Skip to main content

Home/ science/ Group items tagged attack

Rss Feed Group items tagged

cdnsolutions

Biggest cyber attack of 2017- RANSOMWARE - IT Outsourcing and Consulting Company| CDN S... - 0 views

  •  
    Biggest cyber attack occurred because of ransomware, So beware! and keep your computer safe. This blog helps you to prevent RANSOMWARE.
Erich Feldmeier

Computer Security and DNA sequencing , dnasec.pdf @vbioev @synbioinfo @gedankenstuecke ... - 0 views

  •  
    "The rapid improvement in DNA sequencing has sparked a big data revolution in genomic sciences, which has in turn led to a proliferation of bioinformatics tools. To date, these tools have encountered little adversarial pressure. This paper evaluates the robustness of such tools if (or when ) adversarial attacks manifest. We demonstrate, for the first time, the synthesis of DNA which - when sequenced and processed - gives an at- tacker arbitrary remote code execution. To study the feasibility of creating and synthesizing a DNA-based exploit, we performed our attack on a modified down- stream sequencing utility with a deliberately introduced vulnerability. "
anonymous

Implementing Sustainable Farming - 2 views

It is a known fact that there has been a rapid increase of population across the globe. This population growth demands increase in living space and food. It is the agricultural sector that is consi...

sustainable farming sustainable agriculture Mahendra Trivedi Trivedi Foundation scientific research Trivedi Effect

started by anonymous on 30 Dec 14 no follow-up yet
Erich Feldmeier

Peter Lockhart: No proof gum disease causes heart problems - Health - CBC News - 0 views

  •  
    "For 20 years, researchers have reported a potential link between gum disease and atherosclerotic heart disease from hardening of the arteries or stroke. "The message sent out by some in health-care professions, that heart attack and stroke are directly linked to gum disease, can distort the facts, alarm patients and perhaps shift the focus on prevention away from well-known risk factors for these diseases," said Dr. Peter Lockhart, a professor and chair of oral medicine at the Carolinas Medical Center in Charlotte, N.C. Lockhart wrote the heart group's new position statement in the journal Circulation. The statement was prepared after a three-year analysis of about 600 studies by an expert panel led by a dentist and a cardiologist."
Erich Feldmeier

Gut Microbes May Foster Heart Disease | Wired Science | Wired.com - 0 views

  •  
    ""We probably have underestimated the role our microbial flora play in modulating disease risk," says Daniel Rader, a heart disease specialist at the University of Pennsylvania School of Medicine. Rader, who was not involved in the study, says that gut bacteria may not be as big a factor in causing heart disease as diabetes or smoking, but could be important in tipping some people toward sickness. Researchers led by Stanley Hazen, a cardiologist at the Cleveland Clinic, didn't start out to study gut bacteria. In fact, says Hazen, he had "no clue - zero," that intestinal microbes were involved in heart disease. "I'd never even considered it or thought of the concept." Hazen and his colleagues compared blood plasma from healthy people to plasma from people who had had heart attacks, strokes or died to see if substances in the blood could predict who is in danger from heart disease. The researchers found 18 small molecules associated with fat buildup in the arteries. One of the best predictors turned out to be a byproduct made when gut bacteria break down a fat called choline (also known as lecithin). The more of this byproduct, called trimethylamine N-oxide or TMAO, a person or mouse has in the blood, the higher the risk of getting heart disease, the researchers found. Gut bacteria are actually middlemen in TMAO production. The microbes convert lecithin to a gas that smells like rotten fish. Then an enzyme in the liver changes the foul-smelling gas to TMAO."
Erich Feldmeier

Michael Nielsen: Reinventing Discovery | Michael Nielsen - 0 views

  •  
    The book is about networked science: the use of online tools to transform the way science is done. In the book I make the case that networked science has the potential to dramatically speed up the rate of scientific discovery, not just in one field, but across all of science. Furthermore, it won't just speed up discovery, but will actually amplify our collective intelligence, expanding the range of scientific problems which can be attacked at all. But, as I explain in the book, there are cultural obstacles that are blocking networked science from achieving its full potential. And so the book is also a manifesto, arguing that networked science must be open science if it is to realize its potential. Making the change to open science is a big challenge. In my opinion it's one of the biggest challenges our society faces, one that requires action on many fronts. One of those fronts is to make sure that everyone - including scientists, but also grant agencies, governments, libraries, and, especially, the general public -- understands how important the stakes are, and how urgent is the need for change.
Janos Haits

Real-time Web Monitor - 0 views

  •  
    "Akamai monitors global Internet conditions around the clock. With this real-time data we identify the global regions with the greatest attack traffic, cities with the slowest Web connections (latency), and geographic areas with the most Web traffic (traffic density)."
Erich Feldmeier

Gout : Gicht Stryer, Thomas sydenham Symptoms and Diagnosis - 0 views

  •  
    "An accurate and colorful discription of a gout attack was elegantly written in 1683 by Dr. Thomas Sydenham who was himself a sufferer of gout: The victim goes to bed and sleeps in good health. About 2 o'clock in the morning, he is awakened by a severe pain in the great toe; more rarely in the heel, ankle or instep. This pain is like that of a dislocation, and yet the parts feel as if cold water were poured over them. Then follows chills and shiver and a little fever. The pain which at first moderate becomes more intense. With its intensity the chills and shivers increase. After a time this comes to a full height, accommodating itself to the bones and ligaments of the tarsus and metatarsus. Now it is a violent stretching and tearing of the ligaments- now it is a gnawing pain and now a pressure and tightening. So exquisite and lively meanwhile is the feeling of the part affected, that it cannot bear the weight of bedclothes nor the jar of a person walking in the room. "
Walid Damouny

