(12) United States Patent (10) Patent No.: US 6,810,410 B1 Durham (45) Date of Patent: Oct

Total Page:16

File Type:pdf, Size:1020Kb

(12) United States Patent (10) Patent No.: US 6,810,410 B1 Durham (45) Date of Patent: Oct USOO681041 OB1 (12) United States Patent (10) Patent No.: US 6,810,410 B1 Durham (45) Date of Patent: Oct. 26, 2004 (54) CUSTOMIZING ACLIENT APPLICATION 6,412,008 B1 6/2002 Fields et al. ................ 709/228 USING AN OPTIONS PAGE STORED ON A 6.424,981 B1 7/2002 Isaac et al. ................. 707/513 SERVER COMPUTER OTHER PUBLICATIONS (75) Inventor: Peter Emmanuel Durham, Seattle, WA http://my.zdnet.com/myzdnet/alerthelp, Jun. 10, 1999.* (US) Here's an easy way to free yourself from browser promos, Mossberg, Walter, wall Stree Journal, Aug. 21, 1997.* (73) ASSignee: Moon Corporation, Redmond, WA http://my.zdnet.com/myzdnet/alerthelp/ dated Jun. 10, 1999. * cited by examiner (*) Notice: Subject to any disclaimer, the term of this Primary Examiner Moustafa M. Meky U.S.C.patent is154(b) extended by 0 ordays. adjusted under 35 (74) Attorney,y, Agent, or Firm-KlarquistquISL SpSparkman, s LLP (57) ABSTRACT (21)21) Appl. NoNo.: 09/366,4851366, A method and apparatus for displaying an options page for (22) Filed: Aug. 3, 1999 client application in a network environment. Instead of hard 7 coding the options page within the client application, the (51) Int. Cl." ................................................ G06F 13/00 options page is Stored on a Server computer and may be (52) U.S. Cl. ........................ 709/203; 709/217; 709/219 updated dynamically without modifying the client applica (58) Field of Search ................................. 709/200, 201, tion. In one aspect, the user requests to view the options page 709/203, 206, 217, 218, 219, 223, 224, using menu commands generated by the client application. 227, 228, 229 In response to the user request, the client application launches a browser, if needed, and passes the current Settings (56) References Cited for the options page to the browser along with an address U.S. PATENT DOCUMENTS pointing to the location of the options page on a Server computer. The browser connects to the Server computer 5,740,549 A 4/1998 Reilly et al. .................. 705/14 Specified in the URL, requests the page associated with the 5,760,768 A * 6/1998 Gram ......................... 345/333 address, and passes the user Settings to the server computer. 5,799,318 A * 8/1998 Cardinal et al. ............ 707/104 5,914,714 A 6/1999 Brown ....................... 345/339 The Server computer generates a current version of the 5,933,647 A * 8/1999 Aronberg et al. ........... 395/712 options page, initializes the options page by applying the 5.974,406 A * 10/1999 Bisdikian et al. .............. 707/1 user Settings to the options page, and downloads the options 6,009,410 A * 12/1999 LeMole et al. ............... 705/14 page to the browser for display. In another aspect, the user 6,038,588 A * 3/2000 Nagarajayya et al. ....... 709/102 makes changes to the options page in the browser to cus 6,067,552 A 5/2000 Yu ............................. 707/501 tomize the client application. The browser Sends the changes 6,069,623 A 5/2000 Brooks ....................... 345/333 to the Server and the Server returns the changes to the 6,115,039 A 9/2000 Karren et al. ............... 345/335 browser as a special file type. The browser uses a helper 6,121.968 A 9/2000 Arcuri et al. ............... 