarnjiu xiaanshih zoouluh huoh qirche shahngban yoouyih jiahnkang. 2014-09-12. IS number of soldiers increases sharply. IS junrern shuhzih dahfur zengjia The CIA's information shows the number of soldiers of Islamic State (IS) may have up to 31,000, 3 times as many as previously estimated. CIA qinrngbaoh xiaanshih Islam Guor (IS) de junrern shuhzih keenerng gaodar 3,1000, shih xianqiarn gujih de 3 beih. 2014-09-10. Nato kills Afghanistan civilians. Nato sha Afghanistan pirngmirn Nato has airstriked the province of Kunar in eastern Afghanistan, killing at least 11 civilians including women and children, and injuring 16 others. Nato kongxir Afghanistan dongbuh Kunar-sheeng, zhahsii zhihshaao 11 geh pirngmirn baokuoh fuhrur, 16 rern shouhshang. 2014-09-09. The most serious Ebola outbreak. zuih yarnzhohng Ebola baohfa The Ebola outbreak in West Africa has killed 2,288 people, with half of them dying in the last 3 weeks. This is the worst Ebola outbreak in the history. Xifei Ebola baohfa shasii 2288 rern, bahnshuh zaih guohquh 3 xingqi siiwarng. zheh shih lihshii shahng zuih yarnzhohng de Ebola baohfa. EU adopts new sanctions on Russia. EU通过对Russia新的制裁 EU tōngguò duì Russia xīn de zhìcái European Union member states have formally adopted new sanctions on Russia over the Ukraine crisis. 由于Ukraine危机,欧盟成员国正式通过了对Russia新的制裁。 Yóuyú Ukraine wēijī, Ōuméng chéngyuánguó zhèngshì tōngguòle duì Russia xīn de zhìcái. 2014-09-08. Boko Haram occupies key town. Boko Haram占领重镇 Boko Haram zhànlǐng zhòngzhèn Nigeria's Boko Haram Islamic fighters have captured the key northeastern town of Michika, trying to gain more territory for creating an Islamic country. Nigeria的Boko Haram Islam战士夺取东北重镇Michika,为创建Islam国家争取更多的领土。 Nigeria de Boko Haram Islam zhànshì duóqǔ dōngběi zhòngzhèn Michika, wèi chuàngjiàn Islam guójiā zhēngqǔ gèng duō de lǐngtǔ. Somalia suicide bomber kills 12 people. Somalia zihsha zhahdahn sha 12 rern A suicide car bomber has attacked an African Union convoy near Somalia's capital Mogadishu, killing at least 12 people. zihsha zhahdahn xirji Somalia shooudu Mogadishu fuhjihn de Feizhou Liarnmerng cheduih, shasii zhihshaao 12 rern. This is the first attack after Somalia's Islamic rebel army vowed to revenge the killing of its leader in a US air strike. zheh shih Islam pahnjun shihyarn baohfur US kongxir shasii ta'men de liingxiuh zhihouh de shooucih xirji. China's export exceeds expectation. ZG chukoou chaoguoh yuhqi China's export numbers have risen by 9.4% in August from a year earlier, more than the forecast of 8%. ZG Bayuehfehn chukoou shuhzih bii quhniarn torngqi shahngsheng 9.4%, chaoguoh yuhqi de 8%. Pound Sterling falls. Yingbahng xiahdie The Pound Sterling has fallen to its lowest level in 10 months because of worrying about Scotland's independence. youryur youlvh Scotland durlih, Yingbahng xiahdie daoh 10 geh yueh yiilair zuih di shuiipirng. Japan's economy shrinks 1.8%. Rihbeen jingjih shousuo 1.8% Japan's econony in the 2nd quarter of the year has contracted at an annualized rate of 7.1%. Rihbeen dih-2 jihduh jingjih ahn niarn suahn shousuo 7.1%. 2014-09-07. Ukraine's ceasefire is near to collapse. Ukraine tirnghuoo jiejihn bengkuih Following overnight artillery attacks in Mariupol, there is new shelling near Donetsk airport, raising fears that Ukraine's truce is close to collapse. suir'zhe Mariupol zheengyeh paohzhahn, Donetsk jichaang fuhjihn yoou xin de paohhong, shii rern danxin Ukraine de xiuzhahn binlirn bengkuih. 2014-09-05. A death by suicide every 40 seconds. meei 40 miaao 1 rern zihsha sii Somebody dies by taking their life every 40 seconds, according to a report of the WHO (World Health Organization). juh WHO (Shihjieh Weihsheng Zuuzhi) baohdaao, meei 40 miaao 1 rern zihsha siiwarng. There are about 800,000 people die by suicide per year. The main reason causes suicide is mental health problem. meei niarn yue 80,0000 rern zihsha siiwarng. zihsha de zhuuyaoh yuarnyin shih jingshern wehntir. 2014-09-03. Ebola death number of people more than 1,900. Ebola siiwarng rernshuh chaoguoh 1900 More than 1,900 people have died in West Africa's Ebola outbreak, 40% of them in the past 3 weeks, the WHO says. WHO shuo, Xi Fei Ebola baohfa chaoguoh 1900 rern siiwarng, guohquh 3 xingqi zhahn 40%. 2014-08-24. IS seizes Syria airbase. IS duorquu Syria kongjun jidih Syrian TV have confirmed that Islamic State troops have taken control of its important airbase, after hundreds of people have been killed on both sides in days of fighting. Syria TV zhehngshir, jii tian zhahndouh daaozhih shuangfang shuhbaai rern beihsha houh, Islam Guor junduih zhahnliing le ta de zhohngyaoh kongjun jidih. About 200,000 people have been killed in last 3 years in Syria's war, the UN says. UN shuo, yue 200,000 rern zaih guohquh 3 niarn de Syria zhahnzheng beihsha. 2014-08-20. Japan landslides kill 32. Rihbeen shanbeng 32 sii Landslides have attacked a residential area near a mountain in the suburb of the city of Hiroshima in Japan, killing at least 32 people, and 9 people are missing. shanbeng xirji Rihbeen cherngshih Hiroshima jiaoqu yi geh dahshan fuhjihn de mirnju, shasii zhihshaao 32 rern, 9 rern shizong. US reporter beheaded. US jihzhee beih kaantour The Islamic State has issued a video showing the beheading of US reporter James Foley. Islam Guor fafahng shihpirn xiaanshih US jihzhee James Foley beih kaantour. The Islamic State said the killing was revenge for US air strikes against them. Islam Guor shuo kaantour shih weihle baohfur US kongxir ta'men. 2014-08-17. Suicide bomber kills UN soldiers. zihsha zhahdahn sha UN shihbing A suicide bomber has attacked a UN military base in the north of Mali, killing at least 2 UN soldiers and injuring many others. zihsha zhahdahn xirji Mali beeibuh de UN junshih jidih, shasii zhihshaao 2 geh UN shihbing, duo geh shouhshang. 2014-08-13. Islamic State seizes towns. Islam Guor duorquu shihzhehn Islamic State has controlled some towns in Syria's northern province of Aleppo, according to reports from activities. juh huoryueh fehnzii baohdaao, Islam Guor kohngzhih le Syria beeibuh sheengfehn Aleppo de yixie shihzhehn. More US soldiers go to Iraq. gehngduo Meeijun quh Iraq Following sending air force for bombing Islamic State, the US has sent 130 more military advisors to Iraq. suir'zhe paih kongjun hongzhah Islam Guor, US duo paih 130 geh junshih guhwehn daoh Iraq. 2014-08-10. China car accident kills 44. ZG chehuoh 44 sii A tourist bus crashed into 2 other cars and then fell off a 10m cliff at the autonomous region of Xizang in China, killing 44 people and injuring many. ZG Xizahng Zihzhihqu yi jiah lvvyour bus zhuahng 2 che houh dieluoh 10m xuarnyar, zhihshaao 44 rern siiwarng, duo rern shouhshang. China's road safty is one of the worst in the world. The death rate of China's car accident is about 20 per 200,000 each year, higher than Russia or India and double the rate of US. ZG de daohluh anquarn shih shihjieh zuih chah zhiyi, chehuoh siiwarnglvh dahyue shih meei niarn meei 200,000 rern sii 20 geh, gao yur Russia her India, shih US de 2 beih. 2014-08-08. Low vitamin D increases dementia risk. di vitamin D zengjia chidaizhehng fengxiaan Old people lack of vitamin D can increase the risk of developing dementia. laao rern quefar vitamin D huih zengjia huahn chidaizhehng fengxiaan. 2014-08-07. Iraq Christians flee. Iraq Jidutur taorwarng Hundreds of thousands of Christians flee as Islamic rebel army takes the minority's biggest town in northern Iraq. Islam pahnjun duorquu Iraq beeibuh shaaoshuh mirnzur de zuih dah shihzhehn, jii shir wahn Jidutur taorwarng. 2014-08-06. Putin imposes sanctions on the West. Putin 制裁西方 Putin zhìcái Xīfāng Russian President Putin has banned or limited agricultural imports from countries which imposing sanctions on Russia. Russia 总统 Putin 禁止或限制从制裁 Russia 的国家进口农产品。 Russia zǒngtǒng Putin jìnzhǐ huò xiànzhì cóng zhìcái Russia de guójiā jìnkǒu nóngchǎnpǐn. 2014-08-05. Afghanistan senior US soldier killed. Afghanistan gaoji Meeijun beihsha A man wearing Afghanistan's military uniform has opened fire at a British military school in the capital of Afghanistan, killing at least 4 NATO soldiers including a senior US general, and injuring many others. yi 'ge chuan Afghanistan junfur de rern zaih Afghanistan shooudu Kabul de Yingguor junxiaoh kaihuoo, shasii zhihshaao 4 'ge NATO junrern baokuoh yi 'ge gaojir US junguan, lihngwaih duo rern shouhshang. 2 British soldiers were among the wounded, along with several American soldiers, a German general and an Afghan general. shangzhee baokuoh 2 'ge Yingjun, jii 'ge Meeijun, yi 'ge Derguor junguan her yi 'ge Afghanistan junguan. 2014-08-01. China Economy rises. Zhongguor jingjih shahngsheng China's manufacturing activity grows at its highest speed in more than 2 years in July. Zhongguor Qiyuehfehn gongyeh huordohng 2 niarn duo yiilair zengzhaang zuih kuaih. 2014-07-30. US economy rebounds. Meeiguor jingjih faantarn The economic growth of the United States in the second quarter of the year has risen at an annual rate of 4 %. Meeiguor dih-2 jihduh jingjih zengzhaang ahn niarnduh suahn shahngsheng 4%. 2014-07-29. Xinjiang attack kills dozens. Xinjiang xirji jii shir rern sii Militants have attacked a police station and government offices in Xinjiang, China, leaving dozens of people dead and many injured. wuuzhuangfehnzii xirji Zhongguor Xinjiang yi jian jiingjur her bahngongshih, daaozhih jii shir rern siiwarng, duo rern shouhshang. 2014-07-27. 1,000 Palestinians killed. 1,000 Palestine rern beihsha Israel's invasion in Gaza has killed more than 1,000 Palestinians recently, most of them are civilians. On the other side, the military of Gaza has killed 40 Israel soldiers. Israel zuihjihn ruhqin Gaza shasii chaoguoh 1,000 'ge Palestine rern, dahbuhfehn shih pirngmirn. lihngyi fangmiahn, Gaza junfang shasii 40 'ge Israel shihbing. 2014-07-24. Israel bombards UN school in Gaza. Israel paohhong Gaza UN xuerxiaoh Israel has bombarded a UN-run school used as a shelter in Gaza, killing at least 15 people and injuring more than 200 others. Israel paohhong Gaza yi jian UN de yohngzuoh bihhuhsuoo de xuerxiaoh, shasii zhihshaao 15 rern, chaoguoh 200 rern shouhshang. Israel has killed more than 725 palestinians in recent invasion. Israel zaih zuihjihn de ruhqin shasii chaoguoh 725 'ge Palestine rern. China economy rises. Zhongguor jingjih zengzhaang China's manufacturing activity rises at its fastest speed in 18 months in July, showing that its economy is good. Zhongguor Qiyuehfehn gongyeh huordohng shahngsheng 18 'ge yueh yiilair zuih Kuaih, xiaanshih jingjih haao. 2014-07-23. China-Latin America business jumps up. Zhongguor Latin Meeizhou shengyih yuehsheng Chinese trade with Latin America has grown rapidly. It is now the second-largest trading partner in Argentina and Cuba, and has been Brazil's largest since 2009. Zhongguor yuu Latin Meeizhou maohyih xuhnsuh zengjia, xiahzaih shih Argentina her Cuba dih-2 dah de, 2009 niarn yiilair shih Brazil zuih dah de maohyih huoobahn. China is the second-largest market for Venezuelan oil after the United States. Zhongguor zaih Meeiguoo zhihouh, shih Venezuela shiryour zuih dah maaijia. 2014-07-22. Afghanistan Taliban kill foreign soldiers. Afghanistan Taliban sha waihguor junrern A Taliban suicide bomber has attacked an anti-drug building outside the Kabul airport, killing at least 4 people, including at least 3 foreign soldiers. Taliban zihsha zhahdahn xirji Kabul jichaang waihmiahn de faan-durpiin dahlour, shasii zhihshaao 4 rern, baokuoh zhihshaao 3 'ge waihguor shihbing. 2014-07-21. Israel bombards hospital in Gaza. Israel paohhong Gaza yiyuahn Israel troops have bombards a hospital in Gaza, killing at least 5 people and injuring more than 70 others. Israel junduih paohhong Gaza yi jian yiyuahn, zhahsii zhihshaao 5 rern, chaoguoh 70 rern shouhshang. Hamas kills 13 Israel soldiers. Hamas shasii 13 'ge Israel junrern Hamas has killed 13 and captured one Israel soldiers since the beginning of Israel's ground invasion on Gaza at Saturday night. This is the biggest one day lost for Israel's army in years. zihcorng Xingqiliuh waanshahng Israel dihmiahn ruhqin Gaza yiilair, Hamas shasii 13 'ge her furluu yi 'ge Israel shihbing. zheh shih Israel junfang duo niarn lair zuih dah de suunshi. 2014-07-20. Foreign companies create 66,000 jobs in UK. waihguor gongsi zaih Yingguor chuahngzaoh 66,000 'ge zhirweih 66,000 jobs have been created by foreign countries. The main countries are from the US, Japan, France and Germany. waihguor gongsi zaih Yingguor chuahngzaoh le 66,000 'ge zhirweih, zhuuyaoh gongsi lairzih Meeiguor, Rihbeen, Faaguor her Derguor. Many people killed in Nigeria. Nigeria duo rern beih sha Rebel army has attacked a town in the northeast of Nigeria, half of the town has been burned down, killing many people. pahnjun xirji Nigeria dongbeeibuh yi 'ge shihzhehn, bahn 'ge shihzhehn beih shaohuii, shasii heen duo rern. Israel kills 500 people in Gaza. Israel zaih Gaza sha 500 rern Israel has killed more than 500 Palestine people in Gaza recently. At least 87 people have been killed only today. Israel zuihjihn zaih Gaza shasii chaoguoh 500 'ge Palestine rern. zhiishih jintian jiuh sha le zhihshaao 87 rern. China typhoon kills at least 17. 中国台风至少17死 Zhōngguó táifēng zhìshǎo 17 sǐ The biggest typhoon Rammasun to attack the provinces of Hainan, Guangdong and Guangxi in southern China in 40 years , killing at least 17 people, after it killed more than 94 people in the northern Philippines. 在Philippines北部杀死超过94人后,中国40年来最强台风Rammasun, 袭击华南省份海南、广东和广西,杀死至少17人。 Zài Philippines běibù shāsǐ chāoguò 94 rén hòu, Zhōngguó 40 niánlái zuì qiáng táifēng Rammasun, xíjī Huánán shěngfèn Hǎinán, Guǎngdōng hé Guǎngxī, shāsǐ zhìshǎo 17 rén. 2014-07-19. Egypt rebels kill 20 soldiers. Egypt叛军杀20士兵 Egypt pànjūn shā 20 shìbīng Rebel army has attacked a checkpoint in western Egypt, killing at least 20 soldiers. 叛军袭击Egypt西部一个检查站,杀死至少20个士兵。 Pànjūn xíjī Egypt xībù yī ge jiǎncházhàn, shāsǐ zhìshǎo 20 ge shìbīng. 19 migrants from Africa died. 19非洲移民死亡 19 Fēizhōu yímín sǐwáng 19 migrants have died as lack of fresh air in a crowded boat travelling from North Africa to Italy. 北非往Italy的拥挤船上19个移民缺氧死亡。 Běifēi wǎng Italy de yōngjǐ chuán shang 19 ge yímín quēyǎng sǐwáng. Iraq bombs kill 26. Iraq zhahdahn sha 26 A series of car bombs have killed at least 26 people in Iraq's capital Baghdad. Iraq shooudu Baghdad yixihlieh qihche zhadahn shasii zhihshaao 26 rern. Kenya bus attack kills 7. Kenya bus xirji 7 sii Islamic fighters have attacked a bus and then attacked a police car that arrived the scene near the resort island of Lamu in Kenya, killing 7 people including 4 policemen. Islam zhahnshih xirji Kenya duhjiah daao Lamu fuhjihn yi jiah bus her suirhouh daohdar xiahnchaang de jiingche, shasii 7 rern baokuoh 4 'ge jiingchar. China bus crash kills 38. Zhongguor bus zhuahnghuii 38 sii A lorry carring flammable liquid has driven into the back of a long-distance bus and caused a fire and an explosion in the province of Hurnarn in southern China, killing at least 38 people. Zhongguor narnbuh Hurnarn-sheeng yi jiah zaih'zhe yihrarn yehtii de huohche zhuahngxiahng yi jiah charngtur bus de cheweei, yiinqii dahhuoo her baohzhah, zhihshaao 38 rern siiwarng. 2014-07-18. Malaysia pessenger plane crashes in Ukraine. Malaysia kehji Ukraine zhuihhuii A Malaysia Airlines passenger plane reportedly has been shot down by a missile in Ukraine near the border with Russia, killing all 298 passengers and crew. Malaysia Harngkong kehji juhbaoh zaih Ukraine kaohjihn Russia bianjihng beih daaodahn jiluoh, 298 'ge cherngkeh her jiyuarn quarnbuh siiwarng. 2014-07-17. Islamic fighters kill 14 Tunisian soldiers. Islam zhahnshih sha 14 Tunisia junrern Islamic fighters have attacked checkpoints in the northwest of Tunisia, near the border with Algeria, killing at least 14 soldiers and injuring 20 others. Islam zhahshih xirji Tunisia dongbeeibuh kaohjihn Algeria bianjihng de jiaancharzhahn, shasii zhihshaao 14 'ge shihbing, 20 'ge shouhshang. Microsoft to cut 18,000 jobs. Microsoft cairyuarn 18,000 Microsoft plans to cut 18,000 jobs, it is the biggest job cut in its history. Microsoft jihhuah cairyyarn 18,000, shih Microsoft yooushiiyiilair zuih dah de. 2014-07-16. China's economy rises. Zhongguo jingji shangsheng China's economy rises in the second quarter of the year, showing that the government's stimulus moves have started to work. Zhongguo di-2 jidu jingji shangsheng, xianshi zhengfu de ciji cuoshi kaishi qi zuoyong. 2014-07-15. Afghanistan suicide bomb kills 89 people. Afghanistan zihsha zhahdahn sha 89 rern A suicide car bomb has attacked a busy market in eastern Afghanistan, killing at least 89 people and injuring many others. yi 'ge zihsha qihche zhahdahn xirji Afghanistan dongbuh yi 'ge farnmarng shihchaang, shasii zhihshaao 89 rern, duo rern shouhshang. 2014-07-14. Exercise prevents dementia. yuhndohng yuhfarng chidaizhehng Doing exercise can prevent obesity, hypertension, diabetes and dementia. yuhdohng nerng farngzhii chifeir, gaoxuehya, tarngniaohbihng her chidaizhehng. 2014-07-12. Israel kills about 123 Palestine people. Israel shasii yue 123'g Palestine rern The UN says that Israel has killed about 123 Palestinian people recently, most of them are civilians. Liarnherguor shuo Israel zuihjihn shasii yue 123'g Palestine rern, dahbuhfehn shih pirngmirn. Iraq army kills 255 Sunni prisoners. Iraq junduih sha 255'g qiurfahn A human right group says that Iraq's army has killed at least 255 Sunni prisoners recently. rernquarn zuuzhi shuo Iraq junduih zuihjihn shasii zhihshaao 255'g Sunni qiurfahn. 2014-07-11. Kurds seize 2 oil fields. Kurds duorquu 2 'ge yourtiarn Kurdish fighters have taken over 2 oil fields in northern Iraq and plan to be independent. Kurds zhahnshih zhahnliing Iraq beeibuh 2 'ge yourtiarn bihngqiee daasuahn durlih. 2014-07-10. Israel warplanes attack Gaza killing many. Israel kongxir Gaza zhahsii duo rern Israel warplanes attack Gaza, killing at least 60 people including women and children, and injuring many others. Israel kongxir Gaza, shasii zhihshaao 60 rern baokuoh fuhrur, duo rern shouhshang. 2014-07-09. Somalia fighters kill 14 soldiers. Somalia zhahnshih sha 14 shihbing Islamic fighters have attacked the presidential palace in Somalia's capital Mogadishu, killing at least 14 government soldiers. Islam zhahnshih xirji Somalia shooudu zoongtoongfuu, shasii zhihshaao 14 'ge zhehngfuujun. 2014-07-03. Germany approves minimum wage. Derguor tongguoh zuih di gongzi Germany has approved the country's first minimum wage. The minimum wage is 8.5 Euros per hour, which is higher than the US and UK. Derguor tongguoh gai-guor shoou'ge zuih di gongzi, meei xiaaoshir 8.5 Euro, gaoyur Meeiguor her Yingguor. US adds 288,000 jobs. US zengjia 288,000 zhirweih The US economy increased 288,000 jobs in June. The unemployment rate fell to 6.1%, its lowest level since September 2008. Meeiguor Liuhyueh jingjih zengjia 288,000 'ge zhirweih. shiyehlvh die zhih 6.1%, 2008 niarn Jiuuyueh yiilair zuih di. Two killed in Myanmar cIashes. Myanmar chongtu 2 sii Clashes between Buddhists and Muslims in the city of Mandalay in Myanmar have killed a Buddhist and a Muslim. Myanmar cherngshih Mandalay Forjiaohtur yuu Muslim chongtu, yi 'ge Forjiaohtur her yi 'ge Muslim siiwarng. Afghanistan suicide bomb kills 8 soldiers. Afghanistan zihsha zhahdahn sha 8 shihbing Taliban suicide bomb has attacked an Air force bus in Afghanistan's capital Kabul, killing at least 8 soldiers. Taliban xirji Afghanistan shooudu Kabul yi jiah Kongjun bus, shasii zhihshaao 8 'ge shihbing. Efficacious antibiotics running out. yoouxiaoh kahngshengsuh kuaih yohng warn Antibiotics work by disrupting important cellular processes of bacteria or by inhibiting reproduction. kahngshengsuh yohng yur yihzhih xihjun farnzhir. Over the last 25 years there has been a stop in the invention of efficacious antibiotics. guohquh 25 niarn meiryoou famirng yoouxiaoh de kahngshengsuh. Bacteria has become resistant to antibiotics by the means of natural resistance or random mutation. Xihjun nerng biahnhuah err diikahng kahngshengsuh. The lack of useful antibiotics would make surgery or chemotherapy impossible, as these procedures rely on antibiotics. shooushuh huoh huahliaor xuyaoh kahngshengsuh, queshaao yoouxiaoh de kahngshengsuh shii shooushuh huoh huahliaor bu keenerng. In the future, it is likely that a cut or a cough would kill. jianglair geshang huoh kersouh yee huih siiwarng. Antibiotics resistance become a problem when there is an overuse of it. lahnyohng kahngshengsuh zaohcherng xihjun kahngyaoh de wehntir. Intense farming practice and over prescription of antibiotics by doctors meant that bacteria become adapted and thrive. norngye huoh yisheng lahnyohng kahngshengsuh daaozhih xihjun de kahngyaohxihng. Resistant bacteria pass to humans from farms and hospitals via water supply, humans then pass those resistant bacteria to each others via coughing or direct hand-to-hand contact. yoou diikahnglih de xihjun corng norngchaang huoh yiyuahn jingguoh gongshuii xihtoong chuarn geei rern, jingguoh ker'sou her shoou yuu shoou de jiechuh zaih rernkoou li sahnbo. There now have strains of bacteria which have become resistant to all types of antibiotics available, making infection untreatable. xiahnjin yoou duo zhoong xihjun duih geh zhoong xiahnyoou de kahngshengsuh yoou diikahnglih, shiidaoh gaanraanbihng bu nerng zhihliaor. Scientists are lagging behind in the race against killing superbug. kexuerjia zaih duihkahng chaojir xihjun de guohcherng zhong luohhouh yur xihjun. Financial incentive from the government is urgently needed to facilitate the time and ingenuity needed for the development of new antibiotics. zhehngfur yaoh corngsuh tirgong zijin bangzhuh zhengquu shirjian famirng xin de kahngshengsuh. Ebola crisis meeting in West Africa. Xifei Ebola weiji huihyih The World Health Organization (WHO) hosts an emergency meeting in Ghana as Ebola outbreaks in West Africa. It is the most serious Ebola outbreak in history as more than 400 people have died. youryur lihshii shang zuih yarnzhohng de Ebola bihngdur zaih Xifei mahnyarn daaozhih chaoguoh 400 rern siiwarng, Shihjieh Weihsheng Zuuzhi (WHO) zaih Ghana zhaohkai jiinjir huihyih. 2014-07-01. Egypt bomb explosions kill 2 policemen. Egypt zhahdahn zhahsii 2 'ge jiingchar 2 bombs have exploded near the presidential palace in Egypt's capital Cairo, killing 2 policemen and injuring 3 others. Egypt shooudu Cairo zoongtoongfuu fuhjihn 2 'ge zhahdahn baohzhah, zhahsii 2 'ge jiingchar, 3 'ge shouhshang. 2014-06-30. Italy found 30 migrant bodies. Italy faxiahn 30'ge yirmirn shitii Italy's navy has found about 30 migrants died as lack of oxygen in a fishing boat carrying hundreds of migrants between Sicily and the North Africa's coast. Italy haaijun zaih Sicily her Beeifei zhijian haaimiahn yi-sou zaih'zhe jiibaai'ge yirmirn de yurchuarn'shang faxiahn yue 30'ge yirmirn queyaang siiwarng. Isis establishes Islamic country. Isis jiahnlih Islam guorjia The Islamic rebel army Isis has declared to establish an Islamic country on the territories it controls in Iraq and Syria. Islam pahnjun Isis xuanbuh zaih ta kohngzhih de Iraq her Syria liingtuu'shang jiahnlih Islam guorjia. 2014-06-29. North Korea fires missiles. Chaorxian fasheh daaodahn North Korea has test-fired 2 short-range missiles into the sea from its east coast. Chaorxian corng dong-ahn shih-sheh 2'ge duaan-cherng daaodahn ruh haai. India building collapses kill 16. India ta-lour 16 sii Two buildings have collapsed in India, killing at least 16 people and many trapped. India 2-jian lour daaota, zhihshaao 16 rern siiwarng, duo rern beihkuhn. China fishing boat sinks near Diaoyutai. Zhongguor yurchuarn Diaohyurtair fuhjihn chernmoh A China's fishing boat has sunk near Diaoyutai Islands in East China Sea. 5 people are resecured and 5 are missing. Dong Haai Diaohyurtair Qurndaao fuhjihn yi-sou Zhongguor yurchuarn Chernmoh, 5 rern huohjiuh, 5 rern shizong. 2014-06-24. China industrial output increases. Zhongguor gongyeh shengchaan zengjia China's manufacturing activity increases in June, showing that its recent stimulus moves are good for its economy. Zhongguor Liuhyueh zhihzaohyeh huordohng zengjia, xiaanshih zuihjihn'd cihji cuohshi duih jingjih yoou haaochuh. Iraq rebels occupy main oil refinery. Iraq pahnjun zhahnliing zhuuyaoh liahnyourchaang The insurrectionary army in Iraq has fully controlled the country's key oil refinery plant in northern Iraq. Iraq qiiyihjun warnquarn kohngzhih zaih Iraq beeibuh gai guor zhuuyaoh'd liahnyourchaang. 2014-06-14. Ukraine rebels kill 49 soldiers. Ukraine pahnjun sha 49 junrern The rebel army has shot down a military plane in Eastern Ukraine, killing 49 government soldiers. Ukraine dongbuh pahnjun jiluoh yi-jiah junji, 49'ge zhehngfuujun siiwarng. 2014-06-13. Aspirin not the best to prevent stroke. Aspirin预防中风不是最好 Aspirin yùfáng zhòngfēng bùshì zuì hǎo Doctors are advised by NICE (National Institute for Clinical Excellence) not to prescribe aspirin for atrial fibrillation which can lead to stroke, but instead to prescribe warfarin or other anticoagulants. NICE(国家优秀医疗研究院)建议医生,由于心房颤动会导致中风,不要开aspirin药方,可用warfarin或其他抗凝剂代替。 NICE (Guōjiā Yōuxiù Yīliáo Yánjiūyuàn) jiànyì yīshēng, yóuyú xīnfáng chàndòng huì dǎozhì zhòngfēng, bùyào kāi aspirin yàofāng, kě yòng warfarin huò qítā kàngníngjì dàitì. China plans to stimulate economy. 中国计划刺激经济 Zhōngguó jìhuà cìjī jīngjì China has announced new plans for boosting its economic growth. The plans include to build railways, roads and airports along the Chang Jiang River for connecting China's less developed inland provinces to Shanghai. 中国宣布新计划催谷经济增长。计划包括长江一带建造铁路、道路和机场连接内陆落后省份至上海。 Zhōngguó xuānbù xīn jìhuà cuīgǔ jīngjì zēngzhǎng. Jìhuà bāokuò Cháng Jiāng yīdài jiànzào tiělù, dàolù hé jīchǎng liánjiē nèilù luòhòu shěngfèn zhì Shànghǎi. 2014-06-11. Red meat causes cancer. 红肉导至癌症 Hóngròu dǎozhì áizhèng A US study shows that eating too much red meat could cause cancer, and suggests to eat beans, peas and lentils, poultry, nuts, and fish. 美国研究显示吃太多红肉会导至癌症; 建议吃豆,豌豆,扁豆,家禽,果仁和鱼。 Měiguó yánjiū xiǎnshì chī tài duō hóngròu huì dǎozhì áizhèng; jiànyì chī dòu, wāndòu, biǎndòu, jiāqín, guǒrén hé yú. 2014-06-08. Air pollution links to arrhythmia and lung clotting. 空气污染导致心律失常和肺部血凝固 Kōngqì wūrǎn dǎozhì xīnlǜ shīcháng hé fèibù xuènínggù Air pollution causes irregular heartbeat and blood clots in the lung. Elderly people were found to be at particular risk. Air pollution makes people with circulatory problems worse. 空气污染导致不规则心跳和肺部血凝块,使血液循环问题恶化,老人影响最大。 Kōngqì wūrǎn dǎozhì bù guīzé xīntiào hé fèibù xuèníngkuài, shǐ xuèyè xúnhuán wèntí èhuà, lǎorén yǐngxiǎng zuìdà. Afghanistan flooding kills 73. Afghanistan 泛滥73死 Afghanistan fànlàn 73 sǐ Flooding has attacked northern Afghanistan, killing at least 73 people, destroying about 2,000 homes, and some 200 people are missing. Afghanistan 北部泛滥,至少73人死亡,大约 2,000 住宅被毁,约200人失踪。 Afghanistan běibù fànlàn, zhìshǎo 73 rén sǐwáng, dàyuē 2,000 zhùzhái bèi huǐ, yuē 200 rén shīzōng. 2014-06-07. Migrant boat sinks near Yemen killing 62. Yemen 附近移民船沉没62死 Yemen fùjìn yímín chuán chénmò 62 sǐ A boat has sunk near Yemen, killing 60 migrants from Somalia and Ethiopia and 2 Yemen crew members. Yemen 附近沉船,60个来自 Somalia 和 Ethiopia 的移民和2个 Yemen 船员死亡。 Yemen fùjìn chénchuán, 60 gè láizì Somalia hé Ethiopia de yímín hé 2 gè Yemen chuányuán sǐwáng. 2014-06-06. Lack of sleep causes serious problems. 睡眠不足引至严重问题 Shuìmián bùzú yǐnzhì yánzhòng wèntí Studies have shown that lack of sleep can lead to serious health problems such as cancer, heart disease, diabetes, infections and obesity. 研究显示睡眠不足会导至严重健康问题,如癌症、心脏病、糖尿病、感染和痴肥。 Yánjiū xiǎnshì shuìmián bùzú huì dǎozhì yánzhòng jiànkāng wèntí, rú áizhèng, xīnzàngbìng, tángniàobìng, gǎnrǎn hé chīféi. 2014-06-05. Yemen rebels kill 14. "Yemen pahnjun sha 14 rern" Rebel army has attacked a government military checkpoint in southern Yemen, killing 14 people including 8 government soldiers. "pahnjun xirji Yemen narnbuh yi'ge zhehngfuu junshih jiaancharzhahn, shasii 14 rern baokuoh 8'ge zhehngfuujun." Tesco's sales falls. "Tesco yirngyeh`er xiahjiahng" Tesco has announced a third continuous quarter of falling sales as increasing competition. "Tesco xuanbuh, youryur jihngzheng zengjia, yirngyeh`er liarnxuh dih-3 'ge jihduh xiahjiahng." 2014-06-04. Boko Haram kills many in Nigeria. "Nigeria Boko Haram shasii duo rern" Boko Haram has attacked villages in northern Nigeria, killing dozens. "Boko Haram xirji Nigeria beeibuh xiangcun, shasii jiishir rern." EU calls on UK to raise taxes on expansive houses. EU 呼吁 UK 对贵价楼收更多税 EU hūyù UK duì guìjià lóu shōu gèngduō shuì The European Commission has called on the UK to increase taxes on higher value properties and build more homes. 欧洲委员会呼吁英国对贵价楼加税,并建筑更多住宅。 Ōuzhōu Wěiyuánhuì hūyù Yīngguó duì guìjià lóu jiāshuì, bìng jiànzhú gèngduō zhùzhái. 2014-06-03. 120 die in Yemen fighting. "Yemen zhahndouh 120 sii" Fighting between government troops and rebels in the province of Amran in northern Yemen has killed more than 120 people including about 20 government soldiers. It is believed that there were civilians killed as government warplanes bombing the area. "Yemen beeibuh sheengfehn Amran, zhehngfuujun yuu pahnjun zhahndouh, chaoguoh 120 rern siiwarng baokuoh yue 20'ge zhehngfuujun. youryur zhehngfuu zhahnji hongzhah gai dihqu, xiangxihn yoou pirngmirn siiwarng." Pakistan explosion kills 7. "Pakistan baohzhah 7 sii" A vehicle has hit a roadside bomb in the northwest of Pakistan, killing at least 7 people and injuring 3 on the car. "Pakistan dongbeeibuh yi-jiah che zhuahng dihleir, che'shang zhihshaao 7 rern siiwarng, 3 rern shouhshang." 2014-06-02. China's industrial activity increases. "Zhongguor gongyeh huordohng zengjia" China's manufacturing activity has grown in May at the fastest speed since this year after the government stimulated the economy. "zhehngfuu cihji jingjih zhihouh, Zhongguor Wuuyuehfenh zhihzaohyeh huordohng zengzhaang jinniarn yiilair zuihkuaih." Learning foreign language can prevent dementia. 学习外语能预防痴呆症 Xuéxí wàiyǔ néng yùfáng chīdāizhèng Study shows that learning foreign language is good for the brain and can prevent dementia. 研究显示学习外语有利于脑部,能预防痴呆症。 Yánjiū xiǎnshì xuéxí wàiyǔ yǒulìyú nǎobù, néng yùfáng chīdāizhèng. Libya fighting kills 7. Libya 战斗7 死 Libya zhàndòu 7 sǐ Fighting between rebels and government army in Libya's city Benghazi has killed at least 7 people including some soldiers. Libya 城市 Benghazi 叛军与政府军战斗杀死至少7人包括一些士兵。 Libya chéngshì Benghazi pànjūn yǔ zhèngfǔjūn zhàndòu shāsǐ zhìshǎo 7 rén bāokuò yīxiē shìbīng. Afghanistan suicide bomb kills 3 Turkish engineers. Afghanistan 自杀炸弹杀死3个 Turkey 工程师 Afghanistan zìshā zhàdàn shāsǐ 3 gè Turkey gōngchéngshī A suicide motorcycle bomb has attacked a minibus in eastern Afghanistan, killing 3 Turkish construction engineers on the minibus. Afghanistan 东部自杀摩托车炸弹袭击一架小巴,杀死小巴上3个 Turkey 建筑工程师。 Afghanistan dōngbù zìshā mótuōchē zhàdàn xíjí yī jià xiǎobā, shāsǐ xiǎobā shàng 3 gè Turkey jiànzhú gōngchéngshī. Nigeria bomb attack kills 14. "Nigeria zhahdahn xirji 14 sii" A bomb attack targeting people watching football at a bar in northeastern Nigeria, killing at least 14 people and injuring 12 including some are severely injured. "Nigeria dongbeeibuh zhahdahn xirji yi jian jiuuba kahn zurqiur de rern, shasii zhishaao 14 rern, 12 rern shouhshang baokuoh yixie zhohngshang." 2014-06-01. Rebels kill 6 Egypt soldiers. 叛军杀死 6个 Egypt 士兵 Pànjūn shāsǐ 6 gè Egypt shìbīng Islamic fighters have attacked Egypt's troops near Libya's border, killing 6 soldiers. Islam 战士袭击 Libya 边境附近的 Egypt 部队,杀死 6个士兵。 Islam zhànshì xíjí Libya biānjìng fùjìn de Egypt bùduì, shāsǐ 6 gè shìbīng. 2014-05-31. India economy slows down. India 经济放缓 India jīngjì fànghuǎn The economic growth of India has slowed down in the first quarter of the year as the manufacturing sector declined. 由于制造业委缩, India 首季经济增长放缓。 Yóuyú zhìzàoyè wěisuō, India shǒujì jīngjì zēngzhǎng fànghuǎn. 2014-05-30. Japan inflation highest in 23 years. 日本通胀23年来最高 Rìběn tōngzhàng 23 nián lái zuìgāo Japan's consumer prices rose 3.2% in April compared with the same period last year, it is the highest in 23 years in April. 日本四月份消费物价比去年同期上升3.2%, 是23年来四月份最高的。 Rìběn Sìyuèfèn xiāofèi wùjià bǐ qùnián tóngqī shàngshēng 3.2%, shì 23 nián lái Sìyuèfèn zuìgāo de. US economic growth slows down. "US jingjih fahnghuaan" The economic growth of the United States has reduced to 1% in the first quarter of the year, it is the worst in 3 years. "Meeiguor shooujih jingjih zengzhaang xiahjiahng zhih 1%, shih 3 niarn lair zuihcha." Tesco forms partnership with China. "Tesco yuu Zhongguor herhuoo" Tesco has signed a partnership agreement with the state-run China Resources Enterprise to establish the biggest food retailer in China. "Tesco yuu guoryirng Huarruhn Chuahngyeh qiandihng herhuoo xieryih chernglih Zhongguor zuihdah shirpiin lirngshouhshang." Ukraine rebels shoot down helicopter killing 12. "Ukraine pahnjun jiluoh zhirshengji 12 sii" Rebel army has shot down a government military helicopter in eastern Ukraine, killing 12 army members including a general. "Ukraine dongbuh pahnjun jiluoh zhehngfuujun yi-jiah zhirshengji, 12'ge junrern siiwarng baokuoh yi'ge jiangjun." 2014-05-29. Taiwan political party calls for cooperation with Mainland China. 台湾政党呼吁与大陆合作 Táiwān zhèngdǎng hūyù yǔ Dàlù hézuò The chairman of the People First Party of Taiwan, James Soong, called for economic cooperation with Mainland China to make money. 台湾亲民党主席宋楚瑜呼吁与大陆经济合作赚钱。 Táiwān Qīnmín Dǎng zhǔxí Sòng Chǔyú hūyù yǔ Dàlù jīngjì hézuò zhuànqián. CAR rebel army kill 11 people. CAR 叛军杀11人 CAR pànjūn shā 11 rén Rebel army have attacked a church in the Central African Republic's capital Bangui, killing at least 11 people and injuring many others. 叛军袭击中非共和国首都 Bangui 一间教堂,杀死至少11人,多人受伤。 Pànjūn xíjī Zhōngfēi Gònghéguó shǒudū Bangui yī jiān jiàotáng, shāsǐ zhìshǎo 11 rén, duō rén shòushāng. 2014-05-28. Pakistan woman stoned to death. "Pakistan nvvrern beih shir'tou daasii" A Pakistan woman has been killed by her family using bricks and sticks, for marrying against their wishes. "yi'ge Pakistan nvvrern weirbeih jiarern'd yihyuahn jiahrern, beih jiarern yohng zhuan'tou her guhnbahng daasii." South Korea hospital fire kills 21. "Harnguor yiyuahn dahhuoo 21 sii" A fire has attacked a hospital in South Korea, killing at least 20 patients and 1 nurse, and injuring 6 others seriously. "Harnguor yi-jian yiyuahn dahhuoo, shasii zhishaao 20'ge bihngrern her 1'ge huhshih, 6'ge zhohngshang." 2014-05-27. Iraq suicide bomb kills 17. "Iraq zhahdahn sha 17" A suicide bomb has attacked a Shiah mosque in the city center of Iraq's capital Baghdad, killing at least 17 people. Violence happens often since the United States invading Iraq. There are more than 3,500 people killed since this year. "yi'ge zihsha zhahdahn xirji Iraq shooudu Baghdad shihzhongxin yi-jian Shiah qingzhensih, shasii zhihshaao 17 rern. Meeiguor ruhqin Iraq yiilair baohlih jingcharng fasheng. jinniarn yiilair chaoguoh 3,500 rern beihsha." India train derail kills 23. "India huooche chuguii 23 sii" A passenger train has derailed and hit a stationary train in India, killing 23 people and injuring 52 including at least 15 are seriously injured. India happens train accidents often, killing several hundreds of people in recent years. "India zaihkeh huooche chuguii zhuahng wernjuh huooche, 23 rern siiwarng, 52'ge shouhshang baokuoh zhihshaao 15'ge zhohngshang. India jingcharng fasheng huooche yihwaih, jihnniarn jiibaai rern siiwarng." China to destroy 6 million cars. "Zhongguor xiaohuii 6 baaiwahn qihche" China plans to destroy 6 million cars that do not meet the standard of exhaust emission by the end of the year for improving air. "Zhongguor jihhuah niarndii qiarn xiaaohuii 6 baaiwahn darbudaoh feihqih pairfahng biaozhuun'd qihche yii gaaishahn kongqih." Vietnam boat sinks off Xisha. "Yuehnarn chuarn Xisha chernmoh" A Vietnam's boat had sunk after collided with a China's ship off Xisha Islands in the South China Sea. "Narn Haai Xisha Qurndaao yi-sou Yuehnarn chuarn yuu Zhongguor chuarn xiangzhuahng chernmoh." 2014-05-26. Sony to open PlayStation factory in China. "Sony zaih Zhongguor kai PlayStation gongchaang" Japan's Sony has signed a partnership agreement with China to make and sell PlayStation in Mainland China. "Rihbeen Sony yuu Zhongguor qiandihng herhuoo xieryih zaih Zhongguor Dahluh zaoh her maih PlayStation." 2014-05-24. UK house prices rise sharply. "UK farngjiah jizeng" The house prices of 5 seaside towns in Aberdeenshire have at least doubled since 2004, Halifax has reported. "Halifax baohdaao, 2004 niarn yiilair 5'ge Aberdeenshire haaibian shihzhehn farngjiah qiimaa beihzeng." Djibouti restaurant attack kills 2. "Djibouti canting xirji 2 sii" Attackers have thrown grenades to a restaurant popular with Westerners in Djibouti, killing at least 2 people and injuring more than 10. "xirjizhee xiahng Djibouti yi-jian Xifangrern charng-quh'd canting tourzhih shoouliurdahn, shasii zhishaao 2 rern, chaoguoh 10 rern shouhshang." Jewish Museum attack kills 3. "Yourtaih Borwuhguaan xirji 3 sii" A gunman has attacked the Jewish Museum in the Belgium's capital Brussels, killing 3 people and injuring seriously another. "yi'ge qiangshoou xirji Belgium shooudu Belgium'd Yourtaih Borwuhguaan, shasii 3 rern, 1 rern zhohngshang." California shooting kills 6. "California qiangji 6 sii" A gunman has killed 6 people in the city of Santa Barbara in California in the United States. "Meeiguor California cherngshih Santa Barbara yi'ge qiangshoou shasii 6 rern." Somalia attack kills 10. "Somalia xirji 10 sii" Islamic fighters have attacked the Somalia parliament in Mogadishu, leaving at least 10 people dead. "Mogadishu Islam zhahnshih xirji Somalia guorhuih, daaozhih zhihshaao 10 rern siiwarng." Syria rebel army kills 20 people. "Syria pahnjun sha 20 rern" Rebel army has used mortars to attack an election rally in south Syria, killing at least 20 people. "Syria narnbuh pahnjun yohng paaijipaoh xirji xuaanjuu jirhuih, shasii zhishaao 20 rern." Nigeria rebel army kills 30 people. "Nigeria pahnjun sha 30 rern" Boko Haram has attacked 3 villages in northeastern Nigeria, killing more than 30 people. "Boko Haram xirji Nigeria dongbeeibuh 3'ge cunzhuang, shasii chaoguoh 30 rern." 2014-05-23. England contains huge oil resources. "England yuhncarng dahliahng shiryour" A study shows that there are several billion barrels of petroleum mineral resources under southern England. "yarnjiu xiaanshih England narnbuh yuhncarng jiishir yih toong shiryour kuahngcarng." 2014-05-22. Many killed in Baghdad. "Baghdad duo rern beihsha" 3 bomb explosions have attacked Shia Muslim pilgrims in Iraq's capital Baghdad, killing at least 24 people. "Iraq shooudu Baghdad 3 cih zhahdahn baohzhah xirji Shia Muslim chaorshehngzhee, shasii zhihshaao 24 rern." Militants destroy village. "wuuzhuangfehnzii cuihuii cunzhuang" Militants has attacked a village in northeast Nigeria, killing at least 25 people and burning down nearly all the houses. "wuuzhiangfehnzii xirji Nigeria dongbeeibuh yi'ge cunzhuang, shasii zhihshaao 25 rern, shaohuii jihu suooyoou farngwu." Rebel army kills 14 Ukraine soldiers. "pahnjun sha 14 Ukraine shihbing" Rebel army with heavy weapon has attacked a checkpoint in eastern Ukraine, killing at least 14 soldiers. "zhuangbeih zhohngxirng wuuqih'd pahnjun xirji Ukraine dongbuh yi'ge jiaancharzhahn, shasii zhihshaao 14'ge shihbing." Taiwan attack kills 3. "Tairwan xirji 3 sii" A student holding knife has attacked passengers on an underground train near Taibei in Taiwan, killing at least 3 people and injuring more than 25. "Tairwan Tairbeei fuhjihn yi'ge xuersheng chirdao xirji dihtiee che'shang cherngkeh, shasii zhihshaao 3 rern, chaoguoh 25 shouhshang." Xinjiang attack kills 31. "Xinjiang xirji 31 sii" Attackers have crashed 2 cars into shoppers and thrown bombs at a market in China's Xinjiang capital Urumqi, killing at least 31 people and injuring more than 90. "Zhongguor Xinjiang shooufuu Urumqi yi'ge shihchaang, xirjizhee kai 2 che zhuahng gouhwuhzhee bihng tourdahn, shasii zhihshaao 31 rern, chaoguoh 90 shouhshang." Lenovo becomes world's biggest PC maker. "Lenovo cherngweir shihjieh zuihdah zhihzaohshang" Lenovo has become the biggest PC manufacturer of the world as its full year net profit has increased sharply 29%. "Lenovo niarnduh churnlih jizeng 29%, cherngweir shihjieh zuihdah PC zhihzaohshang." 2015-05-21. Guerrillas kill 3 policemen in Cairo. "Cairo yourjiduih sha 3 jiingchar" Gunmen have killed 3 policemen in the capital of Egypt, Cairo. Rebel army has killed hundreds of military members since Egypt's first people-elected president Mohammed Morsi has been overthrown by the military in a coup. "Egypt shooudu Cairo qiangshoou shasii 3'ge jiingchar. junfang zhehngbiahn tuifan Egypt shoou'ge mirnxuaan zoontoong Mohammed Morsi yiilair, pahnjun shasii'le jiibaai'ge junfang cherngyuarn." Rebel army kills 27 in Nigeria. "Nigeria pahnjun sha 27 rern" Rebel army has attacked 2 villages in northeastern Nigeria, killing at least 27 people. "pahnjun xirji Nigeria dongbeeibuh 2'ge cunzhuang, shasii zhihshaao 27 rern." Mali rebel army occupies key town. "Mali pahnjun zhahnliing zhohngzhen" Mali rebel army says it has defeated government forces and controlled a northern key town after heavy fighting. "Mali pahnjun xuanbuh jizhahn houh daabaih zhehngfuujun, zhahnliing beeibuh zhohngzhen." China signs huge gas contract with Russia. "Zhongguor yuu Russia qiandihng juhxirng qihtii hertorng" Russia's president Putin has signed an estimated over USD400bn, 30-year natural gas agreement with China in Shanghai summit. "Russia zoongtoong Putin zaih Shahghaai fenghuih yuu Zhongguor qiandihng gujih chaoguoh USD400bn 30 niarn'd tianrarnqih xieryih." China bans Windows 8. "Zhongguor jihnzhii Windows 8" Because Microsoft decides to stop supporting XP operating system, China bans the use of Windows 8 on government computers. "youryur Microsoft juerdihng tirngzhii zhiyuarn XP caozuoh xihtoong, Zhongguor jihnzhii zhehgfuu diahnnaao yohng Windows 8." 2015-05-20. Nigeria bomb explosions kill many. "Nigeria zhahdahn baohzhah duo rern sii" 2 bomb explosions have attacked the city of Jos in central Nigeria, killing at least 46 people. "2 cih zhahdahn baohzhah xirji Nigeria zhongbuh cherngshih Jos, shasii zhihshaao 46 rern." Putin arrives China for summit. "Putin daoh Zhongguor kai fenghuih" Putin has arrived Shanghai for a summit to deepen relationship with China. "Putin daohdar Shahnghaai kai fenghuih jiashen yuu Zhongguor'd guanxih." 2015-05-19. 6 Mali officials killed. "6'ge Mali guanyuarn beihsha" Rebel army has attacked a government office in Mali, killing 6 officials. "Mali pahnjun xirji zhehngfuu bahngongshih, shasii 6'ge guanyuarn." 2015-05-16. China continues oil drilling offshore of Xisha Islands. "Zhongguor Xisha Quarndaao lir`ahn zuahnyour jihxuh" China says it will continue oil drilling offshore of Xisha Islands, despite of anti-Chinese riots in Vietnam. "jiinguaan Yuehnarn faan-Huar baohdohng, Zhongguor shuo huih jihxuh Xisha Qurndaao lir`ahn'd zuahnyour." Olanzapine could cause diabetes. "Olanzapine huih daaozhih tarngniaohbihng" The US Food and Drug Administration warns that Olanzapine has a risk of causing diabetes. "Meeiguor Shirpiin her Yaohwuh Xirngzhehngbuh jiinggaoh, Olanzapine yoou daaozhih tarngniaohbihng'd fengxiaan." 2014-05-15. Sony shares fall 7%. Sony股票跌7% Sony gǔpiào diē 7% Sony shares have fallen by 7% after the company forecast its second continuous year of losses. 由于预计连续第二年亏损, Sony 股票下跌7%. Yóuyú yùjì liánxù dì-èr nián kuīsǔn, Sony gǔpiào xiàdié 7%. 16 Chinese killed in Vietnam anti-Chinese riot. "Yuehnarn faan-Huar baohdohng 16 Huarrern beihsha" Anti-Chinese rioters have attacked Chinese factories in Vietnam, killing 16 Chinese and injuring many others. "Yuehnarn faan-Huar baohtur xirji Huarern gongchaang, shasii 16 Huarern, duo rern shouhshang." 2014-05-14. Vietnam protesters burn Chinese factories. "Yuehnarn kahngyihzhee shao Huarrern gongchaang" Anti-Chinese protesters have attacked industrial parks in southern Vietnam, burning down at least 15 Chinese factories. "Yuehnarn narnbuh faan-Huar kahngyihzhee xirji gongyehcun, shaohuii zhihshaao 15-jian Huarern gongchaang." China industrial growth slows in April. 中国四月工业增长放缓 Zhōngguó Sìyuè gōngyè zēngzhǎng fànghuǎn China's industrial growth in April is lower than expected, making people worry about the world's second biggest economy may slow down. 中国四月工业增长比预期低,使人们忧虑这世界第二大经济体会放缓。 Zhōngguó Sìyuè gōngyè zēngzhǎng bǐ yùqí dī, shǐ rénmen yōulǜ zhè shìjiè dì-èr dà jīngjìtǐ huì fànghuǎn. Turkey coal mine explosion kills many people. "Turkey meirkuahng baohzhah duo rern sii" A coal mine has exploded in western Turkey, killing more than 200 mine workers and injuring many. "Turkey xibuh meirkuahng baohzhah, chaoguoh 200'ge kuahnggong siiwarng, duo'ge shouhshang." 2014-05-13. Rebel army kills 7 Ukraine soldiers. "pahnjun shasii 7'ge Ukraine shihbing" Rebel army has ambushed an armored car in Donetsk, killing 7 Ukraine soldiers and injuring many. "Donetsk pahnjun mairfur yi-jiah zhuangjiaache, shasii 7'ge Ukraine shihbing, duo'ge shouhshang." High blood pressure harms health. "gaoxuehya weihaih jiahnkang" High blood pressure can cause stroke, coronary heart disease, kidney disease and heart failure. Treatments for high blood pressure include medicine therapy, diet therapy and exercise. "gaoxuehya huih daaozhih zhohngfeng, guanxinbihng, shehnbihng her xinshuaijier. yizhih gaoxuehya yoou yaohwuh zhihliaor, shirliaor her yuhndohng." Lack of sleep damages health. "shuihmiarn buzur suunhaih jiahnkang" Lack of sleep can cause cancer, heart disease, type-2 diabetes, infections and obesity. "shuihmiarn buzur kee daaozhih airzhehng, xinzahngbihng, 2-xirng tarngniaohbihng, gaanraan her chifeir." 2014-05-12. China strengtens secuity in Beijing. "Zhongguor jiaqiarng Beeijing baao`an" China has deployed armed police patrol car in Beijing following attacks have spread around the country. "suir'zhe xirji mahnyarn, Zhongguor zaih Beeijing buhshuu wuujiing xurnluorche." UK interest rate would rise. "UK lihlvh huih shahngsheng" The interest rates of the UK are predicted to increase to 0.75% from 0.5% in early 2015 as its economy growth rises again. "youryur UK jingjih zengzhaang huirsheng, yuhjih 2015 niarnchu lihlvh huih corng 0.5% zengjia daoh 0.75%." China to build new Africa railway. "Zhongguor jiahnzaoh xin Feizhou tieeluh" China will build a new railway line in Eastern Africa linking Kenya, Uganda, Rwanda and South Sudan. "Zhongguor huih zaih Dongfei jiahnsheh xin tieeluhxiahn liarnjie Kenya, Uganda, Rwanda her South Sudan." 2014-05-10. Yemen soldiers killed. "Yemen shihbing beihsha" Rebel army has attacked a gate outside the presidential palace in the capital of Yemen, Sanaa, killing at least 4 soldiers. "pahnjun xirji Yemen shooudu Sanaa zoongtoongfuu waihmiahn zharmern, shasii zhihshaao 4'ge shihbing." 2014-05-09. UK GDP close to last pre-crisis level. "UK GDP jiejihn shahngcih weiji qiarn shuiipirng" The UK's economy is close to recovering its last pre-financial crisis level of economic activity. Economic output at the end of April was just 0.17% below its last pre-recession peak. "UK jingjih jiejihn huirdaoh shahngcih cairzhehng weiji qian'd jingjih huordohng shuiipirng. Sihyueh dii jingjih chaanliahng zhii 0.17% diyur shahngcih shuaituih qian'd fengdiing." Biggest heart disease factor. "zuihdah xinzahngbihng yinsuh" Lack of exercise is the biggest risk factor for heart disease. Other factors including smoking, obesity, high blood pressure and high cholesterol. At least 30 minutes of daily exercise can reduce risk of heart disease. "quefar yuhndohng shih xinzahngbihng'd zuihdah fengxiaan yinsuh. Qirta yinsuh baokuoh xiyan, chifeir, gaoxuehya her gao daanguhchurn. meeitian zhihshaao yuhndohng 30 fenzhong kee jiaanshaao xinzahngbihng fengxiaan." 300 killed in Nigeria. "Nigeria 300 rern beihsha" Suspected Islamic rebel army Boko Haram have attacked a town in the northeast of Nigeria, killing more than 300 people. "huairyir'd Islam pahnjun Boko Haram xirji Nigeria dongbeeibuh yi'ge shihzhehn, shasii chaoguoh 300 rern." 2014-05-08. Bomb kills 9 Pakistan soldiers. "zhahdahn sha 9 Pakistan shihbing" A roadside bomb has attacked a military vehicle in Pakistan, killing at least 9 soldiers and injuring seriously several others. The military vehicle was traveling near the border with Afghanistan, in an area which is a hotbed of Taliban activity in Pakistan. "Pakistan luhbian zhahdahn xirji yi-jiah junche, shasii zhihshaao 9'ge shihbing, jii'ge zhohngshang. zheh junche dangshir zaih jiejihn Afghanistan bianjing yi'ge Taliban huordohng wenchuarng dihqu xirngshii zhong." Barclays to cut 19,000 jobs. "Barclays cairyuarn 19,000" Barclays will cut 19,000 jobs by the end of 2016 including more than 9,000 to cut in the UK. "Barclays huih yur 2016 niarndii qiarn cairyuarn 19,000 baokuoh Yingguor chaoguoh 9,000." Toyota profit nearly doubles. Toyota利润几乎两倍 Toyota lìrùn jīhū liǎngbèi Toyota's full-year net profit has increased sharply nearly double to USD17.8bn in the year to March 31, as the Yen's weakness and cost cutting. 由于日元疲弱和降低成本,至3月31日 Toyota 全年纯利大幅度增加几乎两倍至 USD17.8bn. Yóuyú Rìyuán píruò hé jiàngdī chéngběn, zhì 3 yuè 31 rì Toyota quánnián chúnlì dàfúdù zēngjiā jīhū liǎngbèi zhì USD17.8bn. China's imports and exports rebound. "Zhongguor jihnchukoou faantarn" China's imports and exports have rebounded in April, helping reduce worry about its economy could slow down. "Zhongguor Siyueh jihnchukoou faantarn, yoouzhuh jiaanshaao youlvh ta'd jingjih huih fahnghuaan." 2014-05-07. Sainsbury's profit rises. "Sainsbury's yirnglih shahngsheng" UK supermarket Sainsbury's has reported a 16.3% rise in annual pre-tax profit to £898m. "UK chaoshih Sainsbury's niarnduh shuih-qiarn yirnglih shahngsheng 16.3% zhih £898m." China and Vietnam ships collide offshore of Xisha Islands. "Xisha Qurndaao haaimiahn Zhongguor yuu Yuehnarn chuarnzhi xiangzhuahng" China's ships and Vietnam's navy vessels have collided nearby a China's oil drilling platform offshore of Xisha Islands in the South China Sea. "Narn Haai Xisha Qurndaao haaimiahn Zhongguor zuahnyourtair fuhjihn, Zhongguor chuarnzhi yuu Yuehnarn chuarnjiahn xiangzhuahng." Kenya poisonous wine kills many. "Kenya durjiuu shasii duo rern" More than 60 people have been killed and dozens of others have been blinded in Kenya, after drinking the wine believed to have been added with industrial chemicals. "zaih Kenya, youryur he'le xiangxihn jia'le gongyeh huahxuerpiin'd jiuu, chaoguoh 60 rern siiwarng, jiishir rern shimirng." 2014-05-06. US trade deficit falls. "US nihcha xiahjiahng" The US trade deficit has fallen in March, as its export has risen sharply. " Meeiguor Sanyueh chukoou dahfur shahngsheng, nihcha xiahjiahng." Guangzhou knife attack. "Guaangzhou chirdao xirji" A knife attack at a station in the city of Guangzhou in the south of China has injured at least 6 people. "Zhongguor narnbuh Guaangzhou-shih yi'ge chezhahn fasheng chirdao xirji, zhihshaao 6 rern shouhshang." 2014-05-05. Ukraine rebels kill government soldiers. "Ukraine pahnjun sha zhehngfuujun" Rebel army has killed 4 government soldiers and shot down a helicopter near the city of Sloviansk in the east of Ukraine. "pahnjun zaih Ukraine dongbuh cherngshih Sloviansk fuhjihn shasii 4'ge zhehngfuujun, jiluoh yi-jiah zhirshengji." Nigeria rebels "to sell" abducted girls. "Nigeria pahnjun "huih maih" beih jierchir nvvhair" Nigeria's Islamic rebel army Boko Haram has said it will sell the hundreds of schoolgirls it abducted 3 weeks ago. "Nigeria Islam pahnjun Boko Haram shuo huih maih 3 xingqi qiarn baangjiah'd jiibaai'ge nvvxuesheng." Crew missing after ship sinks off Hong Kong. "Xianggaang chernchuarn, chuarnyuarn shizong" At least 11 crew members are missing after 2 ships have collided off the coast of southtern Hong Kong. "Xianggaang narnbuh haaimiahn 2-sou chuarn xiangzhuahng, zhihshaao 11'ge chuarnyuarn shizong." Odesa police release detainees. "Odesa jiingfang shihfahng beihjujihnzhee" The police have released more than 60 detainees after their headquarters has been attacked by protesters in the port city of Odesa in Ukraine. "Ukraine haaigaang chergshih Odesa jiingchar zoongjur beih kahngyizhee xirji houh, jiingfang shihfahng chaoguoh 60'ge beihjujihnzhee." 2014-05-04. Nairobi bomb attacks kill 3. Nairobi炸弹袭击3死 Nairobi zhàdàn xíjí 3 sǐ Two explosions on buses in the capital of Kenya, Nairobi, have killed 3 people and injured at least 62 others. Kenya首都Nairobi两架巴士爆炸,3人死亡,至少62人受伤。 Kenya shǒudū Nairobi liǎng jià bāshì bàozhà, 3 rén sǐwáng, zhìshǎo 62 rén shòushāng. China bridge collapse kills 11. "Zhongguor ta qiaor 11 sii" An illegal building bridge has collapsed in the province of Guaangdong in southern China, killing 11people. "Zhongguor narnbuh Guaangdong-sheeng yi-tiaor feifaa jiahnzaoh-zhong'd qiaorliarng daaota, 11 rern siiwarng." India rebel army kills 32. "India pahnjun sha 32 rern" Separatist guerrillas have attacked a villiage living mainly immigrants in the northeastern province of Assam in India, killing 32 people. "Fenlirzhuuyih yourjiduih xirji India dongbeeibuh Assam-sheeng yi'ge zhuuyaoh waihlair yirmirn juzhuh'd xiangcun, shasii 32 rern." 2014-05-03. Ethiopia army kills dozens of students. "Ethiopia junrern sha jiishir xuersheng" Ethiopia soldiers have opened fire to protesters, killing dozens of people including many students. "Ethiopia shihbing xiahng kahngyihzhee kaihuoo, shasii jiishir rern baokuoh heen duo xuersheng." Ukraine clashes kill dozens. "Ukraine chongtu jiishir rern sii" Clashes between pro-Russia and pro-government people in southwestern Ukraine has killed at least 31 people. "Ukraine xinarnbuh qin-Russia yuu qin-zhehngfuu rernshih chongtu, zhihshaao 31 rern siiwarng." Samsung ordered to pay Apple US$119.6m. "Samsung beih pahn fuh Apple US$119.6m" A US court has ordered Samsung to pay US$119.6m to Apple for violating its patents. "Meeiguor faatirng pahnjuer, youryur qinfahn zhuanlih, Samsung fuhgeei Apple US$119.6m." US employment increases sharply. "Meeiguor jiuhyeh dahfurduh shahngsheng" US employment increased 288,000 jobs in April, the strongest monthly job creation since January 2012. The unemployment rate fell to 6.3%. "Meeiguor Sihyuehfehn jiuhyeh rernshuh zengjia 288,000'ge, shih 2012 niarn Yiyueh yiilair zengjia zuih duo'd yuehfehn. Shiyelvh diezhih 6.3%." 2014-05-02. Ukraine troops kill many people. "Ukraine junduih shasii duo rern" Troops have attacked the east of Ukraine, killing and injuring many people. "Junduih gongji Ukraine dongbuh, duo rern shangwarng." Afghanistan landslide kills hundreds. "Afghanistan shanbeng jiibaai sii" A landslide has buried hundreds of homes in the northeast of Afghanistan, killing hundreds of people and thousands are missing. "Afghanistan dongbeeibuh shanbeng yanmair jiibaai zhuhzhair, jiibaai rern siiwarng, jiiqian rern shizong." Fiber good for heart. "Xianweir lihyur xinzahng" High-fiber food improves blood pressure and cholesterol, helps to prevent and cure heart disease. Vegetables, fruits and cereals are all high-fiber foods. "Gao-xianweir shirwuh gaaishahn xuehya her daanguhchurn, bangzhuh farngzhih xinzahngbihng. Shuguoo her guuleih dou shih gao-xianweir shirwuh." 2014-05-01. Sony Predicts bigger loss. Sony yùcè gèng dà kuīsǔn Sony 预测更大亏损 Japan's Sony has said it will report a bigger-than-expected loss for the year to March. Rìběn Sony shuō jiānghuì gōngbù dàyú yùqí de zhì Sānyuè de niándù kuīsǔn. 日本 Sony 说将会公布大于预期的至三月的年度亏损。 IMF approves USD17bn Ukraine bailout. IMF pīzhǔn yuánzhù Ukraine USD17bn IMF 批准援助 Ukraine USD17bn The IMF has approved a USD17bn bailout for Ukraine to help solve the country's economic difficulty. IMF pīzhǔn USD17bn yuánzhù Ukraine, bāngzhù jiějué gāi guó de jīngjì kùnnán. IMF 批准 USD17bn 援助 Ukraine, 帮助解决该国的经济困难。 Sanctions damage Russia's economy. Zhìcái sǔnhài Russia jīngjì 制裁损害 Russia 经济 IMF has said USD100bn would leave Russia this year because of sanctions on the country. IMF shuō, yóuyú Russia bèi zhìcái, jīnnián huì yǒu USD100bn chèlí gāi guó. IMF 说,由于 Russia 被制裁,今年会有 USD100bn 撤离该国。 Exercise after dinner helps to slim. Wǎnfàn hòu yùndòng yǒuzhù jiǎnféi 晚饭后运动有助减肥 To do physical exercise after dinner can help to digest fats and reduce body weight. Wǎnfàn hòu yùndòng yǒuzhù xiāohuà zhīfáng hé jiàngdī tǐzhòng. 晚饭后运动有助消化脂肪和降低体重。 2014-04-30. Libya car bomb kills 2 soldiers. "Libya qihche zhahdahn sha 2 shihbing" A car bomb has exploded at the gates of a military barracks near the airport in the city of Benghazi in Libya, killing 2 soldiers. "yi'ge qihche zhahdahn zaih Libya Benghazi-shih jichaang fuhjihn junyirng'd zharmern baohzhah, shasii 2'ge shihbing." UK economy grows 0.8%. " UK jingjih Zengzhaang 0.8% " UK's economy has grown 0.8% in the first quarter of 2014, the fifth continuous quarter of growth. "Yingguor 2014 niarn shooujih jingjih zengzhaang 0.8%, liarnxuh dih-5 'ge jihduh zengzhaang." Xinjiang attack kills 3. " Xinjiang xirji 3 sii " A bomb and knife attack at a railway station in China's Xinjiang region has killed 3 people and injured 79 others. " Zhongguor Xinjiang dihqu huoochezhahn zhahdahn her chirdao xirji shasii 3 rern, 79 rern shouhshang. " US economy slows. "US jingjih fahngmahn" United states' economic growth slows down sharply to 0.1% in the first quarter of the year. "Meeiguor shooujih jingjih zengzhaang dahfurduh fahnghuaan zhih 0.1%." 2O14-04-29. Samsung mobile phone sales decline. Samsung shǒujī xiāoshòu xiàjiàng Samsung手机销售下降 Samsung has reported a 4% decline in sales at its mobile phone business in the first quarter of 2014. Samsung gōngbù 2014 nián dìyī jìdù shǒujī yèwù xiāoshòu xiàjiàng 4%. Samsung公布2014年第一季度手机业务销售下降4%. 2014-04-28. Microsoft must release overseas data. "Microsoft bihxu jiaochu haaiwaih ziliaoh" A US judge has ordered Microsoft to hand over a customer's emails, even though the data is held on a server in Ireland. "Meeiguor faaguan mihnglihng Microsoft jiaochu yi'ge yohnghuh'd email, jiinguaan ziliaoh chuucurn zaih Ireland'd server." Pakistan pupils killed in explosion. Pakistan xuéshēng bèi zhàsǐ Pakistan 学生被炸死 A grenade has exploded at a religious school in the southern city of Karachi in Pakistan, killing at least 3 children and injuring several others. Pakistan nánbù chéngshì Karachi 1 jiān zōngjiào xuéxiào 1 gè shǒuliúdàn bàozhà, zhàsǐ zhìshǎo 3 gè ertóng, jǐgè shòushāng. Pakistan南部城市Karachi 1间宗教学校1个手榴弹爆炸,炸死至少3个儿童,几个受伤。 Afghanistan floods kill at least 80. Afghanistan fànlàn zhìshǎo 80 sǐ Afghanistan 泛滥至少80死 Floods have attacked northern Afghanistan, killing at least 80 People and more than 80 people are missing. Thousands of homes are destroyed as most houses are made of mud. Hóngshuǐ xíjí Afghanistan běibù, shāsǐ zhìshǎo 80 rén, chāoguò 80 rén shīzōng. Yóuyú fángwū dàduō ní zào, shùqiān jiāyuán bèihuǐ. 洪水袭击 Afghanistan 北部,杀死至少80人,超过80人失踪。由于房屋大多泥造,数千家园被毁。 2014-04-27. Russia rehab center fire kills 8. Russia jièdúsuǒ dàhuǒ 8 sǐ Russia 戒毒所大火8死 A fire has destroyed a rehabilitation center for drug addicts in Russia's eastern Altai region, killing 8 people and injuring 6 others. Dàhuǒ shāohuǐ Russia dōngbù Altai dìqū 1 jiān jièdúsuǒ, shāosǐ 8 rén, 6 rén shòushāng. 大火烧毁 Russia 东部 Altai 地区1间戒毒所,烧死8人,6人受伤。 2014-04-26. Russia "to help free European observers". Russia "bāngzhù shìfàng Ōuzhōu guāncháyuán" Russia "帮助释放欧洲观察员" Russia says it will try its best to help free European military observers detained in eastern Ukraine by pro-Russian separatists. Russia shuō huì jìnlì bāngzhù shìfàng zài Ukraine dōngbù bèi qīn-Russia fēnlífènzǐ kòuyā de Ōuzhōu jūnshì guāncháyuán. Russia说会尽力帮助释放在Ukraine东部被亲Russia分离分子扣押的欧洲军事观察员。 Taliban "shot down" UK helicopter. Taliban "jíluò" UK zhíshēngjī Taliban "击落" UK 直升机 The Taliban claims that it has shot down a UK military helicopter in southern Afghanistan, killing 5 NATO soldiers. Taliban shēngchēng zài Afghanistan nánbù jíluò 1 jià UK jūnyòng zhíshēngjī, shā sǐ 5 gè NATO jūnrén. Taliban 声称在 Afghanistan 南部击落1架 UK 军用直升机,杀死5个 NATO 军人。 China bans eating rare animals. Zhōngguó jìnzhǐ chī xīyǒu dòngwù 中国禁止吃稀有动物 Caught eating rare animals in China could be jailed for up to 10 years. Zài zhōngguó bǔshí xīyǒu dòngwù huì jiānjìn gāodá 10 nián. 在中国捕食稀有动物会监禁高达10年。 Baghdad explosions kill 31. Baghdad bàozhà 31 sǐ Baghdad 爆炸31死 A series of bombs have attacked a Shiah election rally in Iraq's capital Baghdad, killing at least 31 people. Iraq shǒudū Baghdad yīxìliè zhàdàn xíjí yīgè Shiah xuǎnjǔ jíhuì, shā sǐ zhìshǎo 31 rén. Iraq 首都 Baghdad 一系列炸弹袭击一个 Shiah 选举集会,杀死至少31人。 2014-04-25. Nokia sold its mobile phone business. Nokia màile shǒujī yèwù Nokia 卖了手机业务 Microsoft has bought Nokia's mobile phone business for 5.44bn Euros. Microsoft yǐ 5.44bn Euro mǎile Nokia de shǒujī yèwù. Microsoft 以 5.44bn Euro 买了 Nokia 的手机业务。 India Maoists kill election officers. India Máozhǔyìzhě shā xuǎnjǔ guānyuán India 毛主义者杀选举官员 Maoist guerrillas have set off a landmine to attack a bus, killing 3 election officials and 5 policemen. Maoists say they are fighting for the poor. Máozhǔyì yóujīduì yǐnbào dìléi xíjī yī jià bāshì, shāsǐ 3 ge xuǎnjǔ guānyuán hé 5 ge jǐngchá. Máozhǔyìzhě shuō shì wèi qióngrén zhàndòu. 毛主义游击队引爆地雷袭击一架巴士,杀死3个选举官员和5个警察。毛主义者说是为穷人战斗。 2014-04-24. Kenya car bomb Kills 4 people. Kenya qìchē zhàdàn shā 4 rén Kenya 汽车炸弹杀4人 A car bomb has exploded outside a police station in the capital of Kenya, Nairobi, killing 4 people, including 2 policemen. Kenya shǒudū Nairobi jǐngjú wàimiàn yīge qìchē zhàdàn bàozhà, shāsǐ 4 rén, bāokuò 2 ge jǐngchá. Kenya 首都 Nairobi 警局外面一个汽车炸弹爆炸,杀死4人,包括2个警察。 Afghanistan policeman kills 3 foreigners. "Afghanistan jiingchar sha 3 waihguorrern" A policeman has shot dead 3 foreigners at a hospital in Afghanistan's capital Kabul. " Afghanistan shooudu Kabul 1'ge jiingchar qiangsha 3'ge waihguorrern." Facebook earnings rise sharply on mobile ads. "Facebook guaanggaoh shouyih dahfurduh shahngsheng" Facebook says its growing mobile users have helped it boost its advertising earnings. "Facebook shuo ta'd shoouji yohnghuh zengzhaang bangzhuh cuhjihn guaanggaoh shouyih." 2014-04-23. Bomb kills senior Egypt policeman. "Zhahdahn shasii gaojir Egypt jiingchar" A bomb has exploded in Egypt's capital Cairo, killing a senior police officer. Violence against the military happens often after the military coup. "Egypt shoodu Cairo zhadahn zhahsii 1'ge gaojir jiingguan. junshih zhehngbiahn houh, baohlih faankahng junfang jingcharng fasheng." 2014-04-22. World's fastest lift. "shihjieh zuihkuaih diahnti" Hitachi says it will install a lift of speeds up to 72km/h into a high building in Guangzhou, China. "Hitachi shuo huih zaih Zhongguor Guaangzhou yi-jian gaolour anzhuang yi-jiah suhduh gaodar 72km/h 'd diahnti." Japan's trade deficit is 4 times. "Rihbeen maohyih nihcha 4 beih" Japan's trade deficit is 4 times last month compared to March of 2013, because of export growth slows down and energy imports increase. "youryur chukoou fahnghuaan her nerngyuarn jihnkoou zengjia, Rihbeen shahngyueh maoyih nihcha shih 2013 niarn Sanyueh'd 4 beih." 2014-04-20. Algeria guerrillas kill 14 soldiers. "Algeria yourjiduih sha 14 shihbing" Islamic fighters have ambushed a military convoy in a mountain area east of Algeria's capital Algiers, killing 14 soldiers. "Islam zhahnshih mairfur Algeria shoodu Algiers dongmiahn shanqu yi'ge junfang cheduih, shasii 14'ge shihbing." Japan to base troops near Diaoyutai. "Rihbeen zhuhjun Diaohyurtair fuhjihn" Japan has begun to build a military base on Yonaguni island near Diaoyutai islands. "Rihbeen kaishii zaih Diaohyurtair qurndaao fuhjihn'd Yunaguni daao jiahnzhuh junshih jidih." 