Applications: M

Total Page:16

File Type:pdf, Size:1020Kb

Applications: M Applications: M This chapter contains the following sections: • Mac App Store, on page 7 • MacOS Server Admin, on page 8 • MacPorts, on page 9 • Macy's, on page 10 • Magenta Logic, on page 11 • MagicJack, on page 12 • Magicland, on page 13 • MagPie, on page 14 • Mail.Ru, on page 15 • Mail.ru Attachment, on page 16 • Mailbox, on page 17 • Mailbox-LM, on page 18 • MailChimp, on page 19 • MAILQ, on page 20 • maitrd, on page 21 • Malware Defense System, on page 22 • Malwarebytes, on page 23 • Mama.cn, on page 24 • Management Utility, on page 25 • MANET, on page 26 • Manolito, on page 27 • Manorama, on page 28 • Manta, on page 29 • MAPI, on page 30 • MapleStory, on page 31 • MapMyFitness, on page 32 • MapQuest, on page 33 • Marca, on page 34 • Marine Traffic, on page 35 • Marketo, on page 36 • Mashable, on page 37 • Masqdialer, on page 38 Applications: M 1 Applications: M • Match.com, on page 39 • Mathrubhumi, on page 40 • Mathworks, on page 41 • MATIP, on page 42 • MawDoo3, on page 43 • MaxDB, on page 44 • MaxPoint Interactive, on page 45 • Maxymiser, on page 46 • MC-FTP, on page 47 • McAfee, on page 48 • McAfee AutoUpdate, on page 49 • McIDAS, on page 50 • mck-ivpip, on page 51 • mcns-sec, on page 52 • MCStats, on page 53 • mdc-portmapper, on page 54 • MDNS, on page 55 • MdotM, on page 56 • Me.com, on page 57 • Me2day, on page 58 • Media Hub, on page 59 • Media Innovation Group, on page 60 • Media Stream Daemon, on page 61 • Media6Degrees, on page 62 • Mediabot, on page 63 • MediaFire, on page 64 • MediaMath, on page 65 • MediaMind, on page 66 • Mediaplex, on page 67 • MediaV, on page 68 • Medipac, on page 69 • Medium, on page 70 • Meebo, on page 71 • Meeting Maker, on page 72 • Meetup, on page 73 • Mega, on page 74 • Megaco, on page 75 • MegaMeeting, on page 76 • Megaproxy, on page 77 • Megashare, on page 78 • Megaupload, on page 79 • MelOn, on page 80 • Memcomm, on page 81 • Menards, on page 82 • Mendeley, on page 83 • Mention, on page 84 Applications: M 2 Applications: M • Mercado Livre, on page 85 • Merdeka.com, on page 86 • Meregister, on page 87 • MERIT Internodal Protocol, on page 88 • Merriam-Webster, on page 89 • Mesmo Games, on page 90 • Messenger, on page 91 • Meta5, on page 92 • Metacafe, on page 93 • MetaCrawler, on page 94 • MetaFilter, on page 95 • Metagram, on page 96 • Meter, on page 97 • MF Cobol, on page 98 • MFE, on page 99 • MFTP, on page 100 • MGCP, on page 101 • MGID, on page 102 • Mgoon, on page 103 • Mibbit, on page 104 • Michigan Radio, on page 105 • micom-pfs, on page 106 • MICP, on page 107 • Micromuse-lm, on page 108 • Microsoft, on page 109 • Microsoft Access, on page 110 • Microsoft Ads, on page 111 • Microsoft AutoUpdate, on page 112 • Microsoft Azure, on page 113 • Microsoft CRM Dynamics, on page 114 • Microsoft CryptoAPI, on page 115 • Microsoft download, on page 116 • Microsoft Excel, on page 117 • Microsoft FrontPage Server Extensions, on page 118 • Microsoft Global Catalog, on page 119 • Microsoft NCSI, on page 120 • Microsoft Powerpoint, on page 121 • Microsoft Rome, on page 122 • Microsoft Shuttle, on page 123 • Microsoft Store, on page 124 • Microsoft Stream, on page 125 • Microsoft System Center Operations Manager, on page 126 • Microsoft Update, on page 127 • Microsoft Visual Studio, on page 128 • Microsoft Web Platform Installer, on page 129 • Microsoft Windows Live Services Authentication, on page 130 Applications: M 3 Applications: M • Microsoft Windows Messenger, on page 131 • Microsoft WNS, on page 132 • Microsoft Word, on page 133 • Microsoft WSMan, on page 134 • Microsoft-DS, on page 135 • Middle East Broadcasting Center, on page 136 • Midori, on page 137 • Mikogo, on page 138 • Millennial Media, on page 139 • Milliyet, on page 140 • Minecraft, on page 141 • Mini SQL, on page 142 • Mininova, on page 143 • Mint.com, on page 144 • Minus, on page 145 • MissLee, on page 146 • Mister Wong, on page 147 • MIT ML Device, on page 148 • MIT Spooler, on page 149 • mit-ml-dev, on page 150 • MixBit, on page 151 • Mixi, on page 152 • Mixpanel, on page 153 • Mixx, on page 154 • MJ12 Bot, on page 155 • MKRU, on page 156 • MKRU Streaming, on page 157 • MLive, on page 158 • MLN Advertising, on page 159 • MMS, on page 160 • Moat, on page 161 • Mobaga Town, on page 162 • Mobile Safari, on page 163 • Mobile Theory, on page 164 • MobileAsset, on page 165 • MobileCore, on page 166 • MobileIP, on page 167 • MobilIP-MN, on page 168 • Mobility XE protocol, on page 169 • MobiTV, on page 170 • Modbus, on page 171 • MOG, on page 172 • Mojang, on page 173 • Mojiva, on page 174 • Mondex, on page 175 • Monetate, on page 176 Applications: M 4 Applications: M • Monitor, on page 177 • Monster World, on page 178 • Monster.com, on page 179 • Moodlebot, on page 180 • Mop.com, on page 181 • MoPub, on