345/352 function to handle the Special file type and launches an 6,133,915. A * 10/2000 Arcuri et al. ............... 345/334 application that Saves the user Settings on the client com 6,138,150 A * 10/2000 Nichols et al. ............. 709/217 puter. 6,232,972 B1 5/2001 Arcuri et al. ............... 345/352 6,272,536 B1 8/2001 Van Hoff et al. ........... 709/217 6,278,450 B1 8/2001 Arcuri et al. ............... 345/334 45 Claims, 8 Drawing Sheets STOR OPTIONSPAGEFOR ACLENAPPLICATION ONA SRWER COMPUTER STORE USERSETINGS FOR HOCNSAGE NTALIZE THONS PAGE BY APPLYING THE STORed USRSTTINGS SLAYTHE INITIALIZED OPTIONSPAGENA BROWSER ON THE CENT CoMPUTER U.S. Patent US 6,810,410 B1 - U.S. Patent Oct. 26, 2004 Sheet 2 of 8 US 6,810,410 B1 HTM FG 2 CCUMENT NTERNET or INTRANET states 8 Lisgorgia. His Engia sikkaus. Sasketc. Tuileir sitticassi its rigg33. PalEEEta ala.This Bnday also is hig:;arliestsgates:starsiglias (SITIEEEEEE: FFs-Bissa; sistriliisutis. his 10Ohills is or the inapartitatiscil laterspace dasiinstons. Emiss:slidii; if Elcroso"& frill's &rls: Eric Erdterries scorer's is thrld bustiflicts.l. iiirka: rairf's Erie resis 2- - sy Tatase arts Hogg guish infras: Rhemsiri trng refits fur and Iriri's Rethyork. COREliticisir dril addess ke'Eagle F. Egli Elitsi. E. Ericts inities: U.S. Patent Oct. 26, 2004 Sheet 3 of 8 US 6,810,410 B1 FIG. 3 1. 26 18 6 U.S. Patent Oct. 26, 2004 Sheet 4 of 8 US 6,810,410 B1 FG. 4 42 alertsyay receive fat each is"if you attal is times a seek:han big na's breaks. Stories" to get a fewaterts daily, plus any breaking ... risis, News r - Eusiness III:Stones : 150 SO:s Salect your fortha list belowta receila alers when Ele local stories Localleys TOPICS follow MSNBC's 3rigging coverage by SEle:t you anales whenaerthere's a new sloyal U.S. Patent Oct. 26, 2004 Sheet 5 of 8 US 6,810,410 B1 FIG. 5 STORE OPTIONS PAGE FOR 160 A CLIENT APPLICATION ON A SERVER COMPUTER 162 STORE USER SETTINGS FOR THE OPTIONS PAGE INITIALIZE THE OPTIONS 164 PAGE BY APPLYING THE STORED USER SETTINGS 166 DISPLAY THE INITIALIZED OPTIONS PAGENA BROWSER ON THE CLIENT COMPUTER U.S. Patent Oct. 26, 2004 Sheet 6 of 8 US 6,810,410 B1 174 REGISTRY CLIENT APPLICATION CUSTOMIZABLE CLIENT THROUGH BROWSER OPTIONS PAGE 212 SERVER COMPUTER U.S. Patent Oct. 26, 2004 Sheet 7 of 8 US 6,810,410 B1 FIG. 7 CLIENT APPLICATION RETRIEVES SETTINGS FOR AN OPTIONS PAGE ANDA URL FROM THE REGISTRY CLIENT APPLICATION ENCODES THE SETTINGS, APPENDS THEM TO THE URL AND PASSES THE URL TO A BROWSER BROWSER CONNECTS TO THE SERVER SPECIFIED IN THE URL AND REGUESTS THE OPTIONS PAGE ASSOCATED WITH THE URL SERVER INITIALIZES THE OPTIONS PAGE USING THE ENCODED SETTINGS SERVER RETURNS THE OPTIONS PAGE TO THE BROWSER, WHICH IS DISPLAYED TO THE USER IN THE BROWSER U.S. Patent Oct. 26, 2004 Sheet 8 of 8 US 6,810,410 B1 FIG. 8 USER INPUTS CHANGES TO THE 2OO OPTIONS PAGE USING THE BROWSER ON THE CLIENT COMPUTER 202 BROWSER SENDS THE CHANGES TO THE SERVER COMPUTER SERVER DECODES THE CHANGES 204 AND GENERATES ARESPONSE LABELED WITH APREDETERMINED FILE TYPE THE BROWSER SEARCHES ALIST OF APPLICATIONS TO DETERMINE 2O6 AN APPLICATIONASSOCIATED WITH THE FILE TYPE AND PASSES THE RESPONSE TO THE APPLICATION THE APPLICATION STORES THE CHANGES IN USER STORAGE AND 208 PASSES A SAVE REPORT ADDRESS TO THE BROWSER THE BROWSER REOUESTS THE 210 PAGE ASSOCATED WITH THE ADDRESS FROM THE SERVER COMPUTER AND DISPLAYS THE PAGE TO THE USER US 6,810,410 B1 1 2 CUSTOMIZING ACLIENT APPLICATION coding of the option page is problematic. For example, a USING AN OPTIONS PAGE STORED ON A client