Telomeres resemble DNA fragile sites - 0 views

  •  
    Telomeres, the repetitive sequences of DNA at the ends of linear chromosomes, have an important function: They protect vulnerable chromosome ends from molecular attack. Researchers at Rockefeller University now show that telomeres have their own weakness. They resemble unstable parts of the genome called fragile sites where DNA replication can stall and go awry. But what keeps our fragile telomeres from falling apart is a protein that ensures the smooth progression of DNA replication to the end of a chromosome.
Skeptical Debunker

Technology Review: Mapping the Malicious Web - 0 views

  • Now a researcher at Websense, a security firm based in San Diego, has developed a way to monitor such malicious activity automatically. Speaking at the RSA Security Conference in San Francisco last week, Stephan Chenette, a principal security researcher at Websense, detailed an experimental system that crawls the Web, identifying the source of content embedded in Web pages and determining whether any code on a site is acting maliciously. Chenette's software, called FireShark, creates a map of interconnected websites and highlights potentially malicious content. Every day, the software maps the connections between nearly a million websites and the servers that provide content to those sites. "When you graph multiple sites, you can see their communities of content," Chenette says. While some of the content hubs that connect different communities could be legitimate--such as the servers that provide ads to many different sites--other sources of content could indicate that an attacker is serving up malicious code, he says. According to a study published by Websense, online attackers' use of legitimate sites to spread malicious software has increased 225 percent over the past year.
  •  
    Over the past couple of years, cybercriminals have increasingly focused on finding ways to inject malicious code into legitimate websites. Typically they've done this by embedding code in an editable part of a page and using this code to serve up harmful content from another part of the Web. But this activity can be difficult to spot because websites also increasingly pull in legitimate content, such as ads, videos, or snippets of code, from outside sites.
jacob logan

Global crude prices jump over escalating tensions in the Middle-East - 1 views

  •  
    Crude prices jumped more than 1% after Yemeni separatists carried out a drone attack on a Saudi Arabian oil facility during the weekend. Brent crude climbed 78 cents to $59.42 a barrel, while US crude gained 64 cents to trade at $55.51 per barrel, reported Reuters.
Charles Daney

Radical New Theory: Black Holes Attack and Devour Stars from the Inside - Space.com - 0 views

  •  
    As if they weren't considered beastly enough, black holes can dive into nearby stars and devour them from the inside out, scientists now suggest. Such invasions by such black holes could help explain the most powerful explosions in the universe, gamma-ray bursts, whose origins remain elusive.
Skeptical Debunker

Scientists reveal driving force behind evolution - 0 views

  • The team observed viruses as they evolved over hundreds of generations to infect bacteria. They found that when the bacteria could evolve defences, the viruses evolved at a quicker rate and generated greater diversity, compared to situations where the bacteria were unable to adapt to the viral infection. The study shows, for the first time, that the American evolutionary biologist Leigh Van Valen was correct in his 'Red Queen Hypothesis'. The theory, first put forward in the 1970s, was named after a passage in Lewis Carroll's Through the Looking Glass in which the Red Queen tells Alice, 'It takes all the running you can do to keep in the same place'. This suggested that species were in a constant race for survival and have to continue to evolve new ways of defending themselves throughout time. Dr Steve Paterson, from the University's School of Biosciences, explains: "Historically, it was assumed that most evolution was driven by a need to adapt to the environment or habitat. The Red Queen Hypothesis challenged this by pointing out that actually most natural selection will arise from co-evolutionary interactions with other species, not from interactions with the environment. "This suggested that evolutionary change was created by 'tit-for-tat' adaptations by species in constant combat. This theory is widely accepted in the science community, but this is the first time we have been able to show evidence of it in an experiment with living things." Dr Michael Brockhurst said: "We used fast-evolving viruses so that we could observe hundreds of generations of evolution. We found that for every viral strategy of attack, the bacteria would adapt to defend itself, which triggered an endless cycle of co-evolutionary change. We compared this with evolution against a fixed target, by disabling the bacteria's ability to adapt to the virus. "These experiments showed us that co-evolutionary interactions between species result in more genetically diverse populations, compared to instances where the host was not able to adapt to the parasite. The virus was also able to evolve twice as quickly when the bacteria were allowed to evolve alongside it."
  •  
    Scientists at the University of Liverpool have provided the first experimental evidence that shows that evolution is driven most powerfully by interactions between species, rather than adaptation to the environment.
cecilia marie

Virus Protection Software - 1 views

My files are often lost if not corrupted in my disk drive, and sadly, those where important documents. Sometimes, I fail to backup all my files, that is why, by the time it is corrupted, I am left ...

virus protection

started by cecilia marie on 09 Sep 11 no follow-up yet
anonymous

Scientific Research With The Trivedi Effect - 0 views

  •  
    Mahendra Kumar Trivedi has proven the Trivedi Effect® to be of scientific significance through positive results. The results of the tests were also vouched by eminent scientists and scholars with in depth knowledge in molecular science.
anonymous

Enhance The Profit From Your Dairy Farm! - 1 views

Dairy farming is one of the most successful and ever in demand business which needs concentration over a long-term production of milk. The dairy farmers all around the world work hard each day to s...

dairy farming milk production increase supply Mahendra Trivedi Effect Science research

started by anonymous on 26 Dec 14 no follow-up yet
anonymous

Pros And Secrets Of The Stem Cell Research - 1 views

Stem cells are generally present in the body of humans and several animals. They divide themselves into some other cells as well with time, which are important for the survival of humans. Since las...

stem cell research medical research

started by anonymous on 14 Jan 15 no follow-up yet
cdnsolutions

RANSOMWARE! Is your computer safe! - 0 views

  •  
    Lots of computers lock because of RANSOMWARE and demand money to unlock. Is your computer safe.
1 - 19 of 19
Showing 20 items per page