Perception Analysis of Microsoft Windows OS Users

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

X-windows, Gui Programming, and Microsoft Windows

Every operating system has an underlying graphical user-interface that it supports. The graphical user-interface under UNIX is X-Windows. X-Windows has a rich and historical origin with capabilities that other GUI packages do not support. X-Windows is an important graphic tool; other tools exists that compliment X-Windows based development in one way or another. The technology behind X-Windows ...

متن کامل

Forensic analysis of System Restore points in Microsoft Windows XP

Introduction Investigating computer intrusions can be a complicated matter. Attackers are continually hiding their malicious code, erasing or modifying log files, and finding new techniques to minimize the trace evidence they leave behind. After reviewing nearly 200 compromised systems in the last 12 months, I have often become frustrated with the lack of evidence found on victim systems after ...

متن کامل

Entropy Assessment of Windows OS Performance Counters

The security of many cryptographic constructions depends on random number generators for providing unpredictable keys, nonces, initialization vectors and other parameters. Modern operating systems implement cryptographic pseudo-random number generators (PRNGs) to fulfill this need. Performance counters and other system parameters are often used as a low-entropy source to initialize (seed) the g...

متن کامل

DNA array analysis in a Microsoft Windows environment.

Microsoft Windows-based computers have evolved to the point that they provide sufficient computational and visualization power for robust analysis of DNA array data. In fact, smaller laboratories might prefer to carry out some or all of their analyses and visualization in a Windows environment, rather than alternative platforms such as UNIX. We have developed a series of manually executed macro...

متن کامل

in Microsoft Windows Status of This Memo

This document describes how the Microsoft Internet Explorer (MSIE) and Internet Information Services (IIS) incorporated in Microsoft Windows 2000 use Kerberos for security enhancements of web transactions. The Hypertext Transport Protocol (HTTP) auth-scheme of "negotiate" is defined here; when the negotiation results in the selection of Kerberos, the security services of authentication and, opt...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: E3S Web of Conferences

سال: 2018

ISSN: 2267-1242

DOI: 10.1051/e3sconf/20187312008