Skip to main content

Home/ science/ Group items tagged hub

Rss Feed Group items tagged

Janos Haits

SciVerse - HUB - Home - 0 views

  •  
    SciVerse offers unprecedented access to a constantly expanding universe of content and solutions resulting inmore discovery with less searching.
Janos Haits

KnuEdge Inc. - KnuEdge, Inc. - 0 views

  •  
    "KnuEdge is an innovation hub whose mission is to lead fundamental transformations, and deliver next-generation technologies that will alter how humans interact with machines - ranging from robust voice recognition and authentication to machine learning."
anonymous

My Love Of Shortwave Radio - 1 views

  •  
    How I got interested in shortwave and ham radio by building a crystal radio kit as a child.
anonymous

A RFID Blocking Wallet Can Prevent Identity Theft - 0 views

  •  
    How you can prevent identity theft with a RFID blocking wallet.
anonymous

How to Pick Up Free Internet On A Sailboat With Ultra Long Range Wifi - 0 views

  •  
    How to pick up free internet with long range wifi antennas living on a boat.
anonymous

The Job Of A Mud Engineer On An Oil Rig - 0 views

  •  
    What a mud engineer does on an oil rig.
anonymous

How The DB Gain Of A Cell Phone Antenna Increases Range - 0 views

  •  
    How the DB gain of a cell phone antenna affects range. How to increase cell phone range and reception.
anonymous

Cell Phones and Aluminum Siding and Metal Framed Homes - 0 views

  •  
    How to get better cell phone reception in a steel frame home or home with aluminum siding.
anonymous

Long Range Wifi Adapters and Antennas For Free Internet Access - 0 views

  •  
    The best super long range WiFi antennas and high power wireless adapters for really long reaching wifi.
anonymous

What Pumpers or Oilfield Gaugers Do. Vital Oil Production Jobs - 0 views

  •  
    What an oilfield guager or pumper does in oil and gas production, jobs.
anonymous

What are The Dangers of Sodium Laureth Sulfate In Shampoo? - 0 views

  •  
    The danger of sodium laureth sulfate in shampoos includes cancer risk.
anonymous

Lime and Orange Trees For Texas. Varieties. - 0 views

  •  
    The types of orange trees and lime trees that do best in Central Texas.
anonymous

How To Kill Wasps and Bees Naturally Without Pesticide - 1 views

  •  
    Here are some natural ways to kill wasps without pesticides the eco friendly way.
anonymous

Horizontal Drilling, How Directional Drillers Drill Oil Wells Sideways - 0 views

  •  
    How horizontal oil and gas wells are drilled with directional drilling techniques.
Skeptical Debunker

Technology Review: Mapping the Malicious Web - 0 views

  • Now a researcher at Websense, a security firm based in San Diego, has developed a way to monitor such malicious activity automatically. Speaking at the RSA Security Conference in San Francisco last week, Stephan Chenette, a principal security researcher at Websense, detailed an experimental system that crawls the Web, identifying the source of content embedded in Web pages and determining whether any code on a site is acting maliciously. Chenette's software, called FireShark, creates a map of interconnected websites and highlights potentially malicious content. Every day, the software maps the connections between nearly a million websites and the servers that provide content to those sites. "When you graph multiple sites, you can see their communities of content," Chenette says. While some of the content hubs that connect different communities could be legitimate--such as the servers that provide ads to many different sites--other sources of content could indicate that an attacker is serving up malicious code, he says. According to a study published by Websense, online attackers' use of legitimate sites to spread malicious software has increased 225 percent over the past year.
  •  
    Over the past couple of years, cybercriminals have increasingly focused on finding ways to inject malicious code into legitimate websites. Typically they've done this by embedding code in an editable part of a page and using this code to serve up harmful content from another part of the Web. But this activity can be difficult to spot because websites also increasingly pull in legitimate content, such as ads, videos, or snippets of code, from outside sites.
1 - 19 of 19
Showing 20 items per page