application called “News Alert” periodically checks SERVER COMPUTER MSNBC.COM for new stories in topics that the user Selected. If a new Story is available in a Selected topic, the client is notified. The user may then view a small abstract of FIELD OF THE INVENTION the story and download the entire story, if desired. The set The present invention relates generally to graphical user of Stories the user can Select from in NewS Alert changes interfaces, and more particularly to displaying and/or Saving regularly based on hot topics in the news. For example, if a user options for a client application. presidential Scandal erupts in the news, it is desirable to have an option in an options page that a user can Select to view BACKGROUND OF THE INVENTION Stories for that Specific topic. However, with the option page Most modern computer Software employs a graphical user hard-coded, the only way to provide the user with the new interface (GUI) to convey information to and receive com option is to download an updated version of the entire News mands from users. The graphical user interface relies on a Alert application to the client computer. variety of graphical user interface elements or objects, 15 Other problems also occur because of the hard coding of including icons, text, drop-down menus, dialog boxes, option pages. Specifically, the code and resources needed to toolbars, buttons, and the like. A user typically interacts with display the options page Substantially increase the size of the a graphical user interface by using a pointing device (e.g., a client application. A larger client application takes longer for mouse) to position a pointer or cursor over an object and users to download from a server computer and requires more "clicking on the object. An example of an operating System available Storage on the client computer. Additionally, it is that provides a graphical user interface is the MicroSoft desirable for the server computer to be able to examine the WINDOWS operating system, which is manufactured and user Settings So that the users may be invited to change the sold by Microsoft Corporation of Redmond, Wash. Settings based on current activities. Drop-down menus are used to organize numerous com It is desirable, therefore, to provide a System and method puter commands into major headings, which are displayed in 25 wherein user options can be easily updated in a client a menu bar that typically appears along the top of a window.
Recommended publications
  • Learn Python the Hard Way
    ptg11539604 LEARN PYTHON THE HARD WAY Third Edition ptg11539604 Zed Shaw’s Hard Way Series Visit informit.com/hardway for a complete list of available publications. ed Shaw’s Hard Way Series emphasizes instruction and making things as ptg11539604 Zthe best way to get started in many computer science topics. Each book in the series is designed around short, understandable exercises that take you through a course of instruction that creates working software. All exercises are thoroughly tested to verify they work with real students, thus increasing your chance of success. The accompanying video walks you through the code in each exercise. Zed adds a bit of humor and inside jokes to make you laugh while you’re learning. Make sure to connect with us! informit.com/socialconnect LEARN PYTHON THE HARD WAY A Very Simple Introduction to the Terrifyingly Beautiful World of Computers and Code Third Edition ptg11539604 Zed A. Shaw Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein.