2014-04-19. Bahrain car explosion kills 2. "Bahrain qihche baohzhah 2 sii" A car has exploded when traveling in Bahrain, killing 2 people and injuring another seriously. "Bahrain yi-jiah xirngshii-zhong'd qihche baohzhah, 2 rern siiwarng, 1 rern zhohngshang." China gold demand increases. "Zhongguor huarngjin xuqiur zengjia" China's demand for gold is expected to increase 20% by 2017, because of Chinese people become increasingly rich. "youryur Zhongguorrern biahn'de yuehlairyueh fuhyoou, Zhongguor huarngjin xuqiur yuhjih 2017 niarn zengjia 20%." 2014-04-18. Qomolangma snowslide kills 12. "Qomolangma xueebeng 12 sii" A snowslide has attacked a mountaineering base on Mount Qomolangma, also known as Mount Everest, killing at least 12 people and many others are missing. "xueebeng xirji Qomolangma Feng (yee jiaohzuoh Everest Feng) yi'ge dengshan jidih, zhihshaao 12 rern siiwarng, duo rern shizong." 2014-04-17. Earth-like planet discovered. "faxiahn sih-Diqiur xirngxing" The Kepler telescope has discovered a planet that is simular in size to the Earth and that may contain water on its surface. "Kepler wahngyuaanjihng faxiahn yi'ge rur Diqur dah, biaaomiahn keenerng yoou shuii'd xirngxing." 2014-04-16. Hundreds missing as South Korea ferry sinks. "Harnguor duhlurn chernmoh, shuhbaai shizong" About 300 people are missing after a ferry carrying more than 470 people mainly students capsized and sank near South Korea's resort island Jeju. "Harnguor duhjiah daao Jeju fuhjihn yi-sou zaih'zhe chaoguoh 470 rern zhuuyaoh shih xuersheng'd duhlurn fuhmoh, dahyue 300 rern shizong." China's economic growth slows down. "Zhongguor jngjih zengzhaang fahnghuaan" China's economic growth slows down to 7.4% in the first quarter of this year from 7.7% in the fourth quarter of last year. "Zhongguor jingjih zengzhaang corng quhniarn di-4 jihduh'd 7.7% fahnghuaan daoh jinniarn dih-1 jihduh'd 7.4%." 2014-04-14. Global trade speeds up. "Quarnqiur maohyih jiakuaih" International trade will grow 4.7% this year and 5.3% next year, the WTO says. "WTO shuo, guorjih maohyih jinniarn huih zengzhaang 4.7%, mirgniarn 5.3%." 2014-04-10. China's imports & exports decrease. "Zhongguor jihnchukoou jiaanshaao" China's exports and imports have decreased sharply in March, making people worry about the slowdown of the world's second-largest economy. "Zhongguor Sanyuehfehn jihnchukoou dahfurduh jiaanshaao, shii rern danxin zheh'ge shihjieh dih-2 dah jingjihtii fahnghuaan." 2014-04-08. Nigeria is Africa's biggest economy. "Nigeria shih Feizhou zuidah jingjihtii" Nigeria has exceeded South Africa and becomes the biggest economy in Africa, but its population is 3 times of South Africa's. "Nigeria chaoyueh Narnfei cherngweir Feizhou zuihdah jingjihtii, dahnshih ta'd rernkoou shih Narnfei'd 3 beih." 2014-04-07. Somalia 2 UN employees killed. "Somalia 2 UN guhyuarn beihsha" A person wearing a police uniform has shot dead 2 United Nations employees including a British man in Somalia. "Somalia yi'ge chuan jiingfur'd rern qiangsha 2'ge Liarnherguor guhyuarn baokuoh yi'ge Yingguor narnrern." 2014-04-03. Exercise is good to heart. "yuhndohng lihyur xinzahng" Exercise makes heart muscle strong and causes heart healthy. Regular exercise especially aerobic exercise helps to burn calories, balances blood pressure, lowers bad cholesterol and boosts good cholesterol. The risk of getting heart disease of active people compared to inactive people lower 50%. "yuhndohng shii xinji qiarngzhuahng, xinzahng jiahnkang. dihngqi yuhndohng yourqir yoouyaang yuhndohng bangzhuh rarnshao calorie, pirngherng xuehya, jiahngdi huaih daanguhchurn, cuhjihn haao daanguhchurn. huoryueh'd rern huahn xinzahngbihng'd fengxiaan bii bu huoryueh'd shaao 50%." 2014-04-02. Yemen al-Qaeda kills 6 soldiers. "Yemen al-Qaeda sha 6 shihbing" al-Qaeda has attacked an army headquarters in Yemen's capital Aden, killing at least 6 soldiers and 2 civilians. "al-Qaeda xirji Yemen shooudu Aden yi'ge junbuh, shasii zhihshaao 6'ge junrern her 2'ge pirngmirn." Taliban bomb kills 6 policemen. "Taliban zhahdahn sha 6 jiingchar" A Taliban suicide bomb has exploded outside the interior ministry in Afghanistan's capital Kabul, killing at least 6 policemen. Taliban vows to launch a lot of attacks against the coming election. "yi'ge Taliban zihsha zhahdahn zaih Afghanistan shooudu neihzhehngbuh waihmiahn baohzhah, shasii zhihshaao 6'ge jiingchar. Taliban shihyarn fadohng xuuduo xirji faanduih kuaihdaoh'd xuaanjuu." Cairo bomb attacks kill police chief. "Cairo zhahdahn zhahsii jiingzhaang" 3 bombs have exploded near Cairo university, killing a police chief and injuring 5 people. Violence against the military happens often after the military coup. "Cairo dahxuer fuhjihn 3'ge zhahdahn zhahsii yi'ge jiingzhaang, 5 rern shouhshang. junshih zhehngbiahn houh, baohlih duihkahng junfang jingcharng fasheng." 2014-04-01. China ex-general charged with corruption. "Zhongguor qiarn jiangjun beihkohng tanwu" China has charged former General Gu Junshan with corruption, misuse of public money and abuse of power. "Zhongguor kohnggaoh qiarn jiangjun Guu Juhnshan tanwu, lahnyohng gongkuaan her zhirquarn." UN bans Japan to whale in Antarctica. "UN jihn Rihbeen Narnjirzhou buujing" The United Nations' International Court of Justice (ICJ) has banned Japanese to whale in the Antarctica. "Liarnherguor Guorjih Faayuahn (ICJ) jihnzhii Ribeen zaih Narjirzhou buujing." Kenya bomb attack kills 6 people. "Kenya zhahdahn xirji sha 6 rern" A grenade attack on a bus stop and a food kiosk has killed 6 people in Kenya's capital Nairobi. "Kenya shooudu Nairobi shoouliurdahn xirji bus-zhahn her shirpiin-tirng, shasii 6 rern." Nigeria's army kills 600 people. "Nigeria junduih shasii 600 rern" Nigeria's army killed about 600 people, half of those were civilians, after a recent attack by guerrilla on a barracks. "zuihjihn yourjiduih xirji junyirng zhihouh, Nigeria junduih shasii yue 600 rern, qizhong yibahn shih pirngmirn." 7 fruits & vegs better for health. "7 shuguoo gehng yooulih jiahnkang" Eating 7 rather than 5 portions of fruits and vegetables a day is beneficial for health and could lower the risk of death. meeitian chi 7 zhoong shuguoo bii 5 zhoong gehng yooulih jiankahng, huih gehng chaangshouh. Afghanistan Taliban attacks kill 18. "Afghanistan Taliban xirji 18 sii" Taliban has launched a series of attacks in Afghanistan while it prepares for presidential election, killing at least 18 people. "Afghanistan zhuunbeih zoongtoong xuaanjuu zhijih Taliban fadohng yixihlieh xirji, shasii zhihshaao 18 rern." 2014-03-31. Exercise relates to dementia. "yuhndohng yoouguan chidai" Exercise improves blood circulation and is good for brain function. Lack of blood circulation causes metabolism decline in brain and can develop dementia, study shows. "yarnjiu zhiichu, yuhndohng cuhjihn xuehyeh xurnhuarn, lihyur naao gongnerng. quefar xuehyeh xurnhuarn shii naao daihxieh shuaituih, huih zaocherng chidai." Japan output slows in February. "Rihbeen Erhyueh chaanliahng fahnghuaan" Japan's factory output has decreased by 2.3% in February, it makes people worried about the world's third-largest economy. "Rihbeen Erhyueh gongyeh chaanliahng jiaanshaao 2.3%, shii rern'men danxin zheh'ge shihjieh dih-3 dah jingjihtii." 2014-03-30. Chad troops kill 24 people in CAR. "CAR Chad junduih shasii 24 rern" Chad soldiers have opened fire on residents of mainly Christian neighborhoods in Bangui, capital of the Central African Republic, killing at least 24 people. "Zhongfei Gohngherguor shooudu Bangui Chad junduih xiahng zhuuyaoh Jidutur shehqu'd jumirn kaihuoo, shasii zhihshaao 24 rern." 2014-03-28. CAR grenade attack kills 11. "CAR shoouliurdahn xirji 11 sii" A grenade attack on a funeral in bangui, capital of the Central African Republic (CAR), has killed 11 people. "shoouliurdahn xirji Zhongfei Gohngherguor (CAR) shooudu Bangui yi'ge sanglii, shasii 11 rern." US requests Russia to move back. "US yaoqiur Russia chehtuih" The United States president Obama has strongly requested Russia troops to move back from Ukraine's border. "Meeiguor zoongtoong Obama qiarnglieh yaoqiur Russia junduih chehlir Ukraine bianjihng." Smoking bans improve child health. "jihnyan gaaishahn errtorng jiahnkang" "禁烟 改善 儿童 健康" Study shows that laws banning smoking in public places have decreased premature births and severe childhood asthma attacks by 10%. "yarnjiu xiaanshih gongzhohng dihfang jihnyan faalvh jiaanshaao zaaochaan her yarnzhohng'd torngniarn xiaohchuaan fazuoh 10%." "研究 显示 公众 地方 禁烟 法律 减少 早产 和 严重的 童年 哮喘 发作 10%。" 2014-03-27. Uganda boat capsize kills 250. "Uganda fuhzhou 250 sii" "Uganda 覆舟 250 死" A boat has capsized on Lake Albert between the Democratic Republic of Congo and Uganda, killing more than 250 people. "Congo Mirnzhuu Gohngherguor her Uganda zhijian'd Albert Hur yi-sou chuarn qingfuh, chaoguoh 250 rern siiwarng." "Congo 民主 共和国 和 Uganda 之间的 Albert 湖 一艘 船 倾覆,超过 250 人 死亡。" North Korea fires missiles. "Chaorxian fasheh daaodahn" "朝鲜 发射 导弹" North Korea has test-fired two medium-range missiles just several hours after the United States, South Korea and Japan have held a meeting against North Korea. "Meeiguor, Harnguor her Rihbeen gang juuxirng zhenduih Chaorxian 'd huihyih shuh-xiaaoshir houh, Chaorxian jiuh shihsheh 2'ge zhongcherng daaodahn." "美国、韩国 和 日本 刚 举行 针对 朝鲜 的 会议 数小时 后,朝鲜 就 试射 2个 中程 导弹。" 2014-03-26. Thailand bus crash kills 30. "Taihguor bus zhuahnghuii 30 sii" "泰国 巴士 撞毁 30 死" A bus has fallen into a deep valley in northern Thailand, killing at least 30 people and injuring 22. "Taihguor beeibuh yi-jiah bus dieruh shenguu, zhihshaao 30 rern siiwarng, 22 shouhshang." "泰国 北部 一架 巴士 跌入 深谷,至少 30 人 死亡,22 受伤。" 2014-03-25. Afghanistan Taliban kills 2 policemen. "Afghanistan Taliban sha 2 jiingchar" "Afghanistan Taliban 杀 2 警察" Taliban fighters have attacked an election office in Kabul, killing 2 policemen and injuring 2 others. "Taliban zhahnshih xirji Kabul yi'ge xuaanjuu bahngongshi, shasii 2'ge jiingchar, 2'ge shouhshang." "Taliban 战士 袭击 Kabul 一个 选举 办公室,杀死 2个 警察,2个 受伤。" Faulty genes link to delayed puberty. "jiyin quexiahn yuu qingchunqi yarnchir yoouguan" "基因 缺陷 与 青春期 延迟 有关" Faults in genes cause delay in puberty. Girls normally reaches puberty aged 13 and boys aged 14 or 15. Delay in puberty causes bone problems, reduced breast size in girls and reduced testicle size in boys. "jiyin quexiahn daaozhih qingchunqi yarnchir. nvvhair tongcharng 13 suih daoh qingchunqi err narnhair 14 huoh 15 suih. qingchunqi yarnchir daaozhih guu'tou wehntir, nvvhair ruufarng her narnhair gaowarn xiaao." "基因 缺陷 导致 青春期 延迟。女孩 通常 13 岁 到 青春期 而 男孩 14 或 15 岁。青春期 延迟 导致 骨头 问题,女孩 乳房 和 男孩 睾丸 小。" Active mothers have active children. "huoryueh muuqin yoou huoryueh ziinvv" "活跃 母亲 有 活跃 子女" A study shows that a more physically active mother has a more physically active child. "yarnjiu xiaanshih yuhndohng huoryueh'd muuqin jiuh yoou yuhndohng huoryueh'd ziinvv." "研究 显示 运动 活跃的 母亲 就 有 运动 活跃的 子女。" 2014-03-24. Yemen attack kills 20 soldiers. "Yemen xirji shasii 20 shihbing" Guerrillas have attacked a checkpoint in eastern Yemen, killing 20 soldiers. "yourjiduih xirji Yemen dongbuh yi'ge jiaancharzhahn, shasii 20'ge shihbing." Afghanistan suicide bomb kills 15 people. "Afghanistan zihsha zhahdahn shasii 15 rern" A suicide bomb has attacked a market in northern Afghanistan, killing at least 15 people including women and children. "zihsha zhahdahn xirji Afghanistan beeibuh yi'ge shihchaang, shasii zhihshaao 15 rern baokuoh fuhrur." Afghanistan hotel attack kills 9 people. "Afghanistan jiuudiahn xirji shasii 9 rern" Taliban fighters have attacked a hotel in Kabul, leaving 9 people die including 2 children and 4 foreigners. "Taliban zhahnshih xirji Kabul yi-jian jiuudiahn, 9 rern siiwarng baokuoh 2'ge errtorng her 4'ge waihguorrern." 2014-03-20. Taliban kill 10 police. "Taliban sha 10 jiingchar" Taliban fighters have attacked a police station in the east of Afghanistan, killing at least 10 policeman. "Taliban zhahshih xirji Afghanistan dongbuh yi'ge jiingjur, shasii zhihshaao 10'ge jiingchar." 2014-03-19. Two Egyptian army officers killed. "liaang'ge Egypt junguan beihsha" Two Egyptian army officers and 5 guerrillas have been killed in a gunfight north of Cairo. "Cairo beeimiahn qiangzhahn, liaang'ge Egypt junguan her 5'ge yourjiduih siiwarng." Insufficient sleep causes brain cell loss. "shuihmiarn buzur daaozhih naao xihbao suunshi" The consequence of lack of sleep may be very serious, causing a permanent loss of brain cells, a study suggests. "yarnjiu xiaanshih shuihmiarn buzur'd houhguoo huih heen yarnzhohng, daaozhih yoongjiuu'd naao xihbao suunshi." 2014-03-18. Somalia Islamic fighters kill 6 soldiers. "Somalia Islam zhahnshih sha 6 shihbing" Islamic fighters have attacked an army hotel in a central town in Somalia, killing 6 soldiers including a senior Somalia army commander. "Islam zhahnshih xirji Somalia zhongbuh shihzhehn yi-jian junrern jiuudiahn, shasii 6'ge shihbing baokuo yi'ge gaoji'd Somalia junduih silihng." 2014-03-17. Vigorous exercise cuts flu risk. "juhlieh yuhndohng xuejiaan liurgaan fengxiaan" "剧烈 运动 削减 流感 风险。" New data suggests doing at least two and a half hours of vigorous exercise each week cuts the risk of developing flu. "xin ziliaoh xiaanshih meei xingqi juhlieh yuhndohng zhihshaao liaang'ge-bahn xiaaoshir xuejiaan huahn liurgaan'd fengxiaan." "新 资料 显示 每 星期 剧烈 运动 至少 两个半 小时 削减 患 流感 的 风险。" Libya car bomb kills 5 soldiers. "Libya qihche zhahdahn sha 5 shihbing" "Libya 汽车 炸弹 杀 5 士兵" A car bomb has attacked a barracks in the eastern city of Benghazi in Libya, killing at least 5 soldiers. "Libya dongbuh cherngshih Benghazi yi'ge qihche zhahdahn xirji junyirng, shasii zhihshaao 5'ge shihbing." "Libya 东部 城市 Benghazi 一个 汽车 炸弹 袭击 军营,杀死 至少 5个 士兵。" Crimea voters support joining Russia. "Crimea xuaanmirn zhichir jiaruh Russia" "Crimea 选民 支持 加入 Russia" About 95.5% of voters have supported joining Russia, after half of the votes have been counted in a referendum in Crimea. "Crimea'd gongmirn tourpiaoh yiijing diaansuahn'le bahnshuh xuaanpiaoh, yue 95.5% xuaanmirn zhichir jiaruh Russia." "Crimea 的 公民 投票 已经 点算了 半数 选票,约 95.5% 选民 支持 加入 Russia。" 2014-03-16. Cairo guerrillas kill 6 soldiers. "Cairo yourjiduih sha 6 shihbing" "Cairo 游击队 杀 6 士兵" Guerrillas have attacked a checkpoint in a northern suburb of Cairo, shooting dead 6 Egyptian soldiers. "yourjiduih xirji Cairo beeijiao yi'ge jiaancharzhahn, qiangsha 6'ge Egypt shihbing." "游击队 袭击 Cairo 北郊 一个 检查站,枪杀 6个 Egypt 士兵。" 2014-03-14. Cairo gunmen shoot dead soldier. "Cairo qiangshoou qiangsha shihbing" Suspected Islamic fighters have attacked a military vehicle in eastern Cairo, killing a soldier and injuring 3 others. Militants often attack the military after the first people-elected Egyptian president Mohammed Morsi was overthrown in a military coup. "Cairo dongbuh huairyir'd Islam zhahnshih xirji yi-jiah junche, shasii yi'ge shihbing, 3'ge shouhshang. shoou'ge mirnxuaan'd Egypt zoongtoong Mohammed Morsi beih junshih zhehngbiahn tuifan yiihouh, wuuzhuangfehnzii jingcharng xirji junfang." 2014-03-11. India Maoists kill at least 15 policemen. "India Maorzhuuyihzhee shasii zhihshaao 15 jiingchar" Maoist rebel army has killed at least 15 policemen in the province of Chhattisgarh in India. Chhattisgarh is a stronghold of the Maoists who say they are fighting for poor people. The Maoist insurgency began in the late 1960s and has become, according to the description of India's prime minister, the country's "biggest threat". Nowadays, the Maoists are active in more than a third of India's districts and control large areas of several provinces from northeast to central India. "India Chhattisgarh-sheeng Maorzhuuyih pahnjun shasii zhihshaao 15'ge jiingchar. Chhattisgarh shih Maorzhuuyihzhee'd genjuhdih, ta'men shuo shih weih qiorngrern zhahndouh. Maorzhuuyihzhee zaih 60-niarndaih-moh qiiyih bihng cherngweih juh India zoonglii shuo'd guorjia'd "zuihdah weixier". jintian, Maorzhuuyihzhee huoryueh yur chaoguoh san-fenzhi-yi'd India dihqu bihng kohngzhih corng dongbeei zhih zhongbuh jii'ge sheeng'd dahliahng dihqu." 2014-03-01. US economic growth slows down. "Meeiguor jingjih zengzhaang fahnghuaan" The US economy grew at a rate of 2.4% in the fourth quarter of 2013, down from a first estimate of 3.2%, as consumer spending is weaker than expected. "youryur xiaofeih bii yuhqi pirruoh, Meeiguor 2013 niarn dih-4 jihduh jingjih zengzhaang corng xianqiarn'd gujih 3.2% xiahjiahng daoh 2.4%." 2014-02-27. Browning meat link to Alzheimer's disease. "jianzhar rouh daaozhih chidaizhehng" Browning meat by roasting and frying lead to the formation of advanced glycation end products (AGE), when fat and protein in meat react with sugar. AGE lead to the build up of beta-amyloid protein in brain, which lead to Alzheimer's disease. A diet high in AGE also lead to type 2 diabetes. "rouh'd zhifarng her dahnbairzhih zaih shaokaao her jianzhar guohcherng zhong yuu tarng zuohyohng chaansheng "advanced glycation end products (AGE)". AGE shii naaobuh jileei beta-amyloid dahnbairzhih daaozhih chidaizhehng. AGE gao'd yiinshir yee daaozhih 2-xirng tarngniaohbihng." 2014-02-23. Taliban kill at least 20 Afghanistan soldiers. "Taliban shasii zhihshaao 20'ge Afghanistan shihbing" Taliban fighters have attacked a checkpoint in Kunar Province in Afghanistan near the border with Pakistan, killing at least 20 and capturing 7 Afghanistan soldiers. "Taliban zhahnshih xirji jieraang Pakistan'd Afghanistan Kunar-sheeng yi'ge jiaancharzhahn, shasii zhihshaao 20'ge her furluu 7'ge Afghanistan shihbing." 2014-02-04. Huge rise in global cancer cases. "quarnqiur airzhehng bihnglih dahfurduh shahngsheng" The world is seeing a huge rise in cancer and the need to tackle smoking, obesity and alcohol consumption need to be considered. The global incidence of cancer is increasing quite markedly due to the aging of the population and the increase in the world population. "shihjieh airzhehng dahfurduh shahngsheng, xuyaoh kaaolvh jieejuer chouyan, chifeir her xuhjiuu'd wehntir. youryur quarnqiur rernkoou zengjia her laaohuah, air`zhehng bihnglih xiaanzhuh'dy shahngsheng." 2014-01-23. Egypt gunmen kill 5 police. "Egypt qiangshoou shasii 5'ge jiingchar" 2 gunmen have attacked a checkpoint south of the capital of Egypt, Cairo, killing 5 policemen and injuring 2 others. "2'ge qiangshoou xirji Egypt shooudu Cairo narnfang yi'ge jiaancharzhahn, shasii 5'ge jiingchar, 2'ge shouhshang." 2014-01-20. Pakistan Taliban kills 6 soldiers. "Pakistan Taliban shasii 6'ge shihbing" A suicide bomb has exploded in a busy market near Pakistan's army headquarters in the northeastern city of Rawalpindi in Pakistan, killing at least 14 people including 6 soldiers. Pakistan's Taliban has said that it carried out this attack. "Pakistan dongbeeibuh Rawalpindi-shih kaohjihn Pakistan junrern zoongbuh'd farnmarng shihchaang yi'ge zihsha zhahdahn zhahsii zhihshaao 14 rern baokuoh 6'ge shihbing. Pakistan'd Taliban shengcheng fadohng'le zheh-cih xirji." Taliban kills Nato soldier. "Taliban shasii Nato shihbing" The Taliban has attacked a military base in the southern province of Kandahar in Afghanistan, killing a Nato soldier. "Taliban xirji Afghanistan narnbuh sheengfehn Kandahar yi'ge junshih jidih, shasii yi'ge Nato shihbing." 2014-01-19. Pakistan Taliban kills 20 soldiers. "Pakistan Taliban shasii 20'ge shihbing" A bomb has attacked an army convoy in the northwestern Pakistan, killing at least 20 soldiers and injuring more than 24. Pakistan's Taliban has claimed that it carried out the attack and there will be many such attacks. "Pakistan xibeeibuh yi'ge zhahdahn xirji junrern cheduih, shasii zhihshaao 20'ge shihbing, chaoguoh 24'ge shouhshang. Pakistan'd Taliban shengcheng fadohng'le zhe'cih xirji her jianghuih yoou xuuduo zhehyahng'd xirji." 2014-01-18. India funeral stampede kills 18. "India zahnglii rern caai rern, 18 sii" At least 18 people have been killed and more than 40 people injured in a stampede at a funeral in the western city of Mumbai in India. "India xibuh chernghsih Mumbai yi-cih zahnglii rern caai rern, zhihshaao 18 rern siiwarng, chaoguoh 40 rern shouhshang." 2014-01-17. Afghanistan Taliban kills UN officials. "Afghanistan Taliban shasii UN guanyuarn'men" A suicide bomb and gunmen have attacked a restaurant popular with foreigners in Afghanistan's capital Kabul, killing 13 foreigners and 8 Afghanistan people, including a senior IMF official and 4 staff members of the United Nations. The Taliban has claimed that it carried out the attack targeting foreign officials. "Afghanistan shooudu Kabul yi'ge zihsha zhahdahn her qiangshoou'men xirji yi-jian waihguorrern charngquh'd canting, shasii 13'ge waihguorrern her 8'ge Afghanistan-rern, baokuoh Liarnherguor'd yi'ge gaoji IMF guanyuarn her 4'ge zhiryuarn. Taliban shengcheng fadohng'le zheh-cih zhenduih waihguor guanyuarn'd xirji." Pakistan railway explosion kills 3. "Pakistan tieeluh baohzhah 3 sii" An explosion has derailed a train in central Pakistan, killing at least 3 people and injuring 15. "Pakistan zhongbuh huooche baohzhah chuguii, zhihshaao 3 rern siiwarng, 15 rern shouhshang." 2014-01-16. Taliban will defeat invaders. "Taliban huih daabaih ruhqinzhee" An Afghanistan's Taliban spokesman has told the BBC that the Taliban already controls most parts of Afghanistan and will defeat foreign invaders completely. "Afghanistan Taliban fayarnrern gaohsuh BBC, Taliban yiijing kohngzhih Afghanistan dahbuhfehn, jianghuih chehdii'dy daabaih waihguor qinluehzhee." 2014-01-15. Green spaces good for mental health. "lvhseh kongjian duih jingshern jiahnkang haao" A study suggested living in urban area with green spaces had a long-lasting positive effect on mental health. It was found that people living in green urban spaces show fewer signs of depression or anxiety. "yarnjiu xiaanshih zhuh zaih yoou lvhseh kongjian'd shihqu duih jingshern jiahnkang yoou chirjiuu'd haao'chu, zhuh zaih lvhseh shihqu kongjian'd rern jiaohshaao yoou yihyuh huoh jiaolvh." China shoe factory fire kills 16. "Zhongguor xierchaang dahhuoo, 16 sii" A shoe factory has caught fire in the city of Wenling in Zhejiang province in eastern China, killing at least 16 people. "Zhongguor dongbuh zhehjiang-sheeng Wenliing-shih yi-jian xierchaang zhaorhuoo, zhihshaao 16 rern siiwarng." 2014-01-14. Atheist given asylum in UK. "UK bihhuh wurshernluhnzhee" An Afghanistan citizen has been given asylum in the UK for religious reason because he is an atheist. "UK yi'ge Afghanistan gongmirn youryur shih wurshernluhn, beih geeiyuu zongjiaoh liiyour'd bihhuh." 2014-01-13. Caffeine could boost memory. "caffeine nerng tirgao jihyih" A US study has found that caffeine could boost memory besides using as a stimulant. It found those who took caffeine tablets did better than dummy pills on the memory tests. However, experts warned people that caffeine could cause negative effects such as jitteriness and anxiety. "Meeiguor yarnjiu faxiahn caffeine chur'le yohngzuoh xingfehnjih yee nerng tirgao jihyih, furyohng caffeine yaohwarn cuhjihn jihyih bii anweihjih haao. dahnshih zhuanjia jiinggaoh caffeine yoou fuhzuohyohng rur jiinzhang her youlvh." 2014-01-10. China becomes world's largest trading country. "Zhongguor cherngweir shihjieh zuihdah maohyih guorjia" China's latest trade figures show that it has replaced the US as the biggest trading nation in the world, a position the US has held for decades. "Zhongguor zuihxin'd maohyih shuhzih xiaanshih ta quudaih Meeiguor baaochir'le jii-shir niarn'd dihweih, cherngweir shihjieh zuihdah maohyih guorjia." 2014-01-09. Call to cut sugar in food. "huyuh shirwuh xuejiaan tarng" A social movement group has been established calling for reducing the amount of added sugar in food and soft drinks in order to solve the problems of obesity and diabetes in the UK. "wei'le jieejuer chifeir her tarngniaohbihng'd wehntir, Yingguor yi'ge shehhuih yuhndohng tuarntii chernglih huyuh jiaanshaao shirwuh her ruaanyiinpiin tianjia'd tarngfehn." Japan chemical factory explosion kills 5. "Rihbeen huahgongchaang baohzhah 5 sii" An explosion at Mitsubishi Materials factory in Japan's Yokkaichi city in Mie county in Kansai region has killed at least 5 people and injured 12 people. "Rihbeen Kansai dihqu Mie-xiahn Yokkaichi-shih'd Mitsubishi Cairliaoh-chaang baohzhah shasii zhihshaao 5 rern, 12 rern shouhshang." 2014-01-07. Hong Kong movie pioneer Run Run Shaw dies. "Xianggaang diahnyiing xianqu Shaoh Yihfu shihshih" Entertainment tycoon Run Run Shaw, a major figure in Asia's movie industry, has passed away at the age of 107. "Yahzhou diahnyiingyeh zhohngyaoh rernwuh, yurlehyeh dahheng Shaoh Yihfu shihshih, xiaangniarn 107 suih." 2014-01-06. China stampede kills 14. "Zhongguor rern caai rern 14 sii" A stampede has killed 14 people and injured 10 at a mosque in China's northwest Ningxia region. "Zhongguor xibeeibuh Nirngxiah dihqu yi-jian Qingzhensih rern caai rern, 14 sii 10 shang." 2014-01-05. Vitamin D strengthens muscle. "Vitamin D qiarnghuah jirouh" A study has shown that high level of maternal vitamin D during pregnancy strengthens baby's grip strength at the age of four. The study has shown that vitamin D intake during late stage of pregnancy improves muscle strength. Evidence has shown that decreases the amount of fast muscle fibers and increases the amount of fat in muscle. Muscle strength peaks in young adulthood before declining in older age. Low grip strength at adulthood is associated with problems such as diabetes, falls and fractures. It is likely that high vitamin D during pregnancy has benefit to a child that continue until old age and reduces the burden of illness associated with loss of muscle mass in old age. "yarnjiu zhiichu huairyuhnqi muuqin'd gao vitamin D shuiipirng qiarnghuah ying`err 4 suih shir'd wohzhuorlih. yarnjiu xiaanshih huairyuhn houhqi furyohng vitamin D gaaishahn jirouh qiarngduh. zhehngjuh xiaanshih quehfar vitamin D jiaanshaao kuaihsuh jirouh xianweir fehnliahng her zengjia jirouh zhifarng'd fehnliahng. jirouh qiarngduh zaih cherngniarn zaaoqih daadaoh gaofeng rarnhouh zhurbuh shuaituih. cherngniarnqi wohlih di huih daaozhih tarngniaohbihng, diedaao her guuzher wehntir. huairyuhnqi gao vitammin D duih errtorng zhirzhih laaoniarn yoou haaochuh, jiaanshaao laaoniarn jirouh suunshi daaozhih'd jirbihng." 2014-01-04. India house collapse kills 14. "India farngwuh daaotah, 14 sii" A constructing building has collapsed in the western province of Goa in India, killing at least 14 workers and dozens are missing. Lack of safety is the main reason for frequent collapses of buildings. "Indian xibuh sheengfehn Goa yi-jian jiahnzhuh-zhong'd jiahnzhuhwuh daaotah, zhihshaao 14'ge gongrern siiwarng, jii-shir'ge shizong. quefar anquarn shih jiahnzhuhwuh jiingcharng daaotah'd zhuuyin." 2014-01-03. Egypt police kill 11 people. "Egypt jiingchar shasii 11 rern" Police have killed at least 11 protesters in the latest protests across Egypt. More than a thousand protesters were killed since the first popularly elected Egyptian president Mohammed Morsi was overthrown in a military coup. "zuihjihn biahnbuh Egypt'd kahngyih, jiingchar shasii zhihshaao 11'ge kahngyihzhee. junshih zhehngbiahn tuifan shoou'ge mirnxuaan Egypt zoongtoong Mohammed Morsi yiilair chaoguoh yiqian'ge kahngyihzhee beihsha." Cambodia army kills 3 workers. "Cambodia junduih shasii 3'ge gongrern" Military police have opened fire on striking garment workers in the south of the capital of Cambodia, Phnom Penh, killing three and injuring several. The workers are requesting a minimum wage of USD160 instead of USD80 per month. "Cambodia shooudu Phnom Penh narnbuh junjiing xiahng bahgong'd furzhuang gongrern kaihuoo, shasii 3'ge gongrern, jii'ge shouhshang. gongrern yaoqiur meei yueh zuihdi gongzi USD160 daihtih USD80." 2014-01-02. Al-Qaeda controls much of Fallujah. "al-Qaeda kohngzhih Fallujah dah-piahn dihfang" Al-Qaeda-linked rebel army has occupied much of Fallujah that became a hotbed of insurgency following the US invasion of Iraq. "al-Qaeda-yoouguan'd pahnjun zhahnliing'le US ruhqin Iraq houh cherngweir qiiyih wenchuarng'd Fallujah'd dah-piahn dihfang." Somalia bombs kill 10. "Somalia zhahdahn shasii 10 rern" Two car bombs have exploded outside a hotel in Somalia's capital Mogadishu, killing at least 10 people. Al-Qaeda-linked al-Shabab said that it carried out the attack. "Somalia shooudu yi-jian jiuudiahn waihmiahn 2'ge qihche zhahdahn baohzhah, shasii zhihsaao 10 rern. al-Qaeda yoouguan'd al-Shabab shengcheng fadohng zheh-cih xirji." 2014-01-01. Iraq violence kills 8,868 in 2013. "2013 niarn Iraq baohlih shasii 8,868 rern" Violent attacks across Iraq in 2013 killed at least 7,818 civilians and 1,050 soldiers, the highest in 5 years, the United Nations says. "2013 niarn biahnbuh Iraq'd baohlih xirji shasii zhihshaao 7,818'ge pirngmirn her 1,050'ge shihbing, 5 niarn lair zuihgao, Liarnherguor shuo." Vitamin E good for dementia sufferers. "vitamin E yooulihyur chidaizhehng huahnzhee" A study trial has shown that those with Alzheimer's disease shown improvement if taken vitamin E. Patients were able to carry out everyday tasks for longer and needed less help from carers. Vitamin E is found in foods such as eggs, nuts and oils. "yarnjiu shihyahn xiaanshih furyohng vitamin E nerng gaaijihn Alzheimer huanzhee. huahnzhee nerng gehng charng'dy jihnxirng rihcharng'd gongzuoh her xuyaoh gehng shaao'd huhlii. yoou vitamin E'd shirwuh baokuoh jidahn, guoorern her your."
300088
3169431
https://en.wikibooks.org/wiki?curid=300088
XQuery/Microsoft-Access
NOTICE: as of java 8 the JDBC-ODBC bridge has been removed. Therefore, this may not work as expected in eXist versions after 2.2 How to access a Microsoft Access database using the SQL library-- Use the sql:get connection function Use the sun JDBC/ODBC driver string "sun.jdbc.odbc.JdbcOdbcDriver" Specify a jdbc-style URL Specify the path name to the mdb file Example program xquery version "3.0"; let $conn := sql:get-connection("sun.jdbc.odbc.JdbcOdbcDriver", "jdbc:ucanaccess://e:/db1.mdb;memory=false") return sql:execute($conn, "SELECT * FROM tbl1", false) Note that this library converts Access' quirky UTF-16 to UTF-8. Other libraries do not do this. Posted to the eXist list by W.S. Hager on May 17th, 2014
300184
3226541
https://en.wikibooks.org/wiki?curid=300184
A-level Computing 2009/AQA/Problem Solving, Programming, Operating Systems, Databases and Networking/Communication and Networking/Communication Methods
Data Transmission. Serial Data Transmission. Data is created by changes in a voltage in a circuit which is then sent down one wire. For one-way communication a single signal wire is needed but additional wires may be needed for grounding. For two-way communication two signal wires are required, one for each direction. This method is usually used long distance, for example, transatlantic data transmission. The idea being that the setup would be cheaper as there would only be one wire to set up that handles the data. As the data is on one channel, and data is lost over the distance it travels, it is easier to recover the original signal. Parallel Data Transmission. Parallel data is preferred for short distance data transmission because the amount of data that can be sent is greater than serial data transmission. However in long range transmission, the data along a wire could get distorted by the voltages from the other wires parallel to the wire. This problem is known as skew. Another reason it is not used over long distances is that the cost of cabling is very high as many wires are required. Baud rate, bit rate, bandwidth, latency. Baud Rate. Baud Rate is the rate at which signals on a wire may change. This means that in a second, a signal could change a number of times which is recorded as the baud rate. AQA define the baud rate as the number of signal changes per second. Therefore, 1 baud is defined as one signal change per second. Units for baud rate are per second (/s) Bit Rate. Bit rate is measured in bits per second (also written as bps or bits/second). It measures the number of bits that are sent down a channel per second. Baud and bit rate can be different but when the bit rate is equal to the baud rate, one bit is sent between consecutive signal changes. For example, if you had a dripping water tap, the bit rate and baud rate would be equal for that tap because there is a consecutive change between the tap dripping and water not dripping assuming that the tap would only drip one drop at a time. To calculate bit rate, use the equation: Bit rate = Bits per signal × baud rate This can be proven by looking at the units. bits/second = bits × 1/second Bandwidth. There is a direct relationship between bit rate and bandwidth that you must know . They are directly proportional. The greater the bandwidth, the higher the bit rate. The bandwidth is usually double the bit rate so the relationship can be seen as 2:1 as a ratio. Latency. In the context of data communications and electronics, latency is the time that is taken for data to be transmitted from the sender to the receiver. For example, when you're surfing the internet and you make a request, the time that it takes for your request to reach the server is the latency. Asynchronous data transmission. Start and stop bits. Start Bit. A start bit is used to signal the arrival of data and to temporarily synchronise the transmitter and receiver. Stop Bit. A stop bit is a character in asynchronous data transmission that lets a receiver know that the byte being sent has ended. Stop bits are very important because this is the way most of our information is sent across the internet. Without a stop bit it is possible that a receiving computer will likely prompt an error as it may take in unintended data if the end of the intended data is not given. Example: data being sent - 001100 the receiving computer gets this information but does not receive any information to know when to stop reading incoming data and so it will keep reading incoming signals until the program crashes data received - 00110010101001011001... Odd and even parity. A "parity bit" is a bit that is added to ensure that the number of bits with the value 1 in a set of bits is odd or even. Parity bits are used in the simplest form of error detecting. For example, if a signal starts off with 3 occurrences of 1 it is in odd parity, once it arrives at its destination and only has 2 occurrences of 1 then the receiver knows there is a problem and will ask for the data to be re-sent There are two variants of the parity bit, odd and even. When using "even parity", the parity bit is set to 1 if the number of 1s in a set of bits (not including the parity bit) is odd, making the entire set of bits (including the parity bit) even. For example 1001 0110 (4 bits = even) When using "odd parity", the parity bit is set to 1 if the number of 1s in a set of bits (not including the parity bit) is even, making the entire set of bits (including the parity bit) odd. For example 1000 0110 (3 bits = odd) In other words, an even parity bit will be set to "1" if the number of 1s + 1 is even, and an odd parity bit will be set to "1" if the number of 1s +1 is odd. Error detection. If an odd number of bits (including the parity bit) are transmitted incorrectly, the parity bit will be incorrect and therefore shows an error occurred during transmission. Parity bits can only be used to detect errors, they cannot correct any errors as there is no way to determine which specific bit has been corrupted. The data must be scrapped and re-transmitted. Handshaking. It is usually a process that takes place when a computer is about to communicate with a foreign device to establish rules for communication. When a computer communicates with another device like a modem or a printer it needs to handshake with it to establish a connection. Much like humans greet each other by a handshake to establish a connection. Handshaking may be used to negotiate parameters that are acceptable to equipment and systems at both ends of the communication channel, including, but not limited to, information transfer rate, coding alphabet, parity, interrupt procedure and other protocol or hardware features. Handshaking makes it possible to connect relatively heterogeneous systems or equipment over a communication channel without the need for human intervention to set parameters. One classic example of handshaking is that of modems, which typically negotiate communication parameters for a brief period when connection is first established, and thereafter use those parameters to provide optimal information transfer over the channel as a function of its quality and capacity. A typical handshaking process follows the following steps: Baseband. Baseband is a transmission medium used for a network over short distances. Usually, a network is used between several computers so data is sent simultaneously. However, a baseband system only allows one station to be sent at a time. It offers high performance for low cost. Broadband. Broadband is also a transmission medium used for a network but it is a multichannel system which combines several data channels into one so that the bandwidth of the transmission can be shared between several channels. It is mainly used for long distance communication because long-distance wires are difficult to maintain and therefore it would be wasteful to use single channel wires.
300211
40302
https://en.wikibooks.org/wiki?curid=300211
A First Course to Network Coding/How to Use this Book
As readers may already noticed, there are one or two sentences under each chapter's title. It briefly summarize the content of said chapter, so readers have a general idea of what they are getting into when click in. The background section, as the name indicates, is a supplementary section for look-ups. There's no need to finish the section before entering the main body of this textbook. Rather, when you get stuck on a new term or find a concept blurry in memory, then open this chapter and look up for a definition, example or explanation. An alternative way is to seek explanation from Wikipedia, the free encyclopedia. The articles will be longer, sure, but more elaborate and rigorous due to mass review and edition.
300229
715252
https://en.wikibooks.org/wiki?curid=300229
Models and Theories in Human-Computer Interaction/What’s a Model
What's a Model (Sivabalan Umapathy). A step before the Models. Computing has spread rapidly into everyday life. Even before personal computing was pushed to the forefront by smart personal devices, people had been interacting with machines in a micro scale. Systems such ATM machines, ticket vending machines, printers with displays were providing micro interactions. Those interactions were smaller, sparsely used and task focused. Due to these reasons it was either easy to design or the users did not care to complain. Carroll notes that the traditional waterfall method prevented a user oriented design approach, resulting in ill designed software interfaces. And the actors involved in the waterfall method overlooked the importance of the HCI. This oversight cannot be attributed to the project owners, rather should be attributed to the methodology. A careful look at the companies who employed human oriented design (such as Xerox) will help us to understand where root cause of the issue. Companies which were selling mass consumer machines adhered to the basic principle of "Making it Simple". They had clear driving factors to make it simple. For instances Xerox doesn’t want a loaded customer support or a fleet of technicians servicing the machines. Something made simple had a direct effect on the business, hence a visible ROI existed. Thus people had a direct business case to justify the user based research. But not all software systems had such a driving business case. For instance, an e-commerce site's business model (such as lack of support, after sales service etc.) lacked the strength to impose a compelling business case. This problem is very similar to that of an ATM machine or ticket vending machine. In both the cases, unsatisfied customer's had no sway on the business. This highlights the need to have "Cases" for HCI. A case is a high level goal and should be measurable. For instance measurable outcomes such as efficiency, reduction of support apparatus etc. form a good case. Qualitative outcomes such as user satisfaction or reduction of cognitive load can only serve as a starting point for the case. For example reducing the cognitive load to enable all spectrum of users is measurable case. Clearly defining these cases helps one to draw up the boundaries on the breadth of the focus required. Model as a guiding force. Once the cases are defined, a designer needs a way to translate those goals to deliverable. So, how were they normally approached in the past? Most of the past interfaces were defined on "engineering hunches", while some were designed by artists. The translating principles applied by the engineers were totally different from the ones created my media designers. Both lacked the perfection. The situation can be best summarized as blind folded people left to find a path in a forest. The first help here comes in the form of Human factor principles. It can be said that the human factor principles were the founding fathers of the HCI principles. However they were too abstract to convert them into practice. Only leading practitioners (Such as Alan Cooper, Don Norman) could successfully translate them into implementation. While principle is one thing, applying these principles in context is another. Cult of skeuomorphism in iOS and the later shakeup to tear it apart is an excellent example to demonstrate the principle-context gap. Skeuomorphism is supposed to evoke a positive emotion and help to recall a familiar mental model. Applying them in a modern context or design interactions (such as rolodex) does not deliver the right solution for the applied context. This gap between principles and applied context resulted in non standard methodologies. A model fills this gap. It guides the designer to translate the goals to design. It provides a uniform way to apply principles to context. Model can be used as a communication tool for reviewing and validating the design. HCI Researchers (not usability evaluations) can use a model to define the factors of the system they are studying. Inclusive multidisciplinary of HCI is a strength, not a weakness (Amara Poolswasdi). Because of the expansion of human-computer interaction and its scientific foundations, it is challenging to attain the breadth of working knowledge but certainly not impossible. The scope of HCI is quite broad, but as a multidisciplinary field that is to be expected. When this type of scope is applied with great multiplicity to all of the fields of study it touches, it may seem particularly overwhelming the volume of theories, methods, application domains, and systems. However, these are all tools and perspectives by which to interpret and analyze the value of HCI across disciplines. It is not meant to be limiting in scope, overwhelming by volume, or paralyzing by nature -- these theories and models are all different ways to interpret and understand the same problem. As HCI continues maturing as an academic field of study, the scientific foundations will continue expanding. The concept of fragmentation should not be embraced by current academics and practitioners of HCI. It is in our nature to understand and synthesize this information, and the practical fragmentation of this field achieves the opposite intended effect. At the practitioner level and the academic level, there will naturally be quite a bit of fragmentation. That is a necessary byproduct of specialization. It is the responsibility of the individual practitioners and academics, in collaboration with those in leadership roles, to provide an environment by which a holistic HCI perspective still permeates the underpinnings of our field while allowing for differentiation and specialization. This is a practical application of Gestalt theory, where the whole is greater than the sum of its parts. Is the framework “Computer as Human, Human as Computer” able to explain all our behaviors in everyday tasks? (Wei-Ting Yen). Everyday tasks VS. Non-everyday tasks. Most tasks we do in daily life are routine and only require little thought and planning, such as brushing teeth, taking shower, and watching TV. They are usually done relatively quickly, often simultaneously with other activities because neither time nor mental resources may be available. Thus, in most cases the everyday activities are actually done "subconsciously". On the other hand, non-everyday activities, such as computing income tax, learning new software, and making complex online shopping, are done "consciously" and usually require considerable mental processing efforts. Therefore, it can be found that the tasks most frequently studied by HCI researchers are non-everyday tasks. Conscious behavior VS. Subconscious behavior. The exact relationship between conscious and subconscious thought is still under great debate. The resulting scientific puzzles are complex and not easily solved. Norman (2002) explained the differences between the two. He believed subconscious thought matches patterns because it operates by finding the best possible match of one’s past experience to the current one. It proceeds rapidly and automatically without efforts, so it is good at detecting general trends, at recognizing the relationship between what we now experience and what has happened in the past. People can make predictions about the general trend based on few examples. However, Norman also found that subconscious thought could be biased toward regularity and structure. It may not be capable of symbolic manipulation and of careful reasoning through a sequence of steps. Conscious thought is quite different. Norman believed that the conscious thought tends to be slow and labored. People use conscious thought to ponder decisions, compare choices, rationalize decisions, and find explanations. Accordingly, formal logic, mathematics, decision theory are the tools of conscious thought. However, Norman pointed out that conscious thought is severely limited by the small capacity of short-term memory. Conscious and subconscious modes of thought are not against each other. Instead, Norman believed that they are both powerful and essential aspects of human life. Both can provide insightful leaps and creative moments. And both are subject to errors, misconceptions, and failures. Reference: Norman, D.A., (2002), The design of everyday things, Basic Book, New York Similarities and Differences between Models and Theories (Daniel Giranda). Both "Model" and "Theory" are common terms when discussing HCI (Human Computer Interaction) and while both are used in similar ways, they are not the same. In order to more accurately communicate an idea, these terms should not be used interchangeably. I agree with the assessment outlined in session 2. Similarities. Both Models and theories are used to get a better understanding of observable phenomena. While the methods might be different in the process and in scale, models and theories can be tested, expounded, improved and debunked. Both can be used in multiple fields. More often than not models and theories have practical uses or can be translated into a practical use. The two are also predictive tools that can allow one to have an idea of an outcome before it has been observed. Differences. In HCI design, models are used to guide the creation of an interface, this guide is often less technical than a theory is. One common model outside of HCI would be the blueprint used in the construction of a house. While there is certainly a technical and scientific approach to a model there are other aspects used in its creation. A model will take into account certain human factors such as psychological, socio-technical, and collaboration more than most theories will. Models are often more limited in scope than a theory will be. Theories are different in that they need to be tested repeatedly, they are bound by science and scientific theory to explain phenomena. The amount of human elements included are limited. They are less concerned with graphical models and more with raw data to prove a point. All theories considered credible in the scientific world are peer reviewed and tested multiple times to produce the same results. This causes theories to be harder than models to change or modify since there is a rigorous process involved in proving a theory. Technology's Affect on Model Development (Zack Stout). The history of HCI presented by the chapter discusses the growth of HCI theories from the 1970s to the 1990s. In the 1970s, Carroll states that software development had stagnated under the waterfall model, with human factors also facing difficulties. This led directly to the initial golden age of HCI studies. Carroll attributes this golden age to the idea that computing was in trouble, and needed the multidisciplinary approach to overcome this crisis. This initial approach had the main goal of bringing cognitive science to computer software development. Carroll goes on to list the developments of the 1980s, listing four major areas increasing the knowledge of HCI. The first was the increased usage of cognitive science to explain abductive reasoning, learning by exploration, and development of mental models. The second area mentioned was the multidisciplinary focus of HCI research. The third was increased internationalization. The last area is actually the most interesting. The fourth area is the increase in technology, both in capability and proliferation. Increase of Technology Leads to Increase in Models. Carroll doesn’t get into the details of what brought the multidisciplinary approach to HCI about. Perhaps instead of the increase of technology being relegated to the sidelines, it should be thought of as the catalyst of the involvement of other disciplines. As technology proliferated, it became easier for other disciplines to become involved with computer interaction. This is evidenced by the rise of personal computers in the 1980s, and then the Internet in the 1990s. At the same time, the cost of computers decreased, allowing for more people to purchase them. This led to the involvement of people outside the direct area of computer science (CS). As more non-CS computer users got involved with computers, the difficulties became more apparent. This led to the increased development and incentive to develop models for HCI. Fragmentations Benefits Outweigh any Negatives (Tyler Liechty). The Fragmentation of HCI (Human Computer Interface) is attributable to the growth of knowledge and theories as noted by Carroll. As noted, with the over-abundance of theories comes difficulty in maintaining a comprehensive knowledge of HCI. It is noted as a downside in the growth of the field. For a comprehensive knowledge of any field to be feasible the field has to be static and discrete. With a young field such as HCI this is an unreasonable expectation. Carroll notes specifically in the last paragraph of section 1.3 that ‘fragmentation is a threat to future development’. It would seem that any efforts to prevent this fragmentation would be more harmful than the fragmentation. With each new group of ‘immigrants’ to HCI comes another set of use cases and practitioners to expand the scope of HCI and to further test the theories. To see this as a detriment to the field would undermine the new users as a source of further refinement of the theories. This may lead to many ‘quick and dirty’ ethnographies, but provides a large source of data to analyze the theories that are being applied. This fragmentation can enable the other broad principle of HCI, participatory design. Without this fragmented and sometimes insulated development of similar theories, practitioners may not be able to apply as readily the theories of HCI, and will not produce the data to confirm the quality of the theories. Real Costs of HCI Fragmentation (Richard Lee). Carroll’s material on the scientific fragmentation of HCI in the 80’s, 90’s, and 00’s was informative, but it would be a mistake to view the trend in the past tense. The fragmentation has in no way diminished, and has instead become further institutionalized and must be met with ever more passionate evangelism. The hard fact is that fervor without facts has little impact on the annual budget, yet the evidence one might present to justify the effort, time and expense of both HCI research and implementation of subsequent product improvements is itself time consuming and expensive to produce. I would argue that modern advances in both real user monitoring and in behavioral metrics through both the gathering of applicable user-driven data and its analysis should be heavily leveraged in driving forward the justification for the continued application and evolution of HCI models and theories. The argument is often made that ‘good enough’ is sufficient when bringing a product to market, yet regardless of the scope of use (not every example is a downed plane or a raging nuclear reactor) the improvement of the users’ experience via the human/computer interface is guaranteed to have a positive net impact for the organizations who choose to invest in such efforts. Direct revenue is of course a primary driver and metric in determining the feasibility of HCI research and application, but other factors are in play. Consumer confidence in both specific products and in companies as a whole is at stake. WIth the proliferation of software and hardware choices and their integration into our daily lives becoming more complete every day, a user’s interaction with a small, seemingly insignificant member of a much larger family of products can determine the likelihood of further adoption. Negativity bias combined with the one-to-many aspects of social media and broadcast entertainment on-air and online can lead to instances where one user’s negative experience literally determines the success of a product or company in the marketplace. Of course, it’s important to remember that there’s more to improving interaction than simply addressing usability issues, but those of us willing to take on the challenge of advancing the state of humanity’s relationship with technology are those best positioned to continue combating the fragmentation in our multifaceted field of science. Understanding Functionality Purpose of Human-Computer Interaction (HCI) - (Hestia Sartika). According to Carroll, HCI is and intersection between the social and behavioral sciences that correlates to computer and information technology. This correlation helps developers to understand how users navigate, visualize and process these virtual environments, which pioneered the development and functionality of voice, video, hypertext links, digital libraries, privacy, information visualization, interactive tutorials, graphical interfaces. It also has changed how home, offices, schools or universities use technology and become accustomed to it. HCI's past focus has been integration, analysis, support, and design for professionals and organizational processes. An important element is how can HCI to continue its success 20 years later, which means that HCI has to focus in other areas such as in-home and school learning integration. In 1970's waterfall development method had been an issue in software engineering since the method is meticulously slow and unreliable that had caused a challenge in developing user interfaces and end-user applications. At the end of 1970's cognitive science presented multi-disciplinary focus that consist of linguistics, anthropology, philosophy, psychology and computer science and came out with two principles of cognitive science: 1. "Cognitive science was the representational theory of mind, the thesis that human behavior and experience can be explained by explicit mental structures and operations." 2. "An effective multidisciplinary science should be capable of supporting and benefiting from application to real problems." Therefore HCI was a golden age of science in a sense that it solved all issues within language, perception, motor activity, problem solving and communication within software development process. For example, Card, Moran and Newell (1983) developed the Goals, Operators, Methods and Selection Rules (GOMS) that provoked controversy and new research, Malone (1981) developed analyses of fun and the role of intrinsic motivation in learning based on studies of computer-game software. Carroll (1985) developed a psycho linguistic theory of names based on studies of file-names and computer commands. HCI is a model since it has molded and created a structure for software development processes issues in connecting technology to human behavior and experience. Let 100 flowers blossom, yet be sure that all the 100 bloom from the earth. (Jieun Lee, Eric Vorm). Carroll’s expression on inclusive multidisciplinarity, “Let 100 Flowers Blossom” was a perfect metaphor for HCI’s beauty of diversity. However, as he pointed out, the irony as “the tension between depth and breadth," its success, and the broad coverage of the field bears a problem: fragmentation. I thought it was interesting to read Carroll’s argument, which is expressed as such: the greater scope an intellectual theory appears, the stronger researchers insulate knowledge selectively. At some point, the large scope of the field of HCI was accelerated by the rapid convergence of technologies and study areas. This made researchers overly narrow-scoped. Like a vicious cycle, the need for foundation theory has been increasing, and along with it, the fragmentation of the field. In my opinion, the major cause of fragmentation came from HCI’s heavy focus on practical applications. Practitioners are the majority, and they want instant and efficient solution to be readily adapted for their work. This case is similar to how a gardener wants to have blossoms of various flowers, but disregards the condition of the earth. Even though the soil is not nourished, flowers will continue blooming for several years. However, in the end, the earth will dry out, and the recovery will take a long time. I don't mean that practical approaches are worthless, rather, these are the flowers of HCI. In other words, fragmentation - focusing on breadth over depth - is inevitable. I argue that fragmentation may enable the success of HCI. However, focusing too heavily on applications may dry out the source, the foundation of theories. Another perspective of this issue is also explored through Carroll's writings, that is the concept of identity. In this case, we speak of identity as in the answer to the question: "what is HCI?" The problem of fragmentation is that as a field grows in scope and begins to blend so much with other disciplines, it runs the risk of losing its distinctness and may end up as nothing at all. This is where the problem of breadth over depth comes into play. The breadth is the scope of the field; both the variety of problems it seeks to address as well as the number of tools and approaches it seeks to employ. In this case, we must consider how many of these domains, paradigms, and tools are unique to HCI. Participatory and ethnographic design methodologies may be said to be distinctly HCI (though some may disagree). Other than these, however, most tools or techniques are largely shared or borrowed from other fields such as sociology, psychology, cognitive science, computer science, engineering, etc. Similarly, the domains in which HCI practitioners work are domains of interest for many other fields, such as those earlier listed. This makes answering the question "what is HCI" increasingly difficult, since we cannot directly answer by pointing to either a domain of interest, nor an approach as being uniquely HCI. The answer to this problem, in part, could be to increase focus on depth. In this case, depth refers to the roots of a field, which primarily come in the form for major theories. Theories must be rigorously developed, rigorously tested, and rigorously validated. This process strengthens the depth of a field much like repeatedly heating and cooling steel adds strength. HCI, for the most part, lacks its own major theories, hence, it has very shallow roots. The identity of the field, as illustrated by Carroll (and others), may cease to exist if we focus too much on breadth and not enough on depth.
300252
134830
https://en.wikibooks.org/wiki?curid=300252
Soil Mechanics/Introduction
Engineering geology is the application of the geologic sciences to engineering practice for the purpose of assuring that the geologic factors affecting the location, design, construction, operation and maintenance of engineering works are recognized and adequately provided for. Engineering geologists investigate and provide geologic and geotechnical recommendations, analysis, and design associated with human development. The realm of the engineering geologist is essentially in the area of earth-structure interactions, or investigation of how the earth or earth processes impact human made structures and human activities. Engineering geologic studies may be performed during the planning, environmental impact analysis, civil or structural engineering design, value engineering and construction phases of public and private works projects, and during post-construction and forensic phases of projects. Works completed by engineering geologists include; Engineering geologic studies are performed by a geologist or engineering geologist that is educated, trained and has obtained experience related to the recognition and interpretation of natural processes, the understanding of how these processes impact man-made structures (and vice versa), and knowledge of methods by which to mitigate for hazards resulting from adverse natural or man-made conditions. The principal objective of the engineering geologist is the protection of life and property against damage caused by geologic conditions. Engineering geologic practice is also closely related to the practice of geological engineering, geotechnical engineering, soils engineering, environmental geology and economic geology. If there is a difference in the content of the disciplines described, it mainly lies in the training or experience of the practitioner.
300258
3371989
https://en.wikibooks.org/wiki?curid=300258
Environmental theory and collection of ideas
Foreword. This is the community version of Arpad Fekete's public domain book "Environmental theory and ideas", which is part of the Free Eco Web Services project. The main goals of the community version is to be more comprehensive by explaining modern environmental protection issues and their solutions as practiced by individuals, businesses, and governments around the world (e.g. solar cooking devices, using recyclable materials, or laws); what you can do to help encourage people, businesses, and governments to adopt environment-friendly practices; and open problems scientists and others have researched or can research in the future for the sake of the environment.