page 182 • MoreFreeCamSecret, on page 183 • Morgan Stanley, on page 184 • Morpheus, on page 185 • MortgageWare, on page 186 • Motley Fool, on page 187 • Motorola, on page 188 • Motrixi, on page 189 • Movenetworks, on page 190 • Movieclips, on page 191 • MovieTickets.com, on page 192 • Mozilla, on page 193 • MP4, on page 194 • MPEG, on page 195 • MPEG Transport Stream, on page 196 • MPLS, on page 197 • MPLS Unicast, on page 198 • MPM, on page 199 • MPM FLAGS Protocol, on page 200 • MPP, on page 201 • MPTN, on page 202 • MQTT, on page 203 • MRM, on page 204 • MS CDN, on page 205 • MS CRS, on page 206 • MS Exchange Routing, on page 207 • MS Global Catalog Secure, on page 208 • MS Office Existence Discovery, on page 209 • MS Office Protocol Discovery, on page 210 • MS OLAP, on page 211 • MS Online, on page 212 • MS SQL, on page 213 • MSA, on page 214 • MSDN, on page 215 • MSDP, on page 216 • MSG, on page 217 • msg-icp, on page 218 • MSMQ, on page 219 • MSN, on page 220 • MSN Messenger, on page 221 • msnbot, on page 222 Applications: M 5 Applications: M • MSNP, on page 223 • MSOC File Transfer, on page 224 • MSP, on page 225 • MTA, on page 226 • MTP, on page 227 • MTv, on page 228 • MuchShare, on page 229 • Multiling HTTP, on page 230 • Multiplex, on page 231 • Multiply, on page 232 • Multiupload, on page 233 • MUMPS, on page 234 • Munin, on page 235 • Music Hub, on page 236 • Musical.ly, on page 237 • Mute, on page 238 • Mutt, on page 239 • MUX, on page 240 • MUZU TV, on page 241 • MyBuys, on page 242 • MyDownloader, on page 243 • MyHeritage, on page 244 • Mylex-mapd, on page 245 • MyLife, on page 246 • MyOnlineArcade, on page 247 • MyPCBackup, on page 248 • MySpace, on page 249 • MySpace Chat, on page 250 • Myspace Music, on page 251 • Myspace Photos, on page 252 • Myspace Videos, on page 253 • MySQL, on page 254 • myUdutu, on page 255 • MyWay, on page 256 • MyWebSearch, on page 257 Applications: M 6 Applications: M Mac App Store Mac App Store Description 1680 Categories Menudo Tags Online store for Mac OSX products. Different than Apple App Store, which is for iOS products. Risk Business Relevance Applications: M 7 Applications: M MacOS Server Admin MacOS Server Admin Description 3204 Categories Chivas Tags Remote administration/configuration tools for Mac OS X Server. Risk Business Relevance Applications: M 8 Applications: M MacPorts MacPorts Description 2010 Categories Primus Tags Package for software installation. Risk Business Relevance Applications: M 9 Applications: M Macy's Macy's Description 952 Categories Clash Tags Department store chain. Risk Business Relevance Applications: M 10 Applications: M Magenta Logic Magenta Logic Description 273 Categories NAVL Tags Registered with IANA on port 313 tcp/udp. Risk Business Relevance Applications: M 11 Applications: M MagicJack MagicJack Description 274 Categories NAVL Tags Magic Jack is a USB device that allows any phone to make free calls within the US and Canada. Risk Business Relevance Applications: M 12 Applications: M Magicland Magicland Description 1666 Categories Belvedere Tags Facebook game application. Risk Business Relevance Applications: M 13 Applications: M MagPie MagPie Description 2265 Categories Styx Tags A web crawler. Risk Business Relevance Applications: M 14 Applications: M Mail.Ru Mail.Ru Description 1551 Categories Lemonheads Tags Runet's free e-mail service. Risk Business Relevance Applications: M 15 Applications: M Mail.ru Attachment Mail.ru Attachment Description 4091 Categories FooFighters Tags Attaching a file to an email on mail.ru. Risk Business Relevance Applications: M 16 Applications: M Mailbox Mailbox Description 1801 Categories Oingo Tags App for Email service. Risk Business Relevance Applications: M 17 Applications: M Mailbox-LM Mailbox-LM Description 3206 Categories Chivas Tags Mailbox-LM is a used by FTP Daemon. Risk Business Relevance Applications: M 18 Applications: M MailChimp MailChimp Description 2754 Categories UB40 Tags Email service provider. Risk Business Relevance Applications: M 19 Applications: M MAILQ MAILQ Description 275 Categories NAVL Tags Registered with IANA on port 174 tcp/udp. Risk Business Relevance Applications: M 20 Applications: M maitrd maitrd Description 3207 Categories Chivas Tags Registered with IANA on port 997 TCP/UDP. Risk Business Relevance Applications: M 21 Applications: M Malware Defense System Malware Defense System Description 2287 Categories Styx Tags Anti-virus software. Risk Business Relevance Applications: M 22 Applications: M Malwarebytes Malwarebytes Description 3990 Categories Drambuie Tags Antimalware software. Risk Business Relevance Applications: M 23 Applications: M Mama.cn Mama.cn Description 4204 Categories Lorde Tags A website that communicates knowledge about infants and young children, sharing parenting experiences and family life experiences.