    [Show full text]
  • Digital Rights Management and the Process of Fair Use Timothy K
    University of Cincinnati College of Law University of Cincinnati College of Law Scholarship and Publications Faculty Articles and Other Publications Faculty Scholarship 1-1-2006 Digital Rights Management and the Process of Fair Use Timothy K. Armstrong University of Cincinnati College of Law Follow this and additional works at: http://scholarship.law.uc.edu/fac_pubs Part of the Intellectual Property Commons Recommended Citation Armstrong, Timothy K., "Digital Rights Management and the Process of Fair Use" (2006). Faculty Articles and Other Publications. Paper 146. http://scholarship.law.uc.edu/fac_pubs/146 This Article is brought to you for free and open access by the Faculty Scholarship at University of Cincinnati College of Law Scholarship and Publications. It has been accepted for inclusion in Faculty Articles and Other Publications by an authorized administrator of University of Cincinnati College of Law Scholarship and Publications. For more information, please contact [email protected]. Harvard Journal ofLaw & Technology Volume 20, Number 1 Fall 2006 DIGITAL RIGHTS MANAGEMENT AND THE PROCESS OF FAIR USE Timothy K. Armstrong* TABLE OF CONTENTS I. INTRODUCTION: LEGAL AND TECHNOLOGICAL PROTECTIONS FOR FAIR USE OF COPYRIGHTED WORKS ........................................ 50 II. COPYRIGHT LAW AND/OR DIGITAL RIGHTS MANAGEMENT .......... 56 A. Traditional Copyright: The Normative Baseline ........................ 56 B. Contemporary Copyright: DRM as a "Speedbump" to Slow Mass Infringement ..........................................................
    [Show full text]
  • 100% Pure Java Cookbook Use of Native Code
    100% Pure Java Cookbook Guidelines for achieving the 100% Pure Java Standard Revision 4.0 Sun Microsystems, Inc. 901 San Antonio Road Palo Alto, California 94303 USA Copyrights 2000 Sun Microsystems, Inc. All rights reserved. 901 San Antonio Road, Palo Alto, California 94043, U.S.A. This product and related documentation are protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Restricted Rights Legend Use, duplication, or disclosure by the United States Government is subject to the restrictions set forth in DFARS 252.227-7013 (c)(1)(ii) and FAR 52.227-19. The product described in this manual may be protected by one or more U.S. patents, foreign patents, or pending applications. Trademarks Sun, the Sun logo, Sun Microsystems, Java, Java Compatible, 100% Pure Java, JavaStar, JavaPureCheck, JavaBeans, Java 2D, Solaris,Write Once, Run Anywhere, JDK, Java Development Kit Standard Edition, JDBC, JavaSpin, HotJava, The Network Is The Computer, and JavaStation are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and certain other countries. UNIX is a registered trademark in the United States and other countries, exclusively licensed through X/Open Company, Ltd. All other product names mentioned herein are the trademarks of their respective owners. Netscape and Netscape Navigator are trademarks of Netscape Communications Corporation in the United States and other countries. THIS PUBLICATION IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT.
    [Show full text]
  • C Programming Tutorial
    C Programming Tutorial C PROGRAMMING TUTORIAL Simply Easy Learning by tutorialspoint.com tutorialspoint.com i COPYRIGHT & DISCLAIMER NOTICE All the content and graphics on this tutorial are the property of tutorialspoint.com. Any content from tutorialspoint.com or this tutorial may not be redistributed or reproduced in any way, shape, or form without the written permission of tutorialspoint.com. Failure to do so is a violation of copyright laws. This tutorial may contain inaccuracies or errors and tutorialspoint provides no guarantee regarding the accuracy of the site or its contents including this tutorial. If you discover that the tutorialspoint.com site or this tutorial content contains some errors, please contact us at [email protected] ii Table of Contents C Language Overview .............................................................. 1 Facts about C ............................................................................................... 1 Why to use C ? ............................................................................................. 2 C Programs .................................................................................................. 2 C Environment Setup ............................................................... 3 Text Editor ................................................................................................... 3 The C Compiler ............................................................................................ 3 Installation on Unix/Linux ............................................................................