300259
3371989
https://en.wikibooks.org/wiki?curid=300259
Environmental theory and collection of ideas/Introduction
We can find many things about environmental problems in greater libraries, the media, or on the Internet. Those works are generally created by professional environmentalists who know much, so we can usually get to know many facts from them, usually with references. In contrast, we base on our present knowledge instead, remind, popularize, and most importantly, search for solutions to the problems. Firstly, we should understand that the solution should be searched for in society instead of the sciences or technology, as until now, humankind lacked not the power, but the willingness, will, unity and cooperation to solve the environmental problems. The essence can be understood by all healthy people: human activities changed the planet Earth so much that it has become less and less fit for supporting life. If it continues this way, it could cause the extinction of many plant and animal species, and perhaps even of humankind, and the possible survivor people will have to live in an unpleasant environment for a long time. The opinions are different about the degree of danger and the extent of problems, so to understand these things, the works of professional environmentalists are handy. When we understand what problems are facing us, it is worth solving them together. Science and technology could not and cannot provide solutions for all problems. They only give tools, but the tools in themselves are not sufficient to solve the environmental problems, if the will for it is not present. Could a newer technology save Earth from the usage of the weapons of mass destruction? Could a newer technology itself save us from a mad scientist? Or could technology save the endangered species from extinction in the time of great famines? Something more is needed here. It is necessary that most of the people do what is good for both the living creatures and the whole of humankind. Education about worldview and ethics can help, but the modification of the economic and political system can help even more, as most people care for environmentalism little until other ways seem to be more competitive. The environmental movement is connected to politics closely, and is trying to influence and decision-makers by votes, ideas, facts, and expert help. There are areas where conservation and the cause of human survival help each other and there are areas where they inhibit each other. If there were no humankind, the world would probably be more natural and predictable than it is now. Humankind, however, might be able to save Earthly life from a threat from space, and they might be able to transport a part of the living world to another planet. Thus we do not know if humankind does good or wrong to the living world in the long term. We know, however, that the natural living world does good to humankind, as it provides food, knowledge and energy. Thus a part of Nature is worth saving anyway. It is sad that the natural living world loses areas more and more in the beginning of the 21st century due to human irresponsibility, and the state of the lifeless environment also differs more and more from that which proved to be sustainable through millions of years. Afterwards, the survival of humankind might be at stake. People should sometimes cooperate with and sometimes compete against each other in order to survive. Environmental agreements are examples of cooperation. There are times when it is difficult to find the form of good cooperation. In these times it may be helpful to share some environmentalist ideas that can cause evolutionary success to their implementors and are compulsive thereby. Call for more arguments to support or disprove this theory or ideas! Further reading. Central Intelligence Agency - The World Factbook (Washington DC, 2013, annual publication) ... official referencing form: The World Factbook 2013-14. Washington, DC: Central Intelligence Agency, 2013 Worldwatch Institute - State of the World (2013, annual publication) Worldwatch Institute - Vital Signs (2013, annual publication) United Nations Environment Programme - UNEP Year Book 2013 (annual publication) United Nations Environment Programme - UNEP 2013 Annual Report (annual publication)
300261
3371989
https://en.wikibooks.org/wiki?curid=300261
Environmental theory and collection of ideas/Environmentalism and survival
Human activity has harmed Nature even in the antiquity, for example, many trees have been cut down and the elephants have disappeared from North Africa. But since the Industrial Revolution, the development of humankind has become so much quicker that it endangers not only Nature, but humankind itself too. In the Cold War, the opposing forces hoarded so many weapons of mass destruction that could have destroyed humankind in case of another world war. Since then, there were more and more countries which were able to create such weapons, so the danger has not ended in the beginning of the 21st century either. Afterwards, as technology advanced, newer sources of danger have appeared, for example, if someone created a virus deadly for humankind with the use of artifical intelligence and gene technology. But not only the extinction of humankind should be feared, but the rise of human suffering too. In the beginning of the 21st century we entered an age when the detrimental effects of global warming appear, the cheaper energy sources of humankind run out, the soil and freshwater run down more and more, the natural life of the oceans and primeval forests is going to lose areas more and more, human population would continue to rise and the rich get even more technological power. In human society, the mentioned problems could cause famines, maybe wars, and an economic crisis bigger than the previous ones. It is possible that the international environmentalist agreements will not be observed in the crisis, and this could make the problems more serious. Thus humankind who have gone far from Nature will probably suffer much, and even cannibalism can happen, but there is a great chance for the survival of the species. If humankind does not go extinct in the short term, small pests could cause problems in agriculture in the long term. What can we do in this situation? We can start living more friendly to the environment, we can join to the environmental movement, and we can even be activists in order to reduce the future suffering in some degree. This is just like symptomatic treatment in many cases. However, if we do not only want a temporary solution, then we should find the root of the problems, and we should deactivate them. It is obvious enough that the world has changed much because of humankind's scientific and technological advancements, and problems have become greater because of overpopulation and mandkind's extravagant lifestyle. Humankind should realize sooner or later that population size should be limited, otherwise it will be limited by something worse, which comes with greater suffering. Sooner or later the irresponsible wastage, like the wastage of one-time use packaging material should be lessened to the minimum too, because it is not sustainable. For the sake of environmentalism, it would be better to lessen them sooner, and we too can make smaller steps in order to diminish them. By the way, the most important goal now is survival, and for this purpose it should be made sure that the countries which can create nuclear weapons do not use them, and people do not use other fatal technologies either, if possible. It is not enough to just disarm nuclear weapons, because people could quickly recreate them again in case of a war. Instead, such an educational and political situation should be created where the production and usage of nuclear weapons and other weapons of mass destruction becomes difficult and meaningless. Humankind should learn to forget what is worth forgetting, and it should deal with the people of Earth's different nations more and more justly. The environmental consciousness is present in humankind, but it is a sad experience that both the private economy and the democratic politics served short-term interests, because buyers and voters have chosen the better standard of living instead of sustainability. If it goes on this way, we will probably not be able to prevent the expected crisis, and we have to take care of our own survival. We should understand what dangers are waiting for us, and how we can avoid them in our own lives. There are people who tend to prepare for a sudden, complete collapse, and their movement is called survivalism in English. They learn about emergencies much, store food and learn to use guns. There are also people who tend to prepare for a great economic crisis instead, and learn such a profession that will be needed in the crisis too. There are poorer ones who might better not beget children. There are richer people too, and they have more opportunities to prepare for the crisis. It is worth for a rich person of being surrounded by such allies whom the rich person supported before, they being grateful to the rich person. The rich person might do it well if he/she prepares to be self-sufficient and self-defensive with these people. Besides self-sufficiency, producing means of sustenance might be a way to go too. Concerning this issue, it is interesting that if someone prepares for his/her own survival, by that he/she probably helps the survival of humankind too. Because if someone prepares for the collapse, then he/she would like to reduce his/her dependent situation, and if dependence on trade lessens in the world, then the consumption which harms the environment probably lessens too. Call for more arguments to support or disprove this theory or ideas! Further reading. Rachel Carson - Silent Spring (Houghton Mifflin, 1962) U.S. Arms Control and Disarmament Agency - Worldwide Effects of Nuclear War (1975) Lester R. Brown - World on the Edge: How to prevent Environmental and Economic Collapse? (Earth Policy Institute, 2011) Paul R. Ehrlich, Anne H. Ehrlich - Can a collapse of global civilization be avoided? (Proceedings of the Royal Society, Biological Sciences, 2013) Jorgen Randers (Report to the Club of Rome) - 2052 - A Global Forecast for the Next Forty Years (Chelsea Green Publishing, 2012)
300262
3371989
https://en.wikibooks.org/wiki?curid=300262
Environmental theory and collection of ideas/Environmentalism and faith
We can find many things on Earth with which we are not satisfied. We are not satisfied that we should kill animals for food, and we are not satisfied either that we should take care of removing our defecation. We are not satisfied that society obliges us for many things, and we are not satisfied either if criminals attack us. We are not satisfied with the morality of the people, nor are we satisfied with religions that make the morality of the people better, if those religions are false. But even if we were satisfied with the Earthly world, we would not be satisfied with the consciousness that we have to die. If we are harmed by these and other imperfections of our Earthly life, and we dislike it, that means that we go closer to a life which we wish. If we want to go even closer to the happy life, the place of which may be called Heaven, then it is worth of thinking on how probable is its existence, and what can we do for making it more probable to get there. The first world religions of history tried to answer these questions too, and it may be the cause of their success. These religions were usually built around a person who was considered infallible and possessing supernatural powers, and who taught in a new way, and whose authority has grown with the spread of the religion - and afterwards, the statements attributed to the founder were proven by authority. Such an authoritarian religion was Christianity, for example. By time, it turned out that some of its statements contradict mankind's scientific advancements. Afterwards, many people ceased to be Christian, but did not cease to like the principles which they considered good in Christianity: the humanists still liked ethics, and the deists still had faith in God. In a similar manner, we may believe that wonders are possible and we can go to Heaven. However, we can approach God by understanding, and not by blind faith. The discipline which studies the arguments for the existence of God, God's attributes and God's will, is called Natural Theology. It is called so because the source of its knowledge is Nature which existed before humankind, and not sacred texts which could have been authored by wise men too. Here we can observe that Natural Theology and environmentalism do good to each other, because the source of the knowledge about God should be protected. We may conjecture that it is also God's will that we should protect the environment, to keep his creation as beautiful as before. If we improve this world, it would be justice for us to get to a better world. Thus protecting the environment can be one aspect of the faith in God or Heaven, and because of this, protecting the true faith in God can be one aspect of environmentalism. That is why Natural Theology deserves some space here. Natural Theology is compatible not only with environmentalism, but with other religions and science, too. Other religions can have Natural Theology as a supplementary source of faith, a subject in school, a protocol between religions, or even a spiritual movement. Science is not complete either without the study of God's possible existence. Unlike the sacred texts, the teachings of Natural Theology can grow and become more and more perfect. So Natural Theology is like science, and it can be real science if it uses the methodology of real science - which is not less, but more strict than 20th century science. If we believe in Natural Theology but not in religions, one question may arise in us: if God exists, why did he allow and probably support so many false religions? There can be different answers to this question, for example, that the religions God supported were better than those religions beside them, or that God wanted to teach us how weak we are. It is also possible that exactly those religions lived for a long time which had the support for survival of that specific religion among their inner values, and God did support them not specifically for their ethical values. Therefore we can imagine humankind's knowledge about God as a convergent series, and the successful religions as points on that series, which help us in our personal convergence towards a proper relationship with God. If not, and we do not believe in God, Natural Theology is still good to show the progress from tradition and authority to reason and better foundations. Call for more arguments to support or disprove this theory or ideas! Further reading. Thomas Paine - The Age of Reason (1794, 1795, 1807) William Paley - Natural Theology: or, Evidences of the Existence and Attributes of the Deity (1809, 12th edition London: Printed for J. Faulder) Sándor Kőrösi Csoma (or Alexander Csoma Korosi) - The Life and Teachings of Buddha (1836–1890; Calcutta, 1957) Cafer S. Yaran - Islamic Thought on the Existence of God: With Contributions from Contemporary Western Philosophy of Religion (Cultural Heritage and Contemporary Change Series IIA, Islam, Volume 16, 2003, printed in the USA) Lee Strobel - The Case for a Creator (Zondervan, 2004)
300263
3371989
https://en.wikibooks.org/wiki?curid=300263
Environmental theory and collection of ideas/Environmentalism and ethical theory
A part of the world's wrongs derives from the immorality of people. In order to make this world better, people should be more ethical and environmentally conscious. However, the ethical and environmentally conscious people may encounter inconveniences as a result of their lifestyle, which does not make it attractive. In order to make the ethical lifestyle more attractive, many solutions have been found during the history of mankind: such are, for example, respect in society, religions, or laws which punish severely. In order to be effective, the religions' moral-forming strength may need faith, or at least deeming it probable or possible that statements of the religion are true. That is why it would probably do good to everyone if those people who do not like religions got ethical tuition. There is a competition for survival, power and reproduction between creatures, which we could call the mover of evolution. We might think that the race of evolution is such a race which has no rules, so the theory of evolution has a detrimental effect on the morals of the people. However, even evolution is against some harmful deeds to the self: for example, smoking, drugs, or suicide. Here we should not consider smoking as if it were a crime that is not forgiven automatically, but as something which makes a person worsen more and more, and as a consequence, falls behind his/her rivals more and more. From the beginning of our written history, humankind uses domesticated plants and tamed animals for its own goals. Humankind cares for the defense and reproduction of these plants and animals, so these creatures need not take part in the race of evolution, except for the extent that they need to win the grace of people. Thus domesticated plants and tamed animals drive their energy into the usefulness for people instead of struggle against their rivals, and this way they can survive. Around many domesticated plants, humans weed out, because the domesticated plants are that yield harvest. Many tamed animals are protected from predators by humans because tamed animals give meat, milk or eggs. Humans probably tame not only animals, but also each other, so the evolutionary race between humans is not only about struggle against one another, but about usefulness to one another as well. The community may help the individual who is more useful to it. Humankind lives in communities, so the evolution of humans is not only about a competition between individuals but about a competition between communities, too. Inside a community, people are similar to each other, and thus helping a member of the community to reproduction is nearly as important for a human as his/her own reproduction. Evolution is about passing on the genes, the parts of the program which is responsible for the build-up of our bodies. Inside a community, the same genes are found more frequently than outside of it. People may do more for the passing on their own genes by doing something great for their community, than by begetting more children. Thus it becomes understandable that it is evolutionarily sound if a person sacrifices his/her life or his/her reproduction for the community. In the society of ants it works in such an advanced way that there are ants who never reproduce, but help the community in survival. If the community of ants came into being by evolution, then possibly there was a time when every ant could reproduce and during community life the present state evolved gradually, probably because helping the teammates was evolutionary helpful for ants even then. Apart from the interest of a group of living creatures, there is an interest that life should survive on Earth. This started to be endangered as a result of the presence of humankind's weapons of mass destruction and humankind's extravagant lifestyle, but it has been in danger for a long time as well because of the risk of the hit of a greater asteroid coming from space. The inclination to save the entire living world presupposes intelligence, and its motivation is similar to the motivation for making a human community survive, and therefore humans are almost fit for solving their environmental problems. The desire for survival is an instinct, and intelligence deems it probable that the survival of our genes as a goal depends on the survival of some other parts of Earthly life. That is why it seems to be logical that humans make such decisions that increase the probability of life on Earth persisting longer. We can call it ethical environmentalism if someone chooses to protect the environment by decisions in his/her own power. We can call it political environmentalism if a group makes an environmental agreement which influences the rules of evolutionary struggle. We can call it educational environmentalism if someone offers knowledge that urges to protect the environment. Call for more arguments to support or disprove this theory or ideas! Further reading. Charles Darwin - On the Origin of Species (1859, 1872) Charles Darwin - The Descent of Man (1871) Richard Dawkins - The Extended Phenotype (Oxford: Oxford University Press, 1982) David Attenborough - The First Eden. The Mediterranean World and Man (William Collins Sons and Co. Ltd. & BBC Books, London, 1987)
300266
3371989
https://en.wikibooks.org/wiki?curid=300266
Environmental theory and collection of ideas/Political environmentalism alliance
Human society works according to the rules of politics. If these rules are bad, it can cause too much suffering to the people. That is why it is worth of making politics more perfect, in which the role of ethics multiplies. Freedom, justice, prosperity and sustainability should belong to the most important goals of politics. In order to achieve this, the democratically elected will and the wise will should correspond more and more to each other, and that is why the basic knowledge about worldview, ethics and politics should be taught in public education, at least briefly. Environmental problems shall cause changes in politics, too. Meanwhile, the hereby mentioned political values should be taken care of, because it is possible that while the weight and role of one value gets stronger, the weight and role of the other weakens. In hard times, power often gets centralized and falls into the hands of rulers, and it cares about liberal laws less, or at least history shows such examples in wars. In these circumstances, the maintenance of order and the distribution of goods is often done better by intelligent people than by outdated laws. This insight might have been known by the Ancient Roman Republic too, because they allowed official dictators in emergency. Thus, environmental problems mean a threat to the freedom of people, because it is difficult to remove a ruling class once it is not wanted. In many cases, liberal parties are in alliance with green parties, perhaps partly due to the before-mentioned threat but not only because of that, but because freedom and sustainability are good concepts, and these people support good concepts. Perhaps that is why these parties used to ally with the socialists, too, as socialism means social justice, which is a good idea. It is another question whether these parties do what is included in their names. But how to protect freedom in a world which is less and less free and advances towards a future which may need strong rule? The answer is not by radical or conceptual liberalism that loses the support of the majority by maintaining controversy. If a liberal party keeps choosing the way it deems good, e.g. it supports the marriage of homosexuals, then it can lose a lot of healthy voters, and it is possible that it will not get the support to govern because of this reason. A liberal party should represent the liberal 80% of the population instead of the liberal 20%, but it is better if it represents the 100% of the population. Thus the parties of wise politicians should be similar to each other, as the will of the people is similar to itself, and wisdom is similar to wisdom too. Instead, liberalism shall show itself where it helps in life, for example, in general, due punishing taxes or incentives should be set instead of prohibitive or coercive laws. It is not sure that changing the political system would prove to be detrimental, provided that it corresponds to the afore-mentioned four values more: freedom, justice, prosperity and sustainability. It is possible that ideal political systems differ very much from what people have had so far. For example, it is probable that more equality of chances can be provided to people if real estates and debts - and even shares and the like - were not inheritable, but every person would start his/her adult life with real estates of approximately equal value, and without debts and public debts. Achieving this goal is, however, not easy, and it needs longer studies in the area of political philosophy, so this is outside of the borders of this book. This was only mentioned as an example to show that probably there would be a more just way to divide land than by inheritance. For dividing money and moveables, however, probably there is no better solution than inheritance, because the parents can give these as gifts to their children, and it might not even be possible to create a good law which restricts the inheritance of these things. As far as there is equality of chances in the area of real estates, it is not very bad that there are wealthier people, because this way people feel motivation for success, and part of them can be happy enough, and the rich can even improve this Earth in some ways a community would not. Call for more arguments to support or disprove this theory or ideas! Further reading. Aristotle - Politics (from a famous ancient greek author) Robin Lane Fox - The Classical World: An Epic History of Greece and Rome (Penguin Books, 2006) Karl Marx - Capital: Critique of Political Economy (1867)
300267
3371989
https://en.wikibooks.org/wiki?curid=300267
Environmental theory and collection of ideas/Political environmentalism warning
Politics could change the world much, but accordingly, politics is not without risks. Many interests collide there and people are competing there with all their talents, which is not always ethical. Politicians can make people believe that other politicians are worse than they are in reality, so the people would hate politicians more, which would make things worse. Politicians can also mislead or trick people to win support, which would make the way of a righteous politician harder. Generally, politicians are just as good as human nature is, that is why it is not advantegous for an enlightened person to compete with them. If an enlightened person wants to change politics, it may be enough for him/her to share thoughts and ideas, and if those thoughts and ideas are proper, probably there will be people who use them anyway. It is better for a politician to consider a philosopher's idea than to make a biased decision, and it is better for philosophers, too, if their ideas are double-filtered by politicians. In a democracy, political power is just for 4–5 years, which is not as secure as the power of a wealthy person. That's why it seems to be more noble to seek economic power instead of political one. A wealthy person can hide more easily than either a politician or a celebrity, which may be important in the age of technology. The life of the wealthy is desired, because they do not have to work if they do not want to, and they can satisfy their desires easily. The life of politicians, on the other hand, is many times about struggle and danger, at least in those ages when mankind is not meek enough. If a politician makes an error, then many people will hate him for it, but if a wealthy person makes an error, he/she usually loses only money. To be unsuccessful, however, is not always the same as to make errors, so it is possible that the people will hate a politician even if that politician is good, e.g. if it is a necessity that the living standards fall, and politicians cannot do anything to prevent it from falling. A politician usually has to follow the philosophy of a party, but a rich person can choose his/her own philosophy. This, however, does not need to be the case in an ideal political system where it would be a civil right to enter into and remain in any party, and the elections inside parties would be democratic . However, we do not live in such an ideal political system, so it is probably better for a free mind to be rich than to be a politician. Politicians should usually make an oath, and the text of the oath may be imperfect or it may demand too much from a righteous person. This, however, does not need to be the case in an ideal political system, where no oath should be made, only obligations shall be formulated. However, we do not live in such an ideal political system, so it is probably better for a righteous person to be rich than to be a politician. In a small country, the power of the politicians is bounded by international agreements just like the power of the rich is bounded by laws. If people have to act according to fix rules anyway, then it is more worth in a small country of being rich than to be a politician because a rich person can affect not only one country, but other countries, too. The rich can decide freely whether to invest their capital into environmentalism. Countries, however, are obligated to do what is the will of the people anyway, and they cannot differ from it much... Call for more arguments to support or disprove this theory or ideas! Further reading. Andrew Carnegie - Autobiography of Andrew Carnegie (London, CONSTABLE & CO. Limited, 1920) Ron Chernow - Titan: The Life of John D. Rockefeller, Sr. (1998) Bill O'Reilly, Martin Dugard - Killing Lincoln: The Shocking Assassination That Changed America Forever (Henry Holt and Co., 2011) Bill O'Reilly, Martin Dugard - Killing Kennedy: The End of Camelot (Henry Holt and Company, 2012)
300272
3371989
https://en.wikibooks.org/wiki?curid=300272
Environmental theory and collection of ideas/Eco friendly games
Early Development and Play. Children are naturally interested in play, partaking in games, and toys. Historically, many games or toys did not require anything which would damage the environment. The games of tag or hide and seek are great examples as they simply require at least one other player to create hours of entertainment, in addition to providing exercise and critical thinking opportunities. Nature often provided its own toys such as helicopter seeds, which when dropped from any height would lazily spin to the ground in an interesting pattern. However as people moved to the city, and as demographics changed, these toys became less viable. In industrialized areas many children are unable to socialize freely, and have fewer siblings to play with. Furthermore safety concerns necessitate parental supervision when children meet with others informally, while daycare and school require a more formal and rigid schedule and setting. These factors prevent some of the spontaneous nature of natural play. As a result, artificial toys and games are required to facilitate play in industrialized areas. This is why it is important to make games and toys more environmentally friendly. A game or toy can be more environmentally friendly by using less resources, providing a greater educational value or engaging the children for more time in an environmentally friendly way. Books explaining the rules of such games are probably friendly to the environment. However, it is very important to make the game or toy very popular as well, because otherwise children would not really want to play with it. Children usually follow fashion, and people could support a game so that it can be fashionable by a popular story or something else. For this, the creation of a new game might be needed, and a rich person or alliance could support the creation of such popular eco games and toys, setting a competition between game developers with alike material resources, and rewarding them according to their success. For example, there is the idea to create a computer game which would be about saving the life on Earth in the 21st century, by cooperation. In this case, the term for game campaign would coincide with the term for environmentalist/political campaign. For the environment, it seems to be better if the computer game is turn-based and multi-player at one computer, or hot-seat. For the environment, it also seems to be better if there are parts of the game which can be played without a computer too, promoting new games which are more environmentally friendly. It is just a matter of money and creativity to create such a game. Ethics and games. The people who believe in God and the philosophers might not regard every game as good as others. It is a right question to ask which are the games that are the most ethical to play. To decide this question, many criteria should be considered. Such criteria are the following: it should use environmentally friendly accessories, it should teach what is good, it should help to form a community, it should not help the development of artifical intelligence too much, it should be interesting and fashionable, it should be accessible by the poor people too, it should cause joy to the less talented too, it should do good to the bodily and mental health, and it should be apt to earn money from it, as a sport, or as a creator of puzzles. Apart from these, there may be other criteria. The game can be more interesting if its rules are not too complicated, but at the same time, human creativity can be manifested in it. It is quite hard to create a game which complies with all the mentioned criteria, although that would be the ideal. The lesson to learn from this is that we should not only be environmentally friendly, but ethical in other aspects, too. Skill and play. Environmentalism is a serious issue, and it is about important problems, but one does not always like to fight a war in which one is likely to lose. That is why those who have suffered much because of the world, and made many sacrifices in order to make the world better, deserve to play, in order not to think about the world, and get more success and sources of joy. Even the hypothesis can come to our mind that a happy person can probably diet, care for his/her body, exercise, and have temperance more easily, because it is more difficult for the sad people to make sacrifices. A professional player could even earn money by skill games, or by writing about games, or by taking part in creating new games. The therapeutic and community-making effects of games are not negligible either. It is not always easy, however, to find a proper playmate. Whoever wins many times, might feel the game more dull, and whoever loses many times, probably does not enjoy the game as much. These times a voluntary handicap by the stronger player may help at the starting of the game, for example, when a grandmaster of chess plays without rooks against a child. This way any of them wins, may enjoy the game. So if we create a game, it is worth taking care of opportunities for voluntary handicaps, or for different skill levels for one-team games. If we play so much that it gives us happiness, and if we can win from our handicapped situation, why should not we try again to solve our problems in real life?
300280
3371989
https://en.wikibooks.org/wiki?curid=300280
Environmental theory and collection of ideas/Eco friendly economical life
Call for more ideas presented as shortly as these! Further reading. Aristotle - Nichomachean Ethics (work of a famous ancient greek author) P.T. Barnum - The Art of Money Getting (1880) Talane Miedaner - Coach Yourself to Success: 101 tips from a personal coach for reaching your goals at work and in life (Contemporary Books, 2000)
300281
3371989
https://en.wikibooks.org/wiki?curid=300281
Environmental theory and collection of ideas/Ideas to politicians
Call for more ideas presented as shortly as these! Further reading. A.C. Grayling - What is good? (2003; Phoenix, London, 2004) Robert Van De Weyer - Against Usury: Resolving the Economic and Ecological Crisis (SPCK Publishing, 2010) Rohan D'Souza - Environment, Technology and Development: Critical and Subversive Essays (2012)
300282
3371989
https://en.wikibooks.org/wiki?curid=300282
Environmental theory and collection of ideas/Ideas to the rich
Call for more ideas presented as shortly as these! Further reading. Global Reporting Initiative - G4 Sustainability Reporting Guidelines (Amsterdam, 2013) David Bornstein - How to Change the World: Social Entrepreneurs and the Power of New Ideas, Updated Edition (Oxford University Press, USA; 2007)
300283
3371989
https://en.wikibooks.org/wiki?curid=300283
Environmental theory and collection of ideas/Ideas to activists
Call for more ideas presented as shortly as these! Further reading. Dr. Gene Sharp - The Politics of Nonviolent Action, Vol. 2: The Methods of Nonviolent Action (Boston: Porter Sargent Publishers, 1973) Randy Shaw - The Activist's Handbook (University of California Press; 1996, 2001)
300284
3371989
https://en.wikibooks.org/wiki?curid=300284
Environmental theory and collection of ideas/Ideas to researchers and inventors
Call for more ideas presented as shortly as these! Further reading. United Nations - Millenium Development Goals Report (annual publication, 2005–2015) Edmund Burke - The Environment and World History (University of California Press, 2009)
300291
1599330
https://en.wikibooks.org/wiki?curid=300291
Travel Time Reliability Reference Manual/About TICAS
Traffic Information and Condition Analysis System (TICAS) is a powerful traffic data collection and simulation software developed by the Northland Advanced Transportation Systems Research Laboratory (NATARL) at University of Minnesota Duluth. The data source of TICAS comes from the Minnesota freeway detectors which provide traffic flow rates, speed and density data every 30 seconds. The major advantage for using TICAS is it enables user to access corridor-based traffic information, such as travel time and vehicle miles traveled. Those traffic metrics are derived or estimated basing on the traffic raw data archived at Minnesota Traffic Management Center. Data from TICAS can be exported into EXCEL directly, which is convenient for large data collection. = References = Next Page → Creating Routes
300292
40302
https://en.wikibooks.org/wiki?curid=300292
Travel Time Reliability Reference Manual/Availability of Data
Here are some graphs and data for an 6-lane urban freeway (I-43/I-894 near Milwaukee) and 4-lane interregional (I-94 west of Eau Claire). I realize the corridor lengths are much different, but the options were limited for non-urban interstates which had more than just a couple TMC points and the urban corridors tend to be shorter. In this case, we actually have more data for I-94. The reliability indices follow what we’d expect with the more rural freeway performing better. I had to use the 70th percentile travel time for the free flow travel time on the urban freeway because using the speed limit would have led to a mean speed less than the free flow. Let me know your thoughts. 6-lane urban freeway (4.34875 miles) Free flow travel time is based on the 70th percentile travel time 4-lane interregional freeway (20.178 miles) Free flow travel time is based on speed limit of 65mph
300294
49843
https://en.wikibooks.org/wiki?curid=300294
Travel Time Reliability Reference Manual/Creating Routes
TICAS is a powerful data collection tool for corridor-based traffic study. Travel time and vehicle miles traveled data can be downloaded for the routes created by the users. The database of corridors contains the majority of freeways, trunk highways, and US highways in Minnesota central area, and their directions are specified. The interface of the tool is user-friendly and straightforward.The procedures for creating routs are stated below. 1. Open TICAS tool, and go to "Data/Performance" tab; 2. Click the button "Edit Route" in the "Route and Times" region; 3. Click " Create Route" tab when a new window named "Route Editor" shows up; 4. Drag down the corridor list, and select a corridor that contains the segment(s) interested; 5. A route will be specified in the right window box if a corridor is selected. For the pins showing on the routes, red pins are actual main lane stations of loop detectors, and pins of other colors represent the exit and enter ramp stations. Find the main lane station that closed to the starting location of the interested segment, right click the pin and select "Section start from here". This helps to specify the starting location of the route; 6. Find the main lane station that closed to the ending location of the interested segment, right click the pin and select "Section end to here". This helps to specify the ending location of the route; 7. Click "Save location" button. Then the new edited route will be listed in the "Route Lists" tab. This route can be extracted directly for data collection use. Previous Page → About TICAS Next Page → Primary use in SHRP II
300296
1598391
https://en.wikibooks.org/wiki?curid=300296
Travel Time Reliability Reference Manual/NPMRDS and INRIX Data Comparison
=Comparison of INRIX and NPMRDS Data Sets= A comparison of speed data between INRIX and NPMRDS for January 2012 on a 4-lane inter-regional and 6-lane urban freeway. Particularly on the urban freeway, the NPMRDS data reports lower speeds than INRIX with higher variability. The matched pair graphs below reveal a similar trend represented by the linear fit with the intercept set to zero. Previous Page → Imputing Missing Speed Data Next Page → Example Data
300297
1598391
https://en.wikibooks.org/wiki?curid=300297
Travel Time Reliability Reference Manual/INRIX Data Types
=INRIX Speed Data Types= INRIX speed data includes a code with each speed observation. This code represents the type of speed: reference, historical or real-time. Reference speed: based on the typical free flow speed for the segment - related to the speed limit Historical speed: based on the historical speed data for that particular segment during the same time of day Real-time speed: based on real-time speed measurements from probe, gps or other real-time measurements The reference speed is constant across all times and varies only by TMC segment. The historical speed is time dependent and may capture recurring congestion along a segment. INRIX uses reference and historical speeds to fill in gaps in the real-time data. INRIX does not reveal the threshold necessary to provide real-time data, nor does INRIX reveal when reference data is used instead of historical data for filling gaps in real-time data. It appears, however, that reference data is used during the night and other off peak times in order to reduce processing when speeds are likely constant, whereas, historical data is likely used during hours when speeds may vary but no real-time data is available. Data Type by Year. Below are graphs representing the distribution of data types for freeways and arterials in Wisconsin by year. The data does not include all INRIX freeway and arterial coverage in Wisconsin, but a subset. The graphs reveal an increase in the availability of real-time data with time. It is expected that this trend has continued with 2013 and 2014 data. Data Type by Hour. The graph below shows the distribution of real-time data along a 4-lane inter-regional freeway in Wisconsin by hour of the day. Real-time data is most prevalent during daytime hours when more vehicles are present on the roadway. Previous Page → About INRIX Next Page → NPMRDS and INRIX Data Comparison
300298
1598391
https://en.wikibooks.org/wiki?curid=300298
Travel Time Reliability Reference Manual/About NPMRDS
=NPMRDS= The FHWA acquired a national data set of average travel times for use in performance measurement and to identify transportation improvement areas and monitor their effectiveness.. The National Performance Measure Research Data Set, is provided by HERE North America, LLC (formerly known as Nokia/NAVTEQ). The data set is made available to States and Metropolitan Planning Organizations (MPOs) as a tool for performance measurement. Access can be obtained by emailing e-mail [email protected]. Next Page → Accessing the Data = References =
300309
1598391
https://en.wikibooks.org/wiki?curid=300309
Travel Time Reliability Reference Manual/About the Travel Time Reliability Reference Manual
The Travel Time Reliability Reference Manual is authored and maintained by the Upper Midwest Reliability Resource Center. The main page acts as a table of contents for the manual. Next Page → Travel Time Reliability Indices
300310
1598391
https://en.wikibooks.org/wiki?curid=300310
Travel Time Reliability Reference Manual/Data Format and Size
=NPMRDS Data Format= NPMRDS data comes in two formats. The first is the static file containing the TMC information for all states. This file may be updated from time to time, but is typically static. The remaining files contain the travel time information for each state in the form of comma separated files (CSV). The files are usually between 500MB and 4GB depending on the region, with the Northeast being the largest data set. A sample Google Earth (.kml) file mapping out the TMCs in Iowa, Minnesota, North Dakota, South Dakota and Wisconsin is available here or on Google Maps here . TMC Static File Format Travel Time File Format Previous Page → Accessing the Data Next Page → Data Storage = References =
300311
164862
https://en.wikibooks.org/wiki?curid=300311
Travel Time Reliability Reference Manual/Accessing the Data
=Access to NPMRDS Data= The data set is made available to States and Metropolitan Planning Organizations (MPOs) as a tool for performance measurement. Access can be obtained by emailing e-mail [email protected]. More information regarding access to the NPMRDS data can be found at http://www.ops.fhwa.dot.gov/freight/freight_analysis/perform_meas/vpds/npmrdsfaqs.htm. The data typically come out each month in the form of seven compressed .tar files. The files include: Previous Page → About NPMRDS Next Page → Data Format and Size = References =
300312
1598391
https://en.wikibooks.org/wiki?curid=300312
Travel Time Reliability Reference Manual/Availability of Real-Time Data
=NPMRDS Real-Time Data Availability= The charts below outline the availability of NPMRDS real-time data on two freeway corridors in January 2012. The following two graphs show the availability of real-time data by hour of day in January 2012 for the 6-lane urban freeway and the 4-lane inter-regional freeway. The availability of real-time data is higher during daytime hours when vehicle volumes are higher and lower overnight. Overall, the 4-lane inter-regional corridor reported more real-time measurements. Although the urban freeway experiences higher vehicle volumes, the inter-regional freeway likely experiences higher commercial truck volumes, which are often a source of probe data. Another possible factor is the shorter TMC lengths along the urban freeway. The inter-regional freeway is 20 miles long with 4 TMC segments, while the urban freeway is 4 miles long with 6 TMC segments. It's unknown whether there is a correlation between TMC length and availability of real-time data. The two charts below show the frequency at which varying amounts of real-time data were available along the corridors during January 2012. For example, 100% availability corresponds to all TMCs reporting (4/4 or 6/6 for these two corridors) real-time data during a given time interval, 50% availability to half of TMC segments (2/4 or 3/6) reporting real-time data etc. The frequency at which eac of these occur is plotted along the y-axis. The inter-regional freeway consists of 4 TMCs making up 20.18 miles, the urban freeway 6 TMCs totaling 4.35 miles. The greater number of TMC segments along the urban corridor is one factor leading to the smaller frequencies of availability. However, with fewer real-time data points (as shown in the graphs above), it is expected that the frequencies will also be lower on the urban corridor than the inter-regional. 6 TMC segments along 4.35 miles of corridor 4 TMC segments along 20.18 miles of corridor Previous Page → Building Corridors Previous Page → Calculating Speeds and Travel Times
300313
1598391
https://en.wikibooks.org/wiki?curid=300313
Travel Time Reliability Reference Manual/About SHRP II
=Strategic Highway Research Program 2 (SHRP II)= "Congress authorized the second Strategic Highway Research Program (SHRP 2) in 2005 to investigate the underlying causes of highway crashes and congestion in a short-term program of focused research. To carry out that investigation, SHRP 2 targets goals in four interrelated focus areas: Safety: Significantly improve highway safety by understanding driving behavior in a study of unprecedented scale. Renewal: Develop design and construction methods that cause minimal disruption and produce long-lived facilities to renew the aging highway infrastructure. Reliability: Reduce congestion and improve travel time reliability through incident management, response, and mitigation. Capacity: Integrate mobility, economic, environmental, and community needs into the planning and design of new transportation capacity." "SHRP 2 is being conducted under a memorandum of understanding among the American Association of State Highway and Transportation Officials, the Federal Highway Administration, and the National Research Council. The multiyear program (five years of funding, nine years to complete) began work in March 2006. SHRP 2 is guided by an oversight committee and four technical coordinating committees, one in each of the four focus areas. More targeted task groups provide assistance in areas requiring specific technical expertise, including preparation of requests for proposals and review of proposals." Next Page → TTRMS Tool = References =
300324
49843
https://en.wikibooks.org/wiki?curid=300324
Travel Time Reliability Reference Manual/Building Corridors
=Constructing a Segment for Analysis= TMCs are segments of the roadway, often between interchanges or major intersections on arterials. The travel time data is reported at the TMC level. These segments range in length from less than a mile to several miles long. In order to build a corridor and calculate the travel time, TMCs must be connected. Each TMC is assigned a location code. Details can be found at Next Page → Data Format. A Google Earth (.kml) file mapping out the TMCs in Iowa, Minnesota, North Dakota, South Dakota and Wisconsin is available here or on Google Maps here . Typically, a corridor can be constructed by connecting successive TMCs in the positive or negative direction. The TMC numbers increase with the direction of travel along the positive direction and decrease along the negative direction. For example, a corridor in the positive direction might consiste of 107P04585, followed by 107P04586, 107P04587 and 107P04588 etc. In the negative direction, 107N04588 would be the first TMC, followed by 107N04587, 107N04586, and 107N04585 etc. Longer corridors, however, can be constructed by simply connecting successive TMCs. When roadways intersect other roadways, the TMC sequence may change. Therefore, viewing TMC points in GIS or other mapping software allows one to see the sequence of TMCs along the desired corridor. The static file containing TMC information, includes the roadway name, direction and latitude and longitude coordinates, allowing the points to be plotted in various programs. The NPMRDS data set also includes a shapefile which can be used to construct corridors in GIS. One difference in the TMC data provided by INRIX, is that TMC points are defined by a beginning and ending latitude and longitude which typically allows a corridor to be constructed by connecting the ending latitude/longitude of one TMC to the beginning latitude/longitude of another. Once the order and sequence of TMC points along the corridor is defined, travel times and other metrics can be calculated. Previous Page → Data Storage Next Page → Availability of Real-Time Data
300325
2669093
https://en.wikibooks.org/wiki?curid=300325
Elementary Spanish/Past Education/commands
Informal Commands: Affirmative: <br> <br> Compra la comida.<br> Buy the food. (you) <br> <br> Leé el libro.<br> Read the book. <br> <br> Limpia la casa.<br> Clean the house. <br> <br> Cepilla tus dientes.<br> Brush your teeth. <br> <br> Negative: -ar verbs change to -e<br> -er/ir verbs change to -a<br> <br> <br> Compra la comida.<br> Buy the food. <br> <br> No compres la comida.<br> Don't buy the food. <br> <br> No hables tanto.<br> Don't talk so much. <br> <br> No mires la televisión.<br> Don't watch T.V. <br> <br> No la escuches.<br> Don't listen to her. <br> <br> Irregular Verbs for Command Form: <br> decir: to say/tell<br> Affirmative: di / Negative: digas <br> <br> salir: to leave/ go out<br> Affirmative: sal/ Negative: salgas <br> <br> hacer: to do/make<br> Affirmative: haz / Negative: hagas <br> <br> ser:to be<br> Affirmative: sé / Negative: seas <br> <br> ir: to go<br> Affirmative: ve / Negative: vayas <br> <br> tener: to have<br> Affirmative: ten / Negative: tengas <br> <br> poner: to put<br> Affirmative: pon / Negative: pongas <br> <br> venir: to come<br> Affirmative: ven / Negative: vengas <br> <br> No vengas a la reunión.<br> Don't come to the meeting. <br> <br> Pon el café en la mesa.<br> Put the coffee on the table. <br> <br> No te vayas tan temprano.<br> Don't leave so early. <br> <br> Sal del cuarto.<br> Leave the room. Dialogo: Mama: Jorge, necesito ayuda preparando para los visitantes que vienen este fin de semana.<br> Jorge: Bueno, pero, tengo la fiesta de cumpleaños de mi amigo Sam hoy.<br> Mama: Por eso, debemos limpiar ahora mismo. Ven, ten la escoba y vete a la cocina.<br> Jorge: Pero mama! No hay tiempo, tenemos que envolver el regalo de Sam!<br> Mama: La fiesta empieza a la una, y apenas son las nueva de la manaña. No me lo dicutas. A limpiar! <br> Jorge: Vale, pues. Prestame la cinta para envolver el regalo. <br> Mama: Ten. Hazlo rapido mi amor!<br> Jorge: Muy bien. Graciás mama!<br> Mama: Y a tí. Bueno. Ahora agarra el regalo y ponlo en tu cuarto. Mientras que estas allá, limpia tu cuarto también!<br> Jorge: Ya, terminé de limpiar el cuarto. Y ya tenemos que ir a la fiesta.<br> Mama: Es casi tiempo de irnos, sí. Pero cepillate los dientes y lavate la cara primero. No te puedo permitirte ir fuera de la casa asi.<br> Jorge: Puedo traer mi juegete a la fiesta también?<br> Mama: No traigas el juegete. No queiro que lo pierdas.<br> Jorge: Tengo hambre. Podemos comer algo antes de irnos.<br> Mama: Pero acabaste de cepillarte los dientes! Pues, a ver, te prepare un sandwich.<br> Jorge: Gracias mama, pero no le pongas mayonesa. No me gusta la mayonesa.<br> Mama: Desde cuando no te gusta mayonesa? Mientras estoy preparando el sandwich, asegurate que estes listo de ir a la fiesta.
300327
396820
https://en.wikibooks.org/wiki?curid=300327
Travel Time Reliability Reference Manual/About INRIX
"As of April 2012, INRIX collects trillions of bytes of information about roadway speeds from nearly 100 million anonymous mobile phones, trucks, delivery vans, and other fleet vehicles equipped with GPS locator devices. Data retrieved from consumer cellular GPS-based devices including the iPhone, Android, BlackBerry and Windows Phone phones, Ford SYNC and Toyota Entune. The data collected is processed in real-time, creating traffic speed information for major freeways, highways and arterials across North America (United States, Canada), as well as much of Europe, South America, and Africa." See the INRIX Wikipedia Page for more information. Next Page → INRIX Data Types = References =
300336
1598391
https://en.wikibooks.org/wiki?curid=300336
Travel Time Reliability Reference Manual/Imputing Missing Speed Data
Unlike INRIX, the NPMRDS data set does not include non real-time travel times or speeds. If real-time measurements do not exist for a given TMC during a given time period, the data point is left blank. In some cases, it may be desirable to impute some of the missing data points based on surrounding real-time data. The figure below gives an example of imputing a missing data point based on surrounding spatial and temporal data. Using a sample NPMRDS data set, an imputation was conducted in which missing data points were imputed only if the surrounding spatial and temporal points were all populated with real-time data. The percentage of missing data points which fit this criteria was around 3 percent. More often than not, the missing data points are not anomalies, but are accompanied by other missing points. This makes sense, since missing real-time data is usually the result of a lack of probe vehicles. A lack of real-time data in one TMC segment will likely result in neighboring TMCs to also lack real-time data. Similarly, surrounding temporal points are likely to lack real-time observations when vehicle volumes are low. Previous Page → Calculating Speeds and Travel Times Next Page → NPMRDS and INRIX Data Comparison = References =
300337
1598391
https://en.wikibooks.org/wiki?curid=300337
Travel Time Reliability Reference Manual/Calculating Speeds and Travel Times
Calculating speeds or travel times along a corridor is straightforward given that one has constructed the TMC segments which make up the corridor and that one has a tool by which to access the data. One open source tool for writing the necessary code is Python. Python extensions, such as Psycopg, allow one to access SQL databases which are storing the speed/travel time data. INRIX and NPMRDS provide either speed or travel time measurements for each TMC for every time interval (1 or 5 minutes). TMC lengths are also reported which allows for easy conversion between speed and travel time. Calculating speeds or travel times along a corridor only requires that these values be aggregated. Python scripting can be used to read from the databases for the necessary TMC segments and desired time periods and loop over the values in order to construct speeds/travel times. These speeds/travel times can then be written to a Comma Value Separated (CSV) file, or inserted into a database table. Additional add-ons are available for Python which allow 3D graphing capabilities. Below are sample graphs created using the NPMRDS data set and the Matplotlib python library. Blank areas represent points where real-time data did not exist along the entire corridor. Travel Times for 4-lane Inter-regional Freeway in January 2012 Travel Times for 6-lane Urban Freeway in January 2012 Previous Page → Availability of Real-Time Data Next Page → Imputing Missing Speed Data
300346
1598391
https://en.wikibooks.org/wiki?curid=300346
Travel Time Reliability Reference Manual/Data Storage
=Data Storage= Due to the large size of the NPMRDS data sets, it is not possible to open the CSV files containing travel time data in Microsoft Excel. While Microsoft Access provides the ability to handle slightly larger data sets, MS Access is also limited in the amount of data it can hold (typically around 2 GB). With each month of data containing between 500 MB and 4 GB, depending on the region, it is recommended to use a non file-based relational database. MySQL and PostgreSQL are examples of open source databases which can handle these large data sets. The data is often stored as two tables, one which holds the static TMC information and the other which holds the speed/travel time data. The two tables can be joined by the TMC id/name which is parameter in both data sets. Details of each data set can be found on the NPMRDS data format page. Previous Page → Data Format and Size Next Page → Building Corridors
300350
3225714
https://en.wikibooks.org/wiki?curid=300350
Travel Time Reliability Reference Manual/Travel Time Reliability Indices
=Reliability Indices= Travel Time Index (TTI) - The ratio of a measured travel time during congestion to the time required to make the same trip at free-flow speeds. For example, a TTI of 1.3 indicates a 20-minute free-flow trip required 26 minutes. <math>TTI = \frac{TT_{Mean}}{TT_{Free Flow}}</math> Buffer Index (BI) - "The buffer index represents the extra buffer time (or time cushion) that most travelers add to their average travel time when planning trips to ensure on-time arrival. This extra time is added to account for any unexpected delay. The buffer index is expressed as a percentage and its value increases as reliability gets worse. For example, a buffer index of 40 percent means that, for a 20-minute average travel time, a traveler should budget an additional 8 minutes (20 minutes × 40 percent = 8 minutes) to ensure on-time arrival most of the time. In this example, the 8 extra minutes is called the buffer time. The buffer index is computed as the difference between the 95th percentile travel time and average travel time, divided by the average travel time." "This formulation of the buffer index uses a 95th percentile travel time to represent a near-worst case travel time. Whether expressed as a percentage or in minutes, it represents the extra time a traveler should allow to arrive on-time for 95 percent of all trips. A simple analogy is that a commuter or driver who uses a 95 percent reliability indicator would be late only one weekday per month." <math>BI = \frac{TT_{95\%} - TT_{Mean}}{TT_{Mean}}</math> Planning Time Index - "The planning time index represents the total travel time that should be planned when an adequate buffer time is included. The planning time index differs from the buffer index in that it includes typical delay as well as unexpected delay. Thus, the planning time index compares near-worst case travel time to a travel time in light or free-flow traffic. For example, a planning time index of 1.60 means that, for a 15-minute trip in light traffic, the total time that should be planned for the trip is 24 minutes (15 minutes × 1.60 = 24 minutes). The planning time index is useful because it can be directly compared to the travel time index (a measure of average congestion) on similar numeric scales. The planning time index is computed as the 95th percentile travel time divided by the free-flow travel time." <math>PTI = \frac{TT_{95\%}}{TT_{Free Flow}}</math> XXth % Travel Time Index - The XXth-percentile travel time index is the ratio of the XXth % travel time to the mean travel time. The XXth-percentile travel time is the travel time at which XX % of travel times are less than or equal to it. <math>TTI_{XX\%} = \frac{TT_{XX\%}}{TT_{Free Flow}}</math> Misery Index (MI) - The misery index measures the amount of delay of the worst trips. For example, the MI may compare the 97.5th percentile travel time to the mean travel time. <math>MI = \frac{TT_{97.5\%}}{TT_{Free Flow}}</math> On-Time Performance - The percentage of trips which are less than or equal to XX x free-flow travel time, where XX is usually around 1.1-1.3. Graphical Representation of Travel Time Indices. Previous Page → About the Travel Time Reliability Reference Manual Travel Time Reliability Reference Manual = References =
300364
3244527
https://en.wikibooks.org/wiki?curid=300364
A-level Chemistry/OCR/Atoms, Bonds and Groups/The Periodic Table/Periodicity
The periodic table is a tabular arrangement of the chemical elements, organized on the basis of their atomic numbers, electron configurations, and recurring chemical properties. Elements are presented in order of increasing atomic number.
300393
96589
https://en.wikibooks.org/wiki?curid=300393
HKDSE Geography/Objectives
The objectives of this book are as follows: When writing this book, we will adhere to these principles: Moreover, note that: A Word on Conventions. Red boxes are about common misconceptions in geography. You are frequently tested about them in multiple-choice questions, so make sure you read through these. Green boxes provide statistical data and examples that you should cite in essays for higher scores. Only study and remember this if you have time on your hands and want to aim for a 5+ grade. Let us get started.
300399
3036709
https://en.wikibooks.org/wiki?curid=300399
HKDSE Geography/M1
Focuses of the chapter: Plate Tectonics. The theory of plate tectonics was proposed by German meteorologist Alfred Wegener in 1912. The theory based on the idea of continental drifts describes the large-scale movements of the plates of the Earth's lithosphere. The Earth can be structurally divided into three parts, namely crust, mantle and core. Use an egg as an analogue, the crust that is the outermost layer corresponds to the egg shell; the mantle in the middle corresponds to the egg white; and the core that is the innermost part corresponds to the egg yolk. However, this is an oversimplified picture, which can only be used to give you a rough idea. The crust with thickness ranges from a few kilometres to tens of kilometres can be categorised into two groups, continental and oceanic crusts. As suggested by their names, the continental crusts contribute to the land of the Earth, whereas the oceanic crusts lie under the ocean. There are distinct differences between them, in terms of thickness, chemical composition, and so on.
300402
3710067
https://en.wikibooks.org/wiki?curid=300402
HKDSE Geography/M2a/Fluvial Processes
The three fluvial processes are erosion, transportation and deposition. Erosion. There are three directions and four processes. Remember the names and what they mean (but don't memorise the definitions). Four Processes. Four processes: Attrition is the wearing down of the load. Abrasion is the wearing down of the bed or bank. When load knocks against the bed or bank, abrasion occurs on the bed or bank, and attrition occurs in the load. Factors. These factors affect erosion: Transportation. The materials carried by transportation are load. Deposition. One Process. One process occurs in deposition: Sorting. The heaviest load is deposited first. Cobbles are deposited, then pebbles, then sand, then silt, and finally clay. Thus deposited materials are deposited in layers.
300433
248949
https://en.wikibooks.org/wiki?curid=300433
RAC Attack - Oracle Cluster Database at Home/RAC Attack 12c/Flex Cluster and Flex ASM
Purpose. The purpose of this particular is to illustrate a conversion from standard to flex for both Cluster and ASM. Although the names Flex Cluster and Flex ASM appear similar, they are two distinct and for the most part mutually exclusive, components of RAC in 12c. Flex Clusters. Flex Clusters introduces (among many other new features) the concept of Hub and Leaf nodes. Hub Nodes. Hub Nodes are similar to Oracle Grid Infrastructure nodes in an Oracle Clusterware standard Cluster configuration. Leaf Nodes. Leaf Nodes are different from standard Oracle Grid Infrastructure nodes, in that they do not require direct access to shared storage, but instead request data through Hub Nodes. Leaf nodes were designed to contain application (non-database) components of a system. For example, one could place Fusion Middleware, EBS, IDM etc on a set of leaf nodes, where as on the hub nodes the actual databases for the application would reside. For a standard cluster to convert to a Flex Clusters, Flex ASM must be enabled. Flex ASM. Oracle Flex ASM enables Oracle ASM instances to run on a separate physical server from the database servers. An Oracle ASM instance can operate in several configurations in Oracle Flex ASM. The aim of Flex ASM is to consolidate ASM instances into a set of nodes within a cluster. Assumptions. This lab assumes that the user has an existing 2-node RAC environment configured as per the base RAC Attack 12c manual instructions.
300437
46022
https://en.wikibooks.org/wiki?curid=300437
International Postage Meter Stamp Catalog/Sudanese Republic
=Sudanese Republic= <br> 1. Havas "M” (MV), 1959-1961. [Extremely rare. Value uncertain] Frank wider than tall with simulated perforation outer border and straight line inner border. "REPUBLIQUE / SOUDANAISE" at top, "POSTES" above meter number at bottom. The frank borders are broken at the centers of both sides. Only meter MG 3296 known TM: SL V/F: ★000 NOTE: Only three examples are presently known of this stamp.
300466
3097823
https://en.wikibooks.org/wiki?curid=300466
A-level Computing 2009/AQA/Problem Solving, Programming, Operating Systems, Databases and Networking/Communication and Networking/Wireless Networks
Wireless networks are convenient ways that modern technology uses to create networks with low costs as there are almost no wires involved. Wireless access points (WAP) allow devices to connect to such networks. the network can continue to run as a normal network. There are two types of wireless network methods that AQA have said you need to be aware of; Wi-Fi and Bluetooth. These are both radio-based protocols that are used to create networks that users can transfer data over. Wi-Fi. Wi-Fi (also written Wifi or WiFi) is a trademark name for a technology that allows devices to wirelessly access a local area network as well as data transfer. The Wi-Fi Alliance defines Wi-Fi as any wireless local area network (WLAN) products that use IEEE 802.11 standards. The IEEE is the Institute of Electrical and Electronics Engineers. Wi-Fi uses a radio wave frequency range of 2.4 GHz to 2.5 GHz and 4.9 GHz to 5.8 GHz although allowed channels vary between countries. In Europe only 5.240-5.700 GHz of the 5 GHz frequency band is usable. Devices connect to a Wi-Fi network by means of a wireless router or 'hotspot' which usually has an approximate range of 20 metres indoors and greater range outdoors. Because wireless is always less secure than wired, Wi-Fi is usually considered less secure than ethernet connection. Wi-Fi can be encrypted using either WEP, WPA or WPA2. Bluetooth. Bluetooth is a trademark name for a wireless technology with very short range. It can be used for data and media transfer between devices. The range of the radio wave frequency is 2.4 GHz to 2.485 GHz. The small range of Bluetooth (approximately 5 metres) means that the network is call a Personal Area Network (PAN). However it can also be categorised under a wireless local area network (WLAN).
300468
2879697
https://en.wikibooks.org/wiki?curid=300468
KoBo Toolbox
The purpose of this Wikibook is to provide an introduction to the mobile survey software suite called KoBo Toolbox (http://www.kobotoolbox.org/). Using the KoBo Toolbox, surveys for mobile Android devices, such as smartphones and tablets, can be created. The screenshot of the Android application shows a typical multiple-choice (single-select) question. Although there are many mobile survey software suites, the KoBo Toolbox is particularly interesting for a number of reasons: The topics discussed in this Wikibook are listed below.
300469
49843
https://en.wikibooks.org/wiki?curid=300469
KoBo Toolbox/KoBoForm/Creating a Form
KoBo surveys are created using the standard Xform format, which is build on XML. In order to create these forms, we use KoBoForm (http://kobotoolbox.org/koboform). New Form. After the KoBoForm editor has loaded a menu bar is displayed. The Menu button on the left opens the file menu, using the option New form, a form can be created. Overview. The two panels is the bottom part of the screen are now populated, as seen in the Empty form image. On the left side the structure of the form is outlined. The new form is already populated with a few elements: From the structure we can see that all elements are contained within the New form 1 element, and that OptionA01_1 is also contained within QuestionA01. The right hand panel shows the contents of the element which is selected in the left panel. When the form is created the New form 1 element is active, and so this is displayed. Since our survey will be on pets, we can change the title to Pet Survey as shown in the picture. The form title in the structure is automatically updated to reflect the new title. User Accounts. Note that KoBoForm has the option to create a user account in order to save forms in between browser sessions. These accounts are stored offline, in the browser, which means that they will not synchronize across computers or browsers.
300473
1406991
https://en.wikibooks.org/wiki?curid=300473
German/Lesson 13
Lektion 13 Mein Arm schmerzt ! Franz met his friend Karl , Karl got a plaster on his arm . Franz : guten Tag Karl , wie geht`s? Karl : guten Tag Franz , nicht so gut , mein Arm schmerzt , und ihnen? Franz : wie bitte ? Arm schmerzt ? warum ? Karl : gestern , im Fussballspiel ,hatte ich eine Wunde . Franz : gehst du zum Arzt ? Karl : ja . auf Widersehen . Franz : auf Widersehen. _ _ _ _ Vokabeln. _ _ _ _ (The plural article is always "die".)German Adjectives. Adjectives are words that describe nouns. Most adjectives are stand-alone words; however, present and past participles can also be used as adjectives. Numbers are also adjectives, though they do not decline. Adjectives may be either "predicate" or "attributive". Predicate adjectives are adjectives connected to a noun through a verb known as a "copula". Those verbs in German are "sein" (to be), "werden" (to become), and "bleiben" (to remain). Other verbs, such as "machen" and "lassen" impart a predicate adjective onto an accusative object. Predicate adjectives are "never inflected". Ich bin noch "ledig". (I am still single.) Trotz des Streites bleiben wir "verheiratet". (Despite the argument we remain married.) Ich werde "böse". (I am getting angry.) Die alte Milch wird dich "krank" machen. (The old milk will make you sick.) I am still updating this chapter, so please do not delete this page. Danke Schôn. ~~~~ Dated 08-June-2014 ----/!>
300493
112346
https://en.wikibooks.org/wiki?curid=300493
Cg Programming/Unity/Water Reflection and Refraction
using UnityEngine; using System.Collections; using System; using System.Collections.Generic; /// <summary> /// 水面 /// </summary> [AddComponentMenu("GameCore/Effect/Water/Water (Base)")] [ExecuteInEditMode] public class Water : MonoBehaviour public enum FlageWaterRefType Both = 0, Reflection = 1, Refraction = 2 public bool DisablePixelLights = false; public LayerMask Layers = -1; public int TexSize = 512; public FlageWaterRefType RefType = FlageWaterRefType.Both; public float ReflectClipPlaneOffset = 0; public float RefractionAngle = 0; private static Camera _reflectionCamera; private static Camera _refractionCamera; private int _OldTexSize = 0; private RenderTexture _reflectionRenderTex; private RenderTexture _refractionRenderTex; private bool _insideRendering = false; private float _refType = (float)FlageWaterRefType.Both; void OnWillRenderObject if (!enabled || !renderer || !renderer.sharedMaterial || !renderer.enabled) return; Camera cam = Camera.current; if (!cam) return; Material[] materials = renderer.sharedMaterials; if (_insideRendering) return; _insideRendering = true; int oldPixelLightCount = QualitySettings.pixelLightCount; if (DisablePixelLights) QualitySettings.pixelLightCount = 0; if (RefType == FlageWaterRefType.Both || RefType == FlageWaterRefType.Reflection) DrawReflectionRenderTexture(cam); foreach (Material mat in materials) if (mat.HasProperty("_ReflectionTex")) mat.SetTexture("_ReflectionTex", _reflectionRenderTex); if (RefType == FlageWaterRefType.Both || RefType == FlageWaterRefType.Refraction) this.gameObject.layer = 4; DrawRefractionRenderTexture(cam); foreach (Material mat in materials) if (mat.HasProperty("_RefractionTex")) mat.SetTexture("_RefractionTex", _refractionRenderTex); _refType = (float)RefType; Matrix4x4 projmtx = CoreTool.UV_Tex2DProj2Tex2D(transform, cam); foreach (Material mat in materials) mat.SetMatrix("_ProjMatrix", projmtx); mat.SetFloat("_RefType", _refType); if (DisablePixelLights) QualitySettings.pixelLightCount = oldPixelLightCount; _insideRendering = false; /// <summary> /// 绘制反射RenderTexture /// </summary> private void DrawReflectionRenderTexture(Camera cam) Vector3 pos = transform.position; Vector3 normal = transform.up; CreateObjects(cam,ref _reflectionRenderTex, ref _reflectionCamera); CoreTool.CloneCameraModes(cam, _reflectionCamera); float d = -Vector3.Dot(normal, pos) - ReflectClipPlaneOffset; Vector4 reflectionPlane = new Vector4(normal.x, normal.y, normal.z, d); Matrix4x4 reflection = CoreTool.CalculateReflectionMatrix(Matrix4x4.zero, reflectionPlane); Vector3 oldpos = cam.transform.position; Vector3 newpos = reflection.MultiplyPoint(oldpos); _reflectionCamera.worldToCameraMatrix = cam.worldToCameraMatrix * reflection; // Setup oblique projection matrix so that near plane is our reflection // plane. This way we clip everything below/above it for free. Vector4 clipPlane = CoreTool.CameraSpacePlane(_reflectionCamera, pos, normal, 1.0f, ReflectClipPlaneOffset); Matrix4x4 projection = cam.projectionMatrix; projection = CoreTool.CalculateObliqueMatrix(projection, clipPlane, -1); _reflectionCamera.projectionMatrix = projection; _reflectionCamera.cullingMask = ~(1 « 4) & Layers.value; // never render water layer _reflectionCamera.targetTexture = _reflectionRenderTex; GL.SetRevertBackfacing(true); _reflectionCamera.transform.position = newpos; Vector3 euler = cam.transform.eulerAngles; _reflectionCamera.transform.eulerAngles = new Vector3(0, euler.y, euler.z); _reflectionCamera.Render; _reflectionCamera.transform.position = oldpos; GL.SetRevertBackfacing(false); /// <summary> /// 绘制折射RenderTexture /// </summary> private void DrawRefractionRenderTexture(Camera cam) CreateObjects(cam, ref _refractionRenderTex, ref _refractionCamera); CoreTool.CloneCameraModes(cam, _refractionCamera); Vector3 pos = transform.position; Vector3 normal = transform.up; Matrix4x4 projection = cam.worldToCameraMatrix; projection *= Matrix4x4.Scale(new Vector3(1,Mathf.Clamp(1-RefractionAngle,0.001f,1),1)); _refractionCamera.worldToCameraMatrix = projection; Vector4 clipPlane = CoreTool.CameraSpacePlane(_refractionCamera, pos, normal, 1.0f, 0); projection = cam.projectionMatrix; projection[2] = clipPlane.x + projection[3];//x projection[6] = clipPlane.y + projection[7];//y projection[10] = clipPlane.z + projection[11];//z projection[14] = clipPlane.w + projection[15];//w _refractionCamera.projectionMatrix = projection; _refractionCamera.cullingMask = ~(1 « 4) & Layers.value; // never render water layer _refractionCamera.targetTexture = _refractionRenderTex; _refractionCamera.transform.position = cam.transform.position; _refractionCamera.transform.eulerAngles = cam.transform.eulerAngles; _refractionCamera.Render; void OnDisable if (_reflectionRenderTex) DestroyImmediate(_reflectionRenderTex); _reflectionRenderTex = null; if (_reflectionCamera) DestroyImmediate(_reflectionCamera.gameObject); _reflectionCamera = null; if (_refractionRenderTex) DestroyImmediate(_refractionRenderTex); _refractionRenderTex = null; if (_refractionCamera) DestroyImmediate(_refractionCamera.gameObject); _refractionCamera = null; void CreateObjects(Camera srcCam, ref RenderTexture renderTex, ref Camera destCam) // Reflection render texture if (!renderTex || _OldTexSize != TexSize) if (renderTex) DestroyImmediate(renderTex); renderTex = new RenderTexture(TexSize, TexSize, 0); renderTex.name = "__RefRenderTexture" + renderTex.GetInstanceID; renderTex.isPowerOfTwo = true; renderTex.hideFlags = HideFlags.DontSave; renderTex.antiAliasing = 4; renderTex.anisoLevel = 0; _OldTexSize = TexSize; if (!destCam) // catch both not-in-dictionary and in-dictionary-but-deleted-GO GameObject go = new GameObject("__RefCamera for " + srcCam.GetInstanceID, typeof(Camera), typeof(Skybox)); destCam = go.camera; destCam.enabled = false; destCam.transform.position = transform.position; destCam.transform.rotation = transform.rotation; destCam.gameObject.AddComponent("FlareLayer"); go.hideFlags = HideFlags.HideAndDontSave; using UnityEngine; using System.Collections; using System; using UnityEditor; [CustomEditor(typeof(Water))] public class WaterEditor : Editor GUIContent[] _renderTextureOptions = new GUIContent[8] {new GUIContent("16"), new GUIContent("32"), new GUIContent("64"), new GUIContent("128"), new GUIContent("256"), new GUIContent("512"), new GUIContent("1024"), new GUIContent("2048") }; int[] _renderTextureSize = new int[8] { 16, 32, 64, 128, 256, 512, 1024, 2048 }; public override void OnInspectorGUI Water water = target as Water; EditorGUILayout.PropertyField(this.serializedObject.FindProperty("RefType"), new GUIContent("RefType")); EditorGUILayout.PropertyField(this.serializedObject.FindProperty("DisablePixelLights"), new GUIContent("DisablePixelLights")); EditorGUILayout.PropertyField(this.serializedObject.FindProperty("Layers"), new GUIContent("Layers")); EditorGUILayout.IntPopup(this.serializedObject.FindProperty("TexSize"), _renderTextureOptions, _renderTextureSize, new GUIContent("TexSize")); if (NGUIEditorTools.DrawHeader("Reflect Settings")) NGUIEditorTools.BeginContents; EditorGUILayout.Slider(this.serializedObject.FindProperty("ReflectClipPlaneOffset"),0,0.1f,new GUIContent("ClipPlane Offset")); NGUIEditorTools.EndContents; if (NGUIEditorTools.DrawHeader("Refraction Settings")) NGUIEditorTools.BeginContents; EditorGUILayout.Slider(this.serializedObject.FindProperty("RefractionAngle"),0,1, new GUIContent("Refraction Angle")); NGUIEditorTools.EndContents; this.serializedObject.ApplyModifiedProperties; using System.Collections; using System; using UnityEngine; /// <summary> /// 工具类 /// </summary> public static class CoreTool #region Config配置 /// <summary> /// 验证当前文件是否为配置文件 /// </summary> /// <param name="filePath">文件路径</param> /// <returns></returns> public static bool IsConfig(string filePath) return true; #endregion #region Camera /// <summary> /// 将源摄像机状态克隆到目标相机 /// </summary> /// <param name="src">源相机</param> /// <param name="dest">目标相机</param> public static void CloneCameraModes(Camera src, Camera dest) if (dest == null) return; // set camera to clear the same way as current camera dest.clearFlags = src.clearFlags; dest.backgroundColor = src.backgroundColor; if (src.clearFlags == CameraClearFlags.Skybox) Skybox sky = src.GetComponent(typeof(Skybox)) as Skybox; Skybox mysky = dest.GetComponent(typeof(Skybox)) as Skybox; if (!sky || !sky.material) mysky.enabled = false; else mysky.enabled = true; mysky.material = sky.material; // update other values to match current camera. // even if we are supplying custom camera&projection matrices, // some of values are used elsewhere (e.g. skybox uses far plane) dest.depth = src.depth; dest.farClipPlane = src.farClipPlane; dest.nearClipPlane = src.nearClipPlane; dest.orthographic = src.orthographic; dest.fieldOfView = src.fieldOfView; dest.aspect = src.aspect; dest.orthographicSize = src.orthographicSize; /// <summary> /// 计算反射矩阵 /// </summary> /// <param name="reflectionMat">原始矩阵</param> /// <param name="plane">反射平面</param> /// <returns>反射矩阵</returns> public static Matrix4x4 CalculateReflectionMatrix(Matrix4x4 reflectionMat, Vector4 plane) reflectionMat.m00 = (1F - 2F * plane[0] * plane[0]); reflectionMat.m01 = (-2F * plane[0] * plane[1]); reflectionMat.m02 = (-2F * plane[0] * plane[2]); reflectionMat.m03 = (-2F * plane[3] * plane[0]); reflectionMat.m10 = (-2F * plane[1] * plane[0]); reflectionMat.m11 = (1F - 2F * plane[1] * plane[1]); reflectionMat.m12 = (-2F * plane[1] * plane[2]); reflectionMat.m13 = (-2F * plane[3] * plane[1]); reflectionMat.m20 = (-2F * plane[2] * plane[0]); reflectionMat.m21 = (-2F * plane[2] * plane[1]); reflectionMat.m22 = (1F - 2F * plane[2] * plane[2]); reflectionMat.m23 = (-2F * plane[3] * plane[2]); reflectionMat.m30 = 0F; reflectionMat.m31 = 0F; reflectionMat.m32 = 0F; reflectionMat.m33 = 1F; return reflectionMat; /// <summary> /// 计算指定平面在摄像机中的空间位置 /// </summary> /// <param name="cam">摄像机</param> /// <param name="pos">平面上的点</param> /// <param name="normal">平面法线</param> /// <param name="sideSign">1:平面正面,-1:平面反面</param> /// <param name="clipPlaneOffset">平面法线位置偏移量</param> /// <returns></returns> public static Vector4 CameraSpacePlane(Camera cam, Vector3 pos, Vector3 normal, float sideSign,float clipPlaneOffset) Vector3 offsetPos = pos + normal * clipPlaneOffset; Matrix4x4 m = cam.worldToCameraMatrix; Vector3 cpos = m.MultiplyPoint(offsetPos); Vector3 cnormal = m.MultiplyVector(normal).normalized * sideSign; return new Vector4(cnormal.x, cnormal.y, cnormal.z, -Vector3.Dot(cpos, cnormal)); /// <summary> /// 由剪裁面计算投影倾斜矩阵 /// </summary> /// <param name="projection">投影矩阵</param> /// <param name="clipPlane">剪裁面</param> /// <param name="sideSign">剪裁平面(-1:平面下面,1:平面上面)</param> public static Matrix4x4 CalculateObliqueMatrix(Matrix4x4 projection, Vector4 clipPlane,float sideSign) Vector4 q = projection.inverse * new Vector4( sgn(clipPlane.x), sgn(clipPlane.y), 1.0f, 1.0f Vector4 c = clipPlane * (2.0F / (Vector4.Dot(clipPlane, q))); // third row = clip plane - fourth row projection[2] = c.x + Mathf.Sign(sideSign)*projection[3]; projection[6] = c.y + Mathf.Sign(sideSign) * projection[7]; projection[10] = c.z + Mathf.Sign(sideSign) * projection[11]; projection[14] = c.w + Mathf.Sign(sideSign) * projection[15]; return projection; private static float sgn(float a) if (a > 0.0f) return 1.0f; if (a < 0.0f) return -1.0f; return 0.0f; /// <summary> /// 由水平、垂直距离修改倾斜矩阵 /// </summary> /// <param name="projMatrix">倾斜矩阵</param> /// <param name="horizObl">水平方向</param> /// <param name="vertObl">垂直方向</param> /// <returns>修改后的倾斜矩阵</returns> public static Matrix4x4 CalculateObliqueMatrix(Matrix4x4 projMatrix, float horizObl, float vertObl) Matrix4x4 mat = projMatrix; mat[0, 2] = horizObl; mat[1, 2] = vertObl; return mat; #endregion #region Shader Matrix4x4 /// <summary> /// tex2DProj到tex2D的uv纹理转换矩阵 /// 在shader中, /// vert=>o.posProj = mul(_ProjMatrix, v.vertex); /// frag=>tex2D(_RefractionTex,float2(i.posProj) / i.posProj.w) /// </summary> /// <param name="transform">要显示纹理的对象</param> /// <param name="cam">当前观察的摄像机</param> /// <returns>返回转换矩阵</returns> public static Matrix4x4 UV_Tex2DProj2Tex2D(Transform transform,Camera cam) Matrix4x4 scaleOffset = Matrix4x4.TRS( new Vector3(0.5f, 0.5f, 0.5f), Quaternion.identity, new Vector3(0.5f, 0.5f, 0.5f)); Vector3 scale = transform.lossyScale; Matrix4x4 _ProjMatrix = transform.localToWorldMatrix * Matrix4x4.Scale(new Vector3(1.0f / scale.x, 1.0f / scale.y, 1.0f / scale.z)); _ProjMatrix = scaleOffset * cam.projectionMatrix * cam.worldToCameraMatrix * _ProjMatrix; return _ProjMatrix; #endregion Shader "GameCore/Mobile/Water/Diffuse" Properties { _RefractionTex ("Refraction", 2D) = "white" {} _RefColor("Color",Color) = (1,1,1,1) SubShader { Tags { LOD 100 Pass { CGPROGRAM #pragma vertex vert #pragma fragment frag #include "UnityCG.cginc" uniform float4x4 _ProjMatrix; uniform float _RefType; sampler2D _ReflectionTex; sampler2D _RefractionTex; float4 _RefColor; struct outvertex { float4 pos : SV_POSITION; float4 uv0 : TEXCOORD0; float4 refparam : COLOR0;//r:fresnel,g:none,b:none,a:none outvertex vert(appdata_tan v) { outvertex o; o.pos = mul (UNITY_MATRIX_MVP,v.vertex); float4 posProj = mul(_ProjMatrix, v.vertex); o.uv0 = posProj; float3 r =normalize(ObjSpaceViewDir(v.vertex)); float d = saturate(dot(r,normalize(v.normal)));//r+(1-r)*pow(d,5) o.refparam =float4(d,0,0,0); return o; float4 frag(outvertex i) : COLOR { half4 flecol = tex2D(_ReflectionTex,float2(i.uv0) / i.uv0.w); half4 fracol = tex2D(_RefractionTex,float2(i.uv0) / i.uv0.w); half4 outcolor = half4(1,1,1,1); if(_RefType == 0) outcolor = lerp(flecol,fracol,i.refparam.r); else if(_RefType == 1) outcolor = flecol; else if(_RefType == 2) outcolor = fracol; return outcolor*_RefColor; ENDCG
300516
929065
https://en.wikibooks.org/wiki?curid=300516
KoBo Toolbox/KoBoForm
The first step in the survey administration life-cycle is to design the survey. The formulation of the questions and the answers is extremely important, however this fall outside of the scope of this wikibook. For more information on survey design see the chapter Surveys of the wikibook Social Research Methods. Here we will assume that you have already formulated the questions and answers for your survey, this chapter will describe how to input these questions in the KoBo FormBuilder.
