| Strider GhostBuster: Why It’s a bad Idea For Stealth Software To Hide Files The simplicity and effectiveness of the approach suggest that the following quote on the Internet may no longer be true: “When you can get the dir command to lie, it’s all over.” In the post-GhostBuster world 48.53 Kb. 1 | read |
| VMware vCenter Converter 2 for vCenter Server 1 Release Notes Windows or Linux, virtual machine formats that are not specific to vmware, other third-party image formats, and vmware virtual machines 267.84 Kb. 3 | read |
| Advances in Memory Management for Windows Windows Vista® and Windows Server® 2008. It describes the changes that Microsoft has implemented internally in the operating system and provides guidelines for application developers, driver writers 92.35 Kb. 7 | read |
| Grid Computing Environments rg d. Gannon, cs & ptl, Indiana University This memo provides information to the Grid community interested in portal access to Grid systems. Distribution is unlimited 89.54 Kb. 1 | read |
| Assaf Solomovitch Tsahi Talmor The Phoneme class is the heart of our application. To it attached three modules, each handles different aspect of the architecture: 24 266.03 Kb. 6 | read |
| Building a Research Library for the History of the Web H 7 [Information Storage and Retrieval]: Digital Libraries – collection, systems issues, user issues. J. 4 [Social and Behavioral Sciences]: sociology 70.6 Kb. 1 | read |
| 1 General information 2 General Features 1 Capabilities It can take no responsibility for damages or injuries resulting from construction and operation of this Turbo card. A liability for damages as a result of improper installation is excluded 45.07 Kb. 1 | read |
| The Amiga Operating System: Past and Present cs 450 1 The 3 custom chips were the ‘Agnus’ which was the address generator, ‘Denise’ which was the display adapter, and ‘Paula’ which handled the ports and audio 61.32 Kb. 1 | read |
| Kevin Emmanuel mpe+ Access Data Sim reader. Mpe+ includes a visualization tool in which you can see different relationships of communication dealing with contacts on a phone or mobile device. It then is able to create graphical data timelines from this information 15.97 Kb. 1 | read |
| Some Ubuntu Practice sanog 10 – August 29 New Delhi, India Instead of logging in as the “root” user to do system tasks, or becoming root by using the su command you are encouraged to do your system administration using sudo. By default your user has privileges to do this 75.82 Kb. 1 | read |
| Ubuntu Practice and Configuration Post Installation Exercises apricot 2008 Taipei, Taiwan Instead of logging in as the “root” user to do system tasks, or becoming root by using the su command you are encouraged to do your system administration using sudo. By default your user has privileges to do this 80.67 Kb. 1 | read |
| Making a Linux Kernel for the Puppeteer Arm processor Linux Operating System once we have it on the Puppeteer boards we also need facilities such as a compiler (with its associated libraries) and utilities such as the ability to login and perform housekeeping 40.79 Kb. 1 | read |
| Microsoft Windows 2000 By Q. Liu (Student id: 106520) Abstract It was based on Windows nt but avoided using a dos-based architecture in an attempt to minimize the system crashes and other problems that plagued Windows nt in the past 58.55 Kb. 1 | read |
| Unix vs. Nt cis333-101 Warren Pencak Win nt, for what? Users are demanding a new interface like that of Win 95. Microsoft played it smart though, they decided to experiment on an unproven interface with Win 95 to see how stable it is then most likely port it to nt when it is as stable as their 31.06 Kb. 1 | read |
| Computer System Structures Some computer systems, such as pcs, use a two-step process in which a simple bootstrap loader fetches a more complex boot program from disk, which in turn loads the kernel 168.14 Kb. 3 | read |