    [Show full text]
  • Medical Device Cyber Security – Best Practice Guide
    Integrating the Healthcare Enterprise 5 IHE Patient Care Device (PCD) White Paper 10 Medical Equipment Management (MEM): Medical Device Cyber Security – Best Practice Guide 15 Published Revision 1.1 20 Date: October 14, 2015 Author: IHE PCD Technical Committee Email: [email protected] 25 Please verify you have the most recent version of this document. See here for Published versions and here for Public Comment versions. Copyright © 2015: IHE International, Inc. IHE Patient Care Device White Paper – MEM Medical Device Cyber Security-Best Practice Guide ______________________________________________________________________________ Foreword This white paper is published on October 14, 2015. Comments are invited and can be submitted at http://www.ihe.net/PCD_Public_Comments/. 30 General information about IHE can be found at: www.ihe.net. Information about the IHE Patient Care Device domain can be found at: ihe.net/IHE_Domains. Information about the organization of IHE Technical Frameworks and Supplements and the process used to create them can be found at: http://ihe.net/IHE_Process and 35 http://ihe.net/Profiles. The current version of the IHE Patient Care Device Technical Framework can be found at: http://www.ihe.net/Technical_Frameworks. ______________________________________________________________________________ 2 Rev. 1.1 – 2015-10-14 Copyright © 2015: IHE International, Inc. IHE Patient Care Device White Paper – MEM Medical Device Cyber Security-Best Practice Guide ______________________________________________________________________________
    [Show full text]
  • To Download PDF File of Guidelines for Application Software Testing
    Office of the Government Chief Information Officer GUIDELINES FOR APPLICATION SOFTWARE TESTING [G20] Version: 1.10 May 2018 ©The Government of the Hong Kong Special Administrative Region of the People’s Republic of China The contents of this document remain the property of and may not be reproduced in whole or in part without express permission of the Government of the HKSAR GUIDELINES FOR AMENDMENT HISTORY APPLICATION SOFTWARE TESTING ________________________________________________________________________________ Amendment History Change Revision Description Pages Revision Date Number Affected Number 1 Update the document style in order to Whole 1.1 Dec 1999 conform with the Document Style document Manual Version 2.0. 2 Revise the outdated contents to reflect 2-1, 5-2, 1.1 Dec 1999 current practices. 6-2, 7-2, 7-4, 7-5, 7-7, 8-9, 10-1, 11-1 3 The personnel to take up the quality 5-2, 6-4, 1.1 Dec 1999 assurance role is revised. 8-1, 9-2, 9-3 4 Remove the banner ‘Standards & Front Cover 1.2 Jun 2003 Methods Document’. Page 5 Remove page number of Amendment Amendment 1.2 Jun 2003 History and Tables of Contents History and Tables of Contents 6 Remove the Distribution and Release Distribution 1.2 Jun 2003 Page and Release Page 7 Merging of ITSD into the Commerce, Whole 1.3 Jul 2004 Industry and Technology Bureau on 1 Document July 2004. Replace ‘Information Technology Services Department (ITSD)’ by ‘The Office of the Government Chief Information Officer (OGCIO)’. Replace logo of ITSD by OGCIO Front Cover Page 8 Review the update-ness 1.4
    [Show full text]
  • Automatic Reusability Analysis of Software Binaries
    AUTOMATIC REUSABILITY ANALYSIS OF SOFTWARE BINARIES RAMAKRISHNAN VENKITARAMAN and GOPAL GUPTA Applied Logic, Programming-Languages, and Systems (ALPS) Laboratory Department of Computer Science The University of Texas at Dallas Email: [email protected], [email protected] 1 We consider reusability of software component binaries. Reuse of code at the binary level is im- portant because usually only the machine code for system components is available; vendors do not want to share their source code for proprietary reasons. We develop necessary and sufficient conditions for ensuring that software binaries are reusable and relate them to the coding standards that have been developed in the industry to ensure binary code reusability. These coding stan- dards, in essence, discourage the (i) use of hard-coded pointers, and (ii) writing of non-reentrant code. Checking that binary code satisfies these standards/conditions, however, is undecidable, in general. We thus develop static analysis based methods for checking if a software binary satisfies these conditions. We also consider the problem of automatically checking if coding standards have been followed in the development of embedded applications. The problem arises from practical considerations because DSP chip manufacturers (in our case Texas Instruments) want various third party software developers to adhere to a certain coding standard to facilitate system inte- gration during application development. This static analysis rests on an abstract interpretation framework. Our analyzer takes object code as input, disassembles it, builds the flow-graph, and statically analyzes the flow-graph for the presence of dereferenced pointers that are hard coded. The analyzer is currently being extended to check for compliance with other rules adopted by TI as part of its coding standards.