300521
248949
https://en.wikibooks.org/wiki?curid=300521
Travel Time Reliability Reference Manual/Primary use in SHRP II
TICAS is the software that is primarily used for travel time and vehicle miles traveled (VMT) data collection in Strategic Highway Research Program 2 (SHRP II) Project L38-Pilot Testing of Reliability Data and Analytical Tools. TICAS calculates and provides cumulative travel time with records every 0.1-mile from the specified start point to the end point along the corridor. Data is available in varying time intervals, ranging from 30 seconds to one hour. For primary test, three corridors were selected, and the routes were created and save in TICAS. The start and end points for the corridors are listed below in Table 1. Table 1: Corridor Boundaries The team downloaded data from January 2006 through December 2012 for each corridor. Downloading the traffic data was a time consuming effort due to the fact that the TICAS software is only capable of calculating two months of data per query. In addition, when downloading the data for TH 100, TICAS would tend to quit working if more than two weeks of data were selected at one time, due to the large number of stations along the corridor. If days with no travel time or VMT data available were selected when using TICAS, an “Error in evaluation” message would appear. When this occurred, each individual day had to be checked to determine which days were missing data. After recognizing that, in general, the only days with missing data were the first Saturday and Sunday of November each year (on occasion, the last weekend of October was missing data), the search was narrowed down fairly quickly and the days with missing data were simply not selected in TICAS. Table 2: Days with Missing TICAS Data For the further extension of the SHRP II Project L38, the team also downloaded the travel time and VMT data from TICAS on I-35E and TH 13. Instead of performing analysis with seven-year data, only data in year 2012 was downloaded. In summary, TICAS is a powerful software that could provide corridor-based traffic metrics like travel time and VMT. The data can be collected in every 30 seconds and can be specified in every 0.1 mile. However, there are some limitations when using TICAS. Firstly, downloading the traffic data with multiple years was a time consuming effort due to the fact that the TICAS software is only capable of calculating two months of data per query. Secondly, there is no button like "Select All" which enable user to download the data in large number of days. For example, if user needs to download certain traffic data for a whole year in 2012, TICAS does not allow selecting 366 days in 2012 directly, but select one by one for 366 times. Thirdly, TICAS cannot identify the specific date with error traffic data, but only give user a “Error in evaluation” message. When this occurs, each individual day has to be checked to determine which days are missing data. Previous Page → Creating Routes Next Page → Travel Time Reliability Reference Manual
300529
1599330
https://en.wikibooks.org/wiki?curid=300529
Travel Time Reliability Reference Manual/Surface Plots of non-recurring events
TTRMS analysis tool provides numerous important surface plots that display individual records throughout an entire year for each corridor. This makes the plots more accurate and easier to compare with surface plots from other years and corridors. For all of the surface plots shown in this section, each day of the year is shown across the x-axis from left to right. The time of day is shown on the y-axis from bottom to top and is split into five-minute time intervals. Surface plots were prepared for all of the data elements included in the travel time reliability monitoring system (TTRMS) database. These can broadly be categorized in two groups: one is the traffic data, which is continuous and includes the aggregate measures of vehicle miles travelled (VMT) and travel time. The other is the non-recurring conditions data. These records are not necessarily continuous as there are times when none of these conditions are present on the corridor. The non-recurring conditions include: • Weather • Crash • Incident • Road Work • Event Figure 1 and Figure 2 are examples of the surface plot for the crashes and incidents in 2012 along the I-94 Westbound from I-494 to TH 101. Crash and incident information was gathered from three different sources, which include: • Minnesota State Patrol Computer Aided Dispatch (CAD) data • MnDOT’s Dynamic Message Sign (DMS) logs • Minnesota Department of Public Safety (DPS) crash records. Crash plots are color coded by crash severity. Incident plots are color coded by impact to roadway capacity. Figure 1: 2012 WB I-94 Crash Surface Plot Figure 2: 2012 WB I-94 incident Surface Plot Figure 3 is an weather surface plot example that shows the weather data collected at the Weather Underground site near the I-94 study corridor in 2012. The colors in the legend represent the precipitation type. Figure 3: 2012 WB I-94 Weather Surface Plot Figure 4 is an event surface plot example. The majority of the events considered in this analysis take place during or after the p.m. peak period. Therefore, events have a greater impact on the corridors where the traffic volume is highest during the p.m. peak period. Figure 4: 2012 WB I-94 Event Surface Plot Previous Page → TTRMS Tool Next Page → Surface Plots of travel time and VMT
300530
1599330
https://en.wikibooks.org/wiki?curid=300530
Travel Time Reliability Reference Manual/Surface Plots of travel time and VMT
TTRMS tool is able to provide surface plots of travel time and VMT as well. Those plots can give user a visual view of the reliability of travel by time of day and day of the year. Instead of displaying travel time on the plots, TTRMS analysis tool uses travel time index (TTI). The travel time index is the ratio of the observed travel time divided by the speed limit (free-flow) travel time. This allows for an easier comparison between each of the corridors regardless of length or free-flow speed. The following thresholds were used for the travel time surface plots: • Speed limit travel time • The 45 miles per hour (mph) travel time. This threshold was chosen because MnDOT defines congestion as 45 mph or less. • 1.5-2.0 times the TTI • 2.0-2.5 times the TTI • 2.5-3.0 times the TTI • 3.0-3.5 times the TTI • 3.5-4.0 times the TTI • Greater than 4.0 times the TTI Figure 1 is a example of TTI surface plot along I-94 Westbound from I-494 to TH 101 in 2012. The colors in the legends represent different TTI levels. The plots can automatically updated by different free-flow travel time input. Figure 1: 2012 WB I-94 Travel Time Surface Plot Figure 2 is a example of vehicle miles traveled (VMT) surface plot along I-94 Westbound from I-494 to TH 101 in 2012. In this plot, each five-minute observation is displayed as a unique value. Seven VMT bins with increments of 750 vehicle-miles were selected for the VMT surface. In addition, the plot and bins can be updated by entering different "base VMT" to the TTRMS analysis tool. Figure 2: 2012 WB I-94 VMT Surface Plot Previous Page → Surface Plots of non-recurring events Next Page → Other travel time reliability plots
300537
1146839
https://en.wikibooks.org/wiki?curid=300537
Beginner's Guide to Interactive Fiction with Inform 7/Introduction to Interactive Fiction
What is Interactive Fiction? Interactive Fiction (commonly abbreviated as IF) is a genre of writing that evolved out of older text-based adventure games. The main point of differentiation is that the player can input commands and influence how the story proceeds. This makes the player an active participant as opposed to a passive observer. A typical IF follows the player as they interact with the places, people, and things within it. The player inputs commands via the command prompt. An example of playing through a very minimalist piece of IF is: Magic Flask An Interactive Fiction by Dylan Greene Release 1 / Serial number 140527 / Inform 7 build 6L02 (I6/v6.33 lib 6/12N) SD Altar You can see a flask here. >get flask You got the flask! *** The End ***
300548
520910
https://en.wikibooks.org/wiki?curid=300548
Structured Query Language/Transactions
A transaction is a grouping of one or more SQL statements - that contains statements that write to the database, such as INSERT, UPDATE or DELETE, and also the SELECT command can be part of a transaction. All writing statements must be part of a transaction. The purpose of transactions is to guarantee that the database changes only from one consistent state to another consistent state. It combines all intermediate states into one change-event. This holds true also in critical situations such as parallel processing, disc crash, power failure, ... . Transactions ensure the database integrity. To do so they support four basic properties, which all in all are called the "ACID paradigm". Transaction Boundaries. As every SQL statement which writes to the database is part of a transaction, the DBMS silently starts a transaction for every of them if there is no in-complete transaction started by an earlier statement. Alternatively, the application/session can start a transaction explicitly by the command <code>START TRANSACTION</code>. All subsequent SQL commands are part of this transaction. The transaction remains until it is confirmed or rejected. The confirmation takes place with the command <code>COMMIT</code>, the rejection with the command <code>ROLLBACK</code>. Before the COMMIT or ROLLBACK command is submitted, the DBMS stores the results of every writing statement into an intermediate area where it is not visible to other sessions (see: Isolation Levels). Simultaneously with the COMMIT command, all changes of this transaction ends up in the common database, are visible to every other session, and the transaction terminates. If the COMMIT fails for any reason, it happens the same as when the session submits a ROLLBACK command: all changes of this transaction are discarded, and the transaction terminates. Optionally, a session can revert its complete writing actions, which are part of the active transaction, by submitting the single command ROLLBACK. An Example: -- Begin the transaction with an explicit command (In general not necessary. Not supported by Oracle.) START TRANSACTION; -- Insert some rows INSERT ... ; -- Modify those rows or some other rows UPDATE ... ; -- Delete some rows DELETE ... ; -- If the COMMIT succeeds, the results of the above 3 commands have been transferred to the 'common' -- database and thus 'published' to all other sessions. COMMIT; -- START TRANSACTION; INSERT ... ; UPDATE ... ; DELETE ... ; -- Discard INSERT, UPDATE and DELETE ROLLBACK; Savepoints. As transactions can include many statements, it is likely that runtime errors or logical errors arise. In some of such cases, applications want to rollback only parts of the actual transaction and commit the rest or resume the processing a second time. To do so, it is possible to define internal transaction boundaries, which reflects all processing from the start of the transaction up to this point in time. Such intermediate boundaries are called savepoints. COMMIT and ROLLBACK statements terminate the complete transaction, including its savepoints. -- Begin the transaction with an explicit command START TRANSACTION; INSERT ... ; -- Define a savepoint SAVEPOINT step_1; UPDATE ... ; -- Discard only the UPDATE. The INSERT remains. ROLLBACK TO SAVEPOINT step_1; -- try again (or do any other action) UPDATE ... ; -- confirm INSERT and the second UPDATE COMMIT; During the lifetime of a transaction, a savepoint can be released if it's no longer needed. (It gets implicitly released at the end of the transaction.) -- ... RELEASE SAVEPOINT <savepoint_name>; -- This has no effect on the results of the previous INSERT, UPDATE or DELETE commands. It only eliminates the -- possibility to ROLLBACK TO SAVEPOINT <savepoint_name>. Atomicity. A transaction guarantees that the results of all of its statements are handled on a logical level as one single operation. All writing statements have a temporary nature until the COMMIT command terminates successfully. This behavior helps to ensure the logical integrity of business logic. E.g.: If one wants to transfer some amount of money from one account to another, at least two rows of the database must be modified. The first modification decreases the amount in one row, and the second one increases it on a different row. If there is a disc crash or power failure between these two write-operations, the application has a problem. But the "atomicity property" of transactions guarantees that none of the write-operations reaches the database (in the case of any failure or a ROLLBACK) or all of them reach the database (in the case of a successful COMMIT). There is more detailed information about the atomicity property at Wikipedia. Consistency. Transactions guarantee that the database is in a consistent state after they terminate. This consistency occurs at different levels: * The data and all derived index entries are synchronized. In most cases, data and index entries are stored in different areas within the database. Nevertheless, after the end of a transaction, both areas are updated (or none). * Table constraints and column constraints may be violated during a transaction (by use of the DEFERRABLE keyword) but not after its termination. * There may be Primary and Foreign Keys. During a transaction, the rules for Foreign Keys may be violated (by use of the DEFERRABLE keyword) but not after its termination. * The logical integrity of the database is not guaranteed! If, in the above example of a bank account, the application forgets to update the second row, problems will arise. Isolation. In most situations, there are a lot of sessions working simultaneously on the DBMS. They compete for their resources, especially for the data. As long as the data is not modified, this is no problem. The DBMS can deliver the data to all of them. But if multiple sessions try to modify data at the same point in time, conflicts are inescapable. Here is the timeline of an example with two sessions working on a flight reservation system. Session S1 reads the number of free seats for a flight: 1 free seat. S2 reads the number of free seats for the same flight: 1 free seat. S1 reserves the last seat. S2 reserves the last seat. The central result of the analysis of such conflicts is that all of them are avoidable, if all transactions (concerning the same data) run sequentially: one after the other. But it's obvious that such a behavior is less efficient. The overall performance is increased if the DBMS does as much work as possible in parallel. The SQL standard offers a systematic of such conflicts and the command <code>SET TRANSACTION ...</code> to resolve them with the aim to allow parallel operations as much as possible. Classification of Isolation Problems. The standard identifies three problematic situations: * P1 (Dirty read): "SQL-transaction T1 modifies a row. SQL-transaction T2 then reads that row before T1 performs a COMMIT. If T1 then performs a ROLLBACK, T2 will have read a row that was never committed, and that may thus be considered to have never existed." <ref name="ISO/IEC"></ref> * P2 (Non-repeatable read): "SQL-transaction T1 reads a row. SQL-transaction T2 then modifies or deletes that row and performs a COMMIT. If T1 then attempts to reread the row, it may receive the modified value or discover that the row has been deleted." Non-repeatable reads concern single rows. * P3 (Phantom): "SQL-transaction T1 reads the set of rows N that satisfy some search condition. SQL transaction T2 then executes SQL-statements that generate one or more rows that satisfy the search condition used by SQL-transaction T1. If SQL-transaction T1 then repeats the initial read with the same search condition, it obtains a different collection of rows." Phantoms concern result sets. Avoidance of Isolation Problems. Depending on the requirements and access strategy of an application, some of the above problems may be tolerable - others not. The standard offers the <code>SET TRANSACTION ...</code> command to define, which are allowed to occur within a transaction and which not. The <code>SET TRANSACTION ...</code> command must be the first statement within a transaction. -- define (un)tolerable conflict situations (Oracle does not support all of them) SET TRANSACTION ISOLATION LEVEL [READ UNCOMMITTED | READ COMMITTED | REPEATABLE READ | SERIALIZABLE]; The following table shows which problems may occur within each level. At Wikipedia there are more detailed informatiton and examples about isolation levels and concurrency control. Durability. Transactions guarantee that every confirmed write-operation will survive (almost) every subsequent disaster. To do so, in most cases, the DBMS writes the changes not only to the database but additionally to logfiles, which shall reside on different devices. So it is possible - after a disc crash - to restore all changes from a database backup plus these logfiles. There is more detailed information about the durability property at Wikipedia. Autocommit. Some DBMS offers - outside of the standard - an AUTOCOMMIT feature. If it is activated, the feature submits automatically a COMMIT command after every writing statement with the consequence that you cannot ROLLBACK a logical unit-of-work consisting of a lot of SQL statements. Furthermore, the use of the SAVEPOINT feature is not possible. In much cases, the feature is activated by default.
300561
1598391
https://en.wikibooks.org/wiki?curid=300561
Travel Time Reliability Reference Manual/Example Data
Below are graphs and data for an 6-lane urban freeway (I-43/I-894 near Milwaukee) and 4-lane inter-regional (I-94 west of Eau Claire). All data comes from the NPMRDS data set in January 2012. 6-lane urban freeway (4.35 miles) Free flow travel time is based on the 70th percentile travel time 4-lane interregional freeway (20.18 miles) Free flow travel time is based on speed limit of 65mph The 3-D graphs below show travel times by day and by hour for each corridor. Visually, one can see the better reliability of the inter-regional corridor over the urban. Blank areas represent points where real-time data did not exist along the entire corridor. Travel Times for 6-lane Urban Freeway in January 2012 Travel Times for 4-lane Inter-regional Freeway in January 2012 Previous Page → NPMRDS and INRIX Data Comparison Travel Time Reliability Reference Manual
300563
1599330
https://en.wikibooks.org/wiki?curid=300563
Travel Time Reliability Reference Manual/Other travel time reliability plots
TTRMS analysis tool can also provide user the observed frequency of each of the non-recurring factors. Figure 1 is an example of observation along I-94 Westbound from downtown St. Paul to downtown Minneapolis. This represents the number of fifteen-minute intervals throughout the year that have these factors present in the database. In this example, 60 percent of the time intervals do not have any non-recurring factors present, i.e. normal conditions. The intervals with a single factor observed, such as weather, crash, incident, event or roadwork, range from one percent to ten percent of the intervals. Time intervals with two or more factors present are shown in the combinations category and were observed in nine percent of the time intervals in 2012. Figure 1: 2012 WB I-94 Observation Pie Chart Figure 2 shows the delay experienced during each of the regimes. To calculate this, the average delay for each time period (observed travel time minus free-flow travel time) is multiplied by the number of users during that time period. All of the time periods are then separated by regime to establish the proportion of delay experienced under each condition. Comparing this chart to Figure 1 shows that a disproportionate amount of the delay is experienced during times with non-recurring factors present, indicating that these factors contribute to increased delay on the corridor. Figure 2: 2012 WB I-94 Delay Pie Chart However, there is an argument that a portion of the event delay was likely due to normal delay but not caused by the specific event. For example, 15 percent of crash delay is derived in the example stated above. The right interpretation of the number is that 15 percent of delay is observed during crash time. It cannot be explained as 15 percent of delay is caused by crash because normal delay is included in the 15 percent. TTRMS tool can also provide an adjusted delay pie chart that represents the particular event delay. The basic methodology TTRMS tool applied is to subtract the average normal delay in the specific time when events occurred from the observed delay during events. For example, if a crash lasted for 30 minutes, and the observed corridor delay is 1,000 hours, and the average normal congestion delay is 400 hours, the adjusted delay for this particular crash is 600 hours (1,000 hr- 600 hr) rather than 1,000. However, if a crash lasted for 30 minutes, and the observed corridor delay is 1,000 hours, and the average normal congestion delay is 1,400 hours, the adjusted delay for this particular crash is 0, which indicates that the specific crash does not cause delay at all. Figure 3 shows the adjusted delay pie chart. Comparing with Figure 2 that displays the observed delay pie chart, all of portions for non-recurring events decrease. This chart is more accurate if user would like to analyze the association between the delay and specific types of events. Figure 3: 2012 WB I-94 Adjusted Delay Pie Chart Figure 4 shows the delays caused by non-recurring events only along I-94 Westbound from downtown St. Paul to downtown Minneapolis. This chart shows the same things with Figure 3 except excluding the normal congestion delay. Figure 4: 2012 WB I-94 Adjusted Delay Pie Chart for non-recurring events Previous Page → Surface Plots of travel time and VMT Next Page → Travel Time Reliability Reference Manual
300568
2435677
https://en.wikibooks.org/wiki?curid=300568
Models and Theories in Human-Computer Interaction/Introduction
Is HCI really the most visible part of computer science?: A Critique of Carroll's Introduction. Even when the initial paradigm of windows, menus, icons, and mouse pointing evolved from early work on limited office contexts thanks to the evolution of technology we find now that HCI work has given way to new mobile and virtual trends. Nowawadays, HCI pervades every field/discipline from daily interfaces, like an online banking system, to highly specialized ones like cockpits and surgery dashboards. Thanks to HCI multidisciplinarity we can resort to a plethora of methodologies, from experimental quantitative through context-sensitive qualitative protocols. Specifically, http://ist.psu.edu/directory/jmc56 holds that HCI has become a primary testbed for two broad innovations in design methods, participatory design and ethnographically driven design. In any case, HCI is young and it has a need to be multidisciplinary; ergo, I propose that HCI enables a new renaissance in which we see a move away from specialization which gives way to a blend of the sciences (hard and "soft"/social) and the humanities. HCI has brought about the DaVinci era of the 2000s. What Golden Age? HCI was originally a joining of software engineering and human-factors engineering expertise. Then, in the 70s, the waterfall development model saw a crisis brought about by the need to move away from a linear model of development to one that integrated the user throughout the design and development process. PCs came about to crash this design methodology which was not suitable for systems development that was user-oriented. It is likely that, in the past, this had not been as necessary because systems were not as widespread and they were only used by elites who had the time and ability to cope with systems shortfalls. Cognitive science and theory of mind. Cognitive scientists elaborated models of thought and behavior that informed HCI research. Specifically, Card, Moran and Newell proposed the GOMS model which intended to explain the process given from thoughts to behavior. Prior to this, we had human factors models which did not seek to integrate and/or explain the human micro components—mind, thoughts, behavior. The change in HCI thought. In 1985, Newells’ address to the CHI founding gathering provoked a change in thought. I would argue even before that you could sense the boiling over of a need for a unified concern in this multidisciplinary science... from Wiener’s cybernetics through systems theory to Vannevar Bush's touted address about the future of technology. In the mid-20th century there was already a sense that computers were going to be important and they would be widespread enough that there needed to be a concern with the future and how to effectively integrate them in human society Newell’s vision implicitly marginalized this work, motivating the emergence of alternative cognitive-science paradigms. As a result, among others we have, Suchman's situatedness (1987) theory elaborated from the study of photocopier use which described a variety of usability problems with an advanced photocopier's user interfaces. To be innovative, Suchman considered the interaction between the person and the machine as a sort of conversation that frequently failed because the participants did not understand one another. We see then HCI turns toward Derrida's deconstruction of science, we see HCI study evole into a critique that seeks to present an understanding of reality in which objects and people are accounted for. Suchman brought field-study concepts, techniques, and sensibilities from anthropology, ethnomethodology, and sociology, and she applied them to a real problematic situation of human-computer interaction. On the other hand, Carroll also argues that the internationalization of HCI may have contributed to this new HCI thought. He holds that, thanks to the International Federation for Information Processing (IFIP) conferences held in Europe, and by initiatives within major computer companies, HCI has boiled over with a stream of input that is diverse and multinational/cultural. We have experienced this first-hand in CHI gatherings where practitioners, artists, technologies, and multinationals come together to thinks about and discuss the evolution of technology as it pertains to human society and individuals. Carroll cites Bødker’s (1991) application of activity theory to HCI as yet another contribution that modeled HCI thought. Born out of Russian marxist philosophy, rooted in Vigotsky's writings, activity theory could not deny its beginnings, its Marxist foundations that sought to integrate culture, tools, and cooperation as elements to be considered in any attempt to explain phenomena associated with human cooperation. According to Carroll then there are historical factors acting as sources of ideas in the development of theory in HCI: 1. differentiation within the original cognitive-science community of HCI. (distancing from GOMS) 2. growing multidisciplinary constituency of cognitive science itself. 3. internationalization and 4. technology Ultimately, wary but hopeful of the "New Golden Age". We see that the future may take unsuspected directions. We confront the challenge (and at the same time advantage) of having to deal with a multidisciplinarity that has brought about fragmentation, the making up of camps and the tension between depth and breadth in scientific expertise. Furthermore, we have researchers and practitioners seeking to prevail in their views of what should be considered an HCI discipline. The ACM itself cannot come up with a unified definition of our field. But, I argue that old views, rigidly bound to ergonomics and a linear model of design, has been supplanted by a more interactive view in which practice plays a more central role in articulating requirements for theory and technology as well as in evaluating their efficacy in applied settings. My sense is that we are ever more driven toward producing practical/applied knowledge. That the "mediocrization" of the field--- external factors such as schedule, budget, and compatibility with standard solutions often prevail. This may cause that HCI unofficial reports include no understanding of underlying theoretical aspects and do not follow the exigencies of scientific methodologies which seek to address validity and veracity concerns. Carroll indicates the need for synthesizing a comprehensive and coherent methodological framework but HCI is not about standards. At the end, as HCIers we need to remain educated and recognize the need to adopt a lifelong learner model in which we inform our research and practice with the understanding of objects and phenomena in the world, science, and society. Carroll recognizes that, "in 1988, an Association for Computing Machinery (ACM) task force enumerated HCI as one of nine core areas of the computer-science discipline (Denning et al., 1989). And a joint curriculum task force of the ACM and the IEEE (Institute of Electrical and Electronic Engineers) recommended the inclusion of HCI as a common requirement in computer-science programs (Tucker & Turner, 1991).(Carroll 2003)." However, he also recognizes the inaccessibility of advanced-level materials on HCI science and theory. We ourselves have experienced that in the search for a textbook for this class. At the end, HCI remains ripe with possibilities. However, we need to remain wary of distancing from the rigour required by a scientific pursuit. We need to adapt and adopt but always keeping in mind those who came before us and the need for validity in our methods.
300569
1599330
https://en.wikibooks.org/wiki?curid=300569
Travel Time Reliability Reference Manual/TTRMS Tool
The SHRP 2 reliability data and analytical tools are intended to address travel time variability in one of three ways: 1) Establish monitoring systems to identify sources of unreliable travel times; 2) Identify potential solutions to cost-effectively improve reliability; 3) Incorporate consideration of travel time reliability into transportation agencies’ planning and programming framework. This technical memorandum documents the development of a travel time reliability monitoring system (TTRMS) for the Minnesota pilot site. The development of this system followed the guidelines of the SHRP 2 Project L02 guidebook: Guide to Establishing Monitoring Programs for Travel Time Reliability (September 10, 2012). This document details the data sources used in the development of the TTRMS for the Minnesota Pilot site. This includes: • Travel time and traffic data; • TTRMS database development; • TTRMS analysis tool Travel time and other traffic data can be accessed from TICAS. Comparing with the MnDOT data extraction tools, TICAS performs a number of additional calculations using the data from the detector stations to produce the travel time and VMT information. The TTRMS database is configured using a macro-enabled Microsoft Excel spreadsheet. This software package was identified to be the most user-friendly and data compatible for the variety of data sources under consideration. The macros that were developed for the database application assist in the organization of the various data sources to construct the database. This section describes how these features operate and how the various data sources are linked in the database. A series of refinements were made throughout the development of the database. For example, the database allows users to specify corridor length if a shorter segment of the overall corridor is to be analyzed. In addition, it is capable of accommodating a variety of observation time bins (e.g. 1, 2, 3, 5, 10, or 15-minutes), provided the traffic data is in the corresponding format. These refinements are expected to be used to their full capabilities in later stages of this study and the findings documented in future memoranda. Input Data Processing This section explains how the TTRMS interprets each data source and configures it to a standardized format allowing the data to be combined in the TTRMS database. Traffic Data The traffic data downloaded using TICAS determined the maximum corridor length and the analysis time interval. The start and end point was chosen based on the detector stations, and travel time and VMT output data is provided in 0.1-mile increments. Weather Data A process in the database reformatted the weather data into the appropriate length time intervals as determined by the traffic data. When the time interval from the raw weather data was greater than five minutes, the missing intervals were assigned the conditions of the previous bin until another record was available. For example in a five-minute system, if the source data interval was from 13:05 to 13:20, the travel time records for the 13:10 and 13:15 bins would be assigned the 13:05 weather record. Conversely, when multiple records were available in a single five-minute bin, the most severe weather condition was chosen to represent the bin. Table 1 ranks the precipitation type and intensity by descending order. Table 1 Precipitation Type and Intensity Hierarchy Crash and Incident Data Crashes are motor vehicle collisions with other vehicles or fixed objects that result in over $1,000 of property damage or personal injury. These events are recorded by law enforcement personnel, and crash records are compiled in the Minnesota Department of Public Safety (DPS) database. Incidents are any other non-recurring disruption to the highway that has the potential to affect capacity and throughput. These situations can include stalled vehicles, medical emergencies, or animals and debris that are on the roadway.These are frequently used to perform safety reviews on highways by computing historical crash rates to identify high crash locations.For crash data, the duration was added to the start time to determine when the crash had cleared. If the crash spanned multiple time intervals, all of the time bins contained in the duration were assigned with the crash details. Similar to the weather data, if crashes overlapped, the “worst” crash (based on severity) was selected to populate the affected time bins. A similar process was used for the incident data, with “Incident Impact” used as the hierarchy variable. Event Data Events defined in the TTRMS tool are sports games, concerts, state fairs that have significant impacts on traffic. When an event was taking place, all time bins in the arrival and departure windows were marked with the name of the event type. Each event type was assigned name, such as “Twins_A” (for arrival) or “Vikings_D” (for departure). For instances with multiple events taking place, the names of events were combined to reference both events. For example, if a Twins game arrival overlapped a Vikings game arrival, the event would be categorized as “Twins_A_Vikings_A”. Road Work Road work is defined as any agency activity to maintain or improve the roadway that may result in impacts to capacity. This may include short-term activities such as guardrail, sign, or lighting repair as well as more significant, long term construction actions.Road work records were applied to the TTRMS records using a similar protocol as the crash, incident, and event conditions. The input data included start time, end time, and impact attributes. All travel time records during the periods that the road work was active were assigned with the impact category. Previous Page → About SHRP II Next Page → Surface Plots of non-recurring events
300590
1617031
https://en.wikibooks.org/wiki?curid=300590
Occupational Medicine Textbook-Wiki
= Draft paper for publication as a Commentary (IMH for authors) = ABSTRACT Using the Glucometer finger-prick test in the maritime clinics and for personal control on board opens up a new frontier of screening and prevention for Prediabetes and Diabetes Type 2 in a much wider perspective than before. The "Prediabetes-Remission Study" now accepts either A1c or the Fasting/Postprandial Glucometer test as the inclusion criterion. Personal health coaching provides tailored support to individuals at risk of developing diabetes and empower them to take control of their health using the Glucometers, weight- and bloodpressure self-control onboard. Keywords: Prediabetes, remission, reversion, maritime, seafarers, health-coaching, lifestyle, protocol = Title: Glucometers for diagnosis of Prediabetes and Type 2 Diabetes in the maritime clinics. = Prediabetes, as part of the metabolic syndrome is a critical condition that indicates elevated blood sugar levels, although not yet high enough to be classified as Type 2 Diabetes Mellitus (T2D). This condition significantly increases the risk of progression to T2D, even without any prediabetes symptoms.(1) The growing evidence that Prediabetes can be reversed through lifestyle changes, forms the basis for the "Prediabetes-Remission Study" with the objectives: To educate and encourage seafarers to reverse their newly diagnosed prediabetes in a 16-week prediabetes coaching and learning intervention study – and to apply the course materials in educational programs on Prediabetes/T2D and Hypertension for seafarers and other maritime personnel.(2). However, the early diagnosis of prediabetes is unfortunately often prohibited due to lack of the A1c test the maritime health clinics. Now the use of the cheaper Glucometer finger-prick test opens up for a new frontier in maritime health by screening for Prediabetes and early start of prevention in a much wider perspective than before. A glucometer is a handheld device used to measure the concentration of glucose in the blood. The inclusion criteria for the "Prediabetes-Remission Study" is updated to include either A1c, where this is possible, or Fasting- or Postprandial Glucometer test. The availability of Glucometers in the ship’s medicine chest and the seafarers bringing their personal test Glucometer kits on board, is encouraged. The use of glucometers in maritime medicine could greatly benefit health monitoring in developing countries for early diagnostics and prevention of prediabetes and T2D as was done excellently in Nepal recently.(3)   Internationally, the screening criteria for Prediabetes and T2D are homogenous based on A1c and/or the Fasting and Postprandial glucose laboratory blood test (Table 1). However, since the A1c blood test is not available in most of the maritime medical clinics, there is a need for specific criteria that allow the use of the cheaper Glucometers for diagnostics of Prediabetes and T2D. The inclusing criteria for the Prediabetes-Remission study was originally A1c prediabetes values of "5.7–6.4% / (39–47 mmol/mol." However, being aware the A1c test is often not available, candidates for the "Prediabetes-Remission Study" cannot be selected and invited to the study and the searers don’t now not whe er they might have prediabetes or not for early prevention. Our proposed criteria for the Glucometer mediated diagnostics for prediabetes (Table 2) is based on the American Diabetes Association (ADA) criteria for the Fasting glucose level and the Postprandial glucose level based on the two hour Oral Glucose Tolerance (OGTT) Test level(4) By implementation of the economically feasible glucometer finger-prick test (0.20-0.27USD/test) (Website) with quick results, the seafarer and fishermen can travel to their destinations for embarcation immediately. They will also learn how to use the Glucometer for self control to adjust their dietary- and fitness status. Those with Glucometer based elevated fasting blood glucose and/or postprandial finger prick test (Table 2) can be referred to the GPs or visit a medical clinic in the next port for a A1c measurement. To participate in the study, the seafarers need to bring a glucometer, a blood pressure measurement and a travel weight scale on board for weekly self-testing (estimated total costs for all 3 items: 60-92 USD Website shopping). Application for funding of the 3 items is relevant where the ship does not bring them on board. Using the cheap and rapid glucometer test could help to eliminate health disparities by promoting early diagnosis of prediabetes and comorbidities for seafarers and all the population in the developing countries. (5) Keywords Health disparities, Glucometer, A1c, prediabetes, type 2 diabetes, seafarers, fishermen. Acknowledgments To all colleagues and friends who supported strengthening the prevention of chronic non-infectious diseases, like Prediabetes, T2D, and the co-morbidities. Conflict of interest: None declared. References 1.             Mulla IG, Anjankar A, Pratinidhi S, Agrawal SV, Gundpatil D, Lambe SD. Prediabetes: A Benign Intermediate Stage or a Risk Factor in Itself? Cureus. 2024 Jun;16(6):e63186. 2.             Jensen OC. Invitation to do remission of pre-diabetes to normoglycemia. International Maritime Health. 2024;75(2):135–6. 3.             Gyawali B, Sharma R, Mishra SR, Neupane D, Vaidya A, Sandbæk A, et al. Effectiveness of a Female Community Health Volunteer-Delivered Intervention in Reducing Blood Glucose Among Adults With Type 2 Diabetes: An Open-Label, Cluster Randomized Clinical Trial. JAMA Netw Open. 2021 Feb 1;4(2):e2035799. 4.             Diabetes Diagnosis & Tests | ADA [Internet]. [cited 2024 Aug 21]. Available from: https://diabetes.org/about-diabetes/diagnosis 5.             Guthrie BJ. Low cost blood glucose meters as an appropriate healthcare technology for developing countries. Vol. 2012, IET Conference Publications. 2012. 1 p. 6.             Chandra Prabhakar M, Halder P. Reliability and accuracy of bedside capillary blood glucose measurement by glucometers compared to venous blood glucose in critically ill patients: A facility based cross-sectional study. Clinical Nutrition ESPEN. 2024 Apr 1;60:24–30. 7.             Katz LB, Stewart L, Guthrie B, Cameron H. Patient Satisfaction With a New, High Accuracy Blood Glucose Meter That Provides Personalized Guidance, Insight, and Encouragement. J Diabetes Sci Technol. 2020 Mar;14(2):318–23. 8.             Chen H, Yao Q, Dong Y, Tang Z, Li R, Cai B, et al. The accuracy evaluation of four blood glucose monitoring systems according to ISO 15197:2003 and ISO 15197:2013 criteria. Prim Care Diabetes. 2019 Jun;13(3):252–8. 9.             Andes LJ, Cheng YJ, Rolka DB, Gregg EW, Imperatore G. Prevalence of Prediabetes Among Adolescents and Young Adults in the United States, 2005-2016. JAMA Pediatrics. 2020 Feb 3;174(2):e194498. 10.          Spurr S, Bally J, Hill P, Gray K, Newman P, Hutton A. Exploring the Prevalence of Undiagnosed Prediabetes, Type 2 Diabetes Mellitus, and Risk Factors in Adolescents: A Systematic Review. Journal of Pediatric Nursing: Nursing Care of Children and Families. 2020 Jan 1;50:94–104. 11.          Liu J, Li Y, Zhang D, Yi SS, Liu J. Trends in Prediabetes Among Youths in the US From 1999 Through 2018. JAMA Pediatrics. 2022 Jun 1;176(6):608–11. 12.          Kushwaha S, Srivastava R, Bhadada SK, Khanna P. Prevalence of pre-diabetes and diabetes among school-age children and adolescents of India: A brief report. Diabetes Res Clin Pract. 2023 Aug;202:110738. 13.          Hamrahian S, Falkner B. Approach to Hypertension in Adolescents and Young Adults. Current Cardiology Reports. 2022 Feb 1;24. 14.          Indicator Metadata Registry Details [Internet]. [cited 2024 Aug 20]. Available from: https://www.who.int/data/gho/indicator-metadata-registry/imr-details/2380 (a) To be repeated  (b) ≥ 2 hours after a meal Occupational Health WHO. Occupational safety and health (OSH)is a multidisciplinary field concerned with the safety, health, and welfare of people at work. Occupational medicine, is a part of Occupational Health which deals with the maintenance of health in the workplace, including the prevention and treatment of diseases and injuries. It is the branch of clinical medicine most active in the field of occupational health and safety. Work place risk assessment. One of the most important tools in occupational health is hazard identification in the workplace. This is the process of systematic identifying all hazards in the workplace to be used for prioritation of the prevention actions. A job hazard analysis is one component of the larger commitment of a safety and health management system. Work place risk identification is the share point for all types of profesionals working in occupational health and safety. https://en.wikipedia.org/wiki/Job_safety_analysis Knowledge on the incidence/prevalence, causes and prevention occupational diseases. Scientific studies on occupational medicine in developing countries is scares. The task is to select, search and make a review of epidemiological studies on selected specific type of industry, type of diseases, the exposures and the prevention. Select for example studies on dust exposure, respiratory health problems in agriculture and other industries, the students learn and produce useful learning materials. Ergonomic work hazards and rheumatological diseases is another example. Click to open the page to add more knowledge of your personal interest: Work related diseases in the tropics, exposures and prevention This would be an excellent student´s task. The students can produce important learning materials and learn at the same time (revision and update) Occupational Diseases, Diagnosis, Causality, Prevention and Prognosis Under-reporting of occupational diseases. Under-reporting of occupational diseases is a problem globally. As an example the under-reporting rate of musculo-skeletal diseases in 10 regions of France was estimated at 59% for CTS, 73% for elbow MSD, 69% for shoulder MSD, and 63% for lumbar spine MSD. Several methods can be used to solve this problem. It would be an excellent training for students to do a systematic review in the scientific articles e for useful methods on haoe to establish systematic registration of work-related diseases. Preventive healthcare. Occupational medicine is a medical specialty that aims for the prevention among workers of departures from health caused by their working conditions; the protection of workers in their employment from risks resulting from factors adverse to health need to be studied so epidemiological research is an important part of the speciality; placing and maintenance of a worker in an occupational environment adapted to his physiological and psychological equipment and the promotion and maintenance of physical, mental and social well-being of workers. Social determinants of health. The association between socio-economic status and health has been known for centuries . The socioeconomic derterminants of health is a sine qua non in all medical specialties including occupational medical research and clinical practice. Socio-economic status is related to mainly three indicators: education, income and occupational status. Powerty is a strong indicator for mental and physical occupational diseases Today the field of social medicine is most commonly addressed by public health efforts to understand what are known as social determinants of health. The Social Determinants of Health: It’s Time to Consider the Causes of the Causes. Hippocrates sought to show a connection between the climate of the area and the diseases that plagued that area, still he also must have known the impact of the socio-economic indicators for disease Natural history of disease and exposure. Natural history of disease refers to the progression of a disease process in an individual over time, in the absence of treatment. Most of the diseases have a characteristic natural history with variations in the specific manifestations of disease individual to individual and influenced by preventive and therapeutic measures. Critical thinking. Critical thinking and asking questions is significant in academics, research and especially important in occupational medicine. One basic question for the physicians is to ask the patient about his/her job and to pursue the causalities of the disease in order to propose prevention in the branch and for the patient. Critical thinking is closely related to Evidence Based Medicine, as described below Evidence-Based Medicine. Evidence based medical practice is an approach to clinical decision making that has gained considerable interest and influence during the decades. The phrase 'evidence based medicine' originated in the 1980s as a way of describing the problem based learning approach Medical diagnosis. Medical diagnostics is "sine qua non" in occupational medical practice with patients and epidemiological research. The occupational clinical diagnosis is closely related to the establishment of the causality, as the diagnostic and compensation of an occupational disease involve the diagnosis and the probability of the etiology as well as needed for the proper prevention. Medical causality. Medical causality or etiology is "sine qua non" in medical practice with patients and research for adequate treatment and prevention with roots back to Aristotle Wikipedia Aristotle. Especially for occupational medicine, the development of causality is closely related to the diagnostic process of the single patients and epidemiological research. The importance of the work as possible contribution factor to many diseases was stated by Doctor B.Ramazinni from Italy some 300 years agoArticle in Wikipedia Medical prognosis. Occupational medical prognosis depends the seriousness and the type of the disease and the possibility to change/remove the hazardous working conditions. If the hazardous exposures cannot be removed, the patient is advised to change job function, change to other type of industry and be trained to a new job function, or if nothing else is possible to leave the labor market. Whatever happens, the work related disease should be reported to the relevant authorities and with financial compensation be given in relevant cases. Code of Medical Ethics. The international Code of Medical Ethics forms the basic content of the specific demands of ethics in all the medical specialities. The Spanish version is more elaborated than the English Spanish version. The ethics for occupational physicians are normally seen from two main viewpoints: 1) the legal standing and ethics in job execution; 2) ethics in research on occupational medicine. Among lots of guidelines we choose for a start the International Code of Ethics for Occupational Health Professionals from the ICOH code of ethics and the translation into Spanish ICOH Ethics code in Spanish. /Occupational diseases/. The under-reporting of occupational accidents and occupational diseases, globally is well recognised. However, the degree of underreporting is especially high in Latinamerca .For 2010 in Panama (1,5 million economic active) 66 occupational diseases . For comparison in Denmark with 2,6 million economic actives there were reported about 20000 occupational diseases. Of course any comparison depends on a lot of different conditions on the labor market, of the definition of the inclusion criteria and the degree of underreporting. These issues will be debated in the text. /Occupational accidents/. The under-reporting of occupational accidents and occupational diseases, globally is well recognised. However, the degree of underreporting is especially high in Latinamerca .For 2010 in Panama (1,5 million economic active) there were reported 10,311 occupational accidents, 66 occupational diseases and 135 fatal accidents . For comparison in Denmark with 2,6 million economic actives there were reported about 20000 occupational diseases, 44000 occupational accidents (at least 1 day off from work) and only 39 fatal accidents. It is supposed that the underreporting for non-fatal accidents is about 50%. From 10 different information sources the estimate was 8.3 per 100,000 in 2005 100,000 employed /Occupational medicine in general practice/. General practice and occupational medicine share close similarities in their focus on disease prevention and health promotion. The workforce constitutes a significant part of the population and thus the patient load of a typical primary healthcare practice. Moreover, with an ageing population and rising retirement age, we can expect that there will be an increasing number of health issues to be addressed among older working people. Both occupational and non-occupational factors are important in determining an individual's health. Thus, family physicians need to adequately understand occupational medicine and vice versa .Most occupational health care will continue to be provided by family physicians, who may also be the physicians closest to the workers and their families. There are many opportunities for family physicians to develop their skills in occupational health care and to incorporate occupational medicine into their practices /Occupational psychiatry/. Organisational and occupational psychiatry (OOP) is the subspecialty of psychiatry that focuses on work, its importance in the lives of individuals and work organizations. The psychiatrists do many important occupational health functions. For example they help the patients to stay in the job or to get another change position without the mental hazards they have been exposed to. As the psychiatry include much occupational medicine, a specific chapter will be written about the occupational psychiatry. However there is a gap of knowledge on how much mental disease and symptoms are related to job hazards not only in Panamá but globally. Therefore it is found relevant to do a prevalence study of the proportion of mental disease associated with job hazards. The study is similar to a study planned for general practice. The objective is to answer the questions: How many per cents of the mental health disease can be related to hazards in the work-place? Why should the study be done a psychiatry hospital and not in general practice? The answer is that the patients in the psychiatric clinics are selected via the General Practice. So the main part of the patients have an established psychiatric diagnosis. The questionnaire page 2 is different than that for general practice. On page two the psychiatrist will mark the general area of the ICD-10 diagnosis and not the International Classification of Primary Care (ICPC) that is used for general practice. This has the methodical advance that the diagnosis is on a specialist level and less patients is needed to make conclusions about the percentage of work-related psychiatric diseases. Psychiatry questionnaire % related to work /Occupational dermatology/. (the linked page is just one of many private clinics) Dermatologic complaints are among the most common occupational illnesses. Many occupational exposures can cause skin disease. The most frequent occupational skin disease is contact dermatitis. This may be either irritant or allergic contact dermatitis but often is a combination of both. Irritations may occur from chemical factors including caustics, solvents, detergents, and even plain water. Physical factors that cause irritation include friction, repeated trauma, heat, and low humidity. Contact allergy may be caused by several thousand chemicals and substances, but relatively few agents are common causes of allergic contact dermatitis. Some of the more important include metals (nickel, cobalt, chrome), preservatives, rubber additives, and plastic components (epoxy resins, acrylates). Contact urticaria is an immediate hypersensitivity reaction distinct from allergic contact dermatitis. Latex allergy is the most well-known cause of immunologic contact urticaria, but many other substances, usually protein-based, can also cause contact urticaria. A variety of other skin conditions can also be occupationally related. Skin cancer caused by ultraviolet light (sunlight) exposure or certain chemicals can be attributed in some cases to occupational exposure. Chloracne, a specific acneiform eruption caused by exposure to various halogenated hydrocarbons, is a sensitive indicator of systemic exposure to these agents. Various cutaneous infections are seen more commonly in some occupations, such as warts in meat cutters or erysipelothrix in fishermen. Cutaneous hypopigmentation (chemical leukoderma) can be seen in certain workers who are exposed to depigmenting agents such as phenolic germicides. Systemic sclerosis has been occasionally seen in association with certain job exposures. In evaluating a patient with a possible occupational dermatosis, accurate diagnosis is essential. Certain diagnostic tests, especially the patch test, are important adjuncts to the clinical evaluation. Consideration of nonoccupational components of the disease (confounders) is necessary to arrive at a proper assessment of causation. Fowler Jr JF. Occupational dermatology. Current Problems in Dermatology. 1998 Nov;10(6):211–44. The needs for public-,scientific- and political interest in occupational medicine. Occupational health remains neglected in developing countries because of competing social, economic, and political challenges. Occupational health research in developing countries should recognize the social and political context of work relations, especially the fact that the majority of developing countries lack the political mechanisms to translate scientific findings into effective policies. Impact of unions and safety representatives. Research on safety representatives effectiveness and impact on occupational health lend support to the notion that trade unions, joint arrangements, and trade union representation on occupational health and safety are associated with higher levels of compliance, lower workplace injury rates and ill-health problems, and better overall health and safety performance Unions importance for occupational health & safety (Shannon et al., 1997; Milgate et al., 2002; Walters 2006). Action research in the workplace. Bernardino Ramazzini (1633–1714) published his most famous book 1713, De Morbis Artificum Diatriba (Diseases of workers) Ramazzini . The book is a descriptive account of working conditions in more than fifty occupations and of the diseases of workers in these occupations. Ramazzini's observations were accurate and precise, although he provided no numerical information and made statements implying rather than expressing levels of risk, so readers could not determine, for example, whether pottery was a safer occupation than knife grinding. His accounts remain a good model for occupational health. We want to continue in his footsteps by describing the working conditions in the diferent occupations and the diseases of the workers but in a modernized form, action research. The descriptions will be based on the workers own descriptions and proposals for prevention and the existing scientific evidence about the exposure hazards and the health risks. The objective is to prepare the health professionals with knowledge about the workers´daily conditions so they are well prepared to establish the correct diagnosis, identify the causal factors and so to give the best treatment and guide for prevention. And possibly notify the disease or symptoms as work-related where relevant. Further it is the aim to increase the political interest for prevention of the specific problems. Community intervention programs. Health interventions applied on a community-wide basis have come into increasing use in public health and epidemiologic research over the past decades. The emphasis on interventions focusing on communities has created distinct methodological challenges for researchers. Effective program evaluation is a systematic way to improve and account for public health actions. Evaluation involves procedures that are useful, feasible, ethical, and accurate It is important to develop a tool to measure success and to include these results in the promotion campaign. Even if the program is part of the global campain, it is essetial to establish goals and measure the progress against your goals. By reviewing the program’s successes and failures you can see how it has been the most effective. In conclusion there is a need to add research programs to the interventions. This could be an attractive research area for public health students in Panama and students from outside! Post-grade training courses. The intention is to offer short theoretical and practical courses, that are of relevance to improve the quality of the daily practice in not alone occupational medicine but all areas of medical and health practices and research 1. Epidemiology. Research is an indispensable part of occupational medicine and the epidemiology is traditionally viewed as the main research tool for occupational medical researchers, practitioners and administrators. Though many other disciplines are important to occupational medicine the epidemiology is often described as the ‘basic science of public health and occupational medicine. Unfortunately the university teaching in epidemiology rarely give the students sufficient interest and understanding of the basic principles of epidemiology . Therefore we want to amend the gab of skills and knowledge by offering an integrated course in Epidemiology. The course forms the scientific base for the other three courses (see below) This course will include epidemiology as an integrated part of EBM, OM and basic research. [[File:EBMfr.jpg|200px|th 2. Evidence Based Medicine. The participants will learn to pose relevant questions related to medical diagnosis, treatment, prevention and research. Further to search the relevant literature, read and get the information and be able to communicate the message and the answer to the question effectively and systematically. Some useful existing reviews and guidelines for occupational medicine diagnosis will be presented and explained how they were developed. https://en.wikipedia.org/wiki/Evidence-based_medicine 3. Occupational Medicine. We are planning to offer short OM courses for students, nurses, physicians at the hospitals, general practice and other health professionals. Later we pretend to offer more advanced courses when the course materials are sufficiently developed. The courses will be structured like the content of this Handbook. The intention is that the participants will add new knowledge to the Handbook and get a valuable learning at the same time. The course content reflect the content of the Handbook. The aim of the course is to improve the diagnostics, treatment and prevention of occupational diseases in Panamá by application of the Evidence Based Medicine. After the course the participants will be better to establish the diagnosis and give attention about the notification as occupational diseases. Also be better to try to discover any relevant relation between the work hazards (psychological, physical, chemical, ergonomic etc) and the symptoms. This in order to give the best advice on how to solve the problems for the patient and how to prevent the same could happen for others. The participant will learn to edit and to add text and new chapters to the Wikibook. The homework could be to write and add a chapter to this book, for example 1) diagnostic guidelines for occupational asthma or 2) description of the work processes and health risk factors for urban bus drivers. 4. Basic research course for health professionals. [[File:Program Scheme.png|1000px|right|The programme for a basis course in health research]] We are planning to offer a basic research training course for health professionals in the clinics and in the health administrations. The participants should have access to patients (handout the questionnaires) or access to administrative health data. The participants will stepwise learn how to plan and perform an epidemiological prevalence study based on a given questionnaire. See the questionnaires for general practice, dermatology and psychiatry. Training in the relevant computer programs like Epidata is included. The aim of the training is that the participants will add knowledge to the Handbook and get a relevant learning at the same time. Patient records in general practice (and health registers in the public administrations) are unique resources that can provide evidence to help to improve their understanding of research, improve patient diagnostics (attention to occupational medicine), patient treatment and prevention. We hope the course will be a valuable for general practitioners, administrative health professionals, medical and nurse students and other students so that many of them will enter in to active research activity. After the course the participants will be able to perform their own research, do literature searches and publish articles. MODULE 1 [[/Diploma 1: Education in Health Science research methodology /|Education in Health Science research methodology]]. MODULE 2 [[/ Module 2: Diagnosis, causality, prevention, and prognosis of occupational diseases /]]. MODULE 3 MODULE 4 [[/Early diagnosis, prognosis, follow-up and prevention guidelines/]]. General Practice. Medico_familiar_Encuesta_sobre_enfermedades_del_trabajo Dermatology. Encuesta dermatologia Psychiatry. Encuesta psychiatria Preventive Health Science journal "Open here". The course participants are invited to publish their thesis as a scientific article in this journal. The academic requirements are less than for international indexed journals, but still contribute with important new knowledge for the development of the occupational medicine in Panama. The articles can later be published in revised form in indexed international scientific journals. Articles with relevant new original knowledge will be added to the Handbook. So there is a dynamic relation between the journal, the research courses and the Occupational Medicine Wikibook. =Research protocols= Rules for research in the CSS hospitals in Panama. The documents needed for a scientific study in the CSS hospitals are the following: 1. Estimate of the size of the chronic renal disease of undetermined origin (CKDu) problem in Panama. La insuficiencia renal crónica de causas no tradicionales 2 Clinical Case (CKDu). Occupational Clinica Case Study protocol 3 Ethiological study on risk factors for chronic renal disease of undetermined origine. Etiological case-control study protocol [[Using_Wikibooks/How_To_Edit_A_Wikibook|How to edit the Wikibook]]. [[File:The Spanish international journal in maritime medicine with approval from the Editor Dr. ML Canals.jpg|200px|left|thumb]] [[File:Sociedad Española de Medicina Marítima.jpg|thumb|300px|right|Spanish Society of Maritime Medicine]]
300606
929065
https://en.wikibooks.org/wiki?curid=300606
KoBo Toolbox/KoBo External Resources
In this chapter, which consists only of this page, we mention a few external resources which will be useful for users of the KoBo Toolbox who want to further develop their understanding.
300607
715252
https://en.wikibooks.org/wiki?curid=300607
KoBo Toolbox/Post Processing
This chapter will deal with the post processing of data collected using the KoBoCollect Android app. The first step is to aggregate all the individual XML output files (instances) from one or more devices. Using the KoBoSync java application (which is also available through the KoBoForm website) these results XML files can be aggregated in to a single CSV (Comma Separated Values) file. CSV files can easily be imported in virtually all software used for data analysis, such as spreadsheets, R, or SPSS/PSPP. In the part, we discuss how KoBoForm has the option to export the variable types and labels from the from to an SPSS/PSPP syntax file. Using SPSS or the free and open-source alternative PSPP, we can then use this syntax file to correctly encode and label the variables and data in SPSS/PSPP. From here it is possible to export the SPSS data file within which all variables are correctly encoded, this file can then also be imported in other statistical software such R.
300610
3226541
https://en.wikibooks.org/wiki?curid=300610
A-level Computing 2009/AQA/Problem Solving, Programming, Operating Systems, Databases and Networking/Communication and Networking/Networks
Local Area Networks. A local area network is a group or network of computers linked physically by cables. you should not think about the physical distance between the computers, more about the location of other computers within the network. Wide Area Networks. A set of links that connect geographically remote computers and LANs. Network adapter or Network Interface Card. A computer communicates on the network through a network adapter. A network adapter plugs into the motherboard of a computer and into a network cable. They convert data from the form stored in the computer to the form transmitted or received on the cable. Data is passed through electronics that calculate a checksum value, its own address and destination address. It is now known as a frame. The frame is transmitted a bit at a time onto the network cable, with the address sent first, then data and lastly, the checksum. Each network adapter card has a unique 48 bit hexadecimal MAC address. Topology. The structure of the connections that connect devices to a network Bus Networks. Carrier Sense Multiple Access with Collision Detection (CSMA/CD). To prevent collisions on a bus network, a set of rules can be used. An example of one of these sets of rules is CSMA/CD: Star networks. You should be able to compare local area networking with standalone operation. Network Segment. A segment refers to a string of computers. Segmentation refers to non switched Ethernet bus networks that are split to improve performance. Peer-to-peer networking. This a network system where each workstation has equivalent capabilities. Peer-to-Peer LANs Good for less than 10 users where users are located in a close proximity and security isn't an issue. However provides a limited growth for future network extensions. Peer-to-Peer WANs used to share files among a large number of users connected temporarily. E.g.: BitTorrent Server-based networking. Where resources, security and administration on a network is carried out by dedicated servers. Thin client computing. Thin-client computing is when all of a network's procession comes from a central server. The thin-clients are computers used to connect to one central server to be able to form a network. Some star formatted systems use thin-client networks. Thin-client networks do not require the client computers to have any hard disk storage and they often have very little processing power. They are often called dumb terminals because of this. A thin-client network would be used on a small scale e.g. in a small office because a thin-client network has very little bandwidth. The central server is the application server and can run applications like Word, multimedia and send these to different users terminals. Also, the central server can control user's login to see if the terminals are connected to the server. Web services. Explain these terms and describe situations where these might be used. Compare and contrast thin client computing (software as a service, AJAX, Web 2.0, etc.) vs rich client computing (client-server, peer-to-peer), web services as examples of ‘systems architectures’. Routers. Routers and Bridges allow communication between computers on different segments. A Router is a device that receives packets from a router or a host and uses the destination IP address the packets contain to pass them to another router or host. Routers are commonly connected to a network of other routers. An example of how routers are used: If a host of a network (network A) in one country(country A) wants to communicate with a host on a network(network B) of another country (country B), it will have to send packets to the gateway router on network A; this will pass the packets to the local router -> regional router -> national router -> international router until the network of country B is reached. Bridges. A bridge holds a table of MAC addresses for each connected machine. Data packets received from one segment are only forwarded if they have a valid destination MAC address on the other segment. This helps to reduce overall traffic. Note that bridges are similar to switches but have only two connections. Switches. Like a Bridge a Switch has a table of MAC addresses for each connected machine. Data packets received from one connection are only forwarded if they have a valid destination MAC address on the other connection. Unlike Bridges, Switches can have many connections. Hubs. Hubs broadcast any packets received to all other connections. Gateways. A device used to connect networks using different protocols so that information can be passed from one system to another. Gateways are used to connect LANs through to WANS like the Internet; in order to do this, they must translate the LANs frame into equivalent WAN frame and vice versa, this is because LANs use a protocol that is different from the protocols used on WANs like the Internet. Define these and consider where and why they are used. In particular, consider how routing is achieved across the Internet and how local area networks are connected to the Internet via gateways. Subnetting. Subnetting is used to divide a network into smaller logical networks, e.g a LAN within a WAN. By dividing the address the responsibility for maintaining the network can be split between the WAN operator and the LAN operator. A subnet mask is used to identify which bits in an IP address specify its subnet, and hence which addresses it can send packets directly to, not via a router. 255.255.255.0 is the network mask for the segment 192.168.1
300611
3226541
https://en.wikibooks.org/wiki?curid=300611
A-level Computing 2009/AQA/Problem Solving, Programming, Operating Systems, Databases and Networking/Communication and Networking/Internet Security
Firewalls. A firewall is a device or program that monitors and controls data traffic between the internet and a private network (such as your network at home). Every firewall can be customised and assigned rules which determine which data packets are allowed through from the internet and which are not. Firewalls can also be used to block data from certain IP addresses, domain names or port numbers. Many firewalls also have the capability of being able to search individual packets for specific matches of text. "Packet filtering -" "Proxy server -" Encryption. Encryption is used to hide sensitive messages from illegitimate recipients by using encryption algorithms and an encryption key to convert plain text to cipher text, illegible to those without the encryption and decryption key. Private/Public key encryption is when both parties have a pair of keys, one private and one public. The Public Key is kept in the open freely usable by anyone as is the encryption algorithm, however the Private Key is kept hidden. Digital signatures. Digital signatures are a way for the sender to prove to the receiver that the message did in fact originate from them. A digital signature is obtained through the following process: A Digital Certificate is a way of proving that the public key of the sender is authentic. Digital Certificates are only issued by a certification authority (CA). The certificates are encrypted into the message via the CA's private key, and can only be decrypted with the CA's public key. Security Threats. There are a number to be aware of: Viruses. A virus is a small computer program attached to another program or file and is intended to cause harm to a computer. The first step that a computer performs when the program is executed is to copy itself onto the disk and hide itself. After being copied onto the disk the virus can reside in memory and reconfigure the system so it causes problems such as displaying unwanted messages, destroying or corrupting files or even wiping the entire hard disk. Viruses tend to replicate themselves and also try to spread to other computers. Anti-virus programs are used to detect and remove these viruses. Nowadays web browsers have built-in virus scanners which scan files that are available for download. Worms. A worm is a malicious program designed to replicate itself in an attempt to spread across a computer network such as the internet. The most significant difference between a worm and a virus is that a worm is a complete program on its own. Worms can disrupt network traffic and damage data. Spam. Spam is the flooding of irrelevant unwanted message (silly pointless annoying messages) these can either be by email, SMS or instant messaging. Email spam is usually considered junk mail and millions of spam emails are sent every day. Text messaging spam is also used by companies to advertise themselves. Spam is considered to be disruptive and a waste of network bandwidth. Phishing. Phishing is the act of deceiving a user to give sensitive information about themselves. This may happen by the use of phishing emails or even phishing sites, these look like the site the user is trying to access but are not, they are intended to capture information from the user. The term phishing comes from fishing, where instead of catching fish, information is caught. Pharming. Pharming is technique used to redirect traffic from one website to another, Phishing and Pharming are used in conjunction. Pharming is the process of redirecting users to a different location so that a phishing technique can imitate and capture information about the user. Computer Security Procedures. Authentication, Authorisation, Accounting. Authentication. Verification of the user of the computer system. Forms of Authentication include passwords, biometric data, security tokens and digital signatures. Authorisation. Specifying the access rights of different users to resources on a network. Accounting. Keeping logs of user activity on a network.
300637
520910
https://en.wikibooks.org/wiki?curid=300637
Structured Query Language/SQLSTATE
Programs using a database API that conforms to the SQL standard receive an indication about the success or failure of the call. This return code - which is called SQLSTATE - consists of 5 bytes. They are divided into two parts: the first and second byte contains a "class" and the following three a "subclass". Each class belongs to one of four "categories": "S" denotes "Success" (class 00), "W" denotes "Warning" (class 01), "N" denotes "No data" (class 02) and "X" denotes "Exception" (all other classes). The values of SQLSTATE are published and explained in Wikipedia.
300638
520910
https://en.wikibooks.org/wiki?curid=300638
Structured Query Language/Rollup Cube
In the chapter we have seen that the key word GROUP BY creates groups of rows within a result set. Additionally like <code>SUM</code> computes condensed values for each of those groups. Because GROUP BY can summarize by multiple columns, there is often the requirement to compute summary values for 'super-groups', which arise by successively omitting one column after the next from the GROUP BY specification. Example Table. To illustrate the situation, we offer an example table and typical questions to such kind of tables. CREATE TABLE car_pool ( -- define columns (name / type / default value / nullable) id DECIMAL NOT NULL, producer VARCHAR(50) NOT NULL, model VARCHAR(50) NOT NULL, yyyy DECIMAL NOT NULL CHECK (yyyy BETWEEN 1970 AND 2020), counter DECIMAL NOT NULL CHECK (counter >= 0), CONSTRAINT car_pool_pk PRIMARY KEY (id) INSERT INTO car_pool VALUES (1, 'VW', 'Golf', 2005, 5); INSERT INTO car_pool VALUES (2, 'VW', 'Golf', 2006, 2); INSERT INTO car_pool VALUES (3, 'VW', 'Golf', 2007, 3); INSERT INTO car_pool VALUES (4, 'VW', 'Golf', 2008, 3); INSERT INTO car_pool VALUES (5, 'VW', 'Passat', 2005, 5); INSERT INTO car_pool VALUES (6, 'VW', 'Passat', 2006, 1); INSERT INTO car_pool VALUES (7, 'VW', 'Beetle', 2005, 1); INSERT INTO car_pool VALUES (8, 'VW', 'Beetle', 2006, 2); INSERT INTO car_pool VALUES (9, 'VW', 'Beetle', 2008, 4); INSERT INTO car_pool VALUES (10, 'Toyota', 'Corolla', 2005, 4); INSERT INTO car_pool VALUES (11, 'Toyota', 'Corolla', 2006, 3); INSERT INTO car_pool VALUES (12, 'Toyota', 'Corolla', 2007, 2); INSERT INTO car_pool VALUES (13, 'Toyota', 'Corolla', 2008, 4); INSERT INTO car_pool VALUES (14, 'Toyota', 'Prius', 2005, 1); INSERT INTO car_pool VALUES (15, 'Toyota', 'Prius', 2006, 1); INSERT INTO car_pool VALUES (16, 'Toyota', 'Hilux', 2005, 1); INSERT INTO car_pool VALUES (17, 'Toyota', 'Hilux', 2006, 1); INSERT INTO car_pool VALUES (18, 'Toyota', 'Hilux', 2008, 1); COMMIT; In the table, there are two different car producers, 6 models and 4 years. Typical questions to such tables are: * Number of cars per producer or per model. * Number of cars per combination of some criteria like: producer plus model or producer plus year. * Total number of cars (without any criteria). ROLLUP. As we have , the keyword GROUP BY offers condensed data for exactly one grouping level, "producer" plus "model" in this case. SELECT producer, model, sum(counter) as cnt FROM car_pool GROUP BY producer, model ORDER BY producer, cnt desc; Toyota Corolla 13 Toyota Hilux 3 Toyota Prius 2 VW Golf 13 VW Beetle 7 VW Passat 6 In such situations, one would like to know also the corresponding values for upper groups: per "producer" or for the whole table. This can be achieved by submitting a slightly different SELECT. SELECT producer, sum(counter) as cnt FROM car_pool GROUP BY producer ORDER BY producer, cnt desc; Toyota 18 VW 26 SELECT sum(counter) as cnt FROM car_pool; 44 In principle, it is possible, to combine such SELECTs via UNION or to submit them sequentially. But because this is a standard requirement, SQL offers a more elegant solution, namely the extension of the GROUP BY with the ROLLUP keyword. Based on the results of the GROUP BY, it offers additional rows for every superordinate group, which arises by omitting the grouping criteria one after the other. SELECT producer, model, sum(counter) as cnt FROM car_pool GROUP BY ROLLUP (producer, model); -- the MySQL syntax is: GROUP BY producer, model WITH ROLLUP Toyota Corolla 13 Toyota Hilux 3 Toyota Prius 2 Toyota 18 <-- the additional row per first producer VW Beetle 7 VW Golf 13 VW Passat 6 VW 26 <-- the additional row per next producer 44 <-- the additional row per all producers The simple GROUP BY clause creates rows at the level of "producer" plus "model". The ROLLUP keyword leads to additional rows where first the "model" and then "model" and "producer" are omitted. CUBE. The ROLLUP keyword offers solutions where a hierarchical point of view is adequate. But in data warehouse applications, one likes to navigate freely through the aggregated data, not only from top to bottom. To support this requirement, the SQL standard offers the keyword CUBE. It is an extension of ROLLUP and offers additional rows for all possible combinations of the GROUP BY columns. In the case of our above example with the two columns "producer" and "model", the ROLLUP has created rows for "'producer"-only' and 'no criteria' (= complete table). Additional to that, CUBE creates rows for &apos;"model"-only'. (If different "producer" would use the same "model"-name, such rows will lead to only 1 additional row.) SELECT producer, model, SUM(counter) AS cnt FROM car_pool GROUP BY CUBE (producer, model); -- not supported by MySQL Toyota Corolla 13 Toyota Hilux 3 Toyota Prius 2 Toyota - 18 VW Beetle 7 VW Golf 13 VW Passat 6 VW - 26 - Beetle 7 <-- - Corolla 13 <-- - Golf 13 <-- additional rows for 'model-only' - Hilux 3 <-- - Passat 6 <-- - Prius 2 <-- - - 44 If there are tree grouping columns c1, c2, and c3, the keywords lead to the following grouping.
300655
3332924
https://en.wikibooks.org/wiki?curid=300655
German/Appendices/Exercises
<br><br> This appendix deals with whetting your appetite for something more, why only this much(?) hunger. Here, I am going to list complete exercises which would be dealt in while studying German. Few starting exercises have very simple language examples, as to make the student understand the matter, and thus get into flow. The exercises post those are to make the students grow the fluency at a rapid stage. There are certain exercises which deal in higher level of study materials. These exercises should be dealt only when the person has reached the requisite level of understanding and should also be ready to complete the exercises most of it without any assistance of the English Language. Best of luck. :) Exercise / Übung. Here are a few examples for better understanding the stated methodology and to get a better grip on the daily conversation: Übung Eins. Pronunciation. Kaffee kaf-fay coffee Juni yoo-nee June Karl male Charles Marie female Mary wie vee how Hans male Jack Übung Zwei. Pronoun. Example: Sie ist warm. It is warm. Notes. Masculine der Feminine die Neuter or Noitral das Übung Drei. Notes. Schuh Shoe Übung Vier. Indefinite Article & "kein". Beispiel bei-shpeel Notes. masculine feminine neuter Nom. der ein die eine das ein Übung Fünf. Endung(en). The following exercise deals with a good aspect of the grammatical experience and requirement. This exercise is very important, as it deals with everyday aspect of the spoken German. Übung Sechs. Nicht (Negative Answers). Following exercise is about the opposite of Yes, that is No. Please understand that the German nicht corresponds to the English not. Biespiel Spricht die Frau Englisch? Does the woman speak English? Nein, sie spricht nicht Englisch. No, she does not speak English. Notes. Lernt der Schüler Deutsch? Is the pupil learning German? Ja, er lernt Deutsch. Yes, he is learning German. Übung Sieben. Wer Ist Herr ...? The daily agenda of a simple person (hypothetical) eager to learn German, and few of his moments, which will make us know him. Prior to the exercise, it is recommended to go thoroughly in the alphabets, numbers, days of the week, time, and the different pronunciations. It is also recommended to speak the exercise aloud, as many times, so as to put the conversations in the mind. *aa is pronounced as long "ä"("ah"). Der Saal("zahl") - hall, room. das Paar("pahr") - pair. das Haar("hahr") - hair. Notes. Vokabeln / Wortschatz("vôrt-schätz") der Indien (In-die*the*-an*en*)|India|.nah|near das Büro Office .noch still der Herr gentleman, sir, Mr. .noch nicht not yet das Kind (kint) child .zu (tsoo) too der Knabe (knah-be) boy .zu viel too much das Mädchen (mayt-chen) girl .für for das Jahr (yahr) Year (Age) .von from wohnen (voh-nen) to live, to reside .aber but jung young .und (oont/d) and alt old .sein his (like ein and kein) verheiratet (fer-hei-rah/r-tet) married .alle (al-le) all weit (veit) far .viele many Übung Acht. Notes. ----/!> (If possible, I will get all this recorded and uploaded). I am still updating this chapter, so please do not delete/amend this page. Danke Schôn. ~~~~
300670
3181019
https://en.wikibooks.org/wiki?curid=300670
Guide to Game Development
This is a guide that should help you on your way to becoming a game developer, no matter what which path you want to take. This book should either help you through each aspect, or redirect you to a place that can. This book has been designed to be 'straight' and 'to the point' to allow you to make the most of your time. If you have found a section of the book that's lacking and you feel like you know enough to write about it, feel free to edit it, it will also help you get a better understanding of the topic. __NOEDITSECTION__ An introduction about me, the book and how it can help you. The theory, logic, mathematics and understand behind how a game works. The platform that the game is going to be developed for. The tool/framework/engine that you're going to use to create the game. The programming languages that are going to be used to create the games. The data file types used for storing information about the game. The creation of effective appealing graphics and textures for games. The creation of 3D models used for characters, terrain and more! The music and sound effects that will accompany the game. Connecting your game to the internet and to other players All the items that could be added into a game settings menu. The legal and publishing side of game development. All other subjects related to game development.
300674
46022
https://en.wikibooks.org/wiki?curid=300674
Guide to Game Development/Introduction
An introduction about me, the book and how it can help you (Note: reading this section won't help you with game development). Information about the book itself How to use the book to help you get better/start game development. A place to ask questions and give recommendations
300677
2983037
https://en.wikibooks.org/wiki?curid=300677
Guide to Game Development/Rendering and Game Engines
The tool/framework/engine that you're going to use to create the game. A rendering engine that only works on Windows (as well as Modern), Windows Phone, Xbox 360 and Xbox One. A rendering engine that works on all platforms, except for Windows Phone, Xbox 360 and Xbox One. "This page contains many Sister Projects." A rendering engine based upon OpenGL designed to work on the web. A Javascript webrenderer. Used to make games for Windows (as well as Modern). The default graphics system that you programming language uses to draw basic graphics to the screen (2D only, unless you're a mathematical bad-ass). Simple DirectMedia Layer - provides low level access to audio, input devices, and graphics hardware via OpenGL and Direct3D. A tool for making games aimed at beginners that requires little to no programming. A tool for making games aimed at beginners of a young age that requires no programming. A tool that allow for easy programming, allowing you to interact with public members with a visual interface. The engine used to make Unreal games such as Gears of War. The engine used to make Quake. The engine used to make Crysis, Far Cry and many more games. A simple first-person-shooter creator Categories. Programming built-in languages. See Game-only programming languages.
300679
3330362
https://en.wikibooks.org/wiki?curid=300679
Guide to Game Development/Introduction/About the book
Information. This book was started on 30th May 2014. It's designed to cover all aspects of game development to hopefully help people of all different skill levels in a variety of different ways. Requirements. This book requires you to have learned basic programming languages. I will be using C and Assembly Language, with some information on how to make things simple using OOP. Moreover, you should have some basic information on how things work in programming, such as arrays, objects, decisions, structuring programs and that kind of stuff. Difficulty. Basically, I and other contributors will try to teach you the easiest way, and we will also show some real life examples and which techniques are better where. So it purely depends on your game and skill. Software. This is the most common question almost every beginner programmer asks to everyone, and ends up in the person being stuck between thousands of software recommendations and advice. Believe me, I have found that NO SOFTWARE is perfect for a sound start. Most people think Visual Studio is better than every software, I agree with them. But people starting from the base of mountains know better than people who get on the summit using helicopters. So my basic advice is: Don't use anything. However, I will show you how software works and which thing works better than others. Thanks. Thanks for reading this book, we appreciate it!
300686
46022
https://en.wikibooks.org/wiki?curid=300686
Guide to Game Development/The Programming Language
The programming languages that are going to be used to create the games. Note: this could be a nearly endless list, so I'm only going to add a few, but by all means add more if you want.
300687
1620806
https://en.wikibooks.org/wiki?curid=300687
Guide to Game Development/Settings
All the items that could be added into a game settings menu. The Music and Sound Effects for the game The setting that involve the screen and resolutions The options that involve the heads-up-display that is on top of the game play Settings that affect the game itself All of the graphical options like: Texture quality, anti-aliasing, polygon count, lighting, water affects etc. All setting that involve the gameplay input like key bindings, input type: mouse/keyboard, controller/gamepad, joystick
300688
1620806
https://en.wikibooks.org/wiki?curid=300688
Guide to Game Development/Miscellaneous
All other subjects related to game development. A list of techniques used by companies to make their games addictive How to write a good storyline for a game. All of the different types of free-to-play games How creative games implement electricity and power into their games. The rewards and outcomes of level ups How to properly implement an XP system into a game This is a list of advice from game developers/programmers on wikibooks. This is a list of game development ideas to help you practice your skill level What to think about when brainstorming and planning your game This ways in which you can customise how you upgrade your character based on points you've earnt How to protect everyone's data that uses the service (online games only)
414991
46022
https://en.wikibooks.org/wiki?curid=414991
End-user Computer Security/Preliminaries
<BR>=𓆉≅ End-user Computer Securitysim<BR> Inexpensive security <table ALIGN="RIGHT" STYLE="padding:0px;margin:0px;font-style:italic" border="0"> <tr STYLE="padding:0px;margin:0px;"> <td valign="top" STYLE="padding:0px;margin:0px;"> </td> <td STYLE="padding:0px;margin:0px;"> </td> </tr> </table> <table style="padding:0px;margin:0px"> <tr valign="top"><td> = Meta information = </td><td valign="bottom" style="padding-left:1em;padding-top:3px"> </td> </table> <BR> <table style="padding:0px;margin:0px"> <tr valign="top"><td> Table of Contents. </td><td valign="bottom" style="padding-left:1em;padding-top:3px"> </td> </table> Preliminaries Meta information Table of Contents Index Foreword to first version Main content <table style="color:#009f69"><tr><td width="100px">   1</td><td>Software based</td></tr></table> Security of BIOS/UEFI firmware Custom BIOS/UEFI and which one to use Regarding operating system Which OS? Qubes OS 4.0.3 side-by-side with other operating systems How to ensure installed operating system is not compromised via an evil maid attack, during periods when machine is not meant to be on Regarding how to obtain software Secure downloading Getting an uncompromised smartphone and obtaining software with it Key advantage Downloading to SD cards Transferring downloads to installation media Cost Old or new phone Some other advantages Similar to ‘burner phones’? Whether to use a Raspberry Pi Zero device instead Pros vs Cons Pros: Cons: Conclusion About using a Wi-Fi enabled SD card Detection of malware in software Compiling from source Reproducible builds Using `diff` utilities Full system encryption, full disk encryption (FDE) Malicious sneaky replacement of FDE system with historic clone of system that has known vulnerabilities Description of attack Remedy Bootloader for FDE Factory resets According to device type Web client computers Smartphones Conventional laptops Some other issues Internet connection during reset process Sufficiency Cookies Sandboxing and cloud computing <table style="color:#009f69"><tr><td width="100px">   2</td><td>Passwords and digital keys</td></tr></table> Password security Password managers Multi-step authentication and multi-factor authentication Non-Latin alphabet Concerning certain password attack vectors Screen privacy Keyboard privacy Visual spying of keys pressed Complete occlusion Distance-dependent occlusion (privacy keyboard screen) Using morse code Spying of electronic keyboard signals General visual spying Hiding materially-written passwords Overcoming vulnerabilities in visual encodings Psychic spying of password Protection using password management functionality Protection by thinking little Protection using password encryption With technology Without technology Based on password reuse Disabling TLS security certificates Making sure certificates are genuine Key servers Cross authentication Non-compromised communication of public keys Sending to trusted recipient such that the recipient can hand it over without encountering MITM vulnerabilities, to the end-user Publishing public keys in a “gazette” Piggy-backing over bank transactions and systems Using bank references Using different monetary amounts Using a weak currency Google Authenticator “key and time”-based app for security Tokens for keys External links for further information on security certificates Backing-up security keys and passwords Shamir's Secret Sharing <table style="color:#009f69"><tr><td width="100px">   3</td><td>Wireless Communications</td></tr></table> Wired vs. wireless Shared WiFi Keep communication systems turned off <table style="color:#009f69"><tr><td width="100px">   4</td><td>Digital storage</td></tr></table> General security risks in digital storage USB devices vs. SD cards NAND flash memory vs magnetic storage Rewritable media vs optical ROM discs SD cards and USB memory sticks vs. larger devices Drives able to eject hardware-less media vs. other media More about SD cards How to obtain computer media devices Secure data sanitisation <table style="color:#009f69"><tr><td width="100px">   5</td><td>Some measures that are primarily physical</td></tr></table> Physical isolation and locks Physical measures for securing boot-loader when using full-system encryption Padlock-able laptop bag Metal boxes Combination lock briefcase Physically removing storage component(s) from the rest of the computer system, and then securely storing those components separately Physically securing keys Privacy screens Specifically for goods in physical transit Exploiting unrepeatable patterns for tamper evidence Applying glitter nail varnish to computer screws Tamper-evident security-system ideas Main idea Speculating stronger security again with unrepeatable-pattern principle Similar idea for other circumstances (such as for metal boxes) Perhaps the simplest and best idea Software based tamper checking using security images <table style="color:#009f69"><tr><td width="100px">   6</td><td>Mind-reading attacks</td></tr></table> ‘Inception’ styled attacks <table style="color:#009f69"><tr><td width="100px">   7</td><td>Simple security measures</td></tr></table> Put computer to sleep when not at it Shut down device when not in use Play sound continuously on computing device <table style="color:#009f69"><tr><td width="100px">   8</td><td>Broad security principles</td></tr></table> Stop funding the spies and hackers Report cyber-crime to the police Think in terms of gradual movement along a security-level continuum Minimally-above-average security Publishing security methods User randomly selecting unit from off physical shelves When random is not random Ordering many units of same product Using multiple channels to obtain product Discerning unit least likely to have been compromised Measuring physical properties for authentication Weight Volume Magnetic weight and images Electric field imaging/detection Electro-magentic spectrum Visible spectrum photography Infra-red scanning X rays Microwave testing Radio frequency (RF) imaging/detection Ultrasound Other methods Geospatial Based on which region Time based Based on time passed Example 1 Example 2 Vulnerability when used for software Based on time taken to forge Using most secure window of time Preventing lapses in security DIY security principle “Destroy key when attacked” Relying on high production cost of certain security tokens <table style="color:#009f69"><tr><td width="100px">   9</td><td>What to do when you discover your computer has been hacked</td></tr></table> Backing-up files When to change digital passwords and keys? Further information <table style="color:#009f69"><tr><td width="100px">   10</td><td>Miscellaneous notes</td></tr></table> National Cyber Security Centre Cyber-security standards Deep hardware hacking Cryptocurrency security Using phones and computers as motion detector alarms Appendix <table style="color:#009f69"><tr><td width="100px">   1</td><td>New security inventions requiring a non-trivial investment in new technology</td></tr></table> Cryptocurrency-like mining to increase trust As applied to software As applied to public digital keys (including those used in security certificates) Lock screen with related sound-based security Client-server noise-audio-based secure-password-communication system Port source code to higher-level programming language as a computer-security step having its basis in secure coding Security by pre-loaded private key <table style="color:#009f69"><tr><td width="100px">   2</td><td>Example set-ups & implementations</td></tr></table> <BR> <BR> <table style="padding:0px;margin:0px"> <tr valign="top"><td> Index     (NOT FINISHED). </td><td valign="bottom" style="padding-left:1em;padding-top:3px"> </td> </table> <table><tr><td>2FA</td><td style="padding-left:3em;font-size:x-small;">[see ╱2-factor authentication]</td></tr></table> <table><tr><td>2-factor authentication (2FA) </td><td style="padding-left:3em;font-size:x-small;">[see ╱multi-factor authentication╱2-factor authentication]</td></tr></table> <table><tr><td>2nd hand </td><td style="padding-left:3em;font-size:x-small;">[see ╱second hand]</td></tr></table> <table><tr><td>33c3 </td><td style="padding-left:3em;font-size:x-small;">[see ╱33rd Chaos Communication Congress]</td></tr></table> <table><tr><td>33rd Chaos Communication Congress (33c3) </td><td style="padding-left:3em;font-size:x-small;">[see ╱33rd Chaos Communication Congress]</td></tr></table> <table><tr><td>3D (3D means three dimensional)</td></tr></table> <table><tr><td style="padding-left:3em">3D-optimised hardware </td><td style="padding-left:3em;font-size:x-small;">[see ╱hardware╱3D-optimised hardware]</td></tr></table> <hr> <table><tr><td style="font-size:x-large;color:LightBlue">A</td></tr></table> <table><tr><td>above-average security</td></tr></table> <table><tr><td style="padding-left:3em">minimally-above-average security (broad security principle) </td><td style="padding-left:3em;font-size:x-small;">[see ╱broad security principles╱minimally-above-average security]</td></tr></table> <table><tr><td>age of software, and devices</td></tr></table> <table><tr><td>old</td></tr></table> <table><tr><td style="padding-left:3em">old mobile phone, mobile device (cf. §”Old or new phone”)</td></tr></table> <table><tr><td style="padding-left:3em">old version of software (cf. §”Vulnerability when used for software”)</td></tr></table> <table><tr><td>new </td></tr></table> <table><tr><td style="padding-left:3em">new mobile phone</td></tr></table> <table><tr><td style="padding-left:3em">new software</td></tr></table> <table><tr><td>average security </td><td style="padding-left:3em;font-size:x-small;">[contrasts with ╱above-average security]</td></tr></table> <table><tr><td>account security for your email account </td><td style="padding-left:3em;font-size:x-small;">[see ╱electronic mail╱email account security]</td></tr></table> <table><tr><td>acetone as a glue solvent </td><td style="padding-left:3em;font-size:x-small;">[see ╱glue╱glue solvents╱acetone]</td></tr></table> <table><tr><td>administrator account </td><td style="padding-left:3em;font-size:x-small;">[see ╱operating system╱operating-system login account╱administrator account]</td></tr></table> <table><tr><td>adversary </td><td style="padding-left:3em;font-size:x-small;">[related to ╱computer security attack╱threat model]</td></tr></table> <table><tr><td style="padding-left:3em">intruder</td></tr></table> <table><tr><td style="padding-left:3em">spy</td></tr></table> <table><tr><td style="padding-left:6em">eavesdropper</td></tr></table> <table><tr><td style="padding-left:3em">evil maid</td></tr></table> <table><tr><td style="padding-left:3em">fraudster</td></tr></table> <table><tr><td style="padding-left:3em">security hacker</td></tr></table> <table><tr><td style="padding-left:3em">military</td></tr></table> <table><tr><td style="padding-left:3em">government</td></tr></table> <table><tr><td style="padding-left:3em">Man In The Middle</td></tr></table> <table><tr><td style="padding-left:3em">psychics</td></tr></table> <table><tr><td style="padding-left:3em">secret criminal society</td></tr></table> <table><tr><td>affordable </td><td style="padding-left:3em;font-size:x-small;">[see ╱costs╱affordable]</td></tr></table> <table><tr><td>artificial intelligence (AI)</td></tr></table> <table><tr><td>AI </td><td style="padding-left:3em;font-size:x-small;">[see ╱artificial intelligence]</td></tr></table> <table><tr><td>algorithms </td><td style="padding-left:3em;font-size:x-small;">[see ╱programming╱algorithms]</td></tr></table> <table><tr><td>alphabet </td><td style="padding-left:3em;font-size:x-small;">[see ╱language╱alphabet]</td></tr></table> <table><tr><td>Andrew "bunnie" Huang </td><td style="padding-left:3em;font-size:x-small;">[see ╱persons (individuals named in book)]</td></tr></table> <table><tr><td>Android (Android operating system for mobile devices) </td><td style="padding-left:3em;font-size:x-small;">[see ╱operating system╱different operating systems]</td></tr></table> <table><tr><td>alarm (security alarm)</td></tr></table> <table><tr><td style="padding-left:3em">motion detector alarm</td></tr></table> <table><tr><td style="padding-left:3em">loud alarm</td></tr></table> <table><tr><td>amnesia and security in spite of it </td><td style="padding-left:3em;font-size:x-small;">[see ╱security in spite of amnesia]</td></tr></table> <table><tr><td>antivirus software</td></tr></table> <table><tr><td style="padding-left:3em">antivirus software on Android</td></tr></table> <table><tr><td>app (type of software program)</td></tr></table> <table><tr><td style="padding-left:3em">Google Authenticator (key- and time- based app)</td></tr></table> <table><tr><td style="padding-left:3em">Haven: Keep Watch</td></tr></table> <table><tr><td>Archimedes’ principle </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties╱volume]</td></tr></table> <table><tr><td>asymmetric cryptography </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography]</td></tr></table> <table><tr><td>‘at rest’</td></tr></table> <table><tr><td style="padding-left:3em">‘at rest’ security location</td></tr></table> <table><tr><td style="padding-left:3em">‘at rest’ data</td></tr></table> <table><tr><td style="padding-left:3em">‘at rest’ shape retention (cf. §“Perhaps the simplest and best idea”)</td></tr></table> <table><tr><td>attack (computer security attack)</td></tr></table> <table><tr><td style="padding-left:3em">different classes of attack</td></tr></table> <table><tr><td style="padding-left:6em">'complete fake' attacks</td></tr></table> <table><tr><td style="padding-left:6em">evil maid attack</td></tr></table> <table><tr><td style="padding-left:6em">hardware hacking attack </td><td style="padding-left:3em;font-size:x-small;">[see ╱hack╱security hacking╱hardware hacking.]</td></tr></table> <table><tr><td style="padding-left:6em">health attack (eg. causing fatigue, concentration/memory loss, by use of directed non-lethal energy weapons)</td></tr></table> <table><tr><td style="padding-left:6em">man-in-the-middle (MITM) attack</td></tr></table> <table><tr><td style="padding-left:6em">mind-reading psychic attack</td></tr></table> <table><tr><td style="padding-left:6em">‘Inception’ styled attacks</td></tr></table> <table><tr><td style="padding-left:6em">replay attack</td></tr></table> <table><tr><td style="padding-left:6em">tampering attack</td></tr></table> <table><tr><td style="padding-left:6em">VDU signal interception attack</td></tr></table> <table><tr><td style="padding-left:3em">specific attacks</td></tr></table> <table><tr><td style="padding-left:6em">credential stuffing</td></tr></table> <table><tr><td style="padding-left:6em">malicious sneaky replacement of full-disk encryption system with historic clone of system that has known vulnerabilities</td></tr></table> <table><tr><td style="padding-left:3em">attack vectors</td></tr></table> <table><tr><td style="padding-left:6em">bootloader (of computer system)</td></tr></table> <table><tr><td style="padding-left:6em">computer screen</td></tr></table> <table><tr><td style="padding-left:6em">computer keyboard</td></tr></table> <table><tr><td style="padding-left:6em">device ROM malware</td></tr></table> <table><tr><td style="padding-left:6em">further writes to optical discs that are otherwise seemingly read-only </td></tr></table> <table><tr><td style="padding-left:6em">general visual spying</td></tr></table> <table><tr><td style="padding-left:6em">multi-booting (cf. §”Which OS?”) “...There is unlikely much point in dual-booting between Windows and Linux because if Windows is hacked...” (cf. §”Qubes OS 4.0.3 side-by-side with other operating systems”) “...any such other OS should not be able to access or even ‘touch’ the Qubes OS installation, thereby hopefully safeguarding the Qubes installation from attacks conducted through the other presumably-less-secure OS.”</td></tr></table> <table><tr><td style="padding-left:6em">psychic spying</td></tr></table> <table><tr><td style="padding-left:6em">password reuse</td></tr></table> <table><tr><td style="padding-left:6em">random access memory (see §”Magnetic storage: tapes vs. discs”)</td></tr></table> <table><tr><td style="padding-left:3em">attack window (cf. §Using_most_secure_window_of_time) </td><td style="padding-left:3em;font-size:x-small;">[see ╱window of time╱attack window]</td></tr></table> <table><tr><td style="padding-left:6em">(cf. §”Rewritable media vs optical ROM discs”]</td></tr></table> <table><tr><td style="padding-left:3em">attack surface</td></tr></table> <table><tr><td style="padding-left:3em">“destroy key when attacked” </td><td style="padding-left:3em;font-size:x-small;">[see ╱keys╱digital key╱“destroy key when attacked”]</td></tr></table> <table><tr><td>auditing source code </td><td style="padding-left:3em;font-size:x-small;">[see ╱programming, coding, reprogramming╱source code╱auditing source code]</td></tr></table> <table><tr><td>authentication</td></tr></table> <table><tr><td style="padding-left:3em">authentication keys </td><td style="padding-left:3em;font-size:x-small;">[see ╱key╱digital key╱authentication key] </td></tr></table> <table><tr><td style="padding-left:3em">cross authentication of public-key-cryptography (aka asymmetric cryptography)</td></tr></table> <table><tr><td style="padding-left:3em"> security certificates </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱security certificates╱cross authentication]</td></tr></table> <table><tr><td style="padding-left:3em">measuring physical properties for authentication</td></tr></table> <table><tr><td style="padding-left:3em">testing for security authentication </td><td style="padding-left:3em;font-size:x-small;">[see ╱testing]</td></tr></table> <table><tr><td>auto-power-off of laptop </td><td style="padding-left:3em;font-size:x-small;">[see ╱powering computer systems╱automatic powering off of the laptop]</td></tr></table> <table><tr><td>automatic powering off of the laptop </td><td style="padding-left:3em;font-size:x-small;">[see ╱powering computer systems╱automatic powering off of the laptop]</td></tr></table> <hr> <table><tr><td style="font-size:x-large;color:LightBlue">B</td></tr></table> <table><tr><td>backup, back-up (computer backup)</td></tr></table> <table><tr><td style="padding-left:3em">backing-up before factory reset</td></tr></table> <table><tr><td style="padding-left:3em">backing-up files (computer files)</td></tr></table> <table><tr><td style="padding-left:6em">after discovery of having been hacked</td></tr></table> <table><tr><td style="padding-left:3em">backing-up security keys and passwords </td><td style="padding-left:3em;font-size:x-small;">[contrasts and can complement ╱key╱digital key╱destroying keys]</td></tr></table> <table><tr><td style="padding-left:6em">Shamir's Secret Sharing</td></tr></table> <table><tr><td>bad blocks (on digital storage media) </td><td style="padding-left:3em;font-size:x-small;">[see ╱digital storage╱media╱bad blocks]</td></tr></table> <table><tr><td>balance-of-probabilities </td><td style="padding-left:3em;font-size:x-small;">[see ╱probability╱balance-of-probabilities]</td></tr></table> <table><tr><td>banking (financial banking) </td><td style="padding-left:3em;font-size:x-small;">[see ╱financial╱banking]</td></tr></table> <table><tr><td>bare bones </td><td style="padding-left:3em;font-size:x-small;">[see ╱systems╱properties╱bare bones]</td></tr></table> <table><tr><td>Basic Input Output System (BIOS used in computer boot sequences) </td><td style="padding-left:3em;font-size:x-small;">[see ╱boot╱bootloader╱first-stage boot loader]</td></tr></table> <table><tr><td>‘bells and whistles’ </td><td style="padding-left:3em;font-size:x-small;">[see ╱systems╱properties╱‘bells and whistles’]</td></tr></table> <table><tr><td>best practice (perhaps not complete)</td></tr></table> <table><tr><td style="padding-left:3em">for creating a read-only CD or DVD</td></tr></table> <table><tr><td style="padding-left:3em">for obtaining software</td></tr></table> <table><tr><td style="padding-left:3em">for backing-up files after being hacked</td></tr></table> <table><tr><td>BIOS </td><td style="padding-left:3em;font-size:x-small;">[see ╱Basic Input Output System]</td></tr></table> <table><tr><td>Bitcoin </td><td style="padding-left:3em;font-size:x-small;">[see ╱financial╱currency╱cryptocurrency╱different currencies╱Bitcoin]</td></tr></table> <table><tr><td>blackbox </td><td style="padding-left:3em;font-size:x-small;">[see ╱systems╱properties╱blackbox]</td></tr></table> <table><tr><td>Bluetooth </td><td style="padding-left:3em;font-size:x-small;">[see ╱communication╱wireless communication╱types╱Bluetooth]</td></tr></table> <table><tr><td>boot (computer’s startup sequence)</td></tr></table> <table><tr><td style="padding-left:3em">bootable media</td></tr></table> <table><tr><td style="padding-left:3em">bootkits</td></tr></table> <table><tr><td style="padding-left:3em">bootloader</td></tr></table> <table><tr><td style="padding-left:6em">first-stage boot loader (such as in BIOS or UEFI)</td></tr></table> <table><tr><td style="padding-left:9em">not requiring second stage</td></tr></table> <table><tr><td style="padding-left:12em">Coreboot</td></tr></table> <table><tr><td style="padding-left:12em">Heads (built on top of Coreboot technology)</td></tr></table> <table><tr><td style="padding-left:6em">second-stage boot loader (no content at present)</td></tr></table> <table><tr><td style="padding-left:3em">cold, or warm booting (warm boot is also known as soft off/boot)</td></tr></table> <table><tr><td style="padding-left:6em">cold boot </td><td style="padding-left:3em;font-size:x-small;">[see ╱powering computer systems╱system power states╱powered-off]</td></tr></table> <table><tr><td style="padding-left:6em">soft off/boot, warm boot </td><td style="padding-left:3em;font-size:x-small;">[see ╱powering computer systems╱system power states╱soft off/boot, warm boot]</td></tr></table> <table><tr><td style="padding-left:3em">multi-booting</td></tr></table> <table><tr><td style="padding-left:6em">dual-booting</td></tr></table> <table><tr><td>Boots photo printing (UK) </td><td style="padding-left:3em;font-size:x-small;">[see ╱business╱online printing businesses]</td></tr></table> <table><tr><td>braille </td><td style="padding-left:3em;font-size:x-small;">[see ╱language╱braille]</td></tr></table> <table><tr><td>brain-reading </td><td style="padding-left:3em;font-size:x-small;">[see ╱mental╱mind reading╱brain reading]</td></tr></table> <table><tr><td>broad security principles</td></tr></table> <table><tr><td style="padding-left:3em">“destroy key when attacked” </td><td style="padding-left:3em;font-size:x-small;">[see ╱data destruction╱“destroy key when attacked”]</td></tr></table> <table><tr><td style="padding-left:3em">DIY security principle</td></tr></table> <table><tr><td style="padding-left:3em">geospatial-based broad security principles</td></tr></table> <table><tr><td style="padding-left:3em">measuring physical properties for authentication </td><td style="padding-left:3em;font-size:x-small;">[see ╱authentication╱measuring physical properties for authentication]</td></tr></table> <table><tr><td style="padding-left:3em">minimally-above-average security</td></tr></table> <table><tr><td style="padding-left:3em">ordering many units of same product </td><td style="padding-left:3em;font-size:x-small;">[see ╱order, ordering╱ordering many units of same product]</td></tr></table> <table><tr><td style="padding-left:3em">preventing lapses in security</td></tr></table> <table><tr><td style="padding-left:3em">publishing security methods</td></tr></table> <table><tr><td style="padding-left:3em">relying on high production cost of certain security tokens</td></tr></table> <table><tr><td style="padding-left:3em">report cyber-crime to the police </td><td style="padding-left:3em;font-size:x-small;">[see ╱report, reporting╱report cyber-crime to the police]</td></tr></table> <table><tr><td style="padding-left:3em">stop funding the spies and hackers</td></tr></table> <table><tr><td style="padding-left:3em">think in terms of gradual movement along a security-level continuum</td></tr></table> <table><tr><td style="padding-left:3em">time-based broad security principles</td></tr></table> <table><tr><td style="padding-left:6em">“based on time passed” security principle</td></tr></table> <table><tr><td style="padding-left:6em">“based on time taken to forge” security principle</td></tr></table> <table><tr><td style="padding-left:6em">using most secure window of time</td></tr></table> <table><tr><td style="padding-left:3em">user randomly selecting unit from off physical shelves </td><td style="padding-left:3em;font-size:x-small;">[see ╱business╱shop╱physical shop╱physical shelves]</td></tr></table> <table><tr><td>browser for web/internet </td><td style="padding-left:3em;font-size:x-small;">[see ╱web/internet browser]</td></tr></table> <table><tr><td>building software </td><td style="padding-left:3em;font-size:x-small;">[related to ╱programming]</td></tr></table> <table><tr><td style="padding-left:3em">build from source, compile from source</td></tr></table> <table><tr><td style="padding-left:3em">reproducible builds</td></tr></table> <table><tr><td style="padding-left:6em">detecting malware by using reproducible builds </td><td style="padding-left:3em;font-size:x-small;">[see ╱malware╱detecting malware in source code╱by using reproducible-builds protocol]</td></tr></table> <table><tr><td style="padding-left:3em">compile</td></tr></table> <table><tr><td>bubble wrap </td><td style="padding-left:3em;font-size:x-small;">[see ╱shape flexibility╱bubble wrap]</td></tr></table> <table><tr><td>budget (financial constraint) </td><td style="padding-left:3em;font-size:x-small;">[see ╱costs╱financial constraints]</td></tr></table> <table><tr><td>budget (cheap) </td><td style="padding-left:3em;font-size:x-small;">[see ╱costs╱cheap]</td></tr></table> <table><tr><td>burning, burn (writing CDs, DVDs, etc.) </td><td style="padding-left:3em;font-size:x-small;">[see ╱hardware╱drives and readers╱optical disc drive╱optical disc writers╱writing optical discs╱optical disc writers╱writing optical discs]</td></tr></table> <table><tr><td>burner phones </td><td style="padding-left:3em;font-size:x-small;">[see ╱phones╱mobile phones╱burner phones]</td></tr></table> <table><tr><td>business (intersects with manufacturer, producer)</td></tr></table> <table><tr><td style="padding-left:3em">business models (no content at present)</td></tr></table> <table><tr><td style="padding-left:6em">open-source vs. closed-source (no content at present)</td></tr></table> <table><tr><td style="padding-left:3em">company (business)</td></tr></table> <table><tr><td style="padding-left:6em">company registration number</td></tr></table> <table><tr><td style="padding-left:6em">company registered office</td></tr></table> <table><tr><td style="padding-left:3em">names of different businesses named in book</td></tr></table> <table><tr><td style="padding-left:6em">Boots</td></tr></table> <table><tr><td style="padding-left:6em">GitHub </td><td style="padding-left:3em;font-size:x-small;">[see ╱systems╱collaborative development╱GitHub]</td></tr></table> <table><tr><td style="padding-left:6em">Google</td></tr></table> <table><tr><td style="padding-left:6em">Kodak</td></tr></table> <table><tr><td style="padding-left:6em">Nitrokey</td></tr></table> <table><tr><td style="padding-left:6em">Oracle </td><td style="padding-left:3em;font-size:x-small;">[see ╱Oracle]</td></tr></table> <table><tr><td style="padding-left:6em">PC World</td></tr></table> <table><tr><td style="padding-left:6em">Sandisk</td></tr></table> <table><tr><td style="padding-left:6em">Tesco</td></tr></table> <table><tr><td style="padding-left:6em">Yubico</td></tr></table> <table><tr><td style="padding-left:3em">online printing businesses</td></tr></table> <table><tr><td style="padding-left:6em">Boots</td></tr></table> <table><tr><td style="padding-left:6em">Kodak</td></tr></table> <table><tr><td style="padding-left:6em">Tesco</td></tr></table> <table><tr><td style="padding-left:3em">shop</td></tr></table> <table><tr><td style="padding-left:6em">physical shop</td></tr></table> <table><tr><td style="padding-left:9em">physical shelves</td></tr></table> <table><tr><td style="padding-left:12em"> user randomly selecting unit from off physical shelves (broad security principle)</td></tr></table> <table><tr><td style="padding-left:6em">online shop</td></tr></table> <table><tr><td style="padding-left:6em">second-hand shop</td></tr></table> <table><tr><td style="padding-left:3em">sole trader</td></tr></table> <table><tr><td style="padding-left:3em">small business</td></tr></table> <table><tr><td>byte-for-byte comparison</td></tr></table> <hr> <table><tr><td style="font-size:x-large;color:LightBlue">C</td></tr></table> <table><tr><td>camera </td><td style="padding-left:3em;font-size:x-small;">[related to ╱photography]</td></tr></table> <table><tr><td style="padding-left:3em">camera phone</td></tr></table> <table><tr><td style="padding-left:3em">digital camera</td></tr></table> <table><tr><td>card readers for SD cards </td><td style="padding-left:3em;font-size:x-small;">[see ╱hardware╱digital-storage hardware╱drives and readers╱card readers for SD cards]</td></tr></table> <table><tr><td>cardboard</td></tr></table> <table><tr><td style="padding-left:3em">cardboard </td><td style="padding-left:3em;font-size:x-small;">[see ╱materials╱cardboard]</td></tr></table> <table><tr><td style="padding-left:3em">cardboard “restricted viewing enclosure” </td><td style="padding-left:3em;font-size:x-small;">[see ╱view restriction╱cardboard “restricted viewing enclosure”]</td></tr></table> <table><tr><td>compact disc </td><td style="padding-left:3em;font-size:x-small;">[see ╱digital storage╱media╱non-microchip-based memory╱Random-access Memory╱dis(c|k)-based╱optical╱CDs]</td></tr></table> <table><tr><td>CD </td><td style="padding-left:3em;font-size:x-small;">[see ╱compact disc]</td></tr></table> <table><tr><td>certification authorities (for public-key-cryptography security certificates) </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱security certificates╱certification authorities╱]</td></tr></table> <table><tr><td>certificates for security based on public-key cryptography (aka asymmetric cryptography) </td><td style="padding-left:3em;font-size:x-small;">[see ╱security certificate for public-key cryptography]</td></tr></table> <table><tr><td>channels (purchase channels) </td><td style="padding-left:3em;font-size:x-small;">[see ╱purchasing╱purchase channels]</td></tr></table> <table><tr><td>changing passwords and keys</td></tr></table> <table><tr><td style="padding-left:3em">when to change</td></tr></table> <table><tr><td style="padding-left:3em">changing password to one previously used </td><td style="padding-left:3em;font-size:x-small;">[see ╱password╱password reuse]</td></tr></table> <table><tr><td style="padding-left:3em">changing encryption keys frequently in FDE </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱full-system encryption, full-disk encryption╱frequent changing of encryption keys]</td></tr></table> <table><tr><td>cheap </td><td style="padding-left:3em;font-size:x-small;">[see ╱costs╱cheap]</td></tr></table> <table><tr><td>China </td><td style="padding-left:3em;font-size:x-small;">[see ╱countries mentioned in book╱China]</td></tr></table> <table><tr><td>Chaos Communication Congress </td><td style="padding-left:3em;font-size:x-small;">[see ╱organisations and businesses╱names of non-business organisations╱Chaos Communication Congress]</td></tr></table> <table><tr><td>ChromeOS </td><td style="padding-left:3em;font-size:x-small;">[see ╱operating system╱different operating systems]</td></tr></table> <table><tr><td>Chromebook, Chromebox, Chromebit </td><td style="padding-left:3em;font-size:x-small;">[see ╱personal computer╱different “ready-to-run” PCs marketed as products╱Chromebook, Chromebox, Chromebit]</td></tr></table> <table><tr><td>Chrome web browser </td><td style="padding-left:3em;font-size:x-small;">[see ╱web/internet browser]</td></tr></table> <table><tr><td>Cipher </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱cipher]</td></tr></table> <table><tr><td>client (in server-client computing model) </td><td style="padding-left:3em;font-size:x-small;">[see ╱server-client computing model╱client]</td></tr></table> <table><tr><td>cling film </td><td style="padding-left:3em;font-size:x-small;">[see ╱materials╱transparent material╱cling film]</td></tr></table> <table><tr><td>cloned physical key </td><td style="padding-left:3em;font-size:x-small;">[see ╱key╱physical key╱cloned key]</td></tr></table> <table><tr><td>closed/open source </td><td style="padding-left:3em;font-size:x-small;">[see ╱open/closed source]</td></tr></table> <table><tr><td>clouds </td><td style="padding-left:3em;font-size:x-small;">[see ╱cloud computing╱clouds]</td></tr></table> <table><tr><td>cloud computing </td><td style="padding-left:3em;font-size:x-small;">[related to ╱server-client computing model] </td><td style="padding-left:3em;font-size:x-small;">[related to ╱sandboxing]</td></tr></table> <table><tr><td style="padding-left:3em">clouds</td></tr></table> <table><tr><td style="padding-left:6em">Oracle Cloud </td><td style="padding-left:3em;font-size:x-small;">[see ╱Oracle╱Oracle Cloud]</td></tr></table> <table><tr><td>code (source code) </td><td style="padding-left:3em;font-size:x-small;">[see ╱programming╱source code]</td></tr></table> <table><tr><td>coding (programming) </td><td style="padding-left:3em;font-size:x-small;">[see ╱programming]</td></tr></table> <table><tr><td>cognitive power </td><td style="padding-left:3em;font-size:x-small;">[see ╱mental╱cognitive power]</td></tr></table> <table><tr><td>coin tossing </td><td style="padding-left:3em;font-size:x-small;">[see ╱random╱generating randomness╱coin tossing]</td></tr></table> <table><tr><td>collaborative development </td><td style="padding-left:3em;font-size:x-small;">[see ╱systems╱collaborative development]</td></tr></table> <table><tr><td>comparing files (computer files) </td><td style="padding-left:3em;font-size:x-small;">[see ╱file╱file comparison]</td></tr></table> <table><tr><td>'complete fake' attacks (computer security attack) </td><td style="padding-left:3em;font-size:x-small;">[see ╱attack╱different classes of attack]</td></tr></table> <table><tr><td>computer screen lock/locking (aka screensaver lock)</td></tr></table> <table><tr><td>computer security attack </td><td style="padding-left:3em;font-size:x-small;">[see ╱attack]</td></tr></table> <table><tr><td>communication</td></tr></table> <table><tr><td style="padding-left:3em">communication protocol</td></tr></table> <table><tr><td style="padding-left:6em">zero-knowledge authentication protocol</td></tr></table> <table><tr><td style="padding-left:3em">communication protocols for computing devices</td></tr></table> <table><tr><td style="padding-left:6em">protocols that are also standards</td></tr></table> <table><tr><td style="padding-left:9em">for wireless communication</td></tr></table> <table><tr><td style="padding-left:12em">Bluetooth</td></tr></table> <table><tr><td style="padding-left:12em">NFC (Near-Field Communication)</td></tr></table> <table><tr><td style="padding-left:12em">WiFi</td></tr></table> <table><tr><td style="padding-left:9em">internet protocols</td></tr></table> <table><tr><td style="padding-left:12em">Hypertext Transfer Protocol Secure (HTTPS) </td><td style="padding-left:3em;font-size:x-small;">[related to ╱Transport Layer Security]</td></tr></table> <table><tr><td style="padding-left:6em;color:red">Transport Layer Security should be added here?</td></tr></table> <table><tr><td style="padding-left:3em;color:red">communicating trust in “proofs of work” associated with cryptocurrencies</td></tr></table> <table><tr><td style="padding-left:3em;color:red">devices used for communication?</td></tr></table> <table><tr><td style="padding-left:6em;color:red">thin/fat clients?</td></tr></table> <table><tr><td style="padding-left:6em;color:red">mobile phone?</td></tr></table> <table><tr><td style="padding-left:3em">file transfer, file transmission, sending files </td><td style="padding-left:3em;font-size:x-small;">[see ╱file╱file transfer, file transmission, sending files]</td></tr></table> <table><tr><td style="padding-left:3em;color:red">gazettes as a means for overcoming MITM attacks</td></tr></table> <table><tr><td style="padding-left:3em;color:red">interception of communication in MITM attacks</td></tr></table> <table><tr><td style="padding-left:6em;color:red">family of attacks (blocking comms, imposture, stealing/spying of confidential information)</td></tr></table> <table><tr><td style="padding-left:3em;color:red">Add language?</td></tr></table> <table><tr><td style="padding-left:3em">modes of message-based communication</td></tr></table> <table><tr><td style="padding-left:6em">electronic mail (email)</td></tr></table> <table><tr><td style="padding-left:9em">email account security (email account security)</td></tr></table> <table><tr><td style="padding-left:12em">cf. two-step security for Google account</td></tr></table> <table><tr><td style="padding-left:12em">importance of electronic-mail account security (cf. §“National Cyber Security Centre”)</td></tr></table> <table><tr><td style="padding-left:9em">email encryption </td><td style="padding-left:3em;font-size:x-small;">[covered under ..╱email security]</td></tr></table> <table><tr><td style="padding-left:9em">email security (email security) </td><td style="padding-left:3em;font-size:x-small;">[related to ..╱email account security]</td></tr></table> <table><tr><td style="padding-left:12em">PGP (Pretty Good Privacy) cryptography for email security (could perhaps do with more content here, cf. Main_content╱Broad_security_principle#Example_2)</td></tr></table> <table><tr><td style="padding-left:15em">encrypting emails (no content at present)</td></tr></table> <table><tr><td style="padding-left:15em">digitally signing emails (cf. Main_content/Broad_security_principles#Example_2)</td></tr></table> <table><tr><td style="padding-left:15em">PGP cryptography in general</td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱Pretty Good Privacy cryptography]</td></tr></table> <table><tr><td style="padding-left:6em">software for communication</td></tr></table> <table><tr><td style="padding-left:9em">web/internet browser</td></tr></table> <table><tr><td style="padding-left:6em">text-message</td></tr></table> <table><tr><td style="padding-left:3em;color:red">OEM software as a means for communicating software to end-users?</td></tr></table> <table><tr><td style="padding-left:3em;color:red">over the internet?</td></tr></table> <table><tr><td style="padding-left:3em;color:red">add postal mail?</td></tr></table> <table><tr><td style="padding-left:3em;color:red">printing as part of communication process</td></tr></table> <table><tr><td style="padding-left:3em">secure communication</td></tr></table> <table><tr><td style="padding-left:6em;color:red">using encryption?</td></tr></table> <table><tr><td style="padding-left:9em;color:red">add public-key cryptography?</td></tr></table> <table><tr><td style="padding-left:9em;color:red">add cipher?</td></tr></table> <table><tr><td style="padding-left:9em;color:red">key scrambler?</td></tr></table> <table><tr><td style="padding-left:6em">of files (no content at present) (╱file╱file/file transfer, file transmission, sending files╱secure communication of files) (cf.Appendix invention).</td></tr></table> <table><tr><td style="padding-left:6em;color:red">of public keys? Non-compromised communication of public keys. (cf. Appendix invention).</td></tr></table> <table><tr><td style="padding-left:6em;color:red">of security certificates by pre-installing them on computing devices?</td></tr></table> <table><tr><td style="padding-left:6em;color:red">of passwords? (flavour-encoding, etc.) (cf. Appendix invention)</td></tr></table> <table><tr><td style="padding-left:3em;color:red">add website publishing here?</td></tr></table> <table><tr><td style="padding-left:3em;color:red">server-client model vs. peer-to-peer model, for communications</td></tr></table> <table><tr><td style="padding-left:3em;color:red">add I/O communication?</td></tr></table> <table><tr><td style="padding-left:3em">wireless/wired communication</td></tr></table> <table><tr><td style="padding-left:6em">wireless</td></tr></table> <table><tr><td style="padding-left:9em">types</td></tr></table> <table><tr><td style="padding-left:12em">WiFi</td></tr></table> <table><tr><td style="padding-left:15em">WiFi protocol </td><td style="padding-left:3em;font-size:x-small;">[see ╱communication╱communication protocols for computing devices╱protocols that are also standards╱WiFi]</td></tr></table> <table><tr><td style="padding-left:15em">WiFi network </td><td style="padding-left:3em;font-size:x-small;">[see ..╱..╱..╱networks╱WiFi network]</td></tr></table> <table><tr><td style="padding-left:15em">WiFi router </td><td style="padding-left:3em;font-size:x-small;">[see ╱hardware╱router╱WiFi router]</td></tr></table> <table><tr><td style="padding-left:12em">NFC (Near-Field Communication)</td></tr></table> <table><tr><td style="padding-left:15em">NFC protocol </td><td style="padding-left:3em;font-size:x-small;">[see ╱communication╱communication protocols for computing devices╱protocols that are also standards╱NFC]</td></tr></table> <table><tr><td style="padding-left:12em">Bluetooth</td></tr></table> <table><tr><td style="padding-left:15em">Bluetooth protocol </td><td style="padding-left:3em;font-size:x-small;">[see ╱communication╱communication protocols for computing devices╱protocols that are also standards╱NFC]</td></tr></table> <table><tr><td style="padding-left:9em">hardware</td></tr></table> <table><tr><td style="padding-left:12em">WiFi router </td><td style="padding-left:3em;font-size:x-small;">[see ╱hardware╱router╱WiFi router]</td></tr></table> <table><tr><td style="padding-left:9em">networks</td></tr></table> <table><tr><td style="padding-left:12em">WiFi network</td></tr></table> <table><tr><td style="padding-left:6em">wired</td></tr></table> <table><tr><td style="padding-left:9em">types</td></tr></table> <table><tr><td style="padding-left:12em">USB</td></tr></table> <table><tr><td style="padding-left:12em">PS/2</td></tr></table> <table><tr><td style="padding-left:12em">serial/parallel port (no content at present)</td></tr></table> <table><tr><td style="padding-left:12em">ethernet</td></tr></table> <table><tr><td>conscious thoughts </td><td style="padding-left:3em;font-size:x-small;">[see ╱mental╱conscious thoughts]</td></tr></table> <table><tr><td>company (business) </td><td style="padding-left:3em;font-size:x-small;">[see ╱business, company]</td></tr></table> <table><tr><td>compile </td><td style="padding-left:3em;font-size:x-small;">[see ╱building software╱compile]</td></tr></table> <table><tr><td>computer analysis</td></tr></table> <table><tr><td>computer case</td></tr></table> <table><tr><td>cookies</td></tr></table> <table><tr><td>combination lock</td></tr></table> <table><tr><td style="padding-left:3em">combination lock briefcase</td></tr></table> <table><tr><td>computer operating costs </td><td style="padding-left:3em;font-size:x-small;">[see ╱costs╱operating costs╱computer operating costs]</td></tr></table> <table><tr><td>computer peripheral</td></tr></table> <table><tr><td style="padding-left:3em">USB keyboards</td></tr></table> <table><tr><td style="padding-left:3em">Bluetooth devices</td></tr></table> <table><tr><td style="padding-left:3em">memory sticks </td></tr></table> <table><tr><td>computer screws</td></tr></table> <table><tr><td>computer security standards </td><td style="padding-left:3em;font-size:x-small;">[see ╱cybersecurity standards]</td></tr></table> <table><tr><td>concealment</td></tr></table> <table><tr><td>Coreboot (BIOS/UEFI boot firmware system) </td><td style="padding-left:3em;font-size:x-small;">[see ╱boot╱bootloader, first-stage boot loader]</td></tr></table> <table><tr><td>coronavirus disease 2019</td></tr></table> <table><tr><td>costs</td></tr></table> <table><tr><td style="padding-left:3em">affordable </td><td style="padding-left:3em;font-size:x-small;">[related to ..╱cheap] (cf. UV tinting of already-owned glasses)</td></tr></table> <table><tr><td style="padding-left:3em">cheap (cf. low cost, cf. low price, cf. paper-based scrambler [which is cheap], cf Report cybercrime to the police) </td><td style="padding-left:3em;font-size:x-small;">[because OEM software is often cheap means for obtaining software, related to ╱software╱OEM software] [because open source is often cheap, associated with ╱open/closed source╱open source]</td></tr></table> <table><tr><td style="padding-left:3em">expensive</td></tr></table> <table><tr><td style="padding-left:6em">relying on high production cost of certain security tokens (broad security principle)</td><td style="padding-left:3em;font-size:x-small;">[see ╱broad security principles, relying on high production cost of certain security tokens]</td></tr></table> <table><tr><td style="padding-left:3em">financial constraints, budget </td><td style="padding-left:3em;font-size:x-small;">[related to ..╱affordable] </td><td style="padding-left:3em;font-size:x-small;">[see ╱financial, financial constraints]</td></tr></table> <table><tr><td style="padding-left:3em">operating costs</td></tr></table> <table><tr><td style="padding-left:6em">computer operating costs</td></tr></table> <table><tr><td style="padding-left:3em">stop funding the spies and hackers (broad security principle) </td><td style="padding-left:3em;font-size:x-small;">[see ╱broad security principles╱stop funding the spies and hackers]</td></tr></table> <table><tr><td>countries mentioned in book</td></tr></table> <table><tr><td style="padding-left:3em">China</td></tr></table> <table><tr><td style="padding-left:3em">United Kingdom</td></tr></table> <table><tr><td style="padding-left:3em">United States of America</td></tr></table> <table><tr><td style="padding-left:3em">Germany</td></tr></table> <table><tr><td style="padding-left:3em">Holland</td></tr></table> <table><tr><td style="padding-left:3em">Netherlands </td><td style="padding-left:3em;font-size:x-small;">[see ..╱Holland]</td></tr></table> <table><tr><td>COVID-19 </td><td style="padding-left:3em;font-size:x-small;">[see ╱coronavirus disease]</td></tr></table> <table><tr><td>cracking passwords </td><td style="padding-left:3em;font-size:x-small;">[see ╱password cracking]</td></tr></table> <table><tr><td>credential stuffing</td></tr></table> <table><tr><td>crime reporting to the police, for cyber-crime </td><td style="padding-left:3em;font-size:x-small;">[see ╱report, reporting╱report cyber-crime to the police]</td></tr></table> <table><tr><td>cross authentication</td></tr></table> <table><tr><td style="padding-left:3em">cross authentication of digital security certificates </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱security certificates╱cross authentication]</td></tr></table> <table><tr><td>crumpling plastic bag</td></tr></table> <table><tr><td>cryptocurrencies/cryptocurrency </td><td style="padding-left:3em;font-size:x-small;">[see ╱financial╱cryptocurrency]</td></tr></table> <table><tr><td> </td></tr></table> <table><tr><td>cryptography, cryptographic</td></tr></table> <table><tr><td style="padding-left:3em">Algorithms </td><td style="padding-left:3em;font-size:x-small;">[covered under ..╱protocols and algorithms]</td></tr></table> <table><tr><td style="padding-left:3em">cipher</td></tr></table> <table><tr><td style="padding-left:3em">cryptocurrencies/cryptocurrency </td><td style="padding-left:3em;font-size:x-small;">[see ╱financial╱cryptocurrency]</td></tr></table> <table><tr><td style="padding-left:3em">disk encryption</td></tr></table> <table><tr><td style="padding-left:6em">full-disk encryption (FDE) </td><td style="padding-left:3em;font-size:x-small;">[see ..╱full-system encryption, full-disk encryption]</td></tr></table> <table><tr><td style="padding-left:3em">encrypting emails using PGP security </td><td style="padding-left:3em;font-size:x-small;">[covered under ..╱protocols and algorithms╱public-key cryptography╱Pretty Good Privacy cryptography╱PGP cryptography for email security]</td></tr></table> <table><tr><td style="padding-left:3em">encrypting a full system, a full disk </td><td style="padding-left:3em;font-size:x-small;">[see ..╱full-system encryption, full-disk encryption]</td></tr></table> <table><tr><td style="padding-left:3em">encryption using passwords </td><td style="padding-left:3em;font-size:x-small;">[see ╱password╱password encryption]</td></tr></table> <table><tr><td style="padding-left:3em">FDE </td><td style="padding-left:3em;font-size:x-small;">[see ..╱full-system encryption, full-disk encryption]</td></tr></table> <table><tr><td style="padding-left:3em">full-system encryption, full-disk encryption (FDE)</td></tr></table> <table><tr><td style="padding-left:6em">frequent changing of encryption keys</td></tr></table> <table><tr><td style="padding-left:3em">password encryption </td><td style="padding-left:3em;font-size:x-small;">[see ╱password╱password encryption]</td></tr></table> <table><tr><td style="padding-left:3em">protocols and algorithms</td></tr></table> <table><tr><td style="padding-left:6em">asymmetric cryptography (aka public-key cryptography) </td><td style="padding-left:6em;font-size:x-small;">[see ..╱public-key cryptography╱]</td></tr></table> <table><tr><td style="padding-left:6em">public-key cryptography (aka asymmetric cryptography, using public-private key pair, digital cryptography)</td></tr></table> <table><tr><td style="padding-left:9em">cryptocurrencies/cryptocurrency </td><td style="padding-left:3em;font-size:x-small;">[see ╱financial╱cryptocurrency╱public-key cryptography]</td></tr></table> <table><tr><td style="padding-left:9em">digital signing/signatures of files (no particular content at present) </td></tr></table> <table><tr><td style="padding-left:9em">public key</td></tr></table> <table><tr><td style="padding-left:9em">private key</td></tr></table> <table><tr><td style="padding-left:12em">private key</td></tr></table> <table><tr><td style="padding-left:12em">security by pre-loaded private key </td><td style="padding-left:3em;font-size:x-small;">[see ╱systems╱design╱security by pre-loaded private key]</td></tr></table> <table><tr><td style="padding-left:9em">Pretty Good Privacy (PGP) cryptography</td></tr></table> <table><tr><td style="padding-left:12em">PGP cryptography for email security </td><td style="padding-left:3em;font-size:x-small;">[see ╱electronic mail╱email security╱PGP cryptography for email security]</td></tr></table> <table><tr><td style="padding-left:12em">PGP public key</td></tr></table> <table><tr><td style="padding-left:12em">software</td></tr></table> <table><tr><td style="padding-left:15em">GNU Privacy Guard (GPG) </td><td style="padding-left:3em;font-size:x-small;">[see ╱software tools, software utilities╱cryptography╱GPG]</td></tr></table> <table><tr><td style="padding-left:9em">Transport Layer Security (TLS) </td><td style="padding-left:3em;font-size:x-small;">[related to ╱Hypertext Transfer Protocol Secure]</td></tr></table> <table><tr><td style="padding-left:12em">TLS security certificates</td></tr></table> <table><tr><td style="padding-left:9em">security certificates</td></tr></table> <table><tr><td style="padding-left:12em">certification authorities</td></tr></table> <table><tr><td style="padding-left:12em">cross authentication</td></tr></table> <table><tr><td style="padding-left:12em">security certificate</td></tr></table> <table><tr><td style="padding-left:12em">specific types</td></tr></table> <table><tr><td style="padding-left:15em">TLS security certificates </td><td style="padding-left:3em;font-size:x-small;">[see ..╱..╱..╱Transport Layer Security╱TLS security certificates]</td></tr></table> <table><tr><td style="padding-left:9em">signing/signatures </td><td style="padding-left:3em;font-size:x-small;">[see ..╱digital signing/signatures]</td></tr></table> <table><tr><td style="padding-left:3em">security certificates for public-key-cryptography (aka asymmetric-cryptography) authentication </td><td style="padding-left:3em;font-size:x-small;">[see ..╱protocols and algorithms╱public-key cryptography╱security certificates]</td></tr></table> <table><tr><td style="padding-left:3em">security tokens for public-key cryptography </td><td style="padding-left:3em;font-size:x-small;">[see ╱security tokens╱security tokens for public-key cryptography]</td></tr></table> <table><tr><td style="padding-left:3em">software</td></tr></table> <table><tr><td style="padding-left:6em">Google Authenticator (key- and time- based app) </td><td style="padding-left:3em;font-size:x-small;">[see ╱app╱Google Authenticator]</td></tr></table> <table><tr><td style="padding-left:6em"> cryptographic software tools, software utilities </td><td style="padding-left:3em;font-size:x-small;">[see ╱software tools, software utilities╱cryptography]</td></tr></table> <table><tr><td style="padding-left:3em">system encryption</td></tr></table> <table><tr><td style="padding-left:6em">full-system encryption </td><td style="padding-left:3em;font-size:x-small;">[see ..╱full-system encryption, full-disk encryption]</td></tr></table> <table><tr><td style="padding-left:3em">tokens for public-key cryptography </td><td style="padding-left:3em;font-size:x-small;">[see ╱security tokens╱security tokens for public-key cryptography]</td></tr></table> <table><tr><td>currency </td><td style="padding-left:3em;font-size:x-small;">[see ╱financial╱currency]</td></tr></table> <table><tr><td>cushioning, cushion</td></tr></table> <table><tr><td>custom, customisation</td></tr></table> <table><tr><td style="padding-left:3em">custom BIOS/UEFI</td></tr></table> <table><tr><td>cybersecurity standards </td><td style="padding-left:3em;font-size:x-small;">[see ╱standards╱standards for security╱cybersecurity]</td></tr></table> <hr> <table><tr><td style="font-size:x-large;color:LightBlue">D</td></tr></table> <table><tr><td>‘data at rest’ </td><td style="padding-left:3em;font-size:x-small;">[see ╱‘at rest’ data]</td></tr></table> <table><tr><td>data structures</td></tr></table> <table><tr><td>data destruction </td><td style="padding-left:3em;font-size:x-small;">[contrasts and can complement ╱backup╱]</td></tr></table> <table><tr><td style="padding-left:3em">“destroy key when attacked” </td><td style="padding-left:3em;font-size:x-small;">[contrasts and can complement ╱backup╱backing-up security keys and passwords]</td></tr></table> <table><tr><td style="padding-left:3em">crypto shredding </td><td style="padding-left:3em;font-size:x-small;">[contrasts and can complement ╱backup╱backing-up security keys and passwords]</td></tr></table> <table><tr><td style="padding-left:3em">data sanitisation</td></tr></table> <table><tr><td style="padding-left:6em">data erasure</td></tr></table> <table><tr><td style="padding-left:6em">physical destruction</td></tr></table> <table><tr><td>data erasure</td></tr></table> <table><tr><td>data sanitisation</td></tr></table> <table><tr><td>deleting files </td><td style="padding-left:3em;font-size:x-small;">[see ╱file╱file deletion]</td></tr></table> <table><tr><td>design of systems </td><td style="padding-left:3em;font-size:x-small;">[see ╱systems╱design]</td></tr></table> <table><tr><td>“destroy key when attacked” (broad security principle) </td><td style="padding-left:3em;font-size:x-small;">[see ╱broad security principles╱“destroy key when attacked”]</td></tr></table> <table><tr><td>destructive measuring </td><td style="padding-left:3em;font-size:x-small;">[see ╱measuring method types]</td></tr></table> <table><tr><td>detecting malware in source code </td><td style="padding-left:3em;font-size:x-small;">[see ╱malware╱detecting malware in source code]</td></tr></table> <table><tr><td style="padding-left:3em">deteriorate (cf. deterioration in factory resets)</td></tr></table> <table><tr><td style="padding-left:3em">deterioration due to frequent changing of encryption keys in FDE </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱full-system encryption, full-disk encryption╱frequent changing of encryption keys]</td></tr></table> <table><tr><td>diamonds</td></tr></table> <table><tr><td style="padding-left:3em">imitation diamonds (see dedicated index entry)</td></tr></table> <table><tr><td>dice (rolling dice) </td><td style="padding-left:3em;font-size:x-small;">[see ╱random╱generating randomness╱rolling dice]</td></tr></table> <table><tr><td>diffraction </td><td style="padding-left:3em;font-size:x-small;">[see ╱optical effects]</td></tr></table> <table><tr><td>diff </td><td style="padding-left:3em;font-size:x-small;">[see ╱software tools, software utilities╱file comparison╱diff]</td></tr></table> <table><tr><td>diffoscope </td><td style="padding-left:3em;font-size:x-small;">[see ╱software tools, software utilities╱file comparison]</td></tr></table> <table><tr><td>digital camera </td><td style="padding-left:3em;font-size:x-small;">[see ╱camera╱digital camera]</td></tr></table> <table><tr><td>digital certificates for security based on public-key cryptography (aka asymmetric cryptography) </td><td style="padding-left:3em;font-size:x-small;">[see ╱security certificate for public-key cryptography]</td></tr></table> <table><tr><td>digital signing/signatures </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱digital signing/signatures]</td></tr></table> <table><tr><td>digital storage</td></tr></table> <table><tr><td style="padding-left:3em">media</td></tr></table> <table><tr><td style="padding-left:6em">bad blocks</td></tr></table> <table><tr><td style="padding-left:6em">microchip-based computer memory (hardware-based)</td></tr></table> <table><tr><td style="padding-left:9em">ROM (Read-only Memory) </td><td style="padding-left:3em;font-size:x-small;">[see ╱memory╱ROM]</td></tr></table> <table><tr><td style="padding-left:9em">RAM (Random-access Memory) </td><td style="padding-left:3em;font-size:x-small;">[see ╱memory ╱RAM]</td></tr></table> <table><tr><td style="padding-left:9em">flash memory </td><td style="padding-left:3em;font-size:x-small;">[see ╱memory╱flash memory]</td></tr></table> <table><tr><td style="padding-left:6em">non-microchip-based memory (hardware-less)</td></tr></table> <table><tr><td style="padding-left:9em">all types, alphabetical listing</td></tr></table> <table><tr><td style="padding-left:12em">compact disc (CD) </td><td style="padding-left:3em;font-size:x-small;">[see ..╱..╱Random-access Memory╱dis(c|k)-based╱optical/compact disc]</td></tr></table> <table><tr><td style="padding-left:12em">digital versatile disc (DVD) </td><td style="padding-left:3em;font-size:x-small;">[see ..╱..╱Random-access Memory╱dis(c|k)-based╱optical╱digital versatile disc]</td></tr></table> <table><tr><td style="padding-left:12em">floppy disk </td><td style="padding-left:3em;font-size:x-small;">[see ..╱..╱Random-access Memory╱dis(c|k)-based╱magnetic╱floppy disk]</td></tr></table> <table><tr><td style="padding-left:12em">hard disk drive (HDD) </td><td style="padding-left:3em;font-size:x-small;">[see ..╱..╱Random-access Memory╱dis(c|k)-based╱magnetic╱hard disk drive]</td></tr></table> <table><tr><td style="padding-left:12em">holographic data storage </td><td style="padding-left:3em;font-size:x-small;">[see ..╱..╱Random-access Memory╱holographic data storage]</td></tr></table> <table><tr><td style="padding-left:12em">magnetic-optical tape </td><td style="padding-left:3em;font-size:x-small;">[see ..╱..╱Sequential-access Memory╱tape╱magnetic-optical]</td></tr></table> <table><tr><td style="padding-left:12em">magnetic-optical discs </td><td style="padding-left:3em;font-size:x-small;">[see ..╱..╱Random-access Memory╱dis(c|k)-based╱magnetic-optical╱magnetic-optical discs]</td></tr></table> <table><tr><td style="padding-left:12em">magnetic tape (eg. cassette tapes) </td><td style="padding-left:3em;font-size:x-small;">[see ..╱..╱Sequential-access Memory╱tape╱magnetic]</td></tr></table> <table><tr><td style="padding-left:12em">optical tape </td><td style="padding-left:3em;font-size:x-small;">[see ..╱..╱Sequential-access Memory╱tape╱optical]</td></tr></table> <table><tr><td style="padding-left:9em">SAM </td><td style="padding-left:3em;font-size:x-small;">[see ..╱Sequential-access Memory]</td></tr></table> <table><tr><td style="padding-left:9em">Sequential-access Memory (SAM)</td></tr></table> <table><tr><td style="padding-left:12em">tape</td></tr></table> <table><tr><td style="padding-left:15em">optical</td></tr></table> <table><tr><td style="padding-left:15em">magnetic</td></tr></table> <table><tr><td style="padding-left:15em">magnetic-optical</td></tr></table> <table><tr><td style="padding-left:15em">drives for such media </td><td style="padding-left:3em;font-size:x-small;">[see ╱hardware╱digital-storage hardware╱drives and readers╱tape drives]</td></tr></table> <table><tr><td style="padding-left:9em">RAM</td><td style="padding-left:9em;font-size:x-small;">[see ..╱Random-access Memory]</td></tr></table> <table><tr><td style="padding-left:9em">Random-access Memory (RAM)</td></tr></table> <table><tr><td style="padding-left:12em">dis(c|k)-based</td></tr></table> <table><tr><td style="padding-left:15em">optical</td></tr></table> <table><tr><td style="padding-left:18em">optical ROM (read-only memory) discs </td><td style="padding-left:3em;font-size:x-small;">[read-only CDs, read-only DVDs, etc.]</td></tr></table> <table><tr><td style="padding-left:21em">writing (aka burning) optical ROM discs</td></tr></table> <table><tr><td style="padding-left:24em">as live DVDs, or live CDs</td></tr></table> <table><tr><td style="padding-left:18em">burner for such media </td><td style="padding-left:3em;font-size:x-small;">[see ..╱writer for such media]</td></tr></table> <table><tr><td style="padding-left:18em">compact disc (CD)</td></tr></table> <table><tr><td style="padding-left:18em">digital versatile disc (DVD)</td></tr></table> <table><tr><td style="padding-left:18em">drive for such media </td><td style="padding-left:3em;font-size:x-small;">[see ╱hardware╱digital-storage hardware╱drives and readers╱optical disc drives]</td></tr></table> <table><tr><td style="padding-left:18em">writer (burner) for such media </td><td style="padding-left:3em;font-size:x-small;">[covered under ..