    [Show full text]
  • Coding Guidelines and Quick Start Tips for Software Development Version 0.6 (In Progress)
    Coding Guidelines and Quick Start Tips for Software Development Version 0.6 (in progress) Includes: C, Python, and some Assembler and C++ File: “C:\Travel_Briefcase\EricSchool\Research\Coding Guidelines.doc” Last modified by Eric L. Michelsen The goal of coding guidelines is to improve the productivity of all software development: Easier, faster, more reliable. 1. Source code is a language for people, not just computers. 2. Comment as you go. Don’t wait for later. 3. Ask yourself: “How will the next person know that?” “Debugging is twice as hard as writing the code in the first place. Therefore, if you write the code as cleverly as possible, you are, by [implication], not smart enough to debug it.” - Brian W. Kernighan “Whenever possible, ignore the coding standards currently in use by thousands of developers in your project’s target language and environment.” - Roedy Green, How To Write Unmaintainable Code, www.strauss.za.com/sla/code_std.html “There is much more to programming than simply writing the code.” - T. M. R. Ellis, Fortran 90 Programming, Addison-Wesley, 1994, p693. “These guidelines will make everyone’s life easier, even yours.” - Eric L. Michelsen APOLLO Lunar Laser Ranging Software Coding Guidelines Table of Contents 1. Why Coding Guidelines? ................................................................................................................ 5 1.1 Guidelines Summary ................................................................................................................. 6 1.2 Document Overview.................................................................................................................
    [Show full text]
  • OWASP Code Review Guide V1.1 2008
    OWASP CODE REVIEW GUIDE 2008 V1.1 © 2002-2008 OWASP Foundation This document is licensed under the Creative Commons Attribution Share Alike 3.0 license. You must attribute your version to the OWASP Code Review Guide or the OWASP Foundation. OWASP Code Review Guide V1.1 2008 Table of Contents Foreword by Jeff Williams, OWASP Chair .................................................................................................................................... 4 Welcome to the OWASP Code Review Guide 1.1 ........................................................................................................................ 6 About The Open Web Application Security Project ..................................................................................................................... 8 Code Review Guide History ....................................................................................................................................................... 10 Introduction ............................................................................................................................................................................... 11 Preparation ................................................................................................................................................................................ 13 Security Code Review in the SDLC ............................................................................................................................................. 16 Security Code Review
    [Show full text]
  • A Survey of Compiler Testing (2019)
    1 A Survey of Compiler Testing∗ JUNJIE CHEN, College of Intelligence and Computing, Tianjin University, China JIBESH PATRA, Department of Computer Science, University of Stuttgart, Germany MICHAEL PRADEL, Department of Computer Science, University of Stuttgart, Germany YINGFEI XIONG, Key Laboratory of High Confidence Software Technologies (Peking University), MoE, China HONGYU ZHANG, School of Electrical Engineering and Computing, University of Newcastle, Australia DAN HAO, Key Laboratory of High Confidence Software Technologies (Peking University), MoE, China LU ZHANG, Key Laboratory of High Confidence Software Technologies (Peking University), MoE, China Virtually any software running on a computer has been processed by