╱‘drive for such media’]</td></tr></table> <table><tr><td style="padding-left:15em">magnetic</td></tr></table> <table><tr><td style="padding-left:18em">floppy disk</td></tr></table> <table><tr><td style="padding-left:18em">drive for floppy disks </td><td style="padding-left:3em;font-size:x-small;">[see ╱hardware╱digital-storage hardware╱drives and readers╱floppy disk drive]</td></tr></table> <table><tr><td style="padding-left:15em">hard disk drive (HDD)</td></tr></table> <table><tr><td style="padding-left:12em">magnetic-optical</td></tr></table> <table><tr><td style="padding-left:15em">magnetic-optical discs</td></tr></table> <table><tr><td style="padding-left:9em">holographic data storage (no information at present)</td></tr></table> <table><tr><td style="padding-left:3em">hardware </td><td style="padding-left:3em;font-size:x-small;">[see ╱hardware╱digital-storage hardware]</td></tr></table> <table><tr><td>disk encryption</td></tr></table> <table><tr><td style="padding-left:3em">full-disk encryption (FDE) </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱full-system encryption, full-disk encryption]</td></tr></table> <table><tr><td>DIY </td><td style="padding-left:3em;font-size:x-small;">[see ╱Do It Yourself]</td></tr></table> <table><tr><td>downloads, downloading</td></tr></table> <table><tr><td>Do It Yourself (DIY)</td></tr></table> <table><tr><td style="padding-left:3em">DIY ultrasound imaging kit </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties╱images]</td></tr></table> <table><tr><td style="padding-left:3em">DIY security principle (broad security principle) </td><td style="padding-left:3em;font-size:x-small;">[see ╱broad security principles╱DIY security principle]</td></tr></table> <table><tr><td>drives (computer drive) and readers (card readers for computer systems) </td><td style="padding-left:3em;font-size:x-small;">[see ╱hardware╱digital-storage hardware╱drives and readers╱]</td></tr></table> <table><tr><td>dual-booting (a special instance of multi-booting) </td><td style="padding-left:3em;font-size:x-small;">[see ╱boot╱multi-booting]</td></tr></table> <table><tr><td>Digital Video Disc </td><td style="padding-left:3em;font-size:x-small;">[see ╱Digital Versatile Disc]</td></tr></table> <table><tr><td>Digital Versatile Disc </td><td style="padding-left:3em;font-size:x-small;">[see ╱digital storage╱media╱non-microchip-based memory╱Random-access Memory╱dis(c|k)-based╱optical╱DVDs]</td></tr></table> <table><tr><td>DVD </td><td style="padding-left:3em;font-size:x-small;">[see ╱Digital Versatile Disc]</td></tr></table> <hr> <table><tr><td style="font-size:x-large;color:LightBlue">E</td></tr></table> <table><tr><td>eavesdropper, eavesdropping </td><td style="padding-left:3em;font-size:x-small;">[see ╱spy╱eavesdropper]</td></tr></table> <table><tr><td>Eiffel (Eiffel programming language) </td><td style="padding-left:3em;font-size:x-small;">[see ╱programming╱programming languages╱Eiffel]</td></tr></table> <table><tr><td>electronic keyboard signals</td></tr></table> <table><tr><td>electric fields </td></tr></table> <table><tr><td style="padding-left:3em">electric field imaging </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties╱image]</td></tr></table> <table><tr><td>electronic mail </td><td style="padding-left:3em;font-size:x-small;">[see ╱communication╱electronic mail]</td></tr></table> <table><tr><td>electromagnetic </td></tr></table> <table><tr><td style="padding-left:3em">electromagnetic radiation</td></tr></table> <table><tr><td style="padding-left:3em">electromagnetic spectrum</td></tr></table> <table><tr><td>email </td><td style="padding-left:3em;font-size:x-small;">[see ╱communication╱electronic mail]</td></tr></table> <table><tr><td>EM radiation </td><td style="padding-left:3em;font-size:x-small;">[see ╱electromagnetic radiation]</td></tr></table> <table><tr><td>embedded</td></tr></table> <table><tr><td style="padding-left:3em">embedded microcontrollers</td></tr></table> <table><tr><td>emoji </td><td style="padding-left:3em;font-size:x-small;">[see ╱language╱emoji]</td></tr></table> <table><tr><td>emulators (type of software that emulates another software)</td></tr></table> <table><tr><td style="padding-left:3em">Wine Is Not an Emulator (Wine) (Windows emulator for Unix-like operating systems)</td></tr></table> <table><tr><td>engineering</td></tr></table> <table><tr><td>encryption </td><td style="padding-left:3em;font-size:x-small;">[covered under ╱cryptography, cryptographic╱]</td></tr></table> <table><tr><td>epoxy resin</td></tr></table> <table><tr><td>espionage </td><td style="padding-left:3em;font-size:x-small;">[see ╱spy]</td></tr></table> <table><tr><td>ethernet</td></tr></table> <table><tr><td>error correction</td></tr></table> <table><tr><td style="padding-left:3em">error correction algorithms</td></tr></table> <table><tr><td>Essex police </td><td style="padding-left:3em;font-size:x-small;">[see ╱police]</td></tr></table> <table><tr><td>evil maid attack </td><td style="padding-left:3em;font-size:x-small;">[see ╱attack╱different classes of attack]</td></tr></table> <table><tr><td>Expensive </td><td style="padding-left:3em;font-size:x-small;">[see ╱costs╱expensive]</td></tr></table> <hr> <table><tr><td style="font-size:x-large;color:LightBlue">F</td></tr></table> <table><tr><td>factory resets</td></tr></table> <table><tr><td>fail safe</td></tr></table> <table><tr><td>fantasy (fiction)</td></tr></table> <table><tr><td>fat clients </td><td style="padding-left:3em;font-size:x-small;">[see ╱server-client computing model╱client╱thin/fat clients╱fat clients]</td></tr></table> <table><tr><td>FDE (full-disk encryption, full-system encryption) </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱full-system encryption, full-disk encryption]</td></tr></table> <table><tr><td>file (computer file) </td><td style="padding-left:3em;font-size:x-small;">[related to ╱digital storage]</td></tr></table> <table><tr><td style="padding-left:3em">backing up files </td><td style="padding-left:3em;font-size:x-small;">[see ╱backup╱backing up files]</td></tr></table> <table><tr><td style="padding-left:3em">digital-signing of files, and the use of such signatures </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱digital signing/signatures╱of files]</td></tr></table> <table><tr><td style="padding-left:3em">file comparison</td></tr></table> <table><tr><td style="padding-left:6em">to detect malware introductions when using reproducible-builds protocol</td></tr></table> <table><tr><td style="padding-left:6em">byte-for-byte comparison </td><td style="padding-left:3em;font-size:x-small;">[see ╱byte-for-byte comparison for general treatment of byte-for-byte comparison]</td></tr></table> <table><tr><td style="padding-left:6em">software tools and utilities </td><td style="padding-left:3em;font-size:x-small;">[see ╱software tools, software utilities╱file comparison]</td></tr></table> <table><tr><td style="padding-left:3em">file deletion (no particular content at present)</td></tr></table> <table><tr><td style="padding-left:6em">recoverable deletion (no particular content at present)</td></tr></table> <table><tr><td style="padding-left:6em">data sanitisation </td><td style="padding-left:3em;font-size:x-small;">[falls under ╱data destruction╱data sanitisation]</td></tr></table> <table><tr><td style="padding-left:3em">file transfer, file transmission, sending files</td></tr></table> <table><tr><td style="padding-left:6em">downloads, downloading (no particular content at present) </td><td style="padding-left:3em;font-size:x-small;">[falls under ╱downloads, downloading]</td></tr></table> <table><tr><td style="padding-left:6em">secure communication of files </td><td style="padding-left:3em;font-size:x-small;">[see ╱secure communication╱of files]</td></tr></table> <table><tr><td style="padding-left:3em">malware in files (no particular content at present) </td><td style="padding-left:3em;font-size:x-small;">[see ╱malware╱malware in files]</td></tr></table> <table><tr><td>forge, forgery</td></tr></table> <table><tr><td style="padding-left:3em">“based on time taken to forge” broad security principle </td><td style="padding-left:3em;font-size:x-small;">[see ╱broad security principles╱time-based broad security principles╱“based on time taken to forge” security principle]</td></tr></table> <table><tr><td>financial </td><td style="padding-left:3em;font-size:x-small;">[related to ╱costs]</td></tr></table> <table><tr><td style="padding-left:3em">banking</td></tr></table> <table><tr><td style="padding-left:6em">bank references (transaction references)</td></tr></table> <table><tr><td style="padding-left:6em">bank transactions </td><td style="padding-left:3em;font-size:x-small;">[see ╱financial╱financial transactions╱bank transactions]</td></tr></table> <table><tr><td style="padding-left:6em">bank systems </td><td style="padding-left:3em;font-size:x-small;">[see ╱financial╱financial systems╱bank systems]</td></tr></table> <table><tr><td style="padding-left:6em">bank transfer</td></tr></table> <table><tr><td style="padding-left:6em">bank branch</td></tr></table> <table><tr><td style="padding-left:3em">currency</td></tr></table> <table><tr><td style="padding-left:6em">weak currency</td></tr></table> <table><tr><td style="padding-left:6em">money</td></tr></table> <table><tr><td style="padding-left:9em">monetary amounts</td></tr></table> <table><tr><td style="padding-left:6em">cryptocurrency</td></tr></table> <table><tr><td style="padding-left:9em">authentication coins</td></tr></table> <table><tr><td style="padding-left:9em">different currencies</td></tr></table> <table><tr><td style="padding-left:12em">Bitcoin</td></tr></table> <table><tr><td style="padding-left:15em">Bitcoin keys </td><td style="padding-left:3em;font-size:x-small;">[see ..╱..╱..╱cryptocurrency keys╱Bitcoin keys]</td></tr></table> <table><tr><td style="padding-left:12em">cryptocurrency keys</td></tr></table> <table><tr><td style="padding-left:15em">Bitcoin keys</td></tr></table> <table><tr><td style="padding-left:12em">cryptocurrency security </td><td style="padding-left:3em;font-size:x-small;">[see ╱standards╱security standards╱cryptocurrency]</td></tr></table> <table><tr><td style="padding-left:12em">cryptocurrency systems </td><td style="padding-left:3em;font-size:x-small;">[see ╱financial╱financial systems╱cryptocurrency systems]</td></tr></table> <table><tr><td style="padding-left:12em">cryptocurrency transactions </td><td style="padding-left:3em;font-size:x-small;">[see ╱financial╱financial transactions╱cryptocurrency transactions]</td></tr></table> <table><tr><td style="padding-left:12em">mining cryptocurrency</td></tr></table> <table><tr><td style="padding-left:12em">proof of work</td></tr></table> <table><tr><td style="padding-left:12em">public-key cryptography (using public-private key pair, aka asymmetric cryptography)</td></tr></table> <table><tr><td style="padding-left:15em">public-key cryptography in general </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography]</td></tr></table> <table><tr><td style="padding-left:3em">financial constraints, budget </td><td style="padding-left:3em;font-size:x-small;">[see ╱costs╱financial constraints╱budget]</td></tr></table> <table><tr><td style="padding-left:3em">financial systems</td></tr></table> <table><tr><td style="padding-left:6em">bank systems</td></tr></table> <table><tr><td style="padding-left:6em">cryptocurrency systems (no particular information at present)</td></tr></table> <table><tr><td style="padding-left:3em">financial transactions</td></tr></table> <table><tr><td style="padding-left:6em">bank transactions</td></tr></table> <table><tr><td style="padding-left:6em">cryptocurrency (such as Bitcoin) transactions</td></tr></table> <table><tr><td style="padding-left:3em">refund</td></tr></table> <table><tr><td style="padding-left:3em">security in finance</td></tr></table> <table><tr><td style="padding-left:6em">cryptocurrency security </td><td style="padding-left:3em;font-size:x-small;">[see ╱standards╱security standards╱cryptocurrency]</td></tr></table> <table><tr><td style="padding-left:6em">using bank branches</td></tr></table> <table><tr><td style="padding-left:3em">treasure map </td><td style="padding-left:3em;font-size:x-small;">[see ╱treasure map]</td></tr></table> <table><tr><td>fingerprint</td></tr></table> <table><tr><td>firmware</td></tr></table> <table><tr><td>flash/flashing</td></tr></table> <table><tr><td style="padding-left:3em">flash cells</td></tr></table> <table><tr><td>flash memory </td><td style="padding-left:3em;font-size:x-small;">[see ╱memory╱flash memory]</td></tr></table> <table><tr><td>flavours</td></tr></table> <table><tr><td>floppy disk </td><td style="padding-left:3em;font-size:x-small;">[see ╱digital storage╱non-microchip-based memory╱Random-access Memory╱dis(c|k)-based╱magnetic╱floppy disk]</td></tr></table> <table><tr><td>foam </td></tr></table> <table><tr><td style="padding-left:3em">foam peanuts</td></tr></table> <table><tr><td>foil</td></tr></table> <table><tr><td style="padding-left:3em">reflective foil</td></tr></table> <table><tr><td>form factor</td></tr></table> <table><tr><td>fraud</td></tr></table> <table><tr><td>full-system encryption, full-disk encryption (FDE) </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱full-system encryption, full-disk encryption]</td></tr></table> <hr> <table><tr><td style="font-size:x-large;color:LightBlue">G</td></tr></table> <table><tr><td>gazette</td></tr></table> <table><tr><td>Gas Chromatography Mass Spectrometry machine</td></tr></table> <table><tr><td>GC-MS machine </td><td style="padding-left:3em;font-size:x-small;">[see ╱Gas Chromatography Mass Spectrometry]</td></tr></table> <table><tr><td>GDPR </td><td style="padding-left:3em;font-size:x-small;">[see ╱General Data Protection Regulation]</td></tr></table> <table><tr><td>General Data Protection Regulation </td><td style="padding-left:3em;font-size:x-small;">[see ╱legislation╱GDPR]</td></tr></table> <table><tr><td>geographic areas </td><td style="padding-left:3em;font-size:x-small;">[see ╱geospatial]</td></tr></table> <table><tr><td>geospatial</td></tr></table> <table><tr><td style="padding-left:3em">geographic areas, geographies</td></tr></table> <table><tr><td style="padding-left:3em">see countries mentioned in book</td></tr></table> <table><tr><td style="padding-left:3em">geospatial-based broad security principles </td><td style="padding-left:3em;font-size:x-small;">[see ╱broad security principles╱geospatial-based broad security principles]</td></tr></table> <table><tr><td>Germany </td><td style="padding-left:3em;font-size:x-small;">[see ╱countries mentioned in book╱Germany]</td></tr></table> <table><tr><td>GitHub </td><td style="padding-left:3em;font-size:x-small;">[see ╱systems╱collaborative development╱GitHub]</td></tr></table> <table><tr><td>Glacier protocol </td><td style="padding-left:3em;font-size:x-small;">[see ╱standards╱security standards]</td></tr></table> <table><tr><td>glare </td><td style="padding-left:3em;font-size:x-small;">[see ╱optical effects]</td></tr></table> <table><tr><td>glasses (looking glasses, spectacles)</td></tr></table> <table><tr><td>glitter nail varnish</td></tr></table> <table><tr><td>glue</td></tr></table> <table><tr><td style="padding-left:3em">glue solvents</td></tr></table> <table><tr><td style="padding-left:6em">acetone</td></tr></table> <table><tr><td style="padding-left:3em">super glue</td></tr></table> <table><tr><td>Google</td></tr></table> <table><tr><td style="padding-left:3em">Google Authenticator (key- and time- based app) </td><td style="padding-left:3em;font-size:x-small;">[see ╱apps]</td></tr></table> <table><tr><td>government</td></tr></table> <table><tr><td>GNU’s-Not-Unix! Privacy Guard (GPG) </td><td style="padding-left:3em;font-size:x-small;">[see ╱software tools, software utilities╱cryptography╱GPG]</td></tr></table> <table><tr><td>GNU Privacy Guard (GPG) </td><td style="padding-left:3em;font-size:x-small;">[see ╱software tools, software utilities╱cryptography╱GPG]</td></tr></table> <table><tr><td>GPG </td><td style="padding-left:3em;font-size:x-small;">[see ╱software tools, software utilities╱cryptography╱GPG]</td></tr></table> <table><tr><td>Greek alphabet </td><td style="padding-left:3em;font-size:x-small;">[see ╱language╱alphabet╱non-latin alphabet╱Greek alphabet]</td></tr></table> <table><tr><td>graphical user interface (GUI) (for computing)</td></tr></table> <table><tr><td>gravitational weight </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties╱weight]</td></tr></table> <table><tr><td>GUI </td><td style="padding-left:3em;font-size:x-small;">[see ╱graphical user interface]</td></tr></table> <hr> <table><tr><td style="font-size:x-large;color:LightBlue">H</td></tr></table> <table><tr><td>hack</td></tr></table> <table><tr><td style="padding-left:3em">hacker culture</td></tr></table> <table><tr><td style="padding-left:3em">security hacking</td></tr></table> <table><tr><td style="padding-left:6em">backing up files after discovery of having been hacked </td><td style="padding-left:3em;font-size:x-small;">[see ╱backup╱backing up files╱after discovery of having been hacked]</td></tr></table> <table><tr><td style="padding-left:6em">hardware hacking</td></tr></table> <table><tr><td style="padding-left:9em">deep hardware hacking</td></tr></table> <table><tr><td style="padding-left:6em">mindset of hackers</td></tr></table> <table><tr><td style="padding-left:6em">stop funding the spies and hackers (broad security principle) </td><td style="padding-left:3em;font-size:x-small;">[see ╱broad security principles╱stop funding the spies and hackers]</td></tr></table> <table><tr><td>hand-made paper </td><td style="padding-left:3em;font-size:x-small;">[see ╱natural hand-made paper]</td></tr></table> <table><tr><td>hardware (computer hardware)</td></tr></table> <table><tr><td style="padding-left:3em">digital-storage hardware</td></tr></table> <table><tr><td style="padding-left:6em">drives (computer drive) and readers (card readers for computer systems)</td></tr></table> <table><tr><td style="padding-left:9em">card readers for SD cards </td><td style="padding-left:3em;font-size:x-small;">[see ╱memory </td><td style="padding-left:3em;font-size:x-small;">[microchip-based computer memory]╱flash memory╱Secure Digital cards╱readers]</td></tr></table> <table><tr><td style="padding-left:9em">floppy disk drive</td></tr></table> <table><tr><td style="padding-left:9em">optical disc drives</td></tr></table> <table><tr><td style="padding-left:12em">writer (aka burner)</td></tr></table> <table><tr><td style="padding-left:15em">writing (aka burning) optical discs</td></tr></table> <table><tr><td style="padding-left:18em">writing (aka burning) optical ROM discs (can be DVDs, CDs)</td><td style="padding-left:3em;font-size:x-small;">[see ╱digital storage╱non-microchip-based memory╱Random-access Memory╱dis(c|k)-based╱optical╱optical ROM discs╱writing optical ROM discs]</td></tr></table> <table><tr><td style="padding-left:9em">tape drives</td></tr></table> <table><tr><td style="padding-left:3em">in relation to media</td></tr></table> <table><tr><td style="padding-left:6em">hardware-less media (for digital storage) </td><td style="padding-left:3em;font-size:x-small;">[see ╱digital storage╱media╱non-microchip-based memory]</td></tr></table> <table><tr><td style="padding-left:6em">hardware-based media (for digital storage) </td><td style="padding-left:3em;font-size:x-small;">[see ╱digital storage╱media╱non-microchip-based memory]</td></tr></table> <table><tr><td style="padding-left:3em">hardware hacking </td><td style="padding-left:3em;font-size:x-small;">[see ╱hack╱security hacking╱hardware hacking]</td></tr></table> <table><tr><td style="padding-left:3em">hardware considered as either open-source or closed-source</td></tr></table> <table><tr><td style="padding-left:6em">open-source hardware </td><td style="padding-left:3em;font-size:x-small;">[opposite of ..╱closed-source hardware]</td></tr></table> <table><tr><td style="padding-left:9em">Novena open-source computing hardware platform</td></tr></table> <table><tr><td style="padding-left:9em">(cf. USB device firmware specifications being more open)</td></tr></table> <table><tr><td style="padding-left:6em">closed-source hardware </td><td style="padding-left:3em;font-size:x-small;">[opposite of ..╱open-source hardware]</td></tr></table> <table><tr><td style="padding-left:9em">(cf. SD card firmware not having open specifications?)</td></tr></table> <table><tr><td style="padding-left:6em">open/closed source in general </td><td style="padding-left:3em;font-size:x-small;">[see ╱open/closed source]</td></tr></table> <table><tr><td style="padding-left:3em">processor</td></tr></table> <table><tr><td style="padding-left:6em">processor idle time</td></tr></table> <table><tr><td style="padding-left:6em">processor-hour work</td></tr></table> <table><tr><td style="padding-left:3em">router</td></tr></table> <table><tr><td style="padding-left:6em">WiFi router</td></tr></table> <table><tr><td style="padding-left:3em">trustable hardware</td></tr></table> <table><tr><td style="padding-left:3em">hardware optimisation</td></tr></table> <table><tr><td style="padding-left:6em">3D-optimised hardware</td></tr></table> <table><tr><td style="padding-left:3em">hardware researchers/specialists</td></tr></table> <table><tr><td style="padding-left:6em">Andrew Bunnie Huang</td></tr></table> <table><tr><td style="padding-left:6em">Trammel Hudson</td></tr></table> <table><tr><td>hard disk drive </td><td style="padding-left:3em;font-size:x-small;">[see ╱digital storage╱non-microchip-based memory╱Random-access Memory╱dis(c|k)-based╱magnetic╱hard disk drive]</td></tr></table> <table><tr><td>Haven: Keep Watch </td><td style="padding-left:3em;font-size:x-small;">[see ╱apps]</td></tr></table> <table><tr><td>HDD </td><td style="padding-left:3em;font-size:x-small;">[see ╱hard disk drive]</td></tr></table> <table><tr><td>Heads (BIOS/UEFI boot firmware system) </td><td style="padding-left:3em;font-size:x-small;">[see ╱boot╱bootloader╱first-stage boot loader]</td></tr></table> <table><tr><td>hibernate (a computer’s hibernate mode) </td><td style="padding-left:3em;font-size:x-small;">[see ╱powering computer systems╱system power states╱hibernate]</td></tr></table> <table><tr><td>higher-level programming language </td><td style="padding-left:3em;font-size:x-small;">[see ╱programming╱programming languages╱higher-level programming language]</td></tr></table> <table><tr><td>high-risk, high-sensitivity</td></tr></table> <table><tr><td>historic version of the software </td><td style="padding-left:3em;font-size:x-small;">[see ╱old software, old devices]</td></tr></table> <table><tr><td>historic software (historic version of the software) </td><td style="padding-left:3em;font-size:x-small;">[see ╱historic version of the software]</td></tr></table> <table><tr><td>hoax </td></tr></table> <table><tr><td style="padding-left:3em">deceptive fake (cf. forgery) (cf. evil maid attack where computer is replaced with deceptive fake) cf. “A counter-argument to using this protocol is that adversaries with supercomputers can easily fake such numbers of coins…..“</td></tr></table> <table><tr><td>Holland </td><td style="padding-left:3em;font-size:x-small;">[see ╱countries mentioned in book╱Holland]</td></tr></table> <table><tr><td>hologram, holography, holographic</td></tr></table> <table><tr><td style="padding-left:3em">holographic data storage </td><td style="padding-left:3em;font-size:x-small;">[see ╱digital storage╱non-microchip-based memory╱Random-access Memory╱holographic data storage]</td></tr></table> <table><tr><td>home and mobile working </td><td style="padding-left:3em;font-size:x-small;">[related to ╱remote working]</td></tr></table> <table><tr><td>home made</td></tr></table> <table><tr><td>hotel</td></tr></table> <table><tr><td>HTTPS </td><td style="padding-left:3em;font-size:x-small;">[see ╱communication╱communication protocols for computing devices╱protocols that are also standards╱ Hypertext Transfer Protocol Secure╱]</td></tr></table> <table><tr><td>Hypertext Transfer Protocol Secure </td><td style="padding-left:3em;font-size:x-small;">[see ╱communication╱communication protocols for computing devices╱protocols that are also standards╱Hypertext Transfer Protocol Secure╱]</td></tr></table> <hr> <table><tr><td style="font-size:x-large;color:LightBlue">I</td></tr></table> <table><tr><td>image</td></tr></table> <table><tr><td style="padding-left:3em">magnetic image </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties╱image]</td></tr></table> <table><tr><td style="padding-left:3em">magnetic resonance imaging </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties╱magnetic resonance imaging]</td></tr></table> <table><tr><td style="padding-left:3em">visual image </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties╱image]</td></tr></table> <table><tr><td style="padding-left:3em">radio-frequency imaging </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties╱image]</td></tr></table> <table><tr><td style="padding-left:3em">RF imaging </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties╱image]</td></tr></table> <table><tr><td style="padding-left:3em">electric field imaging </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties╱image]</td></tr></table> <table><tr><td style="padding-left:3em">photography </td><td style="padding-left:3em;font-size:x-small;">[see ╱photography]</td></tr></table> <table><tr><td style="padding-left:3em">T ray </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties╱image╱t ray]</td></tr></table> <table><tr><td style="padding-left:3em">X ray </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties╱image╱x ray]</td></tr></table> <table><tr><td style="padding-left:3em">ultrasound image </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties╱image╱ultrasound image]</td></tr></table> <table><tr><td>imitation diamonds</td></tr></table> <table><tr><td>‘Inception’ (the film)</td></tr></table> <table><tr><td style="padding-left:3em">‘Inception’ styled attacks </td><td style="padding-left:3em;font-size:x-small;">[see ╱attack╱different classes of attack╱mind-reading psychic attack╱‘Inception’ styled attacks]</td></tr></table> <table><tr><td>deep hardware hacking </td><td style="padding-left:3em;font-size:x-small;">[see ╱hack╱security hacking╱hardware hacking╱deep hardware hacking]</td></tr></table> <table><tr><td>industrial radiography</td></tr></table> <table><tr><td>infra-red scanning </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties]</td></tr></table> <table><tr><td>infrared filter </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties]</td></tr></table> <table><tr><td>ink</td></tr></table> <table><tr><td style="padding-left:3em">ink paper marbling </td><td style="padding-left:3em;font-size:x-small;">[see ╱paper╱ink paper marbling]</td></tr></table> <table><tr><td>input/output (input and output aspect of computing hardware)</td></tr></table> <table><tr><td>I/O </td><td style="padding-left:3em;font-size:x-small;">[see ╱Input/Output]</td></tr></table> <table><tr><td>infra red </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties╱ infra red]</td></tr></table> <table><tr><td>installation media</td></tr></table> <table><tr><td>installation software </td><td style="padding-left:3em;font-size:x-small;">[see ╱software╱installation software]</td></tr></table> <table><tr><td>intellectual property</td></tr></table> <table><tr><td style="padding-left:3em">intellectual property concerning source code and designs</td></tr></table> <table><tr><td style="padding-left:6em">open source </td><td style="padding-left:3em;font-size:x-small;">[opposite of ..╱closed source]</td></tr></table> <table><tr><td style="padding-left:9em">open source in general </td><td style="padding-left:3em;font-size:x-small;">[see ╱open/closed source╱open source]</td></tr></table> <table><tr><td style="padding-left:6em">closed source </td><td style="padding-left:3em;font-size:x-small;">[opposite of ..╱open source]</td></tr></table> <table><tr><td style="padding-left:9em">closed source in general </td><td style="padding-left:3em;font-size:x-small;">[see ╱open/closed source╱closed source]</td></tr></table> <table><tr><td>internal Read-Only Memory (of a computer system)</td></tr></table> <table><tr><td>internal ROM </td><td style="padding-left:3em;font-size:x-small;">[see ╱internal Read-Only Memory]</td></tr></table> <table><tr><td>internet</td></tr></table> <table><tr><td>internet research (cf. internet searching)</td></tr></table> <table><tr><td>internet bandwidth, internet quota</td></tr></table> <table><tr><td>internet browser </td><td style="padding-left:3em;font-size:x-small;">[see ╱web/internet browser]</td></tr></table> <table><tr><td>inventions for security </td><td style="padding-left:3em;font-size:x-small;">[see ╱security invention]</td></tr></table> <table><tr><td>isolation</td></tr></table> <table><tr><td style="padding-left:3em">physical isolation</td></tr></table> <table><tr><td style="padding-left:3em">software isolation</td></tr></table> <hr> <table><tr><td style="font-size:x-large;color:LightBlue">K</td></tr></table> <table><tr><td>keyboard (computer keyboard)</td></tr></table> <table><tr><td>keyboard privacy</td></tr></table> <table><tr><td>key</td></tr></table> <table><tr><td style="padding-left:3em">digital key</td></tr></table> <table><tr><td style="padding-left:6em">asymmetric cryptography </td><td style="padding-left:3em;font-size:x-small;">[aka public-key cryptography] </td><td style="padding-left:3em;font-size:x-small;">[see ..╱public-key cryptography╱]</td></tr></table> <table><tr><td style="padding-left:6em">authentication key</td></tr></table> <table><tr><td style="padding-left:6em">backing-up security keys </td><td style="padding-left:3em;font-size:x-small;">[covered under ╱backup╱backing-up security keys and passwords]</td></tr></table> <table><tr><td style="padding-left:6em">destroying keys </td><td style="padding-left:3em;font-size:x-small;">[contrasts and can complement ╱backup╱backing-up security keys and passwords]</td></tr></table> <table><tr><td style="padding-left:9em">crypto shredding </td><td style="padding-left:3em;font-size:x-small;">[see ╱data destruction╱crypto shredding]</td></tr></table> <table><tr><td style="padding-left:9em">“destroy key when attacked” </td><td style="padding-left:3em;font-size:x-small;">[see ╱data destruction╱“destroy key when attacked”]</td></tr></table> <table><tr><td style="padding-left:6em">frequent changing of encryption keys in FDE </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱full-system encryption, full-disk encryption╱frequent changing of encryption keys]</td></tr></table> <table><tr><td style="padding-left:6em">public-key cryptography (using public-private key pair, aka asymmetric cryptography)</td></tr></table> <table><tr><td style="padding-left:9em">PGP (Pretty Good Privacy) public key </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱PGP public key]</td></tr></table> <table><tr><td style="padding-left:9em">private key </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱private key]</td></tr></table> <table><tr><td style="padding-left:9em">public key </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱public key]</td></tr></table> <table><tr><td style="padding-left:9em">Bitcoin keys </td><td style="padding-left:3em;font-size:x-small;">[see ╱financial╱currency╱cryptocurrency╱different currencies╱Bitcoin╱Bitcoin keys]</td></tr></table> <table><tr><td style="padding-left:6em">tokens for public-key-cryptography keys </td><td style="padding-left:3em;font-size:x-small;">[see ╱security tokens╱security tokens for public-key cryptography]</td></tr></table> <table><tr><td style="padding-left:3em">physical key </td><td style="padding-left:3em;font-size:x-small;">[related to ╱physically lock, physical lock╱physical -key lock]</td></tr></table> <table><tr><td style="padding-left:6em">cloned key </td><td style="padding-left:3em;font-size:x-small;">[see ╱cloned key]</td></tr></table> <table><tr><td>key loggers</td></tr></table> <table><tr><td>key scrambler (aka keyboard scrambler)</td></tr></table> <table><tr><td>key servers</td></tr></table> <table><tr><td>keystrokes</td></tr></table> <table><tr><td>keyboard (for computer)</td></tr></table> <table><tr><td>Kodak online printing (UK business) </td><td style="padding-left:3em;font-size:x-small;">[see ╱business╱online printing businesses]</td></tr></table> <table><tr><td>Kosagi (Team Kosagi)</td></tr></table> <hr> <table><tr><td style="font-size:x-large;color:LightBlue">L</td></tr></table> <table><tr><td>language</td></tr></table> <table><tr><td style="padding-left:3em">alphabet</td></tr></table> <table><tr><td style="padding-left:6em">Latin alphabet</td></tr></table> <table><tr><td style="padding-left:6em">non-Latin alphabet</td></tr></table> <table><tr><td style="padding-left:9em">Greek alphabet</td></tr></table> <table><tr><td style="padding-left:6em">unicode</td></tr></table> <table><tr><td style="padding-left:3em">non-verbal symbol</td></tr></table> <table><tr><td>word symbol</td></tr></table> <table><tr><td style="padding-left:3em">braille</td></tr></table> <table><tr><td style="padding-left:3em">emoji</td></tr></table> <table><tr><td style="padding-left:3em">Morse code</td></tr></table> <table><tr><td style="padding-left:3em">programming language </td><td style="padding-left:3em;font-size:x-small;">[see ╱programming╱programming language]</td></tr></table> <table><tr><td style="padding-left:3em">pronunciation</td></tr></table> <table><tr><td style="padding-left:3em">unicode</td></tr></table> <table><tr><td>lapse(s) in security </td><td style="padding-left:3em;font-size:x-small;">[see ╱security lapse]</td></tr></table> <table><tr><td>laptop</td></tr></table> <table><tr><td>Latin alphabet </td><td style="padding-left:3em;font-size:x-small;">[see ╱language╱alphabet]</td></tr></table> <table><tr><td>legislation (hardly any content at present)</td></tr></table> <table><tr><td style="padding-left:3em">GDPR (General Data Protection Regulation)</td></tr></table> <table><tr><td>lenticular printing</td></tr></table> <table><tr><td>library</td></tr></table> <table><tr><td>light rays</td></tr></table> <table><tr><td>Linux (OS) </td><td style="padding-left:3em;font-size:x-small;">[see ╱operating system╱different operating systems]</td></tr></table> <table><tr><td>live DVD, live CD</td></tr></table> <table><tr><td>location (geospatial) </td><td style="padding-left:3em;font-size:x-small;">[see ╱geospatial]</td></tr></table> <table><tr><td>lock (physical) </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical lock]</td></tr></table> <table><tr><td>locking, and lock for, computer screen </td><td style="padding-left:3em;font-size:x-small;">[see ╱computer screen lock/locking]</td></tr></table> <table><tr><td>login, log-in, log-off</td></tr></table> <table><tr><td style="padding-left:3em">log-off (no particular content at present?)</td></tr></table> <table><tr><td>loud alarm </td><td style="padding-left:3em;font-size:x-small;">[see ╱alarm╱loud alarm]</td></tr></table> <table><tr><td>low cost </td><td style="padding-left:3em;font-size:x-small;">[see ╱costs╱cheap]</td></tr></table> <hr> <table><tr><td style="font-size:x-large;color:LightBlue">M</td></tr></table> <table><tr><td>magnetic fields, magnetism, magnet, magnetic</td></tr></table> <table><tr><td style="padding-left:3em">magnetic tape (computer storage, eg. cassette tapes) </td><td style="padding-left:3em;font-size:x-small;">[see ╱digital storage╱non-microchip-based memory╱Sequential-access Memory╱tape╱magnetic]</td></tr></table> <table><tr><td style="padding-left:3em">magnetic-optical </td><td style="padding-left:3em;font-size:x-small;">[see ╱magnetic-optical]</td></tr></table> <table><tr><td style="padding-left:3em">magnetic weight </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties╱weight]</td></tr></table> <table><tr><td style="padding-left:3em">magnetic image </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties╱image]</td></tr></table> <table><tr><td style="padding-left:3em">magnetic resonance imaging </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties╱magnetic resonance imaging]</td></tr></table> <table><tr><td style="padding-left:3em">MRI </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties╱magnetic resonance imaging]</td></tr></table> <table><tr><td>magnetic-optical</td></tr></table> <table><tr><td style="padding-left:3em">computer storage media</td></tr></table> <table><tr><td style="padding-left:6em"> tape </td><td style="padding-left:3em;font-size:x-small;">[see ╱digital storage╱non-microchip-based memory╱Sequential-access Memory╱tape╱magnetic-optical]</td></tr></table> <table><tr><td style="padding-left:6em">discs </td><td style="padding-left:3em;font-size:x-small;">[see ╱digital storage╱non-microchip-based memory╱Random-access Memory╱dis(c|k)-based╱magnetic╱magnetic-optical discs]</td></tr></table> <table><tr><td>magnetic tape (computer storage, eg. cassette tapes) </td><td style="padding-left:3em;font-size:x-small;">[see ╱digital storage╱non-microchip-based memory╱sequential-access Memory╱tape╱magnetic]</td></tr></table> <table><tr><td>malware</td></tr></table> <table><tr><td style="padding-left:3em">malware in files (no particular content at present)</td></tr></table> <table><tr><td style="padding-left:3em">detecting malware in source code</td></tr></table> <table><tr><td style="padding-left:6em">by using reproducible-builds protocol</td></tr></table> <table><tr><td style="padding-left:9em">in general</td></tr></table> <table><tr><td style="padding-left:9em">file-comparison aspect </td><td style="padding-left:3em;font-size:x-small;">[see ╱file╱file comparison╱to detect malware introductions when using reproducible-builds protocol]</td></tr></table> <table><tr><td>manufacturer, producer (intersects with business) (manufacturers and producers named in book)</td></tr></table> <table><tr><td style="padding-left:3em">OEM </td><td style="padding-left:3em;font-size:x-small;">[see ╱original equipment manufacturer]</td></tr></table> <table><tr><td style="padding-left:3em">cf. provider’s authentication server in §“Security by pre-loaded private key”</td></tr></table> <table><tr><td style="padding-left:3em"><different manufacturer names></td></tr></table> <table><tr><td style="padding-left:3em">Sandisk</td></tr></table> <table><tr><td style="padding-left:3em">Qubes</td></tr></table> <table><tr><td>marbling (paper marbling) </td><td style="padding-left:3em;font-size:x-small;">[see ╱paper╱paper marbling]</td></tr></table> <table><tr><td>Mark Fernandes </td><td style="padding-left:3em;font-size:x-small;">[see ╱persons]</td></tr></table> <table><tr><td>mass storage</td></tr></table> <table><tr><td>materials</td></tr></table> <table><tr><td style="padding-left:3em">acetone </td><td style="padding-left:3em;font-size:x-small;">[see ..╱glue solvents╱acetone]</td></tr></table> <table><tr><td style="padding-left:3em">bubble wrap </td><td style="padding-left:3em;font-size:x-small;">[see ..╱unrepeatable-pattern materials╱shape-retentive materials that are very easily deformed╱bubble wrap]</td></tr></table> <table><tr><td style="padding-left:3em">cardboard</td></tr></table> <table><tr><td style="padding-left:3em">cling film </td><td style="padding-left:3em;font-size:x-small;">[see ..╱transparent material╱cling film]</td></tr></table> <table><tr><td style="padding-left:3em">crumpling plastic material </td><td style="padding-left:3em;font-size:x-small;">[see ..╱shape-retentive material that is very easily deformed╱plastic that crumples]</td></tr></table> <table><tr><td style="padding-left:3em">foam peanuts </td><td style="padding-left:3em;font-size:x-small;">[see ..╱unrepeatable-pattern materials╱polystyrene pieces╱foam peanuts]</td></tr></table> <table><tr><td style="padding-left:3em">foil (reflective foil) that is shredded </td><td style="padding-left:3em;font-size:x-small;">[see ..╱unrepeatable-pattern materials╱shredded╱shredded reflective foil]</td></tr></table> <table><tr><td style="padding-left:3em">glitter nail varnish </td><td style="padding-left:3em;font-size:x-small;">[see ..╱unrepeatable-pattern materials╱glitter nail varnish]</td></tr></table> <table><tr><td style="padding-left:3em">glue</td></tr></table> <table><tr><td style="padding-left:6em">super glue</td></tr></table> <table><tr><td style="padding-left:3em">glue solvent</td></tr></table> <table><tr><td style="padding-left:6em">acetone</td></tr></table> <table><tr><td style="padding-left:3em">hand-made paper </td><td style="padding-left:3em;font-size:x-small;">[see ..╱paper╱hand-made paper]</td></tr></table> <table><tr><td style="padding-left:3em">holographic material that is shredded </td><td style="padding-left:3em;font-size:x-small;">[see ..╱unrepeatable-pattern materials╱shredded╱shredded holographic material]</td></tr></table> <table><tr><td style="padding-left:3em">imitation diamonds </td><td style="padding-left:3em;font-size:x-small;">[see ..╱transparent material╱imitation diamonds]</td></tr></table> <table><tr><td style="padding-left:3em">ink</td></tr></table> <table><tr><td style="padding-left:6em">ink</td></tr></table> <table><tr><td style="padding-left:6em">ink-marbled paper </td><td style="padding-left:3em;font-size:x-small;">[see ..╱paper╱ink-marbled paper]</td></tr></table> <table><tr><td style="padding-left:3em">mylar x-ray film </td><td style="padding-left:3em;font-size:x-small;">[see ..╱x-ray film╱mylar x-ray film]</td></tr></table> <table><tr><td style="padding-left:3em">newspaper </td><td style="padding-left:3em;font-size:x-small;">[see ..╱paper╱newspaper]</td></tr></table> <table><tr><td style="padding-left:3em">paint</td></tr></table> <table><tr><td style="padding-left:3em">paper</td></tr></table> <table><tr><td style="padding-left:6em">hand-made paper</td></tr></table> <table><tr><td style="padding-left:6em">ink marbled-paper</td></tr></table> <table><tr><td style="padding-left:6em">newspaper</td></tr></table> <table><tr><td style="padding-left:6em">printer paper</td></tr></table> <table><tr><td style="padding-left:6em">tea-bag marbled stained paper</td></tr></table> <table><tr><td style="padding-left:6em">shredded paper</td></tr></table> <table><tr><td style="padding-left:3em">plastic, transparent pouch/bag material </td><td style="padding-left:3em;font-size:x-small;">[see ..╱transparent material╱plastic pouch/bag material]</td></tr></table> <table><tr><td style="padding-left:3em">plastic that crumples </td><td style="padding-left:3em;font-size:x-small;">[see ..╱unrepeatable-pattern materials╱shape-retentive material that is very easily deformed╱plastic that crumples]</td></tr></table> <table><tr><td style="padding-left:3em">polystyrene pieces </td><td style="padding-left:3em;font-size:x-small;">[see ..╱unrepeatable-pattern materials╱polystyrene pieces]</td></tr></table> <table><tr><td style="padding-left:3em">printer paper </td><td style="padding-left:3em;font-size:x-small;">[see ..╱paper╱printer paper]</td></tr></table> <table><tr><td style="padding-left:3em">reflective foil that is shredded </td><td style="padding-left:3em;font-size:x-small;">[see ..╱unrepeatable-pattern materials╱shredded╱shredded reflective foil]</td></tr></table> <table><tr><td style="padding-left:3em">rice grains </td><td style="padding-left:3em;font-size:x-small;">[see ..╱unrepeatable-pattern materials╱rice grains]</td></tr></table> <table><tr><td style="padding-left:3em">security tape</td></tr></table> <table><tr><td style="padding-left:3em">sellotape</td></tr></table> <table><tr><td style="padding-left:3em">shredded </td><td style="padding-left:3em;font-size:x-small;">[see ..╱unrepeatable-pattern materials╱shredded]</td></tr></table> <table><tr><td style="padding-left:3em">shell-suit material </td><td style="padding-left:3em;font-size:x-small;">[see ..╱unrepeatable-pattern materials╱shape-retentive material that is very easily deformed╱shell-suit material]</td></tr></table> <table><tr><td style="padding-left:3em">silk </td><td style="padding-left:3em;font-size:x-small;">[see ..╱unrepeatable-pattern materials╱shape-retentive material that is very easily deformed╱silk]</td></tr></table> <table><tr><td style="padding-left:3em">super glue </td><td style="padding-left:3em;font-size:x-small;">[see ..╱glue╱super glue]</td></tr></table> <table><tr><td style="padding-left:3em">tea-bag marbled stained paper </td><td style="padding-left:3em;font-size:x-small;">[see ..╱paper╱tea-bag marbled stained paper]</td></tr></table> <table><tr><td style="padding-left:3em">tie-dye material </td><td style="padding-left:3em;font-size:x-small;">[see ..╱unrepeatable-pattern materials╱materials that might be suitable╱tie-dye material]</td></tr></table> <table><tr><td style="padding-left:3em">transparent material</td></tr></table> <table><tr><td style="padding-left:6em">cling film </td><td style="padding-left:3em;font-size:x-small;">[related to ..╱..╱unrepeatable-pattern materials╱shredded╱shredded cling film]</td></tr></table> <table><tr><td style="padding-left:6em">imitation diamonds </td><td style="padding-left:3em;font-size:x-small;">[related to ..╱..╱unrepeatable-pattern materials╱imitation diamonds]</td></tr></table> <table><tr><td style="padding-left:6em">plastic pouch/bag material</td></tr></table> <table><tr><td style="padding-left:6em">transparent beads </td><td style="padding-left:3em;font-size:x-small;">[related to ..╱..╱unrepeatable-pattern materials╱transparent beads]</td></tr></table> <table><tr><td style="padding-left:6em">transparent plastic that is shredded </td><td style="padding-left:3em;font-size:x-small;">[related to ..╱..╱unrepeatable-pattern materials╱shredded╱shredded transparent plastic]</td></tr></table> <table><tr><td style="padding-left:3em">unrepeatable-pattern materials</td></tr></table> <table><tr><td style="padding-left:6em">glitter nail varnish</td></tr></table> <table><tr><td style="padding-left:6em">imitation diamonds</td></tr></table> <table><tr><td style="padding-left:6em">materials that might be suitable</td></tr></table> <table><tr><td style="padding-left:9em">paper</td></tr></table> <table><tr><td style="padding-left:12em">ink-marbled paper </td><td style="padding-left:3em;font-size:x-small;">[see ..╱..╱..╱paper╱ink-marbled paper]</td></tr></table> <table><tr><td style="padding-left:12em">newspaper </td><td style="padding-left:em;font-size:x-small;">[see ..╱..╱..╱paper╱newspaper]</td></tr></table> <table><tr><td style="padding-left:12em">printer paper </td><td style="padding-left:3em;font-size:x-small;">[see ..╱..╱..╱paper╱printer paper]</td></tr></table> <table><tr><td style="padding-left:12em">tea-bag marbled stained paper </td><td style="padding-left:3em;font-size:x-small;">[see ..╱..╱..╱paper╱tea-bag marbled stained paper]</td></tr></table> <table><tr><td style="padding-left:9em">tie-dye material </td><td style="padding-left:3em;font-size:x-small;">[see ..╱..╱..╱paper╱tie-dye material]</td></tr></table> <table><tr><td style="padding-left:6em">polystyrene pieces</td></tr></table> <table><tr><td style="padding-left:9em">foam peanuts</td></tr></table> <table><tr><td style="padding-left:6em">rice grains</td></tr></table> <table><tr><td style="padding-left:6em">shape-retentive materials that are very easily deformed</td></tr></table> <table><tr><td style="padding-left:9em">bubble wrap</td></tr></table> <table><tr><td style="padding-left:9em">plastic that crumples</td></tr></table> <table><tr><td style="padding-left:9em">shell-suit material</td></tr></table> <table><tr><td style="padding-left:9em">silk</td></tr></table> <table><tr><td style="padding-left:6em">shredded</td></tr></table> <table><tr><td style="padding-left:9em">shredded cling film</td></tr></table> <table><tr><td style="padding-left:9em">shredded holographic material</td></tr></table> <table><tr><td style="padding-left:9em">shredded optical discs</td></tr></table> <table><tr><td style="padding-left:9em">shredded paper</td><td style="padding-left:3em;font-size:x-small;">[see ..╱..╱..╱paper╱shredded paper]</td></tr></table> <table><tr><td style="padding-left:9em">shredded transparent plastic</td></tr></table> <table><tr><td style="padding-left:9em">shredded reflective foil</td></tr></table> <table><tr><td style="padding-left:6em">transparent beads</td></tr></table> <table><tr><td style="padding-left:3em">x-ray film</td></tr></table> <table><tr><td style="padding-left:6em">mylar x-ray film</td></tr></table> <table><tr><td style="padding-left:3em">water</td></tr></table> <table><tr><td>materially written</td></tr></table> <table><tr><td>Matthew Garrett </td><td style="padding-left:3em;font-size:x-small;">[see ╱persons]</td></tr></table> <table><tr><td>measurements, readings of physical properties </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties╱readings╱measuring]</td></tr></table> <table><tr><td>measuring method types</td></tr></table> <table><tr><td style="padding-left:3em">invasion related</td></tr></table> <table><tr><td style="padding-left:6em">invasive</td></tr></table> <table><tr><td style="padding-left:6em">non-invasive</td></tr></table> <table><tr><td style="padding-left:3em">destruction related</td></tr></table> <table><tr><td style="padding-left:6em">destructive</td></tr></table> <table><tr><td style="padding-left:6em">non-destructive</td></tr></table> <table><tr><td>memorisation, memorise</td></tr></table> <table><tr><td>memory (microchip-based computer memory)</td></tr></table> <table><tr><td style="padding-left:3em">ROM </td><td style="padding-left:3em;font-size:x-small;">[see ╱Read-only Memory]</td></tr></table> <table><tr><td style="padding-left:3em">RAM </td><td style="padding-left:3em;font-size:x-small;">[see ╱Random-access Memory]</td></tr></table> <table><tr><td style="padding-left:3em">flash memory</td></tr></table> <table><tr><td style="padding-left:6em">NOR flash (NOR stands for the not-or logic gate)</td></tr></table> <table><tr><td style="padding-left:6em">NAND flash (NAND stands for the not-and logic gate)</td></tr></table> <table><tr><td style="padding-left:6em">SD cards </td><td style="padding-left:3em;font-size:x-small;">[see ╱Secure Digital cards also in this group]</td></tr></table> <table><tr><td style="padding-left:6em">Secure Digital cards (SD cards)</td></tr></table> <table><tr><td style="padding-left:9em">types</td></tr></table> <table><tr><td style="padding-left:12em">form factors</td></tr></table> <table><tr><td style="padding-left:15em">original</td></tr></table> <table><tr><td style="padding-left:15em">mini</td></tr></table> <table><tr><td style="padding-left:15em">micro</td></tr></table> <table><tr><td style="padding-left:12em">smartphone internal SD cards</td></tr></table> <table><tr><td style="padding-left:9em">readers for SD cards </td><td style="padding-left:3em;font-size:x-small;">[see ╱hardware╱digital-storage hardware╱drives and readers╱card readers for SD cards]</td></tr></table> <table><tr><td style="padding-left:6em">SSD </td><td style="padding-left:3em;font-size:x-small;">[see ╱solid-state drive]</td></tr></table> <table><tr><td>mental</td></tr></table> <table><tr><td style="padding-left:3em">cognitive power</td></tr></table> <table><tr><td style="padding-left:6em">visual cognitive power</td></tr></table> <table><tr><td style="padding-left:3em">conscious thoughts</td></tr></table> <table><tr><td style="padding-left:3em">mental process</td></tr></table> <table><tr><td style="padding-left:3em">mindset of hackers </td><td style="padding-left:3em;font-size:x-small;">[see ╱hack╱security hacking╱mindset of hackers]</td></tr></table> <table><tr><td style="padding-left:3em">mind reading</td></tr></table> <table><tr><td style="padding-left:6em">brain-reading</td></tr></table> <table><tr><td style="padding-left:6em">psychic</td></tr></table> <table><tr><td style="padding-left:9em">psychic attack </td><td style="padding-left:3em;font-size:x-small;">[see ╱attack╱different classes of attack╱ mind-reading psychic attack]</td></tr></table> <table><tr><td style="padding-left:9em">psychic powers</td></tr></table> <table><tr><td style="padding-left:3em">security in spite of amnesia </td><td style="padding-left:3em;font-size:x-small;">[see ╱security in spite of amnesia]</td></tr></table> <table><tr><td style="padding-left:3em">thinking outside the box</td></tr></table> <table><tr><td>message digest</td></tr></table> <table><tr><td>MFA </td><td style="padding-left:3em;font-size:x-small;">[see ╱multi-factor authentication]</td></tr></table> <table><tr><td>microwave oven </td><td style="padding-left:3em;font-size:x-small;">[see ╱microwave testing]</td></tr></table> <table><tr><td>military</td></tr></table> <table><tr><td style="padding-left:3em">military policy</td></tr></table> <table><tr><td style="padding-left:6em">scorched earth</td></tr></table> <table><tr><td style="padding-left:6em">other policies (no content at present)</td></tr></table> <table><tr><td>mindset of hackers </td><td style="padding-left:3em;font-size:x-small;">[see ╱hack╱security hacking╱mindset of hackers]</td></tr></table> <table><tr><td>minimally-above-average security (broad security principle) </td><td style="padding-left:3em;font-size:x-small;">[see ╱broad security principles╱minimally-above-average security]</td></tr></table> <table><tr><td>multi-factor authentication (MFA)</td></tr></table> <table><tr><td style="padding-left:3em">2-factor authentication (special instance of MFA)</td></tr></table> <table><tr><td>Micah Lee (a long-time Qubes advocate)</td></tr></table> <table><tr><td>microchip (computer microchip, chip is abbreviation)</td></tr></table> <table><tr><td style="padding-left:3em">microchip-based computer memory </td><td style="padding-left:3em;font-size:x-small;">[see ╱memory </td><td style="padding-left:3em;font-size:x-small;">[microchip-based computer memory]]</td></tr></table> <table><tr><td>microcontroller</td></tr></table> <table><tr><td>Micro SD cards </td><td style="padding-left:3em;font-size:x-small;">[see ╱Secure Digital cards]</td></tr></table> <table><tr><td>mind reading </td><td style="padding-left:3em;font-size:x-small;">[see ╱mental╱mind reading]</td></tr></table> <table><tr><td>miracle, miraculous</td></tr></table> <table><tr><td>Man In The Middle</td></tr></table> <table><tr><td>memory stick </td><td style="padding-left:3em;font-size:x-small;">[see ╱USB memory stick]</td></tr></table> <table><tr><td>metal</td></tr></table> <table><tr><td style="padding-left:3em">metal boxes </td></tr></table> <table><tr><td>Michael A. Caloyannides </td><td style="padding-left:3em;font-size:x-small;">[see ╱persons]</td></tr></table> <table><tr><td>microphone</td></tr></table> <table><tr><td>MITM </td><td style="padding-left:3em;font-size:x-small;">[see ╱Man In The Middle]</td></tr></table> <table><tr><td>mobile devices</td></tr></table> <table><tr><td>mobile phone </td><td style="padding-left:3em;font-size:x-small;">[see ╱phones╱mobile phones]</td></tr></table> <table><tr><td>mobile working </td><td style="padding-left:3em;font-size:x-small;">[see ╱home and mobile working]</td></tr></table> <table><tr><td>monetary amounts </td><td style="padding-left:3em;font-size:x-small;">[see ╱financial╱currency╱money╱monetary amounts]</td></tr></table> <table><tr><td>Morse code </td><td style="padding-left:3em;font-size:x-small;">[see ╱language╱Morse code]</td></tr></table> <table><tr><td>motherboard</td></tr></table> <table><tr><td style="padding-left:3em">motherboard ROM</td></tr></table> <table><tr><td>motion detector alarms </td><td style="padding-left:3em;font-size:x-small;">[see ╱alarms╱motion detector alarms]</td></tr></table> <table><tr><td>MrChromebox</td></tr></table> <table><tr><td>multi-step security </td><td style="padding-left:3em;font-size:x-small;">[see ╱MFA]</td></tr></table> <table><tr><td>multi-booting </td><td style="padding-left:3em;font-size:x-small;">[see ╱boot╱multi-booting]</td></tr></table> <table><tr><td>mylar x-ray film </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties]</td></tr></table> <hr> <table><tr><td style="font-size:x-large;color:LightBlue">N</td></tr></table> <table><tr><td>naked eye </td><td style="padding-left:3em;font-size:x-small;">[related to ╱visible spectrum]</td></tr></table> <table><tr><td>National Cyber Security Centre for the UK (NCSC) </td><td style="padding-left:3em;font-size:x-small;">[see ╱organisations and businesses╱names of non-business organisations╱National Cyber Security Centre]</td></tr></table> <table><tr><td>natural hand-made paper</td></tr></table> <table><tr><td>NCSC </td><td style="padding-left:3em;font-size:x-small;">[see ╱organisations and businesses╱names of non-business organisations╱National Cyber Security Centre]</td></tr></table> <table><tr><td>Neo public-key-cryptography USB security tokens </td><td style="padding-left:3em;font-size:x-small;">[see ╱security tokens╱security tokens for public-key cryptography╱USB tokens╱brands╱Yubikey, Yubico╱Neo]</td></tr></table> <table><tr><td>Near Field Communications (NFC) </td><td style="padding-left:3em;font-size:x-small;">[see ╱communication╱wireless communication╱types╱NFC]</td></tr></table> <table><tr><td>new software, and devices </td><td style="padding-left:3em;font-size:x-small;">[see ╱age of software, and devices╱new]</td></tr></table> <table><tr><td>Netherlands </td><td style="padding-left:3em;font-size:x-small;">[see ╱countries mentioned in book╱Netherlands]</td></tr></table> <table><tr><td>network for wireless communication </td><td style="padding-left:3em;font-size:x-small;">[see ╱communication╱wireless communication╱network]</td></tr></table> <table><tr><td>newspaper </td><td style="padding-left:3em;font-size:x-small;">[see ╱paper╱newspaper]</td></tr></table> <table><tr><td>NFC </td><td style="padding-left:3em;font-size:x-small;">[see ╱communication╱wireless communication╱types╱NFC]</td></tr></table> <table><tr><td>Nitrokey brand of USB security tokens </td><td style="padding-left:3em;font-size:x-small;">[see ╱security tokens╱security tokens for public-key cryptography╱USB tokens╱brands╱Nitrokey]</td></tr></table> <table><tr><td>noise (random noise) </td><td style="padding-left:3em;font-size:x-small;">[related to ╱unrepeatable pattern]</td></tr></table> <table><tr><td style="padding-left:3em">visual noise</td></tr></table> <table><tr><td style="padding-left:3em">audio noise</td></tr></table> <table><tr><td style="padding-left:6em"> white noise audio </td></tr></table> <table><tr><td>non-Latin alphabet </td><td style="padding-left:3em;font-size:x-small;">[see ╱language╱alphabet]</td></tr></table> <table><tr><td>non-verbal symbol </td><td style="padding-left:3em;font-size:x-small;">[see ╱language╱non-verbal symbol]</td></tr></table> <table><tr><td>NOR flash (flash microchip memory) </td><td style="padding-left:3em;font-size:x-small;">[see ╱memory </td><td style="padding-left:3em;font-size:x-small;">[microchip-based computer memory]╱flash memory]</td></tr></table> <table><tr><td>NAND flash (flash microchip memory) </td><td style="padding-left:3em;font-size:x-small;">[see ╱memory </td><td style="padding-left:3em;font-size:x-small;">[microchip-based computer memory]╱flash memory] </td></tr></table> <table><tr><td>non-invasive measuring methods </td><td style="padding-left:3em;font-size:x-small;">[see ╱measuring method types╱non-invasive]</td></tr></table> <table><tr><td>non-destructive measuring methods </td><td style="padding-left:3em;font-size:x-small;">[see ╱measuring method types╱non-destructive]</td></tr></table> <table><tr><td>Novena open-source computing hardware platform </td><td style="padding-left:3em;font-size:x-small;">[see ╱hardware╱hardware considered as either open-source or closed-source╱open-source hardware╱Novena open-source computing hardware platform]</td></tr></table> <hr> <table><tr><td style="font-size:x-large;color:LightBlue">O</td></tr></table> <table><tr><td>obtaining software </td><td style="padding-left:3em;font-size:x-small;">[see ╱software╱obtaining software╱]</td></tr></table> <table><tr><td>occlusion</td></tr></table> <table><tr><td>original equipment manufacturer (OEM) software </td><td style="padding-left:3em;font-size:x-small;">[see ╱software╱OEM software]</td></tr></table> <table><tr><td>OEM software </td><td style="padding-left:3em;font-size:x-small;">[see ╱software╱OEM software]</td></tr></table> <table><tr><td>old software, and devices </td><td style="padding-left:3em;font-size:x-small;">[see ╱age of software, and devices╱old]</td></tr></table> <table><tr><td>online printing business </td><td style="padding-left:3em;font-size:x-small;">[see ╱business╱online printing business]</td></tr></table> <table><tr><td>online shop </td><td style="padding-left:3em;font-size:x-small;">[see ╱business╱shop╱online shop]</td></tr></table> <table><tr><td>open/closed source</td></tr></table> <table><tr><td style="padding-left:3em">considered as a business model </td><td style="padding-left:3em;font-size:x-small;">[see ╱business╱business models╱open-source vs. closed-source]</td></tr></table> <table><tr><td style="padding-left:3em">open source </td><td style="padding-left:3em;font-size:x-small;">[opposite of ..╱closed source]</td></tr></table> <table><tr><td style="padding-left:6em">open source source code </td><td style="padding-left:3em;font-size:x-small;">[see ╱programming╱source code╱source code considered as either open source or closed source╱open source source code]</td></tr></table> <table><tr><td style="padding-left:3em">open source hardware </td><td style="padding-left:3em;font-size:x-small;">[see ╱hardware╱hardware considered as either open-source or closed-source╱open-source hardware]</td></tr></table> <table><tr><td style="padding-left:6em">open source considered as intellectual property </td><td style="padding-left:3em;font-size:x-small;">[see ╱intellectual property╱intellectual property concerning source code and designs╱open source]</td></tr></table> <table><tr><td style="padding-left:3em">closed source </td><td style="padding-left:3em;font-size:x-small;">[opposite of ..╱open source]</td></tr></table> <table><tr><td style="padding-left:6em">closed source source code </td><td style="padding-left:3em;font-size:x-small;">[see ╱programming╱source code╱source code considered as either open source or closed source╱closed source source code]</td></tr></table> <table><tr><td style="padding-left:6em">closed source hardware </td><td style="padding-left:3em;font-size:x-small;">[see ╱hardware╱hardware considered as either open-source or closed-source╱closed-source hardware]</td></tr></table> <table><tr><td style="padding-left:6em">closed source considered as intellectual property </td><td style="padding-left:3em;font-size:x-small;">[see ╱intellectual property╱intellectual property concerning source code and designs╱closed source]</td></tr></table> <table><tr><td>optical disc (such as CDs and DVDs) </td><td style="padding-left:3em;font-size:x-small;">[see ╱digital storage╱media╱non-microchip-based memory╱Random-access Memory╱optical╱dis(c|k)-based]</td></tr></table> <table><tr><td>optical ROM discs (read-only CDs, read-only DVDs, etc. {ROM=read-only memory}) </td><td style="padding-left:3em;font-size:x-small;">[see ╱digital storage╱media╱non-microchip-based memory╱Random-access Memory╱optical╱optical ROM discs]</td></tr></table> <table><tr><td>optical effects</td></tr></table> <table><tr><td style="padding-left:3em">transparency</td></tr></table> <table><tr><td style="padding-left:3em">translucency (no content at present).</td></tr></table> <table><tr><td style="padding-left:3em">reflectivity (cf. glare)</td></tr></table> <table><tr><td style="padding-left:3em">refractivity</td></tr></table> <table><tr><td style="padding-left:3em">diffraction </td><td style="padding-left:3em;font-size:x-small;">[related to interference patterns in ╱hologram, holography..]</td></tr></table> <table><tr><td style="padding-left:3em">stereoscopy (no content at present).</td></tr></table> <table><tr><td style="padding-left:3em">polarisation</td></tr></table> <table><tr><td style="padding-left:3em">moving images revealed in holograms by moving hologram.</td></tr></table> <table><tr><td>optical tape </td><td style="padding-left:3em;font-size:x-small;">[see ╱digital storage╱media╱non-microchip-based memory╱Sequential-access Memory╱tape╱optical]</td></tr></table> <table><tr><td>option ROMs (ROM=read-only memory)</td></tr></table> <table><tr><td>Oracle</td></tr></table> <table><tr><td style="padding-left:3em">Oracle Cloud</td></tr></table> <table><tr><td style="padding-left:6em">Oracle Cloud compute instance</td></tr></table> <table><tr><td style="padding-left:6em">Oracle Cloud Linux </td><td style="padding-left:3em;font-size:x-small;">[see ╱operating system╱different operating systems]</td></tr></table> <table><tr><td style="padding-left:6em">Oracle Cloud Linux compute instance</td></tr></table> <table><tr><td>organisations and businesses</td></tr></table> <table><tr><td style="padding-left:3em">business </td><td style="padding-left:3em;font-size:x-small;">[see ╱business]</td></tr></table> <table><tr><td style="padding-left:3em">names of non-business organisations</td></tr></table> <table><tr><td style="padding-left:6em">Chaos Communication Congress</td></tr></table> <table><tr><td style="padding-left:6em">Essex police </td><td style="padding-left:3em;font-size:x-small;">[see ..╱governmental╱police╱Essex police]</td></tr></table> <table><tr><td style="padding-left:6em">National Cyber Security Centre (NCSC) </td><td style="padding-left:3em;font-size:x-small;">[see ..╱governmental╱country-specific╱UK╱National Cyber Security Centre]</td></tr></table> <table><tr><td style="padding-left:6em">Qubes OS project (for general info about Qubes OS) </td><td style="padding-left:3em;font-size:x-small;">[see ╱Qubes OS]</td></tr></table> <table><tr><td style="padding-left:6em">Raspberry Pi Foundation (for general info about Raspberry Pi technology) </td><td style="padding-left:3em;font-size:x-small;">[see ╱Raspberry Pi]</td></tr></table> <table><tr><td style="padding-left:6em">Wikimedia Foundation (for general info about Wikipedia, which is owner by the foundation) </td><td style="padding-left:3em;font-size:x-small;">[see ╱Wikipedia]</td></tr></table> <table><tr><td style="padding-left:6em">governmental</td></tr></table> <table><tr><td style="padding-left:9em">country-specific</td></tr></table> <table><tr><td style="padding-left:12em">UK</td></tr></table> <table><tr><td style="padding-left:15em">National Cyber Security Centre (NCSC)</td></tr></table> <table><tr><td style="padding-left:15em">Essex police</td></tr></table> <table><tr><td style="padding-left:12em">USA government</td></tr></table> <table><tr><td style="padding-left:12em">China’s government</td></tr></table> <table><tr><td style="padding-left:9em">military</td></tr></table> <table><tr><td style="padding-left:9em">police</td></tr></table> <table><tr><td style="padding-left:12em">police in general</td></tr></table> <table><tr><td style="padding-left:12em">Essex police </td><td style="padding-left:3em;font-size:x-small;">[see ..╱..╱country-specific╱UK╱Essex police]</td></tr></table> <table><tr><td style="padding-left:3em">names of organisations and businesses</td></tr></table> <table><tr><td style="padding-left:6em">Boots</td></tr></table> <table><tr><td style="padding-left:6em">certification authorities</td></tr></table> <table><tr><td style="padding-left:6em">Chaos Communication Congress</td></tr></table> <table><tr><td style="padding-left:6em">China government</td></tr></table> <table><tr><td style="padding-left:6em">Essex police</td></tr></table> <table><tr><td style="padding-left:6em">GitHub </td><td style="padding-left:3em;font-size:x-small;">[see ╱systems╱collaborative development╱GitHub]</td></tr></table> <table><tr><td style="padding-left:6em">Google</td></tr></table> <table><tr><td style="padding-left:6em">government</td></tr></table> <table><tr><td style="padding-left:6em">Kodak</td></tr></table> <table><tr><td style="padding-left:6em">National Cyber Security Centre (NCSC)</td></tr></table> <table><tr><td style="padding-left:6em">Nitrokey</td></tr></table> <table><tr><td style="padding-left:6em">Oracle</td></tr></table> <table><tr><td style="padding-left:6em">PC World</td></tr></table> <table><tr><td style="padding-left:6em">police</td></tr></table> <table><tr><td style="padding-left:6em">Qubes OS project</td></tr></table> <table><tr><td style="padding-left:6em">Raspberry Pi Foundation</td></tr></table> <table><tr><td style="padding-left:6em">Sandisk</td></tr></table> <table><tr><td style="padding-left:6em">secret criminal societies</td></tr></table> <table><tr><td style="padding-left:6em">Tesco</td></tr></table> <table><tr><td style="padding-left:6em">USA government</td></tr></table> <table><tr><td style="padding-left:6em">Wikimedia Foundation</td></tr></table> <table><tr><td style="padding-left:6em">Yubico</td></tr></table> <table><tr><td>operating system (OS) (base platform software for using a computer) </td></tr></table> <table><tr><td style="padding-left:3em">different operating systems</td></tr></table> <table><tr><td style="padding-left:6em">Windows</td></tr></table> <table><tr><td style="padding-left:6em">Linux or Linux-based</td></tr></table> <table><tr><td style="padding-left:9em">Oracle Cloud Linux</td></tr></table> <table><tr><td style="padding-left:9em">Qubes OS</td></tr></table> <table><tr><td style="padding-left:9em">Raspberry Pi OS</td></tr></table> <table><tr><td style="padding-left:12em">Raspberry Pi OS</td></tr></table> <table><tr><td style="padding-left:12em">general info about Raspberry Pi technology </td><td style="padding-left:3em;font-size:x-small;">[see ╱Raspberry Pi]</td></tr></table> <table><tr><td style="padding-left:9em">ChromeOS</td></tr></table> <table><tr><td style="padding-left:9em">Android operating system (for mobile devices)</td></tr></table> <table><tr><td style="padding-left:3em">operating-system login account</td></tr></table> <table><tr><td style="padding-left:6em">Administrator account</td></tr></table> <table><tr><td>operating costs </td><td style="padding-left:3em;font-size:x-small;">[see ╱costs╱operating costs]</td></tr></table> <table><tr><td>order, ordering (request for product/service) </td><td style="padding-left:3em;font-size:x-small;">[related to ╱purchasing]</td></tr></table> <table><tr><td style="padding-left:3em">compared with non-order acquisition of goods (ordering is prone to MITM attacks)</td></tr></table> <table><tr><td style="padding-left:3em">ordering many units of same product (broad security principle)</td></tr></table> <table><tr><td style="padding-left:3em">ordering goods requiring physical transit to customer</td></tr></table> <table><tr><td style="padding-left:6em">security for goods in physical transit </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical transit╱security for goods in physical transit]</td></tr></table> <table><tr><td style="padding-left:3em">returning orders </td><td style="padding-left:3em;font-size:x-small;">[see ╱product return]</td></tr></table> <table><tr><td>OS (operating system) </td><td style="padding-left:3em;font-size:x-small;">[see ╱operating system]</td></tr></table> <table><tr><td>outside the box </td><td style="padding-left:3em;font-size:x-small;">[see ╱mental╱thinking outside the box]</td></tr></table> <hr> <table><tr><td style="font-size:x-large;color:LightBlue">P</td></tr></table> <table><tr><td>padlock</td></tr></table> <table><tr><td style="padding-left:3em">padlockable laptop bag</td></tr></table> <table><tr><td>painting, paint</td></tr></table> <table><tr><td>paper?