a compiler or a compiler-like tool. Because compilers are such a crucial piece of infrastructure for building software, their correctness is of paramount importance. To validate and increase the correctness of compilers, significant research efforts have been devoted to testing compilers. This survey article provides a comprehensive summary of the current state of the art of research on compiler testing. The survey covers different aspects of the compiler testing problem, including how to construct test programs, what test oracles to use for determining whether a compiler behaves correctly, how to execute compiler tests efficiently, and how to help compiler developers take action on bugs discovered by compiler testing. Moreover, we survey work that empirically studies the strengths and weaknesses of current compiler
    [Show full text]
  • English Arabic Technical Computing Dictionary
    Ï ú GAÓñ滅 @ ú æ®J Ë@ ñ ÓA®Ë@ úGQ« øQ Êm.'@ English . Arabic Technical Computing Dictionary èQmÌ'@ ©K PAÖ Ï@I. KQªK K Q¯ Free Software Arabisation Team http://wiki.arabeyes.org/Technical Dictionary Version: 2.0.29-02-2008 February 29, 2008 This is a compilation of the Technical Computing Dictionary that is under development at Arabeyes, the Arabic UNIX project. The technical dictionary aims to to translate and standardise technical terms that are used in software. It is an effort to unify the terms used across all Open Source projects and to present the user with consistant and understandable interfaces. This work is licensed under the FreeBSD Documentation License, the text of which is available at the back of this document. Contributors are welcome, please consult the URL above or contact [email protected]. Q Ì ÉJ ªË@ éÒ¢@ Ñ«YË QK AK.Q« ¨ðQåÓ .« èQK ñ¢ ÕæK ø YË@ úæ®JË@ úGñAm '@ ñÓA®ÊË éj èYë . l×. @QK. éÔg. QK ú¯ éÊÒªJÖÏ@ éJ J®JË@ HAjÊ¢Ö Ï@ YJ kñKð éÔg. QK úÍ@ ñÓA®Ë@ ¬YîE .ºKñJ ËAK. éîD J.Ë@ ÐYjJÒÊË éÒj. Óð éÓñê®Ó H. ñAg éêk. @ð Õç'Y®JË ð á ÔgQÖÏ@ á K. H. PAJË@ øXA®JË ,H. ñAmÌ'@ . ¾JÖ Ï .ñÓA®Ë@ éK AîE ú ¯ èQ¯ñJÖÏ@ ð ZAKñÊË ø X @ ú G. ø Q¯ ékP ù ë ñÓA®Ë@ ékP . éJ K.QªËAK. ÕÎ @ [email protected] . úΫ ÈAB@ ð@ èC«@ à@ñJªË@ úÍ@ H. AëYË@ ZAg. QË@ ,á ÒëAÖÏ@ ɾK. I. kQK Action, Z@Qk. @ Activate, , ¡ JK Active, ¡ J A Activity, A Abort, Actor, É«A¯ Aêk.
    [Show full text]
  • Permissionless Banking API
    Permissionless Banking API Christos Kyprianou Permissionless Banking API Master’s Thesis in Embedded Systems Parallel and Distributed Systems group Faculty of Electrical Engineering, Mathematics, and Computer Science Delft University of Technology Christos Kyprianou Jan 31, 2018 Author Christos Kyprianou Title Permisionless Banking API MSc presentation Jan 31, 2018 Graduation Committee dr. ir. J. A. Pouwelse Delft University of Technology dr. J.S. Rellermeyer Delft University of Technology dr. Z. Erkin Delft University of Technology Abstract In this document we present an in-depth vulnerability assessment of the HSBC banking system. Going beyond prior work, we investigate the full stack down to the Java bytecode level and further analyze its 3 key platforms: Android OS, IOS and online banking. During the process we analyze their main security feature, OTP generation algorithm and examine the inner workings of mobile/online bank- ing through various vulnerability assesment techniques and successful man in the browser attacks in their main platforms showing the client-server communication packet flow. During the process we discovered several vulnerabilities and show that HSBC leaks details to multiple webserver which are not under it’s direct control such as: lo.v.liveperson.net. Additionally, the HSBC app is found to be inefficient, for instance, it repeatedly sends ”Lorum Ipsum” phrases. A gross waste of band- width, bordering on incompetence. Finally we present our own version that is able to perform the basic banking functions: 1-log-in, 2-view accounts and balances, 3- view transaction history and 4-perform transactions, adding more than 200% speed improvement. iv Preface This is the report of my MSc thesis project on implementing and testing a permis- sionless banking API, for the completion of my MSc degree in Embedded Systems.
    [Show full text]