</td></tr></table> <table><tr><td style="padding-left:3em">paper shredders</td></tr></table> <table><tr><td style="padding-left:3em">paper marbling</td></tr></table> <table><tr><td style="padding-left:6em">ink paper marbling</td></tr></table> <table><tr><td style="padding-left:6em">tea-bag marbled stained paper</td></tr></table> <table><tr><td style="padding-left:3em">hand-made paper </td><td style="padding-left:3em;font-size:x-small;">[see ╱natural hand-made paper]</td></tr></table> <table><tr><td style="padding-left:3em">paper tears</td></tr></table> <table><tr><td style="padding-left:3em">printer paper</td></tr></table> <table><tr><td style="padding-left:3em">recycled paper</td></tr></table> <table><tr><td style="padding-left:3em">newspaper</td></tr></table> <table><tr><td>password</td></tr></table> <table><tr><td style="padding-left:3em">changing passwords </td><td style="padding-left:3em;font-size:x-small;">[covered under ╱changing passwords and keys]</td></tr></table> <table><tr><td style="padding-left:3em">strong password</td></tr></table> <table><tr><td style="padding-left:3em">password encryption</td></tr></table> <table><tr><td style="padding-left:3em">password encoding</td></tr></table> <table><tr><td style="padding-left:3em">password reuse</td></tr></table> <table><tr><td style="padding-left:3em">password blacklisting</td></tr></table> <table><tr><td style="padding-left:3em">password capture</td></tr></table> <table><tr><td style="padding-left:3em">password manager (aka password vault)</td></tr></table> <table><tr><td style="padding-left:3em">password cracking</td></tr></table> <table><tr><td style="padding-left:3em">communicating passwords (cf. Appendix)</td></tr></table> <table><tr><td style="padding-left:3em">rate limiting in password attempts</td></tr></table> <table><tr><td>pattern (graphical pattern)</td></tr></table> <table><tr><td>personal computer (PC)</td></tr></table> <table><tr><td style="padding-left:3em">different “ready-to-run” PCs marketed as products</td></tr></table> <table><tr><td style="padding-left:6em">Chromebook, Chromebox, Chromebit </td><td style="padding-left:3em;font-size:x-small;">[see ╱server-client computing model╱client╱web client computers╱Chromebook, Chromebox, Chromebit]</td></tr></table> <table><tr><td>persons (individuals named in book)</td></tr></table> <table><tr><td style="padding-left:3em">Andrew "bunnie" Huang (computer hardware researcher and specialist) </td></tr></table> <table><tr><td style="padding-left:3em">Mark Fernandes (software developer, original author of this book)</td></tr></table> <table><tr><td style="padding-left:3em">Matthew Garrett (technologist, software developer, worked on secure boot protocol)</td></tr></table> <table><tr><td style="padding-left:3em">Michael A. Caloyannides (author of “Desktop Witness: The Do's and Don'ts of Personal Computer Security”)</td></tr></table> <table><tr><td style="padding-left:3em">Trammell Hudson (principal developer of the Heads BIOS/UEFI boot firmware system)</td></tr></table> <table><tr><td>PC </td><td style="padding-left:3em;font-size:x-small;">[see ╱personal computer]</td></tr></table> <table><tr><td>PC World</td></tr></table> <table><tr><td>peer review</td></tr></table> <table><tr><td style="padding-left:3em">Cf. Raspberry Pi, cf. peer review in ‘build from source’ section, cf. publishing security methods section (in broad principles section)</td></tr></table> <table><tr><td>pencil</td></tr></table> <table><tr><td>peripheral (computer peripheral)</td></tr></table> <table><tr><td>phones</td></tr></table> <table><tr><td style="padding-left:3em">mobile phones</td></tr></table> <table><tr><td style="padding-left:6em">age of phone</td></tr></table> <table><tr><td style="padding-left:9em">old mobile phone </td><td style="padding-left:3em;font-size:x-small;">[see ╱age of software, and devices╱old╱old mobile phone, mobile device]</td></tr></table> <table><tr><td style="padding-left:9em">new mobile phone </td><td style="padding-left:3em;font-size:x-small;">[see ╱age of software, and devices╱new╱new mobile phone╱mobile device]</td></tr></table> <table><tr><td style="padding-left:6em">burner phones</td></tr></table> <table><tr><td style="padding-left:6em">smartphones</td></tr></table> <table><tr><td style="padding-left:9em">internal SD cards in smartphones </td><td style="padding-left:3em;font-size:x-small;">[see ╱memory </td><td style="padding-left:3em;font-size:x-small;">[microchip-based computer memory]╱flash memory╱SD cards╱smartphone internal SD cards]</td></tr></table> <table><tr><td>PGP public key </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱protocols and algorithms╱Pretty Good Privacy cryptography╱PGP public key]</td></tr></table> <table><tr><td>PGP cryptography </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱protocols and algorithms╱Pretty Good Privacy cryptography]</td></tr></table> <table><tr><td>phish</td></tr></table> <table><tr><td>photography, photograph, photographing</td></tr></table> <table><tr><td style="padding-left:3em">visible-spectrum photography</td></tr></table> <table><tr><td style="padding-left:3em">camera </td><td style="padding-left:3em;font-size:x-small;">[see ╱camera]</td></tr></table> <table><tr><td style="padding-left:3em">photo printing</td></tr></table> <table><tr><td style="padding-left:3em">security-photo matching software </td><td style="padding-left:3em;font-size:x-small;">[see ╱software╱security-photo matching software]</td></tr></table> <table><tr><td>physical disturbance</td></tr></table> <table><tr><td>physical isolation (cf. §“Based on time passed”)</td></tr></table> <table><tr><td>physical key </td><td style="padding-left:3em;font-size:x-small;">[see ╱key╱physical key]</td></tr></table> <table><tr><td>physically lock, physical lock </td><td style="padding-left:3em;font-size:x-small;">[related to ╱safe]</td></tr></table> <table><tr><td style="padding-left:3em">combination lock</td></tr></table> <table><tr><td style="padding-left:3em">padlock</td></tr></table> <table><tr><td style="padding-left:3em">physical -key lock </td><td style="padding-left:3em;font-size:x-small;">[related to ╱key╱physical key]</td></tr></table> <table><tr><td>physical properties</td></tr></table> <table><tr><td style="padding-left:3em">weight</td></tr></table> <table><tr><td style="padding-left:6em">gravitational weight</td></tr></table> <table><tr><td style="padding-left:6em">magnetic weight</td></tr></table> <table><tr><td style="padding-left:6em">weighing scales</td></tr></table> <table><tr><td style="padding-left:3em">images</td></tr></table> <table><tr><td style="padding-left:6em">visual images</td></tr></table> <table><tr><td style="padding-left:6em">magnetic images</td></tr></table> <table><tr><td style="padding-left:6em">magnetic resonance imaging</td></tr></table> <table><tr><td style="padding-left:6em">RF imaging </td><td style="padding-left:3em;font-size:x-small;">[see below, radio-frequency imaging]</td></tr></table> <table><tr><td style="padding-left:6em">radio-frequency imaging</td></tr></table> <table><tr><td style="padding-left:6em">electric field imaging</td></tr></table> <table><tr><td style="padding-left:6em">photography </td><td style="padding-left:3em;font-size:x-small;">[see ╱photography]</td></tr></table> <table><tr><td style="padding-left:6em">T ray (Terahertz radiation scan analogous to an x ray)</td></tr></table> <table><tr><td style="padding-left:6em">ultrasound images</td></tr></table> <table><tr><td style="padding-left:9em"> DIY ultrasound imaging kit</td></tr></table> <table><tr><td style="padding-left:9em"> ultrasonic sensor</td></tr></table> <table><tr><td style="padding-left:6em">X ray</td></tr></table> <table><tr><td style="padding-left:9em">mylar x-ray film</td></tr></table> <table><tr><td style="padding-left:3em">readings, measuring</td></tr></table> <table><tr><td style="padding-left:6em">measuring physical properties for authentication </td><td style="padding-left:3em;font-size:x-small;">[see ╱authentication╱measuring physical properties for authentication]</td></tr></table> <table><tr><td style="padding-left:6em">ultrasound</td></tr></table> <table><tr><td style="padding-left:3em">volume (space in 3D)</td></tr></table> <table><tr><td style="padding-left:6em">Archimedes’ principle</td></tr></table> <table><tr><td style="padding-left:3em">X ray</td></tr></table> <table><tr><td style="padding-left:6em">industrial radiography</td></tr></table> <table><tr><td style="padding-left:3em">infra red</td></tr></table> <table><tr><td style="padding-left:6em">infrared scanning</td></tr></table> <table><tr><td style="padding-left:6em">infrared filter</td></tr></table> <table><tr><td style="padding-left:3em">microwave testing</td></tr></table> <table><tr><td style="padding-left:3em">microwave oven</td></tr></table> <table><tr><td style="padding-left:3em">radio-frequency detection</td></tr></table> <table><tr><td style="padding-left:3em">radio-frequency field</td></tr></table> <table><tr><td style="padding-left:3em">sound</td></tr></table> <table><tr><td style="padding-left:6em">ultrasound</td></tr></table> <table><tr><td>physical shelves </td><td style="padding-left:3em;font-size:x-small;">[see ╱business╱shop╱physical shop╱physical shelves]</td></tr></table> <table><tr><td>physical shop/store </td><td style="padding-left:3em;font-size:x-small;">[see ╱business╱shop╱physical shop]</td></tr></table> <table><tr><td>physical transit</td></tr></table> <table><tr><td style="padding-left:3em">security for goods in physical transit</td></tr></table> <table><tr><td>politics, political</td></tr></table> <table><tr><td>piggy-back</td></tr></table> <table><tr><td>pinhole (pinhole material)</td></tr></table> <table><tr><td>pinhole glasses</td></tr></table> <table><tr><td>pins (motherboard pins)</td></tr></table> <table><tr><td>pixel, pix-elated</td></tr></table> <table><tr><td>plastic</td></tr></table> <table><tr><td style="padding-left:3em">plastic bags </td><td style="padding-left:3em;font-size:x-small;">[see ╱shape flexibility╱plastic bag]</td></tr></table> <table><tr><td>platform (computer platform)</td></tr></table> <table><tr><td>polarisation </td><td style="padding-left:3em;font-size:x-small;">[see ╱optical effects]</td></tr></table> <table><tr><td>police</td></tr></table> <table><tr><td style="padding-left:3em">Essex police </td><td style="padding-left:3em;font-size:x-small;">[see ╱organisations and businesses╱names of non-business organisations╱Essex police]</td></tr></table> <table><tr><td style="padding-left:3em">report cyber-crime to the police </td><td style="padding-left:3em;font-size:x-small;">[see ╱report, reporting╱report cyber-crime to the police]</td></tr></table> <table><tr><td>polarised (polarised optical filter)</td></tr></table> <table><tr><td>polystyrene pieces (such as those used for cushioning parcelled items) </td><td style="padding-left:3em;font-size:x-small;">[see ╱foam peanuts]</td></tr></table> <table><tr><td>porting source code to higher-level programming language </td><td style="padding-left:3em;font-size:x-small;">[see ╱programming╱source code╱porting source code to higher-level programming language]</td></tr></table> <table><tr><td>post (mail)</td></tr></table> <table><tr><td>power states (system power states) </td><td style="padding-left:3em;font-size:x-small;">[see ╱powering computer systems╱system power states]</td></tr></table> <table><tr><td>powering computer systems</td></tr></table> <table><tr><td style="padding-left:3em">auto-power-off</td></tr></table> <table><tr><td style="padding-left:3em">system power states (for computer system)</td></tr></table> <table><tr><td style="padding-left:6em">working (s0)</td></tr></table> <table><tr><td style="padding-left:6em">sleep mode (s1, s2, s3)</td></tr></table> <table><tr><td style="padding-left:6em">hibernate (s4) (no content at present)</td></tr></table> <table><tr><td style="padding-left:6em">soft off/boot, warm boot (s5) (no content at present)</td></tr></table> <table><tr><td style="padding-left:6em">powered-off (step in cold booting) (G3) (cf. securing bootloader when in powered-off...)(there are two types of shutdown {G3}: graceful and hard)</td></tr></table> <table><tr><td>Pretty Good Privacy (PGP) cryptography </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱protocols and algorithms╱Pretty Good Privacy cryptography]</td></tr></table> <table><tr><td>principles of security that are broad </td><td style="padding-left:3em;font-size:x-small;">[see ╱broad security principles]</td></tr></table> <table><tr><td>printed, printing, print</td></tr></table> <table><tr><td style="padding-left:3em">on paper</td></tr></table> <table><tr><td style="padding-left:3em">3D printers (3D=three-dimensional, no content at present).</td></tr></table> <table><tr><td style="padding-left:3em">lenticular printing</td></tr></table> <table><tr><td style="padding-left:3em">printer paper </td><td style="padding-left:3em;font-size:x-small;">[see ╱paper╱printer paper]</td></tr></table> <table><tr><td>privacy screen filters</td><td style="padding-left:3em;font-size:x-small;">[see ╱privacy screens </td><td style="padding-left:3em;font-size:x-small;">[filters]]</td></tr></table> <table><tr><td>privacy screens</td></tr></table> <table><tr><td style="padding-left:3em">privacy screen filters</td></tr></table> <table><tr><td>privacy keyboard screen</td></tr></table> <table><tr><td>programming, coding, reprogramming </td><td style="padding-left:3em;font-size:x-small;">[related to ╱hack╱hacker culture]</td></tr></table> <table><tr><td style="padding-left:3em">secure coding</td></tr></table> <table><tr><td style="padding-left:6em">porting source code to higher-level programming language</td><td style="padding-left:3em;font-size:x-small;">[see ..╱..╱source code╱porting source code to higher-level programming language]</td></tr></table> <table><tr><td style="padding-left:3em">programming languages</td></tr></table> <table><tr><td style="padding-left:6em">Eiffel</td></tr></table> <table><tr><td style="padding-left:6em">higher-level programming language</td></tr></table> <table><tr><td style="padding-left:9em">porting source code to higher-level programming language</td><td style="padding-left:3em;font-size:x-small;">[see ..╱..╱..╱source code╱porting source code to higher-level programming language]</td></tr></table> <table><tr><td style="padding-left:3em">algorithms</td></tr></table> <table><tr><td style="padding-left:6em">denoising algorithms</td></tr></table> <table><tr><td style="padding-left:6em">cryptography algorithms </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱algorithms]</td></tr></table> <table><tr><td style="padding-left:3em">source code</td></tr></table> <table><tr><td style="padding-left:6em">auditing source code</td></tr></table> <table><tr><td style="padding-left:9em">by using collaborative development </td><td style="padding-left:3em;font-size:x-small;">[see ╱systems╱collaborative development╱when used for auditing source code changes]</td></tr></table> <table><tr><td style="padding-left:6em">detecting malware in source code </td><td style="padding-left:3em;font-size:x-small;">[see ╱malware╱detecting malware in source code]</td></tr></table> <table><tr><td style="padding-left:6em">porting source code to higher-level programming language</td></tr></table> <table><tr><td style="padding-left:6em">building from source </td><td style="padding-left:3em;font-size:x-small;">[see ╱building software╱building from source]</td></tr></table> <table><tr><td style="padding-left:6em">source code considered as either open source or closed source</td></tr></table> <table><tr><td style="padding-left:9em">open source source code </td><td style="padding-left:3em;font-size:x-small;">[opposite of ..╱closed source/source code]</td></tr></table> <table><tr><td style="padding-left:9em">closed source source code </td><td style="padding-left:3em;font-size:x-small;">[opposite of ..╱open source source code]</td></tr></table> <table><tr><td style="padding-left:9em">open/closed source in general </td><td style="padding-left:3em;font-size:x-small;">[see ╱open/closed source]</td></tr></table> <table><tr><td>probability, probabilistic </td><td style="padding-left:3em;font-size:x-small;">[related to ╱random]</td></tr></table> <table><tr><td style="padding-left:3em"> balance-of-probabilities</td></tr></table> <table><tr><td>product return</td></tr></table> <table><tr><td>product ordering </td><td style="padding-left:3em;font-size:x-small;">[see ╱order, ordering]</td></tr></table> <table><tr><td>proof of work </td><td style="padding-left:3em;font-size:x-small;">[see ╱financial╱cryptocurrencies╱proof of work]</td></tr></table> <table><tr><td>pronunciation </td><td style="padding-left:3em;font-size:x-small;">[see ╱language╱pronunciation]</td></tr></table> <table><tr><td>pros vs cons (for and against)</td></tr></table> <table><tr><td>protocols</td></tr></table> <table><tr><td style="padding-left:3em">for cryptography </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱protocols and algorithms]</td></tr></table> <table><tr><td style="padding-left:3em">for communication </td><td style="padding-left:3em;font-size:x-small;">[see ╱communication╱communication protocols for computing devices]</td></tr></table> <table><tr><td style="padding-left:3em">that are also standards </td><td style="padding-left:3em;font-size:x-small;">[see ╱standards╱protocols]</td></tr></table> <table><tr><td style="padding-left:3em">reproducible-builds protocol </td><td style="padding-left:3em;font-size:x-small;">[see ╱building software╱reproducible builds]</td></tr></table> <table><tr><td style="padding-left:3em">zero-knowledge authentication protocol</td></tr></table> <table><tr><td>provider</td></tr></table> <table><tr><td>psychic </td><td style="padding-left:3em;font-size:x-small;">[see ╱mental╱mind reading╱psychic]</td></tr></table> <table><tr><td>PS/2 (keyboard interface standard, PS/2 means IBM Personal System/2, IBM stands for International Business Machines and is a technology company)</td></tr></table> <table><tr><td>public authentication PGP key </td><td style="padding-left:3em;font-size:x-small;">[see ╱key╱digital key╱public-key cryptography╱PGP public key]</td></tr></table> <table><tr><td>public domain</td></tr></table> <table><tr><td>private key </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱private key]</td></tr></table> <table><tr><td>“private-public key pair” encryption </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography]</td></tr></table> <table><tr><td>public key </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱public key]</td></tr></table> <table><tr><td>public-key cryptography (aka asymmetric cryptography) </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography]</td></tr></table> <table><tr><td>“public-private key pair” encryption </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography]</td></tr></table> <table><tr><td>public places</td></tr></table> <table><tr><td>publish, publishing</td></tr></table> <table><tr><td style="padding-left:3em">publishing security methods (broad security principle) </td><td style="padding-left:3em;font-size:x-small;">[see ╱broad security principles╱publishing security methods]</td></tr></table> <table><tr><td>purchase, purchasing </td><td style="padding-left:3em;font-size:x-small;">[related to ╱ordering]</td></tr></table> <table><tr><td style="padding-left:3em">costs of purchases </td><td style="padding-left:3em;font-size:x-small;">[see ╱costs]</td></tr></table> <table><tr><td style="padding-left:3em">purchasing channels</td></tr></table> <table><tr><td style="padding-left:3em">purchasing software </td><td style="padding-left:3em;font-size:x-small;">[intersects with ╱software╱obtaining software╱]</td></tr></table> <table><tr><td style="padding-left:3em">refunds for purchases </td><td style="padding-left:3em;font-size:x-small;">[see ╱financial╱refund]</td></tr></table> <table><tr><td style="padding-left:3em">returning purchased products </td><td style="padding-left:3em;font-size:x-small;">[see ╱product return]</td></tr></table> <table><tr><td style="padding-left:3em">shop from which purchases can be made </td><td style="padding-left:3em;font-size:x-small;">[see ╱business╱shop]</td></tr></table> <hr> <table><tr><td style="font-size:x-large;color:LightBlue">Q</td></tr></table> <table><tr><td>QC parameters </td><td style="padding-left:3em;font-size:x-small;">[see ╱quality-control parameters]</td></tr></table> <table><tr><td>quality-control parameters</td></tr></table> <table><tr><td>quantum entanglement (analogy, in respect of testing one unit to determine properties of second unit) </td><td style="padding-left:3em;font-size:x-small;">[see ╱testing]</td></tr></table> <table><tr><td>Qubes OS</td></tr></table> <table><tr><td style="padding-left:3em">Qubes OS / Qubes </td><td style="padding-left:3em;font-size:x-small;">[see ╱operating system╱different operating systems]</td></tr></table> <table><tr><td style="padding-left:3em">entity behind Qubes OS </td><td style="padding-left:3em;font-size:x-small;">[see ╱organisations and businesses╱names of non-business organisations╱Qubes OS project]</td></tr></table> <hr> <table><tr><td style="font-size:x-large;color:LightBlue">R</td></tr></table> <table><tr><td>radio frequency</td></tr></table> <table><tr><td style="padding-left:3em">radio-frequency imaging (RF imaging) </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties]</td></tr></table> <table><tr><td style="padding-left:3em">radio-frequency detection (RF detection) </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties]</td></tr></table> <table><tr><td style="padding-left:3em">radio-frequency fields </td><td style="padding-left:3em;font-size:x-small;">[see ╱RF fields] [see ╱physical properties]</td></tr></table> <table><tr><td>random </td><td style="padding-left:3em;font-size:x-small;">[related to ╱probability]</td></tr></table> <table><tr><td style="padding-left:3em">generating randomness</td></tr></table> <table><tr><td style="padding-left:6em">coin tossing</td></tr></table> <table><tr><td style="padding-left:6em">rolling dice</td></tr></table> <table><tr><td style="padding-left:3em">Random Access Memory (RAM)</td></tr></table> <table><tr><td style="padding-left:3em">user randomly selecting unit from off physical shelves (broad security principle) </td><td style="padding-left:3em;font-size:x-small;">[see ╱business╱shop╱physical shop╱physical shelves]</td></tr></table> <table><tr><td>RAM </td><td style="padding-left:3em;font-size:x-small;">[contrasts with ╱SAM] </td><td style="padding-left:3em;font-size:x-small;">[see ╱random╱Random Access Memory] </td></tr></table> <table><tr><td>Raspberry Pi</td></tr></table> <table><tr><td style="padding-left:3em">products</td></tr></table> <table><tr><td style="padding-left:6em">Raspberry Pi Zero</td></tr></table> <table><tr><td style="padding-left:6em">Raspberry Pi OS </td><td style="padding-left:3em;font-size:x-small;">[see ╱operating system╱different operating systems]</td></tr></table> <table><tr><td style="padding-left:3em">creator (of Raspberry Pi products) </td><td style="padding-left:3em;font-size:x-small;">[see ╱organisations and businesses╱names of non-business organisations╱Raspberry Pi Foundation]</td></tr></table> <table><tr><td>rate limiting</td></tr></table> <table><tr><td>readers (card readers for computer systems) </td><td style="padding-left:3em;font-size:x-small;">[covered under ╱hardware╱digital-storage hardware╱drives and readers╱]</td></tr></table> <table><tr><td>read only</td></tr></table> <table><tr><td style="padding-left:3em">Read-only Memory (ROM)</td></tr></table> <table><tr><td style="padding-left:6em">microchip-based computer memory </td><td style="padding-left:3em;font-size:x-small;">[see ╱digital storage╱media, microchip-based computer memory╱ROM]</td></tr></table> <table><tr><td style="padding-left:6em">optical ROM discs (eg. read-only CDs, read-only DVDs) </td><td style="padding-left:3em;font-size:x-small;">[see ╱digital storage╱media╱non-microchip-based memory╱Random-access Memory╱dis(c|k)-based╱optical]</td></tr></table> <table><tr><td>recycle, recycled, recycling</td></tr></table> <table><tr><td style="padding-left:3em">recycled paper </td><td style="padding-left:3em;font-size:x-small;">[see ╱paper╱recycled paper]</td></tr></table> <table><tr><td>refund </td><td style="padding-left:3em;font-size:x-small;">[see ╱financial╱refund]</td></tr></table> <table><tr><td>reflectivity </td><td style="padding-left:3em;font-size:x-small;">[see ╱optical effects]</td></tr></table> <table><tr><td>refractivity </td><td style="padding-left:3em;font-size:x-small;">[see ╱optical effects]</td></tr></table> <table><tr><td>regulation (a type of legislation) </td><td style="padding-left:3em;font-size:x-small;">[see ╱legislation]</td></tr></table> <table><tr><td>restricted viewing enclosure </td><td style="padding-left:3em;font-size:x-small;">[see ╱view restriction╱cardboard “restricted viewing enclosure”]</td></tr></table> <table><tr><td>remote control (remotely controlling computer)</td></tr></table> <table><tr><td>remote working </td><td style="padding-left:3em;font-size:x-small;">[related to ..╱home and mobile working]</td></tr></table> <table><tr><td>replay attack </td><td style="padding-left:3em;font-size:x-small;">[see ╱attack╱different classes of attack]</td></tr></table> <table><tr><td>report, reporting</td></tr></table> <table><tr><td style="padding-left:3em">report cyber-crime to the police (broad security principle)</td></tr></table> <table><tr><td>reproducible builds </td><td style="padding-left:3em;font-size:x-small;">[see ╱building software╱reproducible builds]</td></tr></table> <table><tr><td>reprogrammable firmware</td></tr></table> <table><tr><td>response and recovery (cf. §“What to do when you discover your computer has been hacked)</td></tr></table> <table><tr><td>return (product return) </td><td style="padding-left:3em;font-size:x-small;">[see ╱product return]</td></tr></table> <table><tr><td>reverse engineering</td></tr></table> <table><tr><td>rewritable media</td></tr></table> <table><tr><td>RF (radio frequency) </td><td style="padding-left:3em;font-size:x-small;">[see ╱radio frequency]</td></tr></table> <table><tr><td>rice grains</td></tr></table> <table><tr><td>rolling dice </td><td style="padding-left:3em;font-size:x-small;">[see ╱random╱generating randomness╱rolling dice]</td></tr></table> <table><tr><td>ROM </td><td style="padding-left:3em;font-size:x-small;">[see ╱Read-only Memory]</td></tr></table> <table><tr><td>rote memory</td></tr></table> <table><tr><td>router </td><td style="padding-left:3em;font-size:x-small;">[see ╱hardware╱router]</td></tr></table> <hr> <table><tr><td style="font-size:x-large;color:LightBlue">S</td></tr></table> <table><tr><td>safe (physical safe) </td><td style="padding-left:3em;font-size:x-small;">[related to ╱physically lock, physical lock]</td></tr></table> <table><tr><td>safe-mode</td></tr></table> <table><tr><td>SAM </td><td style="padding-left:3em;font-size:x-small;">[contrasts with ╱RAM] </td><td style="padding-left:3em;font-size:x-small;">[see ╱Sequential Access Memory] </td></tr></table> <table><tr><td>sandboxing </td><td style="padding-left:3em;font-size:x-small;">[related to ╱cloud computing]</td></tr></table> <table><tr><td>science fiction</td></tr></table> <table><tr><td>screen privacy</td></tr></table> <table><tr><td>screensaver lock </td><td style="padding-left:3em;font-size:x-small;">[covered under ╱computer screen lock/locking]</td></tr></table> <table><tr><td>screen lock </td><td style="padding-left:3em;font-size:x-small;">[covered under ╱computer screen lock/locking]</td></tr></table> <table><tr><td>screws</td></tr></table> <table><tr><td style="padding-left:3em">computer screws </td><td style="padding-left:3em;font-size:x-small;">[see ╱computer screws]</td></tr></table> <table><tr><td>scorched earth </td><td style="padding-left:3em;font-size:x-small;">[see ╱military╱military policy╱scorched earth]</td></tr></table> <table><tr><td>SD card </td><td style="padding-left:3em;font-size:x-small;">[see ╱Secure Digital card]</td></tr></table> <table><tr><td>seal (security seal)</td></tr></table> <table><tr><td>Secure Digital card (SD card) </td><td style="padding-left:3em;font-size:x-small;">[see ╱memory╱flash memory╱SD card]</td></tr></table> <table><tr><td>second hand (used goods, services, etc.) (not brand new)</td></tr></table> <table><tr><td style="padding-left:3em">second hand shop </td><td style="padding-left:3em;font-size:x-small;">[see ╱business╱shop╱second-hand shop]</td></tr></table> <table><tr><td>secure coding</td></tr></table> <table><tr><td>secure communication </td><td style="padding-left:3em;font-size:x-small;">[see ╱communication╱secure communication]</td></tr></table> <table><tr><td>security in spite of amnesia (cf. security reminders)</td></tr></table> <table><tr><td>security by pre-loaded private key </td><td style="padding-left:3em;font-size:x-small;">[see ╱systems╱design╱security by pre-loaded private key]</td></tr></table> <table><tr><td>security via mass adoption</td></tr></table> <table><tr><td>secret criminal society </td><td style="padding-left:3em;font-size:x-small;">[see ╱secret society╱secret criminal society]</td></tr></table> <table><tr><td>security in cyber secure systems and their design </td><td style="padding-left:3em;font-size:x-small;">[see ╱design╱design of cyber secure systems]</td></tr></table> <table><tr><td>secret society</td></tr></table> <table><tr><td style="padding-left:3em">secret criminal society</td></tr></table> <table><tr><td>security credentials</td></tr></table> <table><tr><td>secure data sanitisation</td></tr></table> <table><tr><td>security alarm </td><td style="padding-left:3em;font-size:x-small;">[see ╱alarm╱security alarm]</td></tr></table> <table><tr><td>security bag</td></tr></table> <table><tr><td>security certificate for public-key cryptography (aka asymmetric cryptography)</td></tr></table> <table><tr><td style="padding-left:3em">security certificate for public-key cryptography </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱security certificates]</td></tr></table> <table><tr><td style="padding-left:3em">security certificate for Transport Layer Security (TLS) (digital security certificate) </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱Transport Layer Security╱TLS security certificates]</td></tr></table> <table><tr><td>security community, security researchers</td></tr></table> <table><tr><td>security derived from source-code auditing</td></tr></table> <table><tr><td>security habit</td></tr></table> <table><tr><td>security hole</td></tr></table> <table><tr><td>security invention</td></tr></table> <table><tr><td>security lapse</td></tr></table> <table><tr><td style="padding-left:3em">preventing lapses in security </td><td style="padding-left:3em;font-size:x-small;">[see ╱broad principles╱preventing lapses in security]</td></tr></table> <table><tr><td>security level (complements ‘threat model’ concept)</td></tr></table> <table><tr><td style="padding-left:3em">think in terms of gradual movement along a security-level continuum (broad security principle)</td></tr></table> <table><tr><td></td><td style="padding-left:3em;font-size:x-small;">[see ╱broad security principles╱think in terms of gradual movement along a security-level continuum]</td></tr></table> <table><tr><td>security location for resting </td><td style="padding-left:3em;font-size:x-small;">[see ╱‘at rest’ security location]</td></tr></table> <table><tr><td>security method publishing (broad security principle) </td><td style="padding-left:3em;font-size:x-small;">[see ╱broad security principles╱publishing security methods]</td></tr></table> <table><tr><td>security-photo matching software </td><td style="padding-left:3em;font-size:x-small;">[see ╱software╱security-photo matching software]</td></tr></table> <table><tr><td>security principles that are broad </td><td style="padding-left:3em;font-size:x-small;">[see ╱broad security principles]</td></tr></table> <table><tr><td>security products and services (cf. §“National Cyber Security Centre”)</td></tr></table> <table><tr><td style="padding-left:3em">Qubes</td></tr></table> <table><tr><td style="padding-left:3em">Linux</td></tr></table> <table><tr><td style="padding-left:3em">GPG </td><td style="padding-left:3em;font-size:x-small;">[see ╱software tools, software utilities╱cryptography╱GPG]</td></tr></table> <table><tr><td style="padding-left:3em">Heads</td></tr></table> <table><tr><td style="padding-left:3em">Coreboot</td></tr></table> <table><tr><td style="padding-left:3em">Google Authenticator (key- and time- based app)</td></tr></table> <table><tr><td style="padding-left:3em">lock</td></tr></table> <table><tr><td style="padding-left:6em">padlocks</td></tr></table> <table><tr><td style="padding-left:6em">combination lock briefcase</td></tr></table> <table><tr><td style="padding-left:3em">….</td></tr></table> <table><tr><td>security rating </td><td style="padding-left:3em;font-size:x-small;">[related to ╱security level] </td><td style="padding-left:3em;font-size:x-small;">[see ╱standards╱security standards╱security rating]</td></tr></table> <table><tr><td>security reminder (cf. Preventing lapses in security) (can sometimes overcome amnesia)</td></tr></table> <table><tr><td>security standards </td><td style="padding-left:3em;font-size:x-small;">[see ╱standards╱security standards]</td></tr></table> <table><tr><td>security tape</td></tr></table> <table><tr><td>security testing</td></tr></table> <table><tr><td>security tokens</td></tr></table> <table><tr><td style="padding-left:3em">relying on high production cost of certain security tokens (broad security principle) </td><td style="padding-left:3em;font-size:x-small;">[see ╱broad security principles╱relying on high production cost of certain security tokens]</td></tr></table> <table><tr><td style="padding-left:3em">security tokens for public-key cryptography</td></tr></table> <table><tr><td style="padding-left:6em">USB tokens</td></tr></table> <table><tr><td style="padding-left:9em">brands</td></tr></table> <table><tr><td style="padding-left:12em">Nitrokey</td></tr></table> <table><tr><td style="padding-left:12em">Yubikey, Yubico</td></tr></table> <table><tr><td style="padding-left:15em">Neo</td></tr></table> <table><tr><td style="padding-left:6em">general information on public-key cryptography </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography]</td></tr></table> <table><tr><td>security warning</td></tr></table> <table><tr><td>security whilst asleep </td><td style="padding-left:3em;font-size:x-small;">[see ╱sleeping, and security when asleep]</td></tr></table> <table><tr><td>security zone </td><td style="padding-left:3em;font-size:x-small;">[related to ╱broad security principles╱geospatial-based broad security principles]</td></tr></table> <table><tr><td>sellotape</td></tr></table> <table><tr><td>Sequential Access Memory (SAM)</td></tr></table> <table><tr><td>server </td><td style="padding-left:3em;font-size:x-small;">[see ╱server-client computing model╱server]</td></tr></table> <table><tr><td>server-client computing model</td></tr></table> <table><tr><td style="padding-left:3em">client (client computer/software)</td></tr></table> <table><tr><td style="padding-left:6em">client</td></tr></table> <table><tr><td style="padding-left:6em">thin/fat clients</td></tr></table> <table><tr><td style="padding-left:9em">thin clients (similar to web client computers)</td></tr></table> <table><tr><td style="padding-left:12em">X terminal</td></tr></table> <table><tr><td style="padding-left:9em">fat clients</td></tr></table> <table><tr><td style="padding-left:6em">web client computers (similar to thin clients)</td></tr></table> <table><tr><td style="padding-left:9em">Chromebook, Chromebox, Chromebit</td></tr></table> <table><tr><td style="padding-left:3em">server (computer/software server)</td></tr></table> <table><tr><td style="padding-left:6em">server</td></tr></table> <table><tr><td style="padding-left:6em">server-side processing</td></tr></table> <table><tr><td>Shamir's Secret Sharing </td><td style="padding-left:3em;font-size:x-small;">[see ╱backup╱backing-up security keys and passwords╱Shamir's Secret Sharing]</td></tr></table> <table><tr><td>shape retention ‘at rest’ </td><td style="padding-left:3em;font-size:x-small;">[see ╱‘at rest’ shape retention]</td></tr></table> <table><tr><td>shape flexibility (cf. §“Perhaps the simplest and best idea”)</td></tr></table> <table><tr><td style="padding-left:3em">(in relation to shell-suit material, silk scarves, bubble wrap, and plastic bags)</td></tr></table> <table><tr><td style="padding-left:3em">(in relation to bag/pouch)</td></tr></table> <table><tr><td>sharing, share, shared</td></tr></table> <table><tr><td>shell-suit </td><td style="padding-left:3em;font-size:x-small;">[see ╱shape flexibility╱shell-suit]</td></tr></table> <table><tr><td>shelves</td></tr></table> <table><tr><td style="padding-left:3em">physical shelves </td><td style="padding-left:3em;font-size:x-small;">[see ╱business╱shop╱physical shop╱physical shelves]</td></tr></table> <table><tr><td>shop </td><td style="padding-left:3em;font-size:x-small;">[see ╱business╱shop]</td></tr></table> <table><tr><td>shreds, shredding, shredder</td></tr></table> <table><tr><td>shrink-wrapped</td></tr></table> <table><tr><td>shutdown (computer shutdown, there are two types: graceful and hard) </td><td style="padding-left:3em;font-size:x-small;">[see ╱powering computer systems╱system power states╱sleep mode]</td></tr></table> <table><tr><td>signing/signature (digital signatures in cryptography) </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱digital signing╱signatures]</td></tr></table> <table><tr><td>silk</td></tr></table> <table><tr><td style="padding-left:3em">silk scarf/scarves </td><td style="padding-left:3em;font-size:x-small;">[see ╱shape flexibility╱silk scarves]</td></tr></table> <table><tr><td>single-key password mechanism</td></tr></table> <table><tr><td>sleep (a computer’s sleep mode) </td><td style="padding-left:3em;font-size:x-small;">[see ╱powering computer systems╱system power states╱sleep mode]</td></tr></table> <table><tr><td>sleeping, and security when asleep</td></tr></table> <table><tr><td>small business </td><td style="padding-left:3em;font-size:x-small;">[see ╱business╱small business]</td></tr></table> <table><tr><td>smartphone </td><td style="padding-left:3em;font-size:x-small;">[see ╱phones╱mobile phones╱smartphones]</td></tr></table> <table><tr><td>snooping, snoop</td></tr></table> <table><tr><td>software (cf. listed, advertised, and supported security products and services on NCSC website)</td></tr></table> <table><tr><td style="padding-left:3em">security-photo matching software</td></tr></table> <table><tr><td style="padding-left:3em">installation software</td></tr></table> <table><tr><td style="padding-left:3em">obtaining software</td></tr></table> <table><tr><td style="padding-left:6em">best practice </td><td style="padding-left:3em;font-size:x-small;">[see ╱best practice╱for obtaining software]</td></tr></table> <table><tr><td style="padding-left:6em">obtained when distributed as pre-installed OEM software</td></tr></table> <table><tr><td style="padding-left:6em">from software repositories such as GitHub’s repositories</td></tr></table> <table><tr><td style="padding-left:3em">OEM software</td></tr></table> <table><tr><td style="padding-left:6em">preinstalled, and as method for obtaining software </td><td style="padding-left:3em;font-size:x-small;">[see ..╱..╱obtaining software╱obtained when distributed as pre-installed OEM software]</td></tr></table> <table><tr><td style="padding-left:3em">different classes of software</td></tr></table> <table><tr><td style="padding-left:6em">antivirus software </td><td style="padding-left:3em;font-size:x-small;">[see ╱antivirus software]</td></tr></table> <table><tr><td style="padding-left:6em">apps </td><td style="padding-left:3em;font-size:x-small;">[see ╱apps]</td></tr></table> <table><tr><td style="padding-left:6em">bootloader </td><td style="padding-left:3em;font-size:x-small;">[see ╱boot╱bootloader]</td></tr></table> <table><tr><td style="padding-left:6em">cryptography-related </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱software]</td></tr></table> <table><tr><td style="padding-left:6em">emulators </td><td style="padding-left:3em;font-size:x-small;">[see ╱emulators]</td></tr></table> <table><tr><td style="padding-left:6em">internet browser </td><td style="padding-left:3em;font-size:x-small;">[synonym for ..╱web browser]</td></tr></table> <table><tr><td style="padding-left:6em">operating system </td><td style="padding-left:3em;font-size:x-small;">[see ╱operating system]</td></tr></table> <table><tr><td style="padding-left:6em">tools, utilities </td><td style="padding-left:3em;font-size:x-small;">[see ╱software tools, software utilities]</td></tr></table> <table><tr><td style="padding-left:6em">web/internet browser </td><td style="padding-left:3em;font-size:x-small;">[see ╱web/internet browser]</td></tr></table> <table><tr><td style="padding-left:3em">names of different software mentioned</td></tr></table> <table><tr><td style="padding-left:6em">Android </td><td style="padding-left:3em;font-size:x-small;">[see ╱operating system╱different operating systems]</td></tr></table> <table><tr><td style="padding-left:6em">ChromeOS </td><td style="padding-left:3em;font-size:x-small;">[see ╱operating system╱different operating systems]</td></tr></table> <table><tr><td style="padding-left:6em">diff </td><td style="padding-left:3em;font-size:x-small;">[see ╱software tools, software utilities╱file comparison]</td></tr></table> <table><tr><td style="padding-left:6em">diffoscope </td><td style="padding-left:3em;font-size:x-small;">[see ╱software tools, software utilities╱file comparison]</td></tr></table> <table><tr><td style="padding-left:6em">Haven: Keep Watch </td><td style="padding-left:3em;font-size:x-small;">[see ╱apps]</td></tr></table> <table><tr><td style="padding-left:6em">Heads </td><td style="padding-left:3em;font-size:x-small;">[see ╱boot╱bootloader╱first-stage boot loader]</td></tr></table> <table><tr><td style="padding-left:6em">Chrome internet browser </td><td style="padding-left:3em;font-size:x-small;">[see ╱web/internet browser]</td></tr></table> <table><tr><td style="padding-left:6em">Coreboot </td><td style="padding-left:3em;font-size:x-small;">[see ╱boot╱bootloader╱first-stage boot loader]</td></tr></table> <table><tr><td style="padding-left:6em">Google Authenticator (key- and time- based app) </td><td style="padding-left:3em;font-size:x-small;">[see ╱apps]</td></tr></table> <table><tr><td style="padding-left:6em">GPG </td><td style="padding-left:3em;font-size:x-small;">[see ╱software tools, software utilities╱cryptography╱GPG]</td></tr></table> <table><tr><td style="padding-left:6em">Linux </td><td style="padding-left:3em;font-size:x-small;">[see ╱operating system╱different operating systems]</td></tr></table> <table><tr><td style="padding-left:6em">Oracle Cloud Linux </td><td style="padding-left:3em;font-size:x-small;">[see ╱operating system╱different operating systems]</td></tr></table> <table><tr><td style="padding-left:6em">Qubes OS </td><td style="padding-left:3em;font-size:x-small;">[see ╱operating system╱different operating systems] </td></tr></table> <table><tr><td style="padding-left:6em">Raspberry Pi OS </td><td style="padding-left:3em;font-size:x-small;">[see ╱operating system╱different operating systems]</td></tr></table> <table><tr><td style="padding-left:6em">Windows </td><td style="padding-left:3em;font-size:x-small;">[see ╱operating system╱different operating systems]</td></tr></table> <table><tr><td style="padding-left:6em">Wine </td><td style="padding-left:3em;font-size:x-small;">[see ╱emulators]</td></tr></table> <table><tr><td>software developer, software development</td></tr></table> <table><tr><td style="padding-left:3em">cf. §”8 Principles of Secure Development & Deployment”</td></tr></table> <table><tr><td>software isolation</td></tr></table> <table><tr><td>software repositories</td></tr></table> <table><tr><td>sole trader </td><td style="padding-left:3em;font-size:x-small;">[see ╱businesses╱sole trader]</td></tr></table> <table><tr><td>solvent (glue solvent) </td><td style="padding-left:3em;font-size:x-small;">[see ╱glue╱glue solvents]</td></tr></table> <table><tr><td>source (source code) </td><td style="padding-left:3em;font-size:x-small;">[see ╱programming╱source code]</td></tr></table> <table><tr><td>‘spot the difference’ (game)</td></tr></table> <table><tr><td>spy, spying, spies, espionage</td></tr></table> <table><tr><td style="padding-left:3em">eavesdropper</td></tr></table> <table><tr><td style="padding-left:3em">stop funding the spies and hackers (broad security principle) </td><td style="padding-left:3em;font-size:x-small;">[see ╱broad security principles╱stop funding the spies and hackers]</td></tr></table> <table><tr><td>steganographic (steganography)</td></tr></table> <table><tr><td style="padding-left:3em">white-on-white text</td></tr></table> <table><tr><td>stereoscopy</td><td style="padding-left:3em;font-size:x-small;">[see ╱optical effects]</td></tr></table> <table><tr><td>storage media (digital storage media) </td><td style="padding-left:3em;font-size:x-small;">[see ╱digital storage╱media╱]</td></tr></table> <table><tr><td>storage components</td></tr></table> <table><tr><td>stranger</td></tr></table> <table><tr><td>submerging in water</td><td style="padding-left:3em;font-size:x-small;">[see ╱water╱submerging in water]</td></tr></table> <table><tr><td>sunglasses</td></tr></table> <table><tr><td>software tools, software utilities (class of software)</td></tr></table> <table><tr><td style="padding-left:3em">file comparison</td></tr></table> <table><tr><td style="padding-left:6em">diff</td></tr></table> <table><tr><td style="padding-left:6em">diffoscope</td></tr></table> <table><tr><td style="padding-left:3em">cryptography</td></tr></table> <table><tr><td style="padding-left:6em">GPG (GNU’s-Not-Unix! Privacy Guard)</td></tr></table> <table><tr><td>solid-state drive (SSD)</td></tr></table> <table><tr><td>sound</td></tr></table> <table><tr><td style="padding-left:3em">ultrasound</td></tr></table> <table><tr><td>SSD </td><td style="padding-left:3em;font-size:x-small;">[see ╱solid-state drive]</td></tr></table> <table><tr><td>standards</td></tr></table> <table><tr><td style="padding-left:3em">protocols (there are also protocols that aren’t standards) </td><td style="padding-left:3em;font-size:x-small;">[see ‘╱protocol’ for such other protocols]</td></tr></table> <table><tr><td style="padding-left:6em">for communication between computing devices </td><td style="padding-left:3em;font-size:x-small;">[see ╱communication╱communication protocols for computing devices╱protocols that are also standards╱]</td></tr></table> <table><tr><td style="padding-left:6em">for cryptocurrency</td></tr></table> <table><tr><td style="padding-left:9em">Glacier protocol</td></tr></table> <table><tr><td style="padding-left:6em">for cryptography</td></tr></table> <table><tr><td style="padding-left:9em">Transport Layer Security (TLS) </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱Transport Layer Security]</td></tr></table> <table><tr><td style="padding-left:6em">cf. protocols in §”Cryptocurrency-like mining to increase trust”</td></tr></table> <table><tr><td style="padding-left:3em">security rating</td></tr></table> <table><tr><td style="padding-left:3em">cybersecurity</td></tr></table> <table><tr><td>supercomputer</td></tr></table> <table><tr><td>systems</td></tr></table> <table><tr><td style="padding-left:3em">collaborative development</td></tr></table> <table><tr><td style="padding-left:6em">when used for auditing source code changes</td></tr></table> <table><tr><td style="padding-left:6em">GitHub</td></tr></table> <table><tr><td style="padding-left:3em">design</td></tr></table> <table><tr><td style="padding-left:6em">design of cyber secure systems</td></tr></table> <table><tr><td style="padding-left:9em">Too much of the book content is relevant here, for an exhaustive listing.</td></tr></table> <table><tr><td style="padding-left:9em">cf. NCSC information</td></tr></table> <table><tr><td style="padding-left:6em">design to destroy private key when tampering is detected</td></tr></table> <table><tr><td style="padding-left:6em">security by pre-loaded private key</td></tr></table> <table><tr><td style="padding-left:3em">properties</td></tr></table> <table><tr><td style="padding-left:6em">bare bones </td><td style="padding-left:3em;font-size:x-small;">[roughly opposite of..╱ ‘bells and whistles’]</td></tr></table> <table><tr><td style="padding-left:6em">‘bells and whistles’ </td><td style="padding-left:3em;font-size:x-small;">[roughly opposite of ..╱bare bones]</td></tr></table> <table><tr><td style="padding-left:6em">blackbox</td></tr></table> <table><tr><td>system clone</td></tr></table> <table><tr><td>system encryption</td></tr></table> <table><tr><td style="padding-left:3em">full-system encryption </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱full-system encryption, full-disk encryption]</td></tr></table> <table><tr><td>system power states </td><td style="padding-left:3em;font-size:x-small;">[see ╱powering computer systems╱system power states]</td></tr></table> <hr> <table><tr><td style="font-size:x-large;color:LightBlue">T</td></tr></table> <table><tr><td>tablet (tablet computer)</td></tr></table> <table><tr><td>tamper</td></tr></table> <table><tr><td style="padding-left:3em">hardware tampering (cf. “USB devices vs. SD cards”)</td></tr></table> <table><tr><td style="padding-left:3em">tamper checking</td></tr></table> <table><tr><td style="padding-left:3em">tamper evident, tamper evidence</td></tr></table> <table><tr><td style="padding-left:3em">tampering attack </td><td style="padding-left:3em;font-size:x-small;">[computer security attack, see ╱attack╱different classes of attack]</td></tr></table> <table><tr><td>tape (for computer storage) </td><td style="padding-left:3em;font-size:x-small;">[see ╱digital storage╱Sequential-access Memory╱tape]</td></tr></table> <table><tr><td>taste</td></tr></table> <table><tr><td>tea-bag marbled stained paper </td><td style="padding-left:3em;font-size:x-small;">[see ╱paper╱tea-bag marbled stained paper]</td></tr></table> <table><tr><td>tears (paper tears)</td></tr></table> <table><tr><td>telecom provider</td></tr></table> <table><tr><td>terminal for X Window System (display/input terminal) </td><td style="padding-left:3em;font-size:x-small;">[see ╱server-client computing model╱client╱thin/fat clients╱thin clients╱X terminal]</td></tr></table> <table><tr><td>Tesco online printing (UK business) </td><td style="padding-left:3em;font-size:x-small;">[see ╱business╱online printing businesses]</td></tr></table> <table><tr><td>testing (testing for security authentication)</td></tr></table> <table><tr><td style="padding-left:3em">quantum entanglement (analogy, in respect of testing one unit to determine properties of second unit)</td></tr></table> <table><tr><td>tethering (wired tethering) </td><td style="padding-left:3em;font-size:x-small;">[see ╱wired tethering]</td></tr></table> <table><tr><td>text (text-message) </td><td style="padding-left:3em;font-size:x-small;">[related to ╱language] </td><td style="padding-left:3em;font-size:x-small;">[see ╱communication╱text-message]</td></tr></table> <table><tr><td>tie-dye</td></tr></table> <table><tr><td>thin/fat clients </td><td style="padding-left:3em;font-size:x-small;">[see ╱server-client computing model╱client╱thin/fat clients]</td></tr></table> <table><tr><td>thinking outside the box </td><td style="padding-left:3em;font-size:x-small;">[see ╱mental╱thinking outside the box]</td></tr></table> <table><tr><td>Thirty-third Chaos Communication Congress (33c3) </td><td style="padding-left:3em;font-size:x-small;">[see ╱33rd Chaos Communication Congress]</td></tr></table> <table><tr><td>threat model (term complements ‘security level’ term)</td></tr></table> <table><tr><td>time-based broad security principles (broad security principles) </td><td style="padding-left:3em;font-size:x-small;">[see ╱broad security principles╱time-based broad security principles]</td></tr></table> <table><tr><td>time window </td><td style="padding-left:3em;font-size:x-small;">[see ╱window of time]</td></tr></table> <table><tr><td>time zone</td></tr></table> <table><tr><td>Transport Layer Security (TLS) (digital-cryptography based) </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱Transport Layer Security] </td><td style="padding-left:3em;font-size:x-small;">[related to ╱communication╱communication protocols for computing devices╱protocols that are also standards╱Hypertext Transfer Protocol Secure]</td></tr></table> <table><tr><td>TLS (Transport Layer Security) </td><td style="padding-left:3em;font-size:x-small;">[see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱Transport Layer Security]</td></tr></table> <table><tr><td>tokens for public-key cryptography </td><td style="padding-left:3em;font-size:x-small;">[see ╱security tokens╱security tokens for public-key cryptography]</td></tr></table> <table><tr><td>tools (software tools) </td><td style="padding-left:3em;font-size:x-small;">[see ╱software tools, software utilities]</td></tr></table> <table><tr><td>transparency </td><td style="padding-left:3em;font-size:x-small;">[see ╱optical effects]</td></tr></table> <table><tr><td>translucency </td><td style="padding-left:3em;font-size:x-small;">[see ╱optical effects]</td></tr></table> <table><tr><td>Trusted Platform Module (TPM)</td></tr></table> <table><tr><td>tossing coin </td><td style="padding-left:3em;font-size:x-small;">[see ╱random╱generating randomness╱coin tossing]</td></tr></table> <table><tr><td>TPM </td><td style="padding-left:3em;font-size:x-small;">[see ╱Trusted Platform Module]</td></tr></table> <table><tr><td style="padding-left:3em">TPM binding</td></tr></table> <table><tr><td style="padding-left:3em">TPM sealing</td></tr></table> <table><tr><td>Trammell Hudson (principal developer of the Heads BIOS/UEFI boot firmware system)</td></tr></table> <table><tr><td>transit</td></tr></table> <table><tr><td style="padding-left:3em">physical transit </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical transit]</td></tr></table> <table><tr><td>treasure map</td></tr></table> <table><tr><td>trustable hardware </td><td style="padding-left:3em;font-size:x-small;">[see ╱hardware╱trustable hardware]</td></tr></table> <table><tr><td>trusted recipient</td></tr></table> <table><tr><td>television (TV)</td></tr></table> <table><tr><td>T rays </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties╱images╱t rays]</td></tr></table> <table><tr><td>tripod</td></tr></table> <table><tr><td>TV </td><td style="padding-left:3em;font-size:x-small;">[see ╱television]</td></tr></table> <table><tr><td>two-step security </td><td style="padding-left:3em;font-size:x-small;">[see ╱2FA]</td></tr></table> <table><tr><td>two-factor authentication </td><td style="padding-left:3em;font-size:x-small;">[see ╱2FA]</td></tr></table> <table><tr><td>tweaking</td></tr></table> <hr> <table><tr><td style="font-size:x-large;color:LightBlue">U</td></tr></table> <table><tr><td>Unified Extensible Firmware Interface (UEFI) </td><td style="padding-left:3em;font-size:x-small;">[see ╱boot╱bootloader╱first-stage boot loader]</td></tr></table> <table><tr><td>UEFI </td><td style="padding-left:3em;font-size:x-small;">[see ╱Unified Extensible Firmware Interface]</td></tr></table> <table><tr><td>unicode </td><td style="padding-left:3em;font-size:x-small;">[see ╱language╱unicode]</td></tr></table> <table><tr><td>unrepeatable pattern</td></tr></table> <table><tr><td>Universal Serial Bus (USB, standard for computer peripheral communications)</td></tr></table> <table><tr><td style="padding-left:3em">USB adapters</td></tr></table> <table><tr><td style="padding-left:3em">USB connectors</td></tr></table> <table><tr><td style="padding-left:3em">USB keyboard (computer keyboard)</td></tr></table> <table><tr><td style="padding-left:3em">USB memory stick</td></tr></table> <table><tr><td style="padding-left:3em">USB public-key-cryptography security token </td><td style="padding-left:3em;font-size:x-small;">[see ╱security tokens╱security tokens for public-key cryptography╱USB tokens]</td></tr></table> <table><tr><td>USB</td><td style="padding-left:3em;font-size:x-small;">[see ╱Universal Serial Bus]</td></tr></table> <table><tr><td>ultrasound </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties]</td></tr></table> <table><tr><td>ultraviolet </td><td style="padding-left:3em;font-size:x-small;">[see ╱UV]</td></tr></table> <table><tr><td>United Kingdom </td><td style="padding-left:3em;font-size:x-small;">[see ╱countries mentioned in book╱United Kingdom]</td></tr></table> <table><tr><td>United States of America </td><td style="padding-left:3em;font-size:x-small;">[see ╱countries mentioned in book╱United States of America]</td></tr></table> <table><tr><td>unrepeatable patterns</td></tr></table> <table><tr><td>utilities (software utilities) </td><td style="padding-left:3em;font-size:x-small;">[see ╱software tools╱software utilities]</td></tr></table> <table><tr><td>UV (ultraviolet)</td></tr></table> <table><tr><td style="padding-left:3em">UV pen</td></tr></table> <table><tr><td style="padding-left:3em">UV security lamp, </td></tr></table> <table><tr><td style="padding-left:3em">UV protection glasses</td></tr></table> <table><tr><td style="padding-left:3em">UV rays</td></tr></table> <hr> <table><tr><td style="font-size:x-large;color:LightBlue">V</td></tr></table> <table><tr><td>virus (computer virus)</td></tr></table> <table><tr><td style="padding-left:3em">antivirus software </td><td style="padding-left:3em;font-size:x-small;">[see ╱antivirus software]</td></tr></table> <table><tr><td style="padding-left:3em"><there is so much information relevant here, that it may not be possible to list all of it here.></td></tr></table> <table><tr><td>visible spectrum</td></tr></table> <table><tr><td>visual display unit (computer screen)</td></tr></table> <table><tr><td>VDU </td><td style="padding-left:3em;font-size:x-small;">[see ╱visual display unit]</td></tr></table> <table><tr><td>VDU signal interception attack </td><td style="padding-left:3em;font-size:x-small;">[see ╱attack╱different classes of attack]</td></tr></table> <table><tr><td>video</td></tr></table> <table><tr><td style="padding-left:3em">mobile-phone video</td></tr></table> <table><tr><td>viewing angle </td><td style="padding-left:3em;font-size:x-small;">[see ╱view restriction╱viewing angle]</td></tr></table> <table><tr><td>view restriction</td></tr></table> <table><tr><td style="padding-left:3em">cardboard “restricted viewing enclosure”</td></tr></table> <table><tr><td style="padding-left:3em">viewing angle</td></tr></table> <table><tr><td>visual cognitive power </td><td style="padding-left:3em;font-size:x-small;">[see ╱mental╱cognitive power╱visual cognitive power]</td></tr></table> <table><tr><td>visual encoding</td></tr></table> <table><tr><td>visual noise </td><td style="padding-left:3em;font-size:x-small;">[see ╱noise╱visual noise]</td></tr></table> <table><tr><td>visible spectrum (of light)</td></tr></table> <table><tr><td>visual occlusion </td><td style="padding-left:3em;font-size:x-small;">[see ╱occlusion] (cf. occlude)</td></tr></table> <table><tr><td>visual inspection</td></tr></table> <table><tr><td>volume (space in 3D) </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties]</td></tr></table> <hr> <table><tr><td style="font-size:x-large;color:LightBlue">W</td></tr></table> <table><tr><td>water</td></tr></table> <table><tr><td style="padding-left:3em">submerging in water</td></tr></table> <table><tr><td style="padding-left:6em">electronics</td></tr></table> <table><tr><td style="padding-left:6em">water-proof container</td></tr></table> <table><tr><td>water-proof container</td></tr></table> <table><tr><td>weak currency </td><td style="padding-left:3em;font-size:x-small;">[see ╱financial╱currency╱weak currency]</td></tr></table> <table><tr><td>web client computers </td><td style="padding-left:3em;font-size:x-small;">[see ╱server-client computing model╱client╱web client computers]</td></tr></table> <table><tr><td>web/internet browser</td></tr></table> <table><tr><td style="padding-left:3em">Chrome internet browser</td></tr></table> <table><tr><td>websites referenced in book</td></tr></table> <table><tr><td style="padding-left:3em">https://www.ncsc.gov.uk/</td></tr></table> <table><tr><td style="padding-left:3em">Wikipedia</td></tr></table> <table><tr><td style="padding-left:3em">... </td></tr></table> <table><tr><td>website publishing</td></tr></table> <table><tr><td>weight </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties]</td></tr></table> <table><tr><td>weighing scales </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties]</td></tr></table> <table><tr><td>white-on-white text </td><td style="padding-left:3em;font-size:x-small;">[see ╱steganography╱white-on-white text]</td></tr></table> <table><tr><td>Wikimedia Foundation </td><td style="padding-left:3em;font-size:x-small;">[see ╱Wikipedia╱owner of Wikipedia╱Wikimedia Foundation]</td></tr></table> <table><tr><td>Wikipedia</td></tr></table> <table><tr><td style="padding-left:3em">Wikipedia</td></tr></table> <table><tr><td style="padding-left:3em">owner of Wikipedia</td></tr></table> <table><tr><td style="padding-left:6em">Wikimedia Foundation </td><td style="padding-left:3em;font-size:x-small;">[see ╱organisations and businesses╱names of non-business organisations╱Wikimedia Foundation]</td></tr></table> <table><tr><td>WiFi </td><td style="padding-left:3em;font-size:x-small;">[see ╱communication╱wireless communication╱types╱WiFi]</td></tr></table> <table><tr><td>window of time</td></tr></table> <table><tr><td style="padding-left:3em">attack window </td><td style="padding-left:3em;font-size:x-small;">[see ╱attack╱attack window]</td></tr></table> <table><tr><td style="padding-left:3em">using most secure window of time (broad security principle) </td><td style="padding-left:3em;font-size:x-small;">[see ╱broad security principles╱time-based broad security principles╱using most secure window of time]</td></tr></table> <table><tr><td>Windows (OS) </td><td style="padding-left:3em;font-size:x-small;">[see ╱operating system╱different operating systems]</td></tr></table> <table><tr><td>Wine Is Not an Emulator (Windows emulator for Unix-like operating systems) </td><td style="padding-left:3em;font-size:x-small;">[see ╱emulator]</td></tr></table> <table><tr><td>Wine </td><td style="padding-left:3em;font-size:x-small;">[see ╱Wine Is Not an Emulator]</td></tr></table> <table><tr><td>wired</td></tr></table> <table><tr><td style="padding-left:3em">wired connection</td></tr></table> <table><tr><td style="padding-left:3em">wired tethering</td></tr></table> <table><tr><td>wireless</td></tr></table> <table><tr><td style="padding-left:3em">wireless communication </td><td style="padding-left:3em;font-size:x-small;">[see ╱communication╱wireless communication]</td></tr></table> <table><tr><td style="padding-left:3em">wireless router</td></tr></table> <table><tr><td>word symbol </td><td style="padding-left:3em;font-size:x-small;">[see ╱language╱word symbol]</td></tr></table> <table><tr><td>writing optical discs </td><td style="padding-left:3em;font-size:x-small;">[see ╱hardware╱drives and readers╱optical disc drive╱optical disc writers╱writing optical discs]</td></tr></table> <table><tr><td>"write once" optical media</td></tr></table> <hr> <table><tr><td style="font-size:x-large;color:LightBlue">X</td></tr></table> <table><tr><td>X terminal (display/input terminal for X Window System client applications) </td><td style="padding-left:3em;font-size:x-small;">[see ╱server-client computing model╱client╱thin/fat clients╱thin clients╱X terminal]</td></tr></table> <table><tr><td>X ray </td><td style="padding-left:3em;font-size:x-small;">[see ╱physical properties╱image╱X ray]</td></tr></table> <hr> <table><tr><td style="font-size:x-large;color:LightBlue">Y</td></tr></table> <table><tr><td>Yubico and Yubikey brands of USB security tokens </td><td style="padding-left:3em;font-size:x-small;">[see ╱security tokens╱security tokens for public-key cryptography╱USB tokens╱brands╱Yubikey, Yubico]</td></tr></table> <hr> <table><tr><td style="font-size:x-large;color:LightBlue">Z</td></tr></table> <table><tr><td>zero-knowledge authentication protocol </td><td style="padding-left:3em;font-size:x-small;">[see ╱protocol]</td></tr></table> <BR> <BR> <table style="padding:0px;margin:0px"> <tr valign="top"><td> Foreword to first version. </td><td valign="bottom" style="padding-left:1em;padding-top:3px"> </td> </table> This book was first produced in response to a computer incident encountered during 2020 by the author of the first version of this book, in the course of his being a . He had already adopted some but then felt he really needed an overhaul of the security measures and systems he had in place. This book is aimed specifically at individuals, , and , bearing in mind that they may have . It was the author’s belief that was a real issue of concern because the mindsets of security specialists seemed to be often attuned to examining and proposing solutions within rigid frameworks: such as for example only looking at software security risks but completely ignoring physical aspects of everyday nuts-and-bolts security. A certain element of being able to , and outside one’s own specialised domain, is needed. As such, security is really a multidisciplinary field, requiring the creativity of people from all walks of life. There is special concern for the highlighted entities (individuals, sole traders, and small businesses), because of their being prone to attack due to budget constraints, and a lack of other important resources. The author of the first version of the book places his contributions into the (the author’s version hosted here [minus the Google Docs comments] will always be in the public domain). He feels that end-user security is so important, that intellectual property obstacles should be removed as much as possible, so as to enable everyday users to be able to undertake computing activities safely. This is especially of concern at the time of writing during the 2020 worldwide outbreak. During this outbreak, individuals are being called upon in great numbers to and also to socialise and conduct recreational activities using computing devices. The increasing use of is another reason why a work like this is important. <HR STYLE="margin-left:4em;"> The author only asks in return that you, if possible, do the following: #Amend this work to fix mistakes. #Add comments indicating your level of agreement or disagreement with different parts that you read/review. #Improve it in other ways. Please note that because using your contributions might require that you grant for such, it is mostly preferred that you make your contributions to the Wikibooks version of this book. <BR> <BR> <HR> Footnotes<BR> <BR> <table style="border:1px solid #76a5af;font-size:1em;color:#76a5af;padding:1em" width="100%"> <tr valign="middle"> <td align="left" style="color:#c4dbe0;" width="3%"> </td> <td align="left" style="font-size:small;color:#c4dbe0;" width="27%">Book cover</td> <td align="center" width="40%" valign="middle" style="font-style:italic;">This is the<BR> contents, index, & foreword <BR><BR> </td> <td align="right" width="26%" style="font-size:small;">Chapter 1<br></td> <td align="right" width="4%"> </td></tr></table>
414992
3371989
https://en.wikibooks.org/wiki?curid=414992
End-user Computer Security
= End-user Computer Security = Inexpensive security          for   ⦾ individuals,   ⦾ sole traders,   and  ⦾ small businesses First version written by a single author in April 2020. <BR> <BR> <table width="100%" style="border:1px solid #76a5af;font-size:1em;color:#76a5af;padding-left:1em;padding-right:1em" align="right"> <tr valign="middle"> <td align="left" valign="middle"> </td> <td align="right" style="font-size:small;">Contents, Index, Foreword</td> <td align="right" width="100px"> </td></tr></table> <HR> <BR> <BR> <BR> <BR> Footnotes<BR>
414994
1866535
https://en.wikibooks.org/wiki?curid=414994
SPARQL/Templates
Within Wikidata Query Service Query Helper the comment #TEMPLATE can build a simple template where the user can choose one or more variables to change a query without needing to know the SPARQL query language. See below an example to select presidents and their spouses from any country: The "template" contains the texts and one ore more variables.<br> The "variables" list the variables and optionally a "query" to select possible values, in this case ?id is instance of country. If no query is needed the syntax is "?var1":{} In that case that might be Mind: BIND(wd:Q30 AS ?country) is used as a default for the variable ?country.
414995
46022
https://en.wikibooks.org/wiki?curid=414995
End-user Computer Security/Main content/Software based
<BR>=𓆉≅ End-user Computer Security<BR>Inexpensive security <table ALIGN="RIGHT" STYLE="padding:0px;margin:0px;font-style:italic" border="0"> <tr STYLE="padding:0px;margin:0px;"> <td valign="top" STYLE="padding:0px;margin:0px;"> </td> <td STYLE="padding:0px;margin:0px;"> </td> </tr> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;" width="100%"> <tr valign="top" style="padding:0px;margin:0px;"><td style="padding:0px;margin:0px;"> = <table width="100%"><tr STYLE="COLOR:#009f69;FONT-FAMILY:SANS-SERIF;"><td>Software based</td><td align="right">  /  Chapter 1</td></tr></table> = </td><td valign="bottom" style="padding-left:1em"> </td> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Security of BIOS/UEFI firmware. </td><td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> A computer may be due to its / being infected with (such infection occurring due to malevolent forces). This applies to , , and conventional . Because of this possibility, sometimes it is necessary to the BIOS/UEFI firmware. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Custom BIOS/UEFI and which one to use. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> A custom / that has higher security to a vendor's BIOS/UEFI, can be . It sounds like a good idea to do this. The Qubes OS 4.0.3 guidance in fact recommends installing, in place of a hardware vendor's BIOS, the custom BIOS/UEFI called Coreboot. "All ChromeOS devices (Chromebooks, Chromeboxes, Chromebit, etc) released from 2012 onward use coreboot for their main system firmware. ..."    -   The above excerpt indicates that with a Coreboot firmware freshly downloaded through a hopefully non-compromised device, likely works. Using the MrChromebox Coreboot firmware for a Chromebook seems likely to be more secure than the standard Chromebook firmware. It seems that Coreboot can also be installed as the firmware for an Android phone. The Heads BIOS/UEFI boot firmware system keeps a stored in , so that the bootloader no longer has to be an in relation to storing a bootloader on a drive (, etc.) Heads appears either to be an adaptation of Coreboot, or a system that runs over Coreboot. Either way, using Heads instead of vanilla-flavoured Coreboot appears to provide better security. Heads (and perhaps also Coreboot), can make use of a 's TPM , to ensure computer firmware has not undergone any tampering. It can also be used to ensure a high-quality security system, partly because of the destroy-key-when-attacked security but also because of the system being present in the TPM. The National Cyber Security Centre for the UK (NCSC) highlights the importance of updating firmware, and provides related guidance and information (see here and here). <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Regarding operating system. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Installed operating systems (es) must be safeguarded—they are vital for ensuring computer security. Using an preinstalled OS is prone to the attack of having the related machine intercepted and hacked before reaching the customer (especially on a targeted-individual basis). More secure ways for obtaining an OS’s are described in this document, in the section entitled “Regarding how to obtain software”. Once installed, the security provided by the OS, will likely mean that one can then further from over the without much worry (assuming reasonable security precautions are taken). Some general security advice in relation to using an operating system, is for users to have an that is different to the standard account users use for everyday computing. The standard account has fewer . The more powerful administrator account, that also has higher associated security risks, should also have a “minimised” exposure to risk due to it being used only when needed—when not needed, the less risky standard account is instead used. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Which OS? <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> The operating system has a than the operating system. Being able to , and not being able to do the same with Windows, adds to Linux’s security, which is expanded upon later on in this document (in the section entitled “Compiling from source”). It can be slightly irritating to have to choose Linux over Windows, given the various advantages in using Windows, but can be necessary to ensure security. Windows such as Wine, can perhaps be effectively always used whenever needing to run some software meant to be run over Windows. There is unlikely much point in between Windows and Linux because if Windows is hacked, then the Linux installation can then also be hacked through the hacked Windows, thereby undermining the security advantages Linux affords; in fact this point is specifically mentioned in guidance on the Qubes website. If going for Linux, the Qubes 4.0.3 distribution of Linux appears to be perhaps the best in terms of being most secure, and is at least one of the most secure distributions of Linux. So installing Qubes OS 4.0.3, if installing a Linux distribution, seems like a good idea. Some platform-specific (and OS) guidance from the National Cyber Security Centre (NCSC) is available here. Qubes OS 4.0.3 side-by-side with other operating systems. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> is documented as not coping well with that specifically benefits from . Since a user may well want to use such optimisation, the best way to use such optimisation on the same machine might be to do something like, or the same as, the following: By following the above steps, and choosing the most secure options in the steps, because of: any such other OS should not be able to access or even ‘touch’ the Qubes OS installation, thereby hopefully safeguarding the Qubes installation from attacks conducted through the other presumably-less-secure OS. How to ensure installed operating system is not compromised via an evil maid attack, during periods when machine is not meant to be on. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> If: then it appears that this will quite likely adequately secure the operating system from becoming compromised via an , during those periods in which legitimate users have set the machine to be in a powered-off state. An alternative way is to keep the operating system stored on a that you lock away, and of which you perhaps keep multiple copies stored in different locations in order to help make sure any one selected copy is the “genuine article”; however, be aware that system speed is often degraded when running the operating system in such fashion. Regarding how to obtain software. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> will likely find it much harder to replace every single copy of a particular with -modified versions, in a large physical shop, than to do the same replacement with or goods delivered to specific end-users. Because of this, the broad security principle outlined in the “User randomly selecting unit from off physical shelves” subsection probably applies at least to the obtaining of the foundation software required for operating a computer (i.e. the , , etc.) and at least in terms of part of the overall solution used. The broad security principle(s) outlined in the “Ordering many units of same product” sub-section also applies. Borrowing software and may be another through which software can be usefully obtained. Once an operating system and BIOS firmware have been (re-) for a computing device, downloading software through the device with standard security precautions in place (eg. using connections, , etc.) may become sufficiently secure for obtaining further software. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Secure downloading. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> What are you to do if all your computing devices have been compromised, and security cannot be reestablished in the devices except through using certain software on the devices that is available only via (such as certain)? It can be expensive to buy a brand new computer, if not on one particular occasion, then on some number of occasions whenever security needs to be re-established. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Getting an uncompromised smartphone and obtaining software with it. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Key advantage. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> The advent of appears to be of great benefit to this problem. It looks like a cheap uncompromised smartphone for simply over , that is and boxed fresh from its factory, can easily be bought by first physically visiting a large store geographically distant from an 's address, and then secondly by and personally selecting such a phone from very many other such phones, off the physical shelves of the visited store (principle outlined in “User randomly selecting unit from off physical shelves” section). <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Downloading to SD cards. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> The section entitled “Digital storage” in this document, provides information about some of the security issues surrounding the use of when using them in for the of . <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Transferring downloads to installation media. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Getting the on to suitable for computing devices is perhaps something about which to think. It seems it is possible to get and for . You can also get used in . Many have built-in for interfacing with , and on such laptops, according to Wikipedia, it appears it is sometimes possible to , which has the potential of greatly simplifying things. From brief , formatting media used just for storage and retrieval (eg. with a , , SD cards, etc.) as , solely by means of an and the connected together, is quite likely not very difficult to do. Bootable media is often needed when certain classes of . Please consult the section entitled “Digital storage” for further guidance on which storage medium to use. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Cost. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> The price of purchasing such a phone might initially be of concern, with minimum prices for such a phone perhaps starting at around the £40 mark. However, it should be possible to recoup some of the money spent, by simply selling the phone on as a device once it has been used. There is a possibility that a might be cheaper than a phone; prices should be investigated regarding this. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Old or new phone. </td><td valign="bottom" style="padding-left:1em"></td> </table> It is also generally better to use a brand new phone, rather than an old phone even if you are sure the old phone hasn't undergone any . The reason being, is that brand new phones should be more secure, due to: <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Some other advantages. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Using a or , perhaps is more secure than using a , because a and -based key perhaps effectively reduces or removes the effectiveness of . Also, smartphones are very popular, this should make selection by physically going to a store, much easier and more potent (because so many units should be available 'on the shelves' and because more stores should stock them.) Also, reliance can be made on a higher amount of security testing because of the greater market need for , and because of the greater unit production, compared with devices like the device. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Similar to ‘burner phones’? </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Interestingly, using so-called ", seems to be closely related to the suggestions made in this “Getting an uncompromised smartphone and obtaining software with it” section. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Whether to use a Raspberry Pi Zero device instead. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> It initially seemed that the most especially when you suspect your existing computers may have been compromised, was to buy a brand new Raspberry Pi Zero product, from off the physical shelves of a store, by means of users personally selecting a device at the store using selection, and then to use that device for downloading. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Pros vs Cons. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Pros: <TABLE WIDTH="100%" STYLE="PADDING:0px;MARGIN:0px;border-spacing: 0px;" BORDER="0" ><TR><TD STYLE="PADDING:0px;MARGIN:0px;border-spacing: 0px;" WIDTH="1px" > </TD> <TD STYLE="PADDING-LEFT:10px;"> </TD></TR> <TR><TD></TD><TD STYLE="PADDING-LEFT:10px;"> </TD></TR> <TR><TD></TD><TD STYLE="PADDING-LEFT:10px;"> </OL> 's security information published here seems to support point 2. Reflection on how mostly involves the application of (such as the implementation of certain , , etc.) also clearly inclines one to believe that malware can be detected in source code on occasions where detection in compiled code is either difficult or impossible. Also, publicly hosted source code (such as in public GitHub), can have “many eyes on it” through public of the , including those of , checking over the code (sometimes simply as a step to accomplishing something completely different, such as the contributing of new code to a repository) so as to reveal malware. GitHub also appears to have special provisions for detecting malware, as documented at the GitHub just mentioned. If the detection of malware in source code is computationally expensive, perhaps providers like GitHub, can (or maybe they already do) run automated malware-detection algorithms in the background on their repositories using powerful , perhaps sometimes running for several months, for the detection of malware in source code. Also, GitHub’s structure essentially all source code changes, which undermines many of the efforts aimed at trying to introduce malware into software. These thoughts incline one towards choosing to obtain source code from GitHub rather than the website of some specific software development entity. They also incline one towards choosing to build from source. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> <tr valign="top" style="padding:0px;margin:0px;"><td style="padding:0px;margin:0px;"> Reproducible builds. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td></tr></table> Trammell Hudson said that are important in his 2016 talk, the video of which is hosted here [go to time 31m:07s] (presumably for security reasons). It’s not clear that reproducible builds offer a significant security benefit over simply from . However, they probably do given the promotion of it by other notable individuals. It seems like reproducible builds are good at uncovering certain security compromises more in relation to compromises in the Provider's system than compromises in the user's system. However, since the two (the Provider's system and the user's system) are interdependent, the uncovering of such compromises necessarily means that the user's security is also somewhat increased. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Using `` utilities. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> `Diffoscope` appears to be a potentially useful utility for detecting introductions between released versions of , when the “ protocol” is being used in . The Wikipedia page on , implies that the from such closed-source software, in an automated way, and then running `` on the source code, likely can better uncover malware introductions. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Full system encryption, full disk encryption (FDE). </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> should probably be considered as required when using a computer for business purposes. There are that can provide such . Usefully, the Qubes OS FAQ says that has full-disk encryption installed by default, so if you use Qubes 4.0.3, you probably won't need to take extra steps to make sure full-disk encryption is set-up. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;padding-left:7em;"> Malicious sneaky replacement of FDE system<br>with historic clone of system that has known vulnerabilities. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Description of attack. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> An can exploit that a particular system has been full-disk encrypted with the same used over a long period of time. For example, suppose was with the same key three years' ago, and that an attacker cloned the system three years' ago. Then suppose that in the present day it was known that there were with that historic cloned Windows installation. An attacker could maliciously replace the contents of the system disk with those recorded three years ago, unbeknownst to the user. The user logs in, with their same , and doesn't suspect that the system is three years old. Then the attacker can potentially exploit in the system that is used by the user in the present day, even though the system is in fact the user's system from three years ago, with in it that are known about in the present day. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Remedy. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Way to mitigate against this type of attack: change and passwords on a regular basis, quite frequently (perhaps once per month) but not too frequently so as to wear out the system disk unduly (usually a or). Interestingly, could this solution benefit from old that users give away for free, so as to mitigate against the costs of having to deal with the deterioration of due to them being frequently each time the key changes <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Bootloader for FDE. </td><td valign="bottom" style="padding-left:1em"> </td></table> As was hinted at in the subsection entitled “How to ensure installed operating system is not compromised during periods when machine is not meant to be on, via an evil maid attack”, securely storing the away from the computer during periods when your computer should be in a state, is a good idea. The reason is that the bootloader, as stored in the computer system, is a potential . The Heads system partly overcomes the traditional form of the by actually storing the bootloader in the internal of the computer system, rather than on an internal (or as just suggested, externally, outside the computer system). It is not certain whether storing the (such as on an) such that it can be locked away securely, is more or less secure than the solution presented by the Heads system. However, it is suspected that the Heads solution is more secure because otherwise the Heads creator probably would not have implemented it. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Factory resets. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Could it be a good idea to perform on , on a regular basis? If doing such resets gets rid of any that may have managed to get its way on to the devices, perhaps it is a good idea to do such resets perhaps once per week, on a Monday, just before starting the working week. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> According to device type. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Web client computers. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> With (like the Chromebook), it is likely that there are very few -and-restore concerns about doing a , because are often mostly stored (and consequently) in the . <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Smartphones. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> With a , it might take longer to configure after each , but still should be relatively straight-forward to do. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Conventional laptops. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Doing a for a conventional is more of an issue. Intensive use of the internal , for any frequent periodic factory resetting, is likely going to , significantly, detrimentally, and unacceptably, in the situation where replacing the drive is not an option (perhaps because of financial constraints). Also, the amount of data requiring between such resets, is likely going to be inhibitive. Please note that if you decide to use a for the loading of your and perhaps also for other pieces of , where the / has been contrived so that it is virtually impossible to change the data on the medium (see the section entitled “Rewritable media vs optical ROM discs” to find out how to do this), factory resetting with respect to your operating system and perhaps other software, can become entirely unnecessary, and in certain situations, can overcome these issues regarding the undue . <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Some other issues. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Internet connection during reset process. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> and quota will be needed to cope each time a needs to be updated after such factory . A standard should normally be able to be used without security concerns for such updates because man-in-the-middle normally are not possible due to connections (or other such connections) being used for the updating. However, a does exist if any of the historic upon which reliance is made, and that date back to the time of the production of the device, become compromised (which can happen outside of your systems) in the intervening time between the time of the device’s production and the time when the is performed. If this vulnerability is considered a significant danger, an owner may deliberately choose not to factory reset their device to avoid the danger—instead, the device’s and can possibly be reinstalled through other means such as those outlined in the section entitled “Regarding how to obtain software”. Any alternative means should be evaluated according to whether the alternative means are practicable and whether they are less dangerous. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Sufficiency. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Is of devices sufficient for removing even when there is no risk of attacks happening during the factory resetting? Unfortunately, it is not sufficient in all cases. Whenever malware has infected the / , there’s a chance that factory resetting will not be sufficient to remove the malware. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Cookies. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> An irritating thing about a can be that it wipes all of your stored . In order to retain your cookies, try using a and restore utility for your cookies. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Sandboxing and cloud computing. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Connected with the concepts of physical isolation and locks, are the concepts of and . Qubes OS 4.0.3 and Chromebooks specifically use sandboxing to mitigate risks in . The concept of sandboxing can, to a certain extent, be extended to cloud computing where there is software isolation based on processing in the delivery of software that on the , only requires software (sometimes the software is simply a). This essentially shifts the problem of to one that is largely a server-side security problem, which is easier to handle in certain respects. Please note though that cloud computing can present new security risks, such as those related to storing your data remotely rather than locally. You may wish to run your software using cloud computing resources, and interface with the software just using thin clients, as a possible way to improve your security. For example, you could create an compute instance, install Linux software on it, run the software remotely, and then access the software’s using an (thin client) run on the client side. An alternative simpler way to ‘cloud compute’, is simply to use a Chromebook in conjunction with the many available for . <BR> <BR> <HR> Footnotes<BR> <BR> <table style="border:1px solid #76a5af;font-size:1em;color:#76a5af;padding:1em" width="100%"> <tr valign="middle"> <td align="left" width="3%"></td> <td align="left" width="27%"></td> <td align="center" width="40%" valign="middle" ><BR> Contents, Index, Foreword <BR><BR> </td> <td align="right" width="26%" style="font-size:small;">Chapter 2<br></td> <td align="right" width="4%"> </td></tr></table>
414996
46022
https://en.wikibooks.org/wiki?curid=414996
End-user Computer Security/Main content/Passwords and digital keys
<BR>=𓆉≅ End-user Computer Security<BR> Inexpensive security <table ALIGN="RIGHT" STYLE="padding:0px;margin:0px;font-style:italic" border="0"> <tr STYLE="padding:0px;margin:0px;"> <td valign="top" STYLE="padding:0px;margin:0px;"> </td> <td STYLE="padding:0px;margin:0px;"> </td> </tr> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;" width="100%"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> = <table width="100%"><tr STYLE="COLOR:#009f69;FONT-FAMILY:SANS-SERIF;"><td>Passwords and digital keys based</td><td align="right">  /  Chapter 2</td></tr></table> = </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Password security. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> is a very important issue as nowadays, it is not at all uncommon for users to be maintaining many accounts, some of which may be providing extremely important functionality, and that each require their own security credentials. Additionally, another reason why it is important, is that it is often good practice, and sometimes even , that users change their on a regular basis. All these things put together, can appear to constitute something of an ordeal when it is remembered that users somehow have to keep and ordinarily also be able to call to mind, all of their passwords, which could potentially be very many. In these respects, it seems prudent that an overall password security strategy be developed. General information from the National Cyber Security Centre (NCSC) on password security is available here. Information and guidance from the NCSC on what makes a good password is available here. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Password managers. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> . A user can log into their Google account so that the account providing the settings of their , is the Google account. The Google account can then store very many different , for different online accounts, that no one actually knows (it can be set so that even the user doesn’t know them). These passwords can also be generated so as to create , again, that no human being knows. When the user goes to the login screen for one of their accounts, where the password for the account has been saved in the manner just described, the Chrome browser automatically fills-in the password for the user, without the user having to call to mind the password or even to know it. In this way, a user can have different strong passwords for their different accounts, that can easily be changed, without any human being actually knowing any of the passwords. There are other tools that also have this kind of functionality. National Cyber Security Centre (NCSC) information and guidance on (aka password vaults) is available here and here. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Multi-step authentication and multi-factor authentication. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> The security of is ordinarily enhanced by using either . The ‘multi’ aspect is often two (i.e. two-step authentication). MFA is a means for overcoming mind-reading attacks. When Google’s is set for a Google account, so that two-step security is used every time the user logs into their , it in a way, to some extent, translates to a two-step level of security for those online accounts of theirs, that exclusively have their passwords stored in the user’s Google account using the secret way outlined in the previous subsection. offers a variety of second steps in their two-step security settings, including and . The National Cyber Security Centre for the UK (NCSC) recommends that users set-up 2FA (two-factor authentication) on all their important accounts. More information and guidance from the NCSC on multi-factor authentication can be found here. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Non-Latin alphabet. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> can be by using an not so well known for the password. Non- will likely fit this description. It's probably best to mix several different alphabets together, for maximum security. This might be easier than initially thought, because within certain familiar domains such as and , (such as from the). Choosing letters that have uncommon may provide further security. can also perhaps be used, including , to increase security even more. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Concerning certain password attack vectors. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Screen privacy. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> The unfortunately (at the moment) displays suggested on the , which is open both to psychic attack and signal interception . To overcome these attacks, simply move the Chrome so that when Chrome tries to display the , the displaying occurs outside the boundary of the screen, thereby preventing it from being displayed. As detailed later in the subsection entitled “Privacy screens”, can be used as a defence against the of the visual emanations emanating from your screen, which can have the knock-on effect of interfering with . <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Keyboard privacy. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Visual spying of keys pressed </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> <table style="margin-top:.7em;padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;">Complete occlusion</td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> A “restricted viewing enclosure”, with room for hands, can be constructed to go over keyboards. Once placed over keyboards, the user must look through the two eye holes (like looking through goggles) or some other kind of narrow viewing port, to be able to see the . User then places hands through hand holes, and types their . In such ways, casual onlookers as well as cameras (or otherwise), cannot see what is being typed, because the cardboard construction prevents such seeing, through visual occlusion formed by the cardboard. <BR> Example cardboard “restricted viewing enclosure” installed on <BR> Partially-closed laptop for keyboard-typing privacy Another way to provide a level of occlusion from spies relying on of the , is to move physically, your and/or its parts accordingly. In the case of a , this might involve partially closing your laptop (moving the screen closer to the keyboard based on pivoting around the laptop’s hinge[s]) but not so much so as to trigger the . <table style="clear:both;margin-top:.7em;padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;">Distance-dependent occlusion (privacy keyboard screen)</td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Using the material commonly found in the , you can create a short table of sorts (perhaps 10cm to 20cm tall) to go over your computer . Hopefully, when you type with the table installed, you must move your eyes close to the table surface to see which you are pressing. The hope is that from too far away, all you see are , due to the special material being used for the table’s surface. By installing such a feature, you will better prevent from recording your . This could be very useful if you travel and spend time using your computer in different hotels where could easily be installed. It is not certain that this will work, but it appears likely that materials with such and reflective properties really do exist; so far no information on them has been found through . Perhaps another way to achieve the same effect, is to use or see-through , that has very high properties. It is suspected that old and can possibly be recycled to create such privacy screens. It is also suspected that material that is and , could quite likely help in creating such privacy screens. It should be noted that angle-dependent occlusion (rather than distance-dependent occlusion), as in restricting , may also be helpful for establishing keyboard privacy. As such, the later section entitled “Privacy screens” is relevant to the subject of privacy keyboard screens. In conclusion however, for simplicity and ease, probably the best way to devise such a screen is simply to use a kind of material. For example, are used by for the condition, to identify vision in spite of the condition. From far away, the glasses just appear as small holes in some plastic. However, from close-by, being worn on an individual, an individual can see through the pinholes. The principle appears to be relatively straight-forward, based on the of as they pass from objects ahead of a viewer, towards the viewer. It is strongly suspected, such "pinhole glasses" material can be created by simply poking several holes through a sheet (which could provide a "low cost and home made" based advantage). <table style="margin-top:.7em;padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;">Using morse code</td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> One of the most straight-forward ways to counter the visual of the pressing of , is to resort to entering your using or some similar password mechanism. A user can easily surreptitiously enter in their password using morse code whilst also having the appearance of writing something completely unrelated to entering a password. The user’s hands can additionally be placed so as to occlude the visual capture of the morse code being entered. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Spying of electronic keyboard signals </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Using a keyscrambler software, seems wise and a sensible . As outlined later in the section entitled “Psychic spying of password“, it is also effective against certain psychic attacks. Basically, what you type, say for example, for a , is not what gets entered as the password—it is . Without knowing how to encrypt the key presses, it is impossible to know the actual password used, by means of conventional . <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> General visual spying. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Hiding materially-written passwords </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> technology can be used for hiding on , so that they can only be seen from certain viewing angles. (which appears either to be related to or a type of holography) appears potentially capable of providing a cheap, mostly home-made, and way to make holograms or something like holograms, capable of hiding passwords in this manner. Perhaps lenticular-printing security can be achieved simply by using something like placed over a print-out from a conventional . Alternatively, passwords can possibly be hidden by them being printed on paper using that has slightly different properties to the rest of the paper. When viewed from a certain angle, the hidden text will possibly be due to the greater reflection of light from the ink, such that from other viewing angles, the reflection is not strong enough to reveal the text. Instead of using reflections, using other effects based on the use of materials, perhaps can be employed for roughly the same thing. A reflective effect used in an opposite way, such that higher degrees of reflection effectively blot out the password and lower degrees instead reveal the password, may also be effective. Perhaps an even more interesting effect can be obtained if passwords are only revealed when monitoring all in the movement of an object. This could perhaps be done by an object containing the hidden password, where the containment was such that the first frame shows just the first letter, and the last frame, at which time 180° rotation is achieved, shows just the last letter of the password. These kinds of effects appear to be possibly achievable with certain kinds of moving hologram, and also with certain kinds of lenticular printing. By using a , hidden things can be written that are not at all visible to the . Using an , ought to reveal such hidden things. But perhaps even more interesting, is that it seems may also be able to see such hidden things. This effect appears to be widely accepted as a means for card players to at like . To obtain such glasses, it might be best to order a pair of ordinary (for the), with the option chosen for them to undergo special treatment for ; if you already use looking glasses, you may find that any extra expense incurred, ends up being inconsequential. Such may be particularly handy for the paper-based keyboard mentioned in the “Protection using password encryption” section that shortly follows. There are also ‘classic’ old-fashioned ways to hide passwords, such as in a completely unrelated document by very weakly -underlining the letters making up your password. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Overcoming vulnerabilities in visual encodings </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> The prevalence of technology likely means the very many types of visual encoding for , can simply be recorded using camera technology with ease. Later can assist in also perhaps with ease. Encoding passwords as flavours on a strip of paper, might overcome these . If the paper can be designed so that it can only be 'tasted' once, then you have the advantage of being able to detect whether the password has already been 'read'. Technology to taste small 'dots' of flavour on pieces of paper, is likely not prevalent and is likely very expensive if it is at all possible (it might be possible with the aid of machines like , but such machines are normally very expensive and require highly specialised skills that only a small minority possess). Once a flavour-encoded password has been 'read' (tasted), it can be destroyed if it is still able to be 'read'. Another potential way of encoding passwords to overcome -related vulnerabilities, is to use non-visible . The non-visibility aspect of the braille may be hidden by means of , or simply visual absence (of the specific markings used for the braille). <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Psychic spying of password. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Protection using password management functionality </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> The features of also constitute one way of overcoming psychic password spying (basically, mind reading). Because only the 'computer knows' the individual , psychic attacks simply don't work here so long as the . <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Protection by thinking little </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> extremely well , such that entering doesn't involve the of the password, is perhaps another way to prevent psychic attacks aimed at illicitly learning of passwords. If the password is called to mind merely as finger presses of keys, where exactly which key is pressed is hardly thought about by the key presser (where reliance is made on , rather than on conscious thoughts), probably it will be hard for those relying on powers, to figure out what the password is. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Protection using password encryption </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> <table style="margin-top:.7em;padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;">With technology</td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Another mechanism to protect against psychic attacks, is to have some piece of on your local computer, that translates the in your mind, into another one, where the other one is the one used to log-in (say to your). Keyboard software is one such kind of software. Psychic attacks can get hold of the password in your , but because the real password for logging-in, is one derived from the software and your memory combined, the 'psychic attacker' can't get hold of the real password without also having the software. The software’s could perhaps be simply the of some never-known to the password called to mind by the user. In the case of any entity trying to force the account password out of you, . This kind of security feels like it might be aptly labelled as a kind of . <table style="margin-top:.7em;padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;">Without technology</td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Using a paper-based keyboard is perhaps a good idea to mitigate against psychic attempts to obtain your password. What you do, is you simply create a paper-based overlay for your , where the key are scrambled. You type your as you remember it, into the scrambled keyboard. You then pack away your keyboard scrambler, perhaps even locking it up till the next time you need to use it. In such fashion, whilst a psychic attack might obtain the password from your , they will not actually know the password, because that password in effect has been through the paper-based scrambler. In fact, if you don't the paper-based scrambler, then not even you know the true password, which seems really good. It's important to block the of the paper keyboard scrambler, which can happen by means of . In this regard, folding it up when you don't need to see it, seems like a worthwhile precaution. A paper-based keyboard scrambler is particularly useful because of how much it costs to create. It's entirely feasible and economical to use a new encoded in the scrambler, each week, by simply discarding the last paper-based keyboard scrambler, and making a fresh one. Also, the fact that it is not based on or , is another attractive attribute of this . <BR> Example paper-based scrambler installed on a <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Based on password reuse. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> For National Cyber Security Centre (NCSC) information on specific concrete not to use , see here. For NCSC security guidance and information in relation to a user , see here. For NCSC information on the attack known as , that exploits the habit of users , see here. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Digital cryptography: <BR>security certificates, keys & tokens. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Disabling TLS security certificates. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Why not turn off certain security ? This seems like a prudent measure. Not all certificates are to be with the same level of trust. Also, it's likely that not all certificates are actually generally needed; in fact, perhaps only a small number of security certificates are in reality needed. How about disabling all security certificates by default, and then selectively turning them on as and when they are required? Can even turn them off once they have been used. This should help to detect attempts at and/or over the protocol (and other like systems). <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Making sure certificates are genuine. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Ensuring security are not compromised, seems very important. To this end, multiple checks on them, perhaps in an automated fashion, seems like a good idea. Simply doing spot-checking to make sure that security certificates on a particular device have the correct , by comparing them with the keys from another computer or source, may be enough. A user could export security certificates to an and then when using a different system (such as a different network or different), the user could then obtain differently sourced certificates, and check they are the same to the ones the user already has. Could be particularly applicable when in another country, as well as when visiting friends, etc. For example, in , the government may with security certificates, but users can then visit other countries, re-obtain the certificates, and figure out that the government is tampering with their security certificates. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Key servers. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> The notion of seems very much applicable here—they can probably be used for verifying security , and generally speaking, they probably ought to be used for this and other types of . Use of software such as GPG can be used perhaps to automate the task of key-server-based verification of keys. GPG apparently is available in the Heads firmware boot verification system (Heads was mentioned earlier in the section entitled “Custom BIOS/UEFI and which one to use”)—running GPG as firmware may be best to minimise the risk of the being compromised. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Cross authentication. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Is there a way to get to cross-authenticate certificates from other such authorities? Does it happen automatically? If not, it sounds like a good idea to have such a mechanism in place. For example, you may be able to discover that one certificate has been compromised on your computer, through the signed message of another trusted certification authority revealing what the compromised certificate’s should have been. Relevant information on this subject might be found . <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Non-compromised communication of public keys. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> simply through might be considered as being . The additional use of a , or maybe multiple key servers, may be useful for increasing in keys (which is touched upon above in the “Key servers” subsection). The novel Bitcoin-related method for increasing trust in public keys, described in the Appendix, may also be useful for improving user trust in published keys. However, what other ways can be used for communication of ? <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> <TABLE STYLE="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;margin-left:10em;"><TR style="padding:0px;margin:0px;"><TD style="padding:0px;margin:0px;"> Sending to trusted recipient such that the recipient can hand it over without encountering MITM vulnerabilities, to the end-user. </TD></TR></TABLE> </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> One possible solution is to get the organisation represented by the , to send the to a trusted recipient who can then hand it over to the where in the handover there is no or virtually no possibility of man-in-the-middle attacks. It might be ideal that the trusted recipient , in order to mitigate against security risks associated with computing technology. The user can physically travel to the recipient, rather than have the key or sent on to the end-user (thereby reducing transit risks associated with MITM attacks). A perhaps novel solution, that might be ideal, is for the trusted recipient to be an business, such as Tesco’s, Kodak’s, or Boots’s photo printing. Several trusted recipients can be used to detect better, compromises in such . <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Publishing public keys in a “gazette”. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> There is still the chance that an ’s request for such transmission to a trusted recipient is compromised through attacks. To mitigate against this, instead of organisations doing such sending of on a per-end-user-request basis, the organisations can periodically do such key sending to key locations in the geographic areas of their markets. Doing such sending, is similar to simply periodically the in a well-known . <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Piggy-backing over bank transactions and systems. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Using bank references </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Another method of , that might be quite secure, is to piggy-back over the 's . For example, the organisation can do a transfer for a nominal, trivial, and negligible amount to the , with the bank reference being a to be sent. The end user can then visit a local , where the security is likely to be very high, and find out the bank reference used, and consequently the public key. Not only will the security at the branch be high, the security of the overall banking system is likely to be very high, thereby perhaps ensuring quite secure communication of the public key. To ensure that the transaction is genuinely from the organisation, perhaps your local branch can offer a service where they can give you useful details of the account that paid you (such as possibly the , etc.) You can then possibly authenticate that the source of the was indeed the organisation. By ramping up the value of the transaction, perhaps further trust can be attained through the relatively high amount of money spent in the transaction. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Using different monetary amounts </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> If it is believed that the transaction reference may be compromised, then reliance can instead possibly be made on the monetary amounts of transactions. For example, to send the 1735 8513, a sender can make a series of 8 : the first being for 1 pence, the second for 7 pence, the third for 3 pence, and so on. Because banks invest heavily in the of transactions, this could be quite a secure way to communicate such information. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Using a weak currency </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Interestingly, using a could be better for such transactions, to bring down overall costs—perhaps a suitable demonimination might be available in order to bring down the overall costs. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Google Authenticator “key and time”-based app for security. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> A security method to mitigate against a certain type of , involving the Google Authenticator time-based system to ensure a computer has not been secretly replaced with another potentially compromised one, is described by Trammell Hudson in his 33c3 talk (it was previously described by). It is as follows. The stored in the Trusted Platform Module can be a private key only shared with . Then once you log into your system, the TPM essentially " the current time (rounded, perhaps to the nearest five minutes) with the key. Google then does the same through the 'Google Authenticator' system at their remote . In both instances of signing, the key is already with the respective party (so no transmission takes place, at that time, of the private key). The created using the TPM is displayed on the computer screen; the digest created by Google, is displayed on the user's through the 'Google Authenticator' app. The user compares to make sure the message digests are the same. If they are the same, the user can be sure that an evil-maid attack hasn't occurred where the entire computer was secretly and deceptively replaced with another. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Tokens for keys. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> It looks like -Neo and -Neo-N tokens, in the product family (produced by Yubico) can have their keys changed from a computer (like the Nitrokey product) {see here for info on this}, which meets a requirement of having keys in such tokens different to those set when the tokens are sold off-the-shelf. Additionally and fortuitously, because the Yubico brand appears to be more popular than the Nitrokey brand, it appears that there's an increased chance that it will be found on the shelves of popular computer stores (such as , etc.) {could be handy if employing principle detailed later on in the section entitled “User randomly selecting unit from off physical shelves”}. Also, they seem to be considered as being secure, with Google having mandated that all their employees use them for security. So it seems likely that generally, instead of opting for the less available Nitrokey product, one should instead get a Yubikey product that has the facility to have new keys assigned to it by the transference of them from a standard . If, for some user, it becomes or is such that the availability of Nitrokey products is the same or better than that of the Yubikey products, then it may well be better for that user, to opt for Nitrokey products instead, since in other more conventional respects, Nitrokey products do appear to be more secure. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> External links for further information on security certificates. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> For National Cyber Security Centre (NCSC) guidance describing how should be initially provisioned, and how supporting infrastructure should be securely operated, see here. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Backing-up security keys and passwords. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr valign="top" style="padding:0px;margin:0px;"> <td style="padding:0px;margin:0px;"> Shamir's Secret Sharing. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> The developer of the Heads verification system (Heads was mentioned earlier in the section entitled “Custom BIOS/UEFI and which one to use”) has provided a potentially useful way to backup and . He suggests splitting a key (or password) into say five different sections, and backing-up each section in a different way (perhaps by sending each section to a different friend). If recovery of the key is then needed, a threshold number of the sections can then be retrieved, and put together to recover the full key (perhaps in an automated way using specialised software.) The idea of splitting the key into several sections is apparently the basis of a known as . An interesting thought, is that wealth could potentially be this way, like creating a —perhaps it doesn't matter if it takes a year to trace the treasure using the treasure map, because the wealth is such that it doesn't need to be obtained straight away. <BR> <BR> <HR> Footnotes<BR> <BR> <table style="border:1px solid #76a5af;font-size:1em;color:#76a5af;padding:1em;" width="100%"> <tr valign="middle"> <td align="left" style="color:#c4dbe0;" width="3%"> </td> <td align="left" style="font-size:small;color:#c4dbe0;" width="27%"> Chapter 1<br> </td> <td align="center" width="40%" valign="middle" ><BR> Contents, Index, Foreword <BR><BR> </td> <td align="right" width="26%" style="font-size:small;">Chapter 3<br></td> <td align="right" width="4%"> </td></tr></table>
414997
46022
https://en.wikibooks.org/wiki?curid=414997
End-user Computer Security/Main content/Wireless Communications
<BR>=𓆉≅ End-user Computer Security<BR> Inexpensive security <table ALIGN="RIGHT" STYLE="padding:0px;margin:0px;font-style:italic" border="0"> <tr STYLE="padding:0px;margin:0px;"> <td valign="top" STYLE="padding:0px;margin:0px;"> </td> <td STYLE="padding:0px;margin:0px;"> </td> </tr> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;" width="100%"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> = <table width="100%" style="padding:0px;margin:0px;"><tr STYLE="COLOR:#009f69;FONT-FAMILY:SANS-SERIF;padding:0px;margin:0px;"><td style="padding:0px;margin:0px;">Wireless Communications</td><td align="right" style="padding:0px;margin:0px;">  /  Chapter 3</td></tr></table> = </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> If is , computers will become . Although maintaining on the user's machine will probably mean that security overall will be sufficiently maintained, it is still worthwhile safeguarding against such an event. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Wired vs. wireless. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Whenever there is a choice between or (such as in the case of), wired communication is likely going to be more secure; it appears that most usefully also permit wired connections. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Shared WiFi. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> It's best not to use a shared at all, if it can be helped; or if it is used, only to use it with a highly secure -machine set-up. When a is shared, it can be difficult to convince others about the need to perform certain security tasks, such as the changing of the on a regular basis. ’s advice as of March 2020, was not to use free for anything you wouldn’t want a stranger to see. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Keep communication systems turned off. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Keeping wireless technologies such as , , , and ports, disabled when not in use, is a good precautionary . <BR> <table style="border:1px solid #76a5af;font-size:1em;color:#76a5af;padding:1em;" width="100%"> <tr valign="middle"> <td align="left" style="color:#c4dbe0;" width="3%"> </td> <td align="left" style="font-size:small;color:#c4dbe0;" width="27%" >Chapter 2<br></td> <td align="center" width="40%" valign="middle" ><BR> Contents, Index, Foreword <BR><BR> </td> <td align="right" width="26%" style="font-size:small;">Chapter 4<br></td> <td align="right" width="4%"> </td></tr></table>
414998
46022
https://en.wikibooks.org/wiki?curid=414998
End-user Computer Security/Main content/Digital storage
<BR>=𓆉≅ End-user Computer Security<BR> Inexpensive security <table ALIGN="RIGHT" STYLE="padding:0px;margin:0px;font-style:italic" border="0"> <tr STYLE="padding:0px;margin:0px;"> <td valign="top" STYLE="padding:0px;margin:0px;"> </td> <td STYLE="padding:0px;margin:0px;"> </td> </tr> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;" width="100%"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> = <table width="100%"><tr STYLE="COLOR:#009f69;FONT-FAMILY:SANS-SERIF;"><td>Digital storage</td><td align="right">  /  Chapter 4</td></tr></table> = </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> General security risks in digital storage. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> , , and (whether internal or external, whether a , , , or otherwise), including , can likely easily be modified so as to transmit data to —a . Device (using or otherwise) likely always constitutes an for such devices (that appear often to have that run such ROMs). The same applies with respect to device . However, SD cards are perhaps unlikely to undergo hardware tampering because of their small size (especially with respect to) and because of how they are constructed. The custom / called Coreboot usefully has the option of being able to disable when they are present in USB devices. If you use in conjunction with such disabling, you can instead rely on the supplied in Linux to interface with those USB devices—this approach objectively reduces the associated with those USB devices (because Linux drivers are considered to be more secure than provided option ROMs that provide the same functionality) and is recommended for improved security. Further information about such of and like devices, is available here on the Qubes website. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> USB devices vs. SD cards. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> At first, it was initially thought that had no , such that they couldn’t be infected with firmware . However, as pointed out on the webpage hosted here (by), SD cards do in fact have firmware as well as that run the firmware. Therefore, firmware malware can be present on SD cards similar to how they can be present on certain . The webpage elaborates on these specific . SD card firmware is mostly a according to team Kosagi (in the video linked-to on the webpage), whereas firmware specifications are generally more open and publicly available; this leads one to believe that from a purely perspective, it is easier to create for USB firmware (than it is for SD card firmware). Also, the team’s presentation in the video, inclines one to think that interfacing for the purpose of reprogramming firmware, is much more difficult for SD cards than it is for USB devices. According to the team, it also appears it is harder to with SD cards by sneakily adding or modifying elements in them, than it is for USB devices (see same video); their quite small size especially compared with USB devices, also supports such a conclusion. Because of these things, SD cards may generally have smaller in relation to both firmware , and tampering. Therefore, it may be best to assume that for higher security, if the alternative is USB storage, the use of SD cards is to be preferred for -based storage and retrieval whenever no extra special are in place. However, because the USB device firmware specifications are more open and publicly available, and because it appears to be easier to interface with a USB device for the purposes of checking and/or firmware, it could in fact be easier to detect malware in USB devices than it is to do the same in SD cards. Reinstalling USB device firmware is often possible but the same for SD cards is generally almost impossible. So if you have a special process in place for ensuring the integrity of USB device firmware in the ways just touched upon, it may actually be more secure to use USB devices than to use SD cards. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Flash memory: NOR flash vs NAND flash. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> There appears to be some evidence that using for (rather than the more common) on and other devices, might offer a security advantage, most likely due to issues related to NOR flash apparently being better able to store and retain values in each of its . In contrast, NAND flash employs because values are not so well stored in NAND (more of a approach is taken). However, NOR flash appears to be mostly earmarked for things like rather than general storage (and also rather than). <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> NAND flash memory vs magnetic storage. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Because in comparison to : <TABLE STYLE="padding:0px; margin:0px;margin-left:4em; "> <TR> <TD STYLE="padding:0px; margin:0px;padding-left:0.5em"></TD> <TD STYLE="padding-left:0.5em"> </TD> </TR> <TR> <TD STYLE="padding:0px; margin:0px;padding-left:0.5em">🄰🄽🄳</TD> <TD STYLE="padding-left:0.5em">because adversaries can exploit these things, </TD> </TR> <TR> <TD></TD><TD STYLE="padding-left:0.5em;padding-top:0.5em">it would seem that magnetic storage (such as the use of a) is more secure than NAND flash (NAND flash is commonly used in , , and).</TD> </TR> </TABLE> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Magnetic storage: tapes vs. discs. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Because it seems that objectively, random-access memory has a greater in comparison to sequential access memory , it would seem that are more secure than magnetic discs (magnetic discs are used in). <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Rewritable media vs optical ROM discs. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> "" is more secure than because it narrows the attack window (and so also reduces) by generally significantly shrinking the window of time in which can be written to the . It should be noted that if malware has already infected the of an , even though you configure to be 'write once', because of the ROM malware, the writer may instead set the disc to be 'write many'. From this perspective, it is better only to use that physically cannot be , to write such media so that excess space is "blanked out", and to , discs written, just after writing, to make sure that the excess space has indeed been blanked out; all of these things are important safeguards against that specifically rely upon being able to make further writes to the disc. Optical ROM discs are also potentially more helpful compared with rewritable media, in relation to post security checking. Malware in the ROMs of and , can mostly use the storage capacities of such devices unencumbered whilst also being able to eliminate all traces of malware from the devices, any time the ROM is run. However, the window of time in which such can happen for , as mentioned in the previous paragraph, is mostly narrowed. By using write-once media, and taking the precautionary measures outlined in the last paragraph, the optical disc contents are frozen. If the frozen contents contain evidence of malware, that evidence cannot be clandestinely destroyed through your computer system once the disc’s contents are frozen. This means post analysis, even post analysis one year later, can potentially detect any malware that was on the disc, possibly leading to the identification of points of weakness in your security that are connected to the use of that particular optical disc. The same is not necessarily true with rewritable media because no such freezing takes place. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> SD cards and USB memory sticks vs. larger devices. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> integrity for larger devices is probably easier to establish because: <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Drives able to eject hardware-less media vs. other media. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> capable of ejecting -less (such as , and drives) may have special advantages in respect to and tampering, due to users only needing to “keep their eyes” on one unit regardless of how many hardware-less media (such as and) are used. This is not true for and because these media are essentially hardware incapable of ejecting hardware-less media, in fact the concept of ejecting media from them doesn’t apply. It is also not true for since the discs in such drives cannot be swapped out for other discs. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> More about SD cards. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Team Kosagi in the video mentioned earlier, specifically names the manufacturer as possibly creating more secure when compared to the . Their reasoning behind this is that extra security is achieved through Sandisk’s creation of SD cards having that is not so (or even reprogrammable at all), due to Sandisk having higher involvement in the production process. Incidentally, SD cards can often be used for storing made through . <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> How to obtain computer media devices. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> It seems like a good idea always to use devices that were bought in such ways that no significant risks of (man-in-the-middle) compromises, were encountered in the acquisition of the items, and that were also bought from trusted shop sources. It might be preferable to buy such things from large shops, where you can choose any one device at from a large selection of identical products from off the physical shelves (this is the security principle outlined later on in the section entitled “User randomly selecting unit from off physical shelves”). <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Secure data sanitisation. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> NCSC (National Cyber Security Centre) information on secure data sanitisation (rendering) of and , as well as of other and , is available here. Note that conventional may not work with storage devices (such as , , external , etc.) because of the possible presence of in the of such devices, especially when the related microcontroller is also in the device. In light of such, it may be necessary to such devices to ensure better data sanitisation. <BR> <BR> <HR> Footnotes<BR> <BR> <table style="border:1px solid #76a5af;font-size:1em;color:#76a5af;padding:1em" width="100%"> <tr valign="middle"> <td align="left" style="color:#c4dbe0;" width="3%"> </td> <td align="left" style="font-size:small;color:#c4dbe0;" width="27%">Chapter 3<br></td> <td align="center" width="40%" valign="middle" ><BR> Contents, Index, Foreword <BR><BR> </td> <td align="right" width="26%" style="font-size:small;">Chapter 5<br></td> <td align="right" width="4%"> </td></tr></table>
414999
46022
https://en.wikibooks.org/wiki?curid=414999
End-user Computer Security/Main content/Some measures that are primarily physical
<BR>=𓆉≅ End-user Computer Security<BR> Inexpensive security <table ALIGN="RIGHT" STYLE="padding:0px;margin:0px;font-style:italic" border="0"> <tr STYLE="padding:0px;margin:0px;"> <td valign="top" STYLE="padding:0px;margin:0px;"> </td> <td STYLE="padding:0px;margin:0px;"> </td> </tr> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;" width="100%"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> = <table width="100%"><tr STYLE="COLOR:#009f69;FONT-FAMILY:SANS-SERIF;"><td>Some measures that are primarily physical</td><td align="right">  /  Chapter 5</td></tr></table> = </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Physical isolation and locks. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> and are also other important elements in maintaining . For example, locking-up a when it is not being used, might be a good idea. If a laptop is left unattended for a long time, someone could perform major to it, in such ways that there is no trace evidence of the tampering. (dealt with in the earlier section entitled “Full system encryption, full disk encryption (FDE)”) can partially defend against this. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Physical measures for securing bootloader when using full-system encryption. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Having the for such separately locked away on a rather than stored within the as is usually done, may be a good idea from a security point of view (as documented in the earlier section entitled “Bootloader for FDE”). If the bootloader is instead kept on an (as is normally done), it’s relatively straightforward to with the bootloader when there is to the laptop (by use of so-called for example). If you are storing the bootloader in the laptop, and you choose to use the Heads / system, you will have improved security because Heads stores the bootloader in rather than on one of the internal drives. If in conjunction with Heads, you make certain judicious use of on the motherboard, it appears likely that tampering with the bootloader can be made extraordinarily unlikely, ensuring such good security in conjunction with full disk encryption, that it may even be unnecessary to lock away your laptop. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Padlockable laptop bag. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> If you have a , have a look to see whether you can it, perhaps through sliders on any of the bag’s zips. Also consider whether you can padlock all of your computing devices within that bag, for safe-keeping. You may, for example, be able to padlock your , , and , all within that bag. When you take your devices away from your usual work location (such as when travelling with them), you may wish to take the bag with you, and have your devices padlocked in that bag whenever they are not being used. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Metal boxes. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> If you are locking devices away in boxes, you may wish first of all to place them in bags (such as perhaps a), in order to prevent damage from knocks and bumps when the devices are in the metal boxes. Metal boxes can probably be securely obtained, by buying them over the and having them delivered to you, because there are unlikely to be if they are intercepted—they can be manually inspected when they arrive to check for . But it should also be borne in mind that, due to great advancements in , detection of embedded espionage technology might not be so straight-forward as simply any such boxes. From this point of view, it may well be worthwhile purchasing such a box using the principle outlined later on in the section entitled “User randomly selecting unit from off physical shelves” to minimise the risk of espionage technology being embedded in the metal of the box. In contrast, the used for any such metal boxes likely should, without question, be bought using this principle in order to minimise MITM attacks that are focused on the padlock element of the set-up. It probably should be ensured that the of the selected padlocks are all high. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Combination lock briefcase. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Computing devices may also fit into a that you already own. You might be able to purchase such briefcases cheaply from a local however, be aware that second-hand combination locks might pose unacceptable for your particular . <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> <TABLE STYLE="margin-top:1.5em;padding:0px;margin:0px;margin-left:7em;;border-collapse:collapse;"><TR style="padding:0px;margin:0px;"><TD style="padding:0px;margin:0px;"> Physically removing storage component(s) from the rest of the computer system, and then securely storing those components separately. </TD></TR></TABLE> </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Such securing may be good seeing as ‘’ on such (such as on , internal , etc.) are mostly more secure than when in their associated computer systems, whenever reasonable measures are also taken. The storage components can then be installed in fresh brand new non-compromised computer systems, to retrieve securely the associated data authentically. Also, such storage components tend to be smaller than computer systems, which provides for better secret concealment and storage. However, it should also be noted that because of their small size, they can also be secretly stolen more easily. On some , removing the internal system disk is easy. If you have such a laptop, you can perhaps simply remove the system disk at the end of each working day, and lock it up. This may not be feasible for laptops not having this feature (perhaps most or all light-weight computers, such as certain , fall into this latter category). <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Physically securing keys. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> It seems likely that someone can quite easily create by: If this is true, then an adversary (or maybe perhaps more specifically an ""), just needs access to the physical key and a (most people have smartphone cameras) for maybe just 30 to 60 seconds for the creation of the video that is then sent over the perhaps half-way across the world, for computer analysis to create a cloned key. It may therefore be best to use (such as those detailed shortly in the next subsections) to protect physical keys. However, it should be borne in mind that if the tamper-evident system employed relies upon padding consisting of something like , then an adversary may still be able to clone the key by simply using . With this in mind, using for padding might be a good idea, as the metal in them will probably interfere with many methods that rely upon , and/or (covers). <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Privacy screens. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> A good idea seems to be to get for your different devices. They work by inducing some level of privacy by lowering the maximum of the on which they are installed. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Specifically for goods in physical transit. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> In order to ensure goods aren't tampered with in transit, it can be requested of the sender that they appropriately use such as certain kinds of and certain kinds of . These appear to be cost-effective ways to help ensure goods aren't tampered with when being sent by . Unfortunately, from investigations, the current tamper evident solutions that are commonly available appear to be mostly quite poor. A novel solution might be to a customer’s address, and then print such signature on the tamper-evident mechanism in such fashion that the mechanism is costly to duplicate (perhaps by use of some kind of supplier ‘’, maybe a , also printed on the mechanism). However, at present, no such product or other good enough product appears to be generally affordable. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Exploiting unrepeatable patterns for tamper evidence. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Applying glitter nail varnish to computer screws. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> <BR> Collage illustrating the method of applying to computer screws on a Trammell Hudson has suggested a low-cost and effective tamper-evident solution that uses the painting of heads with to produce practically that are destroyed through unscrewing. By the patterns, and making sure patterns haven’t changed, one can be reasonably sure that no one has unscrewed the painted screws. Information on this solution, which seems to have been accepted by the security community, and how it can be slightly extended for other things, can be found here. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Tamper-evident security-system ideas. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> In parallel with Trammell’s solution which is at least five years old, Mark Fernandes has recently devised similar schemes that employ the same . Those schemes, possibly with improvements contributed by others, are detailed in the following subsections. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Main idea. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Note that creating your own home-made set-up out of commonly available materials (like) will likely ensure greater security. <table STYLE="margin-top:.7em;margin-left:4em;font-style:italic;font-size:smaller;" align="right" ><tr valign="top"> <td> Video detailing unrepeatable-pattern mechanism using </td> <td style="padding-left:3em"> <BR> Illustration demonstrating the effectiveness of using for </td> </tr> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Speculating stronger security again with unrepeatable-pattern principle. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> A similar idea with potentially even more security may exist where a computing device is placed in a container, and then submerged in a bathtub of water that has coloured oil on the water’s surface such that there is a effect on the water’s surface—admittedly, it’s not clear whether this other idea would actually work in practice. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Similar idea for other circumstances (such as for metal boxes). </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td></tr> </table> Another similar system relies on the likely fact that certain : Where such properties are also found in other materials, such other materials probably can also be used instead. Any one such paper, can be 'read' by taking a of it. The colour variations can be measured and in sequence encoded as a long number, which can also be interpreted as being a key (like an). With such a paper, it is practically impossible to create another paper with exactly the same colour variations, as a deceptive . The paper can be glued over the hinges and crevices of a locked metal box. By opening the box, the paper is torn. Because it is hard to hide tears in it in the case of someone else opening the box before you, and because the precise colour variations are hard to fake deceptively, you’ll notice whether someone else has opened the box before you, thereby providing . Very strong probably would need to be used, to ensure better that the paper is noticeably damaged through the opening of the box. If the paper can be glued on the inside of the metal box (instead of the outside), that might be best in order to prevent someone removing the glue through the use of glue like , the doing of which would present itself as a point of weakness in the security system if the gluing were instead performed on the outside. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Perhaps the simplest and best idea. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td></tr> </table> Perhaps the simplest and best is simply to wrap-up computing devices in some material that , but that also can quite easily when slightly disturbed in such fashion that it is . Shell-suit material may be good for this. Also (maybe an old silk scarf perhaps) might be good. Certain kinds of might also be good. Simply using in such ways, will likely provide at least some level of security. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Software based tamper checking using security images. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td></tr> </table> If relying on based for making sure there is no between two security , using a is likely necessary as two security photos requiring comparison need to have been taken from the same angle and location (at least approximately within a certain degree of deviation). Using a may be preferred, as the software for checking two security photos can then be automatically run on the same device used for capturing the photos, which in some ways (in respect of being such an integrated approach) presents a more attractive security solution. However, a can also be used, with the associated being then taken out and placed into a device that can run the related security-photo matching software. The software solution can be manually , if none already exists. A rough idea of an that might be acceptable for the solution, is as follows: <BR> <BR> <HR> Footnotes<BR> <BR> <table style="border:1px solid #76a5af;font-size:1em;color:#76a5af;padding:1em" width="100%"> <tr valign="middle"> <td align="left" style="color:#c4dbe0;" width="3%"> </td> <td align="left" style="font-size:small;color:#c4dbe0;" width="27%">Chapter 4 <br></td> <td align="center" width="40%" valign="middle" ><BR> Contents, Index, Foreword <BR><BR> </td> <td align="right" width="26%" style="font-size:small;">Chapter 6<br></td> <td align="right" width="4%"> </td></tr></table>
415001
46022
https://en.wikibooks.org/wiki?curid=415001
End-user Computer Security/Main content/Simple security measures
<BR>=𓆉≅ End-user Computer Security<BR> Inexpensive security <table ALIGN="RIGHT" STYLE="padding:0px;margin:0px;font-style:italic" border="0"> <tr STYLE="padding:0px;margin:0px;"> <td valign="top" STYLE="padding:0px;margin:0px;"> </td> <td STYLE="padding:0px;margin:0px;"> </td> </tr> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;" width="100%"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> = <table width="100%"><tr STYLE="COLOR:#009f69;FONT-FAMILY:SANS-SERIF;"><td>Simple security measures</td><td align="right">  /  Chapter 7</td></tr></table> = </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Put computer to sleep when not at it. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> When not at your computer, it may be a good idea to put it to . The reason being is that if an intruder has of your computer, and you only leave your computer locked when you are not there, without your knowing, they may start to do -visible things on your computer when you are not there. When you are at your computer, the intruder may be frustrated in trying to do such things because you are then monitoring your screen. So putting your computer to sleep when you are not there, may be a good idea in order to frustrate such remote-controlling activities. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Shut down device when not in use. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> your phone or other computing device before you go to sleep is probably a good idea—it’s an easy precautionary . Doing the same at other times when they are not much needed, might also be a good idea. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Play sound continuously on computing device. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> A simple security measure to monitor whether someone, with physical access to your that is near to you: is simply to play some continuous on it that is heard through its . This could be simply playing the on the device. If someone then were to take it away from being near you, normally you would notice the absence of, or lowering of in, the sound (due to the greater distance of the device from you). Also, if someone were instead to shut down or reboot the device (perhaps as a precursor to), normally you would notice that too because normally the sound would disappear. Do note though, it could be possible to replace the sound playing on your device with the playing of the same sound on another device, such that you don’t notice the occurrence of any of these security compromising actions. In light of such, it may be good to play sound that is hard for others to reproduce precisely, perhaps something as simple as from your own personal favourites . Obviously when using these measures, should also be employed. <BR> <table style="border:1px solid #76a5af;font-size:1em;color:#76a5af;padding:1em" width="100%"> <tr valign="middle"> <td align="left" style="color:#c4dbe0;" width="3%"> </td> <td align="left" style="font-size:small;color:#c4dbe0;" width="27%">Chapter 6<br></td> <td align="center" width="40%" valign="middle" ><BR> Contents, Index, Foreword <BR><BR> </td> <td align="right" width="26%" style="font-size:small;">Chapter 8<br></td> <td align="right" width="4%"> </td></tr></table>
415002
808573
https://en.wikibooks.org/wiki?curid=415002
End-user Computer Security/Main content/Broad security principles
=𓆉≅ End-user Computer Security Inexpensive security <table align="right" style="padding:0px;margin:0px;font-style:italic" border="0"> <tr style="padding:0px;margin:0px;"> <td valign="top" style="padding:0px;margin:0px;"> </td> <td style="padding:0px;margin:0px;"> </td> </tr> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;" width="100%"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> = <table width="100%"><tr style="color:#009f69;FONT-FAMILY:SANS-SERIF;"><td>Broad security principles</td><td align="right">  /  Chapter 8</td></tr></table> = </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Stop funding the spies and hackers. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> As hinted at in “Desktop Witness” by Michael A. Caloyannides, we may well be mostly inadvertently funding the work of spies and hackers, by purchasing personal computing resources without investing reasonable efforts into securing and securely using such resources. So whenever budgeting for computer resources, also factor-in the efforts required to keep and use such equipment securely—you don’t want to be the worse-off because of computer resource purchases you made. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Report cybercrime to the police. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Reporting crime to the police doesn’t only potentially obtain for you, free and tailored computer security assistance from authorities. It also helps to prevent crime in general such that there may be fewer criminals around in the first place to attack your systems, perhaps simply because they have been warded off from committing any crime due to your prior involvement of the police. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Think in terms of gradual movement along a security-level continuum. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Security isn’t simply a question of a Boolean secure-or-not-secure proposition. There is a continuum of security levels, from least secure to most secure. Instead of thinking in terms of simply needing to be secure (which is certainly something worthy of your aspirations), think in terms of progressively moving along the continuum, day-by-day, gradually getting more and more secure, on the whole. Such progressive movement makes sense in terms of balancing the risks of security compromise with the efforts required for becoming secure. Also, don’t be concerned about ‘over doing it’—it’s not an exact science, and it’s often better to do too much than to do too little. Also, don’t worry about mistakes too much; so long as they’re not too frequent, fail-safe mechanisms in your security, coupled with threats being probabilistic, will mean that they won’t matter that much. The National Cyber Security Centre for the UK (NCSC) touches upon this principle in their blog post entitled “Not perfect, but better: improving security one step at a time”. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Minimally-above-average security. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> A security principle exists, where entities seek security levels that are minimally-above-average security. The rationale behind such an approach is as follows. It is supposed that adversaries have in their arsenal of weapons, attacks that overcome average security levels, but not attacks that can do much more. They maximally target users such that the “hacking success to work done” ratio is roughly optimal, which generally means constructing attacks that can be reused as much as possible (to save on work done). Then for every extra unit of work done, the ratio diminishes, equating to less “bang for your buck” (for the hacker). So to defend against such adversaries, an entity may choose to implement security that is above average, but only so much so as to defend against such adversaries who look more for common security weaknesses amongst users as a whole, rather than being able to hack the most secure of systems (“Fort Knox” like systems). The National Cyber Security Centre for the UK (NCSC) touches upon this principle in their blog post entitled “Not perfect, but better: improving security one step at a time”. Some NCSC information on the behaviours and characteristics of cyber crime and cyber criminals can be found in their report located here. It might be that Trammell Hudson also agrees with this principle since on his website, he sometimes uses phrases such as “slightly better security”. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Publishing security methods. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> It may seem counterintuitive to publish your security methods. However, doing so can actually increase your overall security (rather than decrease it). Firstly, by publishing your methods, you can get useful feedback in respect of the weaknesses and strengths of your current security methods, and then adjust them accordingly. Secondly, your activities are unlikely to be completely isolated; instead, they are likely to depend upon a number of relationships with other entities. From this perspective, improving the security of the wider community, can provide better security for yourself. Thirdly and finally, the widespread adoption of better security methods, can make the aspect of hacking you more difficult than if only you adopt better security methods. Suppose you are a hacker and you have on your agenda to hack 100 entities. If just one entity improves their security, hacking your 100 entities perhaps isn't negatively impacted so much. However, if all 100 entities improve their security, then hacking any one entity is made even more difficult because the hacker has to bear in mind that they also have to allot sufficient resources (including time) also to hacking the 99 other entities—the hacker may become simply too stretched for time/resources. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> User randomly selecting unit from off physical shelves. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Getting a unit sent to you in the post is not necessarily the most secure way to obtain a unit of any particular product. In particular, obtaining units in such ways are vulnerable to man-in-the-middle (MITM) attacks. Instead, it may well be more secure to buy a unit by first physically visiting a large physical store selected at random, that is geographically distant from the user’s address, and then when at the store to choose and purchase personally, a shrink-wrapped unit fresh from its factory (or other product source) from off the physical shelves, using random selection, where there are many other units of the same product on the shelves. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> When random is not random. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Behavioural cues can sometimes affect a person’s mental processes, or be used to read a person’s mental processes, such that trying to implement random selection solely with your mind, ends up with selection that’s not so random. In such cases, you should seek to generate random selection externally, which could be something as simple as tossing a coin or rolling some dice. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Ordering many units of same product. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Security can be increased by purchasing very many units of the same product. Because you have so many units in your possession, it should be more difficult for an attacker to tamper with every single unit. One unit can then be chosen at random, and all other units can then be returned for either partial or full refunds. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Using multiple channels to obtain product. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Perhaps a good way to ensure a product isn't tampered with before use, is to obtain the product through multiple channels. For example, software can be downloaded, bought from a physical shop, and also bought from an online shop. The three versions of what should be the same installation software, once obtained, can then be byte-for-byte compared with each other to see whether they are exact copies—if one isn't, then it likely points to tampering having been conducted to one or more of them. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Discerning unit least likely to have been compromised. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> If obtaining hardware, instead of using random selection, a potentially better way to select which unit to keep (one that hopefully hasn't undergone any tampering) is as follows. First, purchase several units of the same hardware. Once several units have been obtained—let's say for sake of example, seven units—the user needs to figure out which of the units have the least likelihood of having undergone any tampering, ideally without damaging them so that excess units can be returned for refunds (hopefully full refunds). To help in this figuring out, the user can use one or more non-invasive and non-destructive measuring methods, some of which are documented in the next section entitled “Measuring physical properties for authentication”. The measuring can be undertaken before opening the hopefully shrink-wrapped boxes that contain the units (to facilitate being able to return, later on, no-longer-needed units). The measurements that are most common amongst the units, determine the quality-control parameters. Then any one unit fitting those parameters can be selected. This selection process on the whole is better than pure random selection, as it is better able to sift out any tampered units that may be in the mix, by using a balance-of-probabilities approach—tampered units hopefully will have odd measurement readings. So for example, if 6 units have the weight 100g with only one unit having the weight 101g, you would choose not to keep the unit weighing 101g (the odd, and potentially tampered-with unit). Since the measuring techniques involved hopefully won't damage the units, returning excess units for a full refund should hopefully not be a problem. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Measuring physical properties for authentication. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> How do you confirm that a physical device in your possession is exactly the same as the device it ought to be, as it was manufactured? It could not only have undergone tampering, but it could in fact be an entirely different device that just has the appearance of the actual genuine device. Measuring physical properties appears to be a good way to make sure you have the genuine device in your possession. Whilst an adversary may be able to replicate one of the physical properties, the convolution (or intersection you might say) of several (or maybe even just two) is likely quite hard to replicate in any kind of imitation or tampered-with device. Once we acknowledge this principle is valid, we now turn to what physical properties we can measure for the application of this principle. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Weight. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Weight is something very easy to measure, so there are no worries about using it. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Volume. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> In the case of devices incapable of being damaged by slow-moving water, to measure volume, we can simply measure the displacement of water by placing the device in water. In the case of other devices, if the device is low cost, a user can purchase two units of the device, one to be measured using destructive measures, the other one to keep, assuming the security tests succeed. The one to be measured, can have its volume measured in the same way as just outlined. Doing so will destroy the device, but you will have the other device that you can keep. Once you have ordered the two units, you select the one to measure by random selection, which is very important. In the scenario that an adversary was able to replace just one of the units, they will likely have replaced both units (and not just one) with imitation or tampered-with units. So testing one of the units will likely apply to tests of the other unit. It should be noted that it does appear—from some brief internet research—that so-called "pure water" and/or distilled water are possibly capable of having electronics submerged in them, without any damage to the electronics occurring as a result. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Magnetic weight and images. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> The 'magnetic weight' of a device can be measured, as in the force of attraction between the device and a magnet of some specific number of newtons force, at a set specific distance away from the device. A simple set of normal (gravitational based) weighing scales can be used for this. What you do is: <table style="margin-top:.7em;margin-left:10em;"> <tr valign="bottom"><td style="color:#009f69;font-size:small" align="right">i. </td><td align="left">you place a magnet a set distance above the scales top;</td></tr> <tr valign="bottom"><td style="color:#009f69;font-size:small" align="right">ii. </td><td align="left">you then place the device on the top of the scales;</td></tr> <tr valign="bottom"><td style="color:#009f69;font-size:small" align="right">iii. </td><td align="left">you measure the weight;</td></tr> <tr valign="bottom"><td style="color:#009f69;font-size:small" align="right">iv. </td><td align="left">you take away the magnet and measure the weight again;</td></tr> <tr valign="bottom"><td style="color:#009f69;font-size:small" align="right">v. </td><td align="left">you then calculate the weight difference to give an indication of the 'magnetic weight'.</td></tr> </table> It is suspected that magnetic resonance imaging (MRI) can be used to profile an electronic device, for security purposes. The question is whether the cost of performing such imaging can be sufficiently reduced for use by general users. It is suspected that it probably can. The "50x50mm Small Magnetic Field Viewing Paper" product available here appears like it might help in this regard. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Electric field imaging/detection. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Like RF imaging/detection , electric field imaging/detection of turned-on electronics might be helpful. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Electro-magentic spectrum. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Visible spectrum photography. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Straight-forward conventional photography using the visible spectrum can be used to check whether a certain device looks externally (and sometimes also internally) like it should (a form of quality control classed under visual inspection). With respect to both photographing the internals, as well convincing users that there is no embedded, hidden espionage technology, it is useful for the device to use transparent materials wherever possible. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Infra-red scanning. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> T rays are analogous to x rays but instead involve infra-red. Infra-red filters appear to be readily available, at relatively low prices, for cameras (including those on mobile phones). T rays are capable of passing through plastic but not through metal; this property enables t rays to be used to detect metal weapons concealed on persons. Could it be possible that such t rays might also pass through silicon? If t rays do in fact pass through silicon and related materials, then perhaps cameras (including those on mobile phones) can be adapted to take t rays of electronic devices, as a form of security verification. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> X rays. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> The "Mylar X-Ray Film, TF-160-255, 500 Pre-Cut CIrcles, Unopened" product priced at just £12.75, appears to be X-ray capturing film at a relatively low price. Since x rays are present in sunlight, could it be possible that an x-ray photograph of a device could be created simply using sunlight and this film, by keeping the apparatus and device still over the course of hours or days (perhaps with the use of a filter that blocks out all non-x-ray light)? It looks like x rays already form an accepted method of confirming certain aspects of at least certain microchip electronics hardware—see here and also information on industrial radiography. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Microwave testing. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Microwave testing is already a tool used in engineering for performing non-destructive testing to find defects in technical parts. As it is presently used in engineering, it most likely isn't low-cost enough. However, could it be that a microwave oven, in conjunction with a smartphone, might be capable of being able to perform such testing? The project hosted here could possibly be useful for this. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Radio frequency (RF) imaging/detection. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> From internet research, it hasn’t been possible to find much information about this. However, it seems like it might be something that is useful, especially with respect to any incidental RF fields produced by powered-on electronics. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Ultrasound. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Ultrasound images and/or readings, appear to be quite likely useful for security authentication of devices. Unfortunately, normally the price of the associated equipment is relatively high. However, there is such a thing as a DIY ultrasound imaging kit which could directly or indirectly bring down the cost of using this technology. Also, a simple ultrasonic sensor, which seems potentially to be much cheaper and affordable, may be sufficient for exploiting ultrasound to do security authentications. According to Wikipedia, ultrasound testing has been used for industrial non-destructive testing of welded joints from at least the 1960s. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Other methods. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Other usable non-destructive testing methods might be documented on Wikipedia, especially at the address of this hyperlink. Other such methods may also be documented here on the betrusted wiki. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Geospatial. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Because of things like hidden cameras, you may want to enter security credentials (such as passwords), only in secure locations. For example, you may choose not to unlock your phone when in public places because of the increased likelihood of an adversary surreptitiously photographing or videoing the password you enter. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Based on which region. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> The United States of America used to have severe restrictions on the export of cryptographic technology. In contrast, other geographic areas (such as perhaps Germany or the Netherlands) probably are relatively liberal in respect of such technology. With such variations in mind, the level of security you attain may depend on which geographic areas you use for the various elements of your security. Also, certain geographies are more prone to attack because of various factors such as things of a political nature, as well as things to do with how powerful the local military are. In this respect, it may even be worthwhile to rely on geographies that are technologically backward, and that have weaker politics and/or political groups. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Time based. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Based on time passed. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Adversaries may initiate their attacks only from a certain time onward. And perhaps we can make assumptions as to when those attacks were definitely not taking place. For sake of example, let’s say that we have an assumption that we were not being attacked six months ago and so were not compromised at that time. If some of the artefacts produced from historic activity dating from before six months ago were isolated six or more months ago, it might be possible to gain extra security drawn from such artefacts. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Example 1. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Nine months ago, I downloaded the public key for some website, and saved it in a way that kept it quite isolated from other systems from that time onward. For example, isolation may have been induced by printing out the key, and keeping it in a safe. Isolation could also have been induced by burning it to an encrypted read-only CD. Now that nine months have passed, I find that adversaries are tampering with my internet communications so that I am downloading the incorrect key. In reliance on 'security based on time passed', I can retrieve the genuine key I saved nine months ago. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Example 2. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> I often engage in email exchanges with a colleague who always writes their public authentication PGP key at the bottom of the emails they send. Three months ago, an adversary started intercepting the emails and changing the key in all emails sent henceforth. By relying on 'security based on time passed', I can access the emails from my colleague from before six months ago (a time at which I know I had system security), and obtain the genuine key. I can then see that the key is now different and therefore figure out that something suspicious is now happening. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Vulnerability when used for software. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Note that ‘security based on time passed’ can have a vulnerability in respect of security holes in software. For example, software from 5 years ago may have security holes that were discovered and published since then, and from this perspective, it may be better not to rely on that historic version of the software, and instead try to obtain a newer version of the software securely (where the holes have been fixed). With this in mind, if using 'security based on time passed' in conjunction with software, it may be best only to use it with very simple software, where the associated algorithms and code have been thoroughly security researched and tested. This is to mitigate against the chance that security holes are discovered subsequent to your storage of the software under this principle. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Based on time taken to forge. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> The time taken to forge something, can be used in security mechanisms. For example, someone could place their mobile phone in a seamless ink-absorbing paper bag, the tearing of which is hard to repair through the use of things like super glue, and then sign a random fountain-pen ink squiggle on it. The time taken to forge a replacement paper bag with the same squiggle, can mean that the phone is secured for several hours from the time of the squiggle. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Using most secure window of time. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Instead of entering your security credentials at any old time, a selected window of time can be chosen when security is high based on factors such as when hackers are awake, etc. The security credentials can be entered in that window of time, and they can be entered so that you don't need them again for a while. Eg. log-in to your computer at 6am because most hackers in your own time zone are perhaps asleep at that time. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Preventing lapses in security. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Simple measures can be put in place to help remind oneself to stay secure. For example, when using a laptop, why not rest it on its wallet case (if it has one)? That way, you are reminded to place it in its wallet case when you close it up. Another simple measure is not to leave a key in an unlocked self-locking padlock—you no longer need the key, so put it away. That way, you reduce the risk of forgetting to store the key after you've used it. <table style="margin-top:.7em;margin-left:4em;font-style:italic;font-size:smaller;" align="right" ><tr valign="top"><td> Security reminder of resting Chromebook in its wallet whilst it is being used </td> <td style="padding-left:3em"> Security measure of taking key out of self-locking padlock </td> </tr> </table> The forming of security habits is another simple measure to help prevent forgetting to secure things. On day 1 and day 2, perhaps you make mistakes in your security routine; however, through simple repetition over many days, weeks, months, etc., you simply reduce more and more your mistakes because of the force of habit acquired. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> DIY security principle. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Building your own devices and security can be good for security reasons. You can better make sure that hidden espionage technology (possibly embedded in materials) is not present when doing it yourself (DIY). The DIY principle can be even more effective when you choose to use very cheap and commonly available materials, because you can often be more sure that hidden embedded espionage technology is not in such materials. For example, why not think about possibly building a computer out of cardboard? You can pick cardboard at random, and be pretty sure no hidden espionage technology is embedded in the cardboard. The DIY principle can also be applied to building software, as in you can do things like build software from source as touched upon in the earlier section entitled “Compiling from source”. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> “Destroy key when attacked”. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> The Heads system outlines a security principle that can perhaps be roughly described as 'destroy-key-when-attacked security'. The trusted platform module (TPM) on a motherboard stores the encryption-decryption (symmetric) key that is only accessible upon entering the correct password. The Heads system will have the TPM destroy the key if incorrect passwords are entered too frequently (if it seems like the computer system is under attack [in relation to so-called rate limiting]). Once the key has been destroyed, the key should no longer be on that computer system. The true user will find out that the key has been destroyed, and then use their backup measures to retrieve the key (relying on the backup of the key outside the computer system). This security principle can be applied more broadly. For example, cryptocurrency (such as Bitcoin) keys can perhaps be safeguarded in the same way. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Relying on high production cost of certain security tokens. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Perhaps a novel way to ensure better communication of things like public keys, is for an organisation to create a security token containing the key, that is very expensive to produce and replicate. It could be, for example, a genuine gold coin with the key on it, or some kind of holographic paper or card with the key on it. What would happen, is that the organisation would post out the security token to end users. The end users would then possibly pass the security token amongst themselves, or just post it back to the organisation. Because it would be so expensive to (re-)create the token, the token would not be thrown away, but simply shared in order to communicate the public key to end users. Adversaries would find it too costly to create fake tokens, because of the expense in creating the token. <HR> Footnotes <table style="border:1px solid #76a5af;font-size:1em;color:#76a5af;padding:1em" width="100%"> <tr valign="middle"> <td align="left" style="color:#c4dbe0;" width="3%"> </td> <td align="left" style="font-size:small;color:#c4dbe0;" width="27%">Chapter 7<br></td> <td align="center" width="40%" valign="middle" > Contents, Index, Foreword </td> <td align="right" width="26%" style="font-size:small;">Chapter 9<br></td> <td align="right" width="4%"> </td></tr></table>
415003
46022
https://en.wikibooks.org/wiki?curid=415003
End-user Computer Security/Main content/What to do when you discover your computer has been hacked
<BR>=𓆉≅ End-user Computer Security<BR> Inexpensive security <table ALIGN="RIGHT" STYLE="padding:0px;margin:0px;font-style:italic" border="0"> <tr STYLE="padding:0px;margin:0px;"> <td valign="top" STYLE="padding:0px;margin:0px;"> </td> <td STYLE="padding:0px;margin:0px;"> </td> </tr> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;" width="100%"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> = <table width="100%"><tr STYLE="COLOR:#009f69;FONT-FAMILY:SANS-SERIF;"><td>What to do when you discover your computer has been hacked</td><td align="right">  /  Chapter 9</td></tr></table> = </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Backing-up files. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> If it is ever discovered that a computer has been , <table STYLE="margin-top:0.7em;margin-left:4em;margin-bottom:2em" cellpadding="5em"> <tr VALIGN="top" > <td align="center">🛡</td> <td align="right">i)</td> <td> the computer into some kind of with , , and other things deactivated, might be a secure way to get access to your so that you can .</td> </tr> <tr VALIGN="TOP"> <td align="center">🛡</td> <td align="right">ii)</td> <td>However, likely more secure than this is to run off the same computer, another using a physical that was never previously used with the computer, or a , and then access your files through the other installation or live DVD/CD so that you can back them up.</td> </tr> <tr VALIGN="TOP"> <td align="center">🛡</td> <td align="right">iii)</td> <td>Even more secure, is to take the drive out containing your files, interface with the drive using a completely different computer that is running a live DVD/CD, and then access your files through the live DVD/CD in order to back them up.</td> </tr> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> When to change digital passwords and keys? </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> You may be tempted to change such security credentials straight-away after discovering that you have been . However, could it be better to wait until you are sure that your system is secure rather than changing such credentials using an unsecure system? <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Further information. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> The National Cyber Security Centre for the UK (NCSC) outlines steps to be urgently taken when you’ve discovered you’ve been infected with malware. Also, see here for their guide for on response and recovery from . <BR> <table style="border:1px solid #76a5af;font-size:1em;color:#76a5af;padding:1em" width="100%"> <tr valign="middle"> <td align="left" style="color:#c4dbe0;" width="3%"> </td> <td align="left" style="font-size:small;color:#c4dbe0;" width="27%">Chapter 8<br></td> <td align="center" width="40%" valign="middle" ><BR> Contents, Index, Foreword <BR><BR> </td> <td align="right" width="26%" style="font-size:small;">Chapter 10<br></td> <td align="right" width="4%"> </td></tr></table>
415004
46022
https://en.wikibooks.org/wiki?curid=415004
End-user Computer Security/Main content/Miscellaneous notes
<BR>=𓆉≅ End-user Computer Security<BR> Inexpensive security <table ALIGN="RIGHT" STYLE="padding:0px;margin:0px;font-style:italic" border="0"> <tr STYLE="padding:0px;margin:0px;"> <td valign="top" STYLE="padding:0px;margin:0px;"> </td> <td STYLE="padding:0px;margin:0px;"> </td> </tr> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;" width="100%"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> =<table width="100%"><tr STYLE="COLOR:#009f69;FONT-FAMILY:SANS-SERIF;"><td>Miscellaneous notes</td><td align="right">  /  Chapter 10</td></tr></table>= </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> National Cyber Security Centre. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> advice is freely available on the National Cyber Security Centre (NCSC) website. Specific NCSC information that may be of interest to you: <TABLE STYLE="margin-top:0.7em;margin-left:7em;"> <TR VALIGN="TOP"> <TD>⦾ </TD> <TD>For : general information; online security.</TD> </TR> <TR VALIGN="TOP"> <TD>⦾ </TD> <TD>Listed, advertised, and supported security products and services.</TD> </TR> <TR VALIGN="TOP"> <TD>⦾ </TD> <TD>Advice and guidance on the issue of authentication. </TD> </TR> <TR VALIGN="TOP"> <TD>⦾ </TD> <TD>Security advice on home and mobile working.</TD> </TR> <TR VALIGN="TOP"> <TD>⦾ </TD> <TD>Information on cyber security in relation to GDPR .</TD> </TR> <TR VALIGN="TOP"> <TD>⦾ </TD> <TD>Information on security in relation to computer peripherals </TD> </TR> <TR VALIGN="TOP"> <TD>⦾ </TD> <TD>8 Principles of Secure Development & Deployment.</TD> </TR> <TR VALIGN="TOP"> <TD>⦾ </TD> <TD>“Secure design principles: Guides for the design of cyber secure systems” publication</TD> </TR> <TR VALIGN="TOP"> <TD>⦾ </TD> <TD>Information and guidance on the importance of having high security specifically for your email account.</TD> </TR> <TR VALIGN="TOP"> <TD>⦾ </TD> <TD>Guidance on whether you need to use antivirus software on your Android device.</TD> </TR> <TR VALIGN="TOP"> <TD>⦾ </TD> <TD>Information explaining what is malware and how to defend against it.</TD> </TR> </TABLE> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Cybersecurity standards. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> See for -standards information from which might be obtained, insights into the and processes helpful for an entity’s security. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Deep hardware hacking. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> Consideration of deep - is probably an overkill for most individuals, and —have to draw the line somewhere. However, if you are interested in defending against such attacks, the computing and other related information hosted here, may be of interest to you. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Cryptocurrency security. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> If you are interested in adopting suggested for users, have a look at the Glacier protocol. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Using phones and computers as motion detector alarms. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> and computers can be turned into alarms, by using their built-in and other , with such as the “Haven: Keep Watch” app. This could provide extra security during sleeping hours. phenomena, including phenomena that have been verified and accepted by the , might be able to whilst intruders enter premises and room whilst the person is asleep; technological measures such as loud may be helpful to defend against such attacks. <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Steganography: easy hiding of information in computer documents. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> White-on-white text in and can be used for hiding and sending security sensitive information. This might be both simple and effective for low . <BR> <table style="border:1px solid #76a5af;font-size:1em;color:#76a5af;padding:1em" width="100%"> <tr valign="middle"> <td align="left" style="color:#c4dbe0;" width="3%"> </td> <td align="left" style="font-size:small;color:#c4dbe0;" width="27%">Chapter 9<BR></td> <td align="center" width="40%" valign="middle" ><BR> Contents, Index, Foreword <BR><BR> </td> <td align="right" width="26%" style="font-size:small;">Appendix:<BR></td> <td align="right" width="4%"> </td></tr></table>
415005
46022
https://en.wikibooks.org/wiki?curid=415005
End-user Computer Security/Appendix/New security inventions requiring a non-trivial investment in new technology
<BR>=𓆉≅ End-user Computer Security<BR> Inexpensive security <table ALIGN="RIGHT" STYLE="padding:0px;margin:0px;font-style:italic" border="0"> <tr STYLE="padding:0px;margin:0px;"> <td valign="top" STYLE="padding:0px;margin:0px;"> </td> <td STYLE="padding:0px;margin:0px;"> </td> </tr> </table> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;" width="100%"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> = <table width="100%"><tr STYLE="COLOR:#009f69;FONT-FAMILY:SANS-SERIF;"><td>New security inventions <BR>requiring a non‑trivial investment in new technology</td><td align="right">  / [Appendix: Part 1]</td></tr></table> = </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> <table STYLE=";padding:0px;margin:0px;"><tr><td> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Cryptocurrency-like mining to increase trust. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> </TD></TR></TABLE> <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> As applied to software. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> An interesting security idea involves using , and the idle time of other , to put the to work to perform computations that increase in a particular . The processors would be put to extra work, but not so much extra work so as to have the computer use more electricity (so as not to impact on computer), to so-called “ ” (similar to). The so-called “authentication coins” would be mined so as to provide some for some piece of software (perhaps through of the of the software), thereby increasing trust in the software. If there are 100,000 users using the particular software, all having each generated these “authentication coins” (which don’t cost anything to make when using idle time in such ways), and those coins are , a new user can the published coins, and then say to themselves something similar to the following: <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> <table STYLE="padding:0px;margin:0px;margin-left:1em;"><tr><td> Port source code to higher-level programming language <BR>as a computer-security step having its basis in secure coding. </TD></TR></TABLE> </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> A possible idea is to translate to a (such as perhaps the programming language) [perhaps initially in an automated way], in such fashion that the has fewer potential . The Eiffel language is apparently (in a related way), when compared with the majority of programming languages, so if you want fewer (even if it is at the price of somewhat slower speed execution), then perhaps porting to Eiffel (where possible) could be a good idea depending upon the circumstances. An example of how Eiffel can improve safety: suppose you have a function that implements some kind of complex ; Eiffel can add a constraint using Eiffel’s specially-designated for , to if certain output properties are wrong (perhaps something as simple as checking that some chosen element is indeed greater than one of its preceding elements). <table style="padding:0px;margin:0px;border:0px;border-collapse:collapse;-webkit-border-horizontal-spacing:0px;-webkit-border-vertical-spacing:0px;border-image-width:0px;"> <tr style="padding:0px;margin:0px;"> <td valign="bottom" style="padding:0px;margin:0px;"> Security by pre-loaded private key. </td> <td valign="bottom" style="padding:0px;margin:0px;padding-left:0.5em;"></td> </table> With respect to a , if the product comes with a pre-loaded for , once the product arrives, the user can use the key to some message they’ve just generated. The user will then receive the . The user can then with their device, submit the long random message to the of the company that produced the token. The authentication server has the same private key securely stored, and so, is able to reproduce the same message digest. The user sees the server-generated message digest, and then is willing to trust that the product is genuinely the same product produced by the authorised provider, at least in respect of certain key components of the product. This security method (a kind of) works against 'complete fake' focused on the token, but will not necessarily work against attacks focused on the token. If the device is designed so that the private key is destroyed whenever any tampering is attempted, then defence against this latter kind of attack will also be achieved. Trammell Hudson's Heads , that destroys a private key within a TPM when incorrect are entered too frequently (see the section entitled `“Destroy key when attacked”`), coupled with the use of to protect components from tampering, might be helpful in the drawing-up of such design features. <BR> <BR> <HR> Footnotes<BR> <BR> <table style="border:1px solid #76a5af;font-size:1em;color:#76a5af;padding:1em" width="100%"> <tr valign="middle"> <td align="left" style="color:#c4dbe0;" width="30%"></td> <td align="center" width="40%" valign="middle" ><BR> Contents, Index, Foreword <BR><BR> </td> <td align="right" width="26%" style="font-size:small;">Appendix: Part 2<BR></td> <td align="right" width="4%"> </td></tr></table>
415040
1720643
https://en.wikibooks.org/wiki?curid=415040
English-Hanzi/White rice is the rice that the husk, bran, and germ is removed
White rice is the rice that the husk, bran, and germ is removed. This changes the flavor, texture and appearance of the rice and helps prevent spoilage and extend its storage life. 白米是去除了外壳,麸皮和胚芽的大米。 这可以改变大米的味道,质地和外观,并有助于防止变质并延长其存储寿命。