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Obtaining and Using Evidence from Social Networking Sites
    U.S. Department of Justice Criminal Division Washington, D.C. 20530 CRM-200900732F MAR 3 2010 Mr. James Tucker Mr. Shane Witnov Electronic Frontier Foundation 454 Shotwell Street San Francisco, CA 94110 Dear Messrs Tucker and Witnov: This is an interim response to your request dated October 6, 2009 for access to records concerning "use of social networking websites (including, but not limited to Facebook, MySpace, Twitter, Flickr and other online social media) for investigative (criminal or otherwise) or data gathering purposes created since January 2003, including, but not limited to: 1) documents that contain information on the use of "fake identities" to "trick" users "into accepting a [government] official as friend" or otherwise provide information to he government as described in the Boston Globe article quoted above; 2) guides, manuals, policy statements, memoranda, presentations, or other materials explaining how government agents should collect information on social networking websites: 3) guides, manuals, policy statements, memoranda, presentations, or other materials, detailing how or when government agents may collect information through social networking websites; 4) guides, manuals, policy statements, memoranda, presentations and other materials detailing what procedures government agents must follow to collect information through social- networking websites; 5) guides, manuals, policy statements, memorandum, presentations, agreements (both formal and informal) with social-networking companies, or other materials relating to privileged user access by the Criminal Division to the social networking websites; 6) guides, manuals, memoranda, presentations or other materials for using any visualization programs, data analysis programs or tools used to analyze data gathered from social networks; 7) contracts, requests for proposals, or purchase orders for any visualization programs, data analysis programs or tools used to analyze data gathered from social networks.
    [Show full text]
  • Opensource Software in Mac OS X V. Zhhuta
    Foss Lviv 2013 191 - Linux VM з Wordpress на Azure під’єднано до SQL-бази в приватному центрі обробки даних. Як бачимо, бізнес Microsoft вже дуже сильно зав'язаний на Open Source! Далі в доповіді будуть розглянуті подробиці інтероперабельності платформ з Linux Server, Apache Hadoop, Java, PHP, Node.JS, MongoDb, і наостанок дізнаємося про цікаві Open Source-розробки Microsoft Research. OpenSource Software in Mac OS X V. Zhhuta UK2 LImIted t/a VPS.NET, [email protected] Max OS X stem from Unix: bSD. It contains a lot of things that are common for Unix systems. Kernel, filesystem and base unix utilities as well as it's own package managers. It's not a secret that Mac OS X has a bSD kernel Darwin. The raw Mac OS X won't provide you with all power of Unix but this could be easily fixed: install package manager. There are 3 package manager: MacPorts, Fink and Homebrew. To dive in OpenSource world of mac os x we would try to install lates version of bash, bash-completion and few other utilities. Where we should start? First of all you need to install on you system dev-tools: Xcode – native development tools that contain GCC and libraries. Next step: bring a GIU – X11 into your system. Starting from Mac OS 10.8 X11 is not included in base-installation and it's need to install Xquartz(http://xquartz.macosforge.org). Now it's time to look closely to package managers MacPorts Site: www.macports.org Latest MacPorts release: 2.1.3 Number of ports: 16740 MacPorts born inside Apple in 2002.
    [Show full text]
  • Xcode Package from App Store
    KH Computational Physics- 2016 Introduction Setting up your computing environment Installation • MAC or Linux are the preferred operating system in this course on scientific computing. • Windows can be used, but the most important programs must be installed – python : There is a nice package ”Enthought Python Distribution” http://www.enthought.com/products/edudownload.php – C++ and Fortran compiler – BLAS&LAPACK for linear algebra – plotting program such as gnuplot Kristjan Haule, 2016 –1– KH Computational Physics- 2016 Introduction Software for this course: Essentials: • Python, and its packages in particular numpy, scipy, matplotlib • C++ compiler such as gcc • Text editor for coding (for example Emacs, Aquamacs, Enthought’s IDLE) • make to execute makefiles Highly Recommended: • Fortran compiler, such as gfortran or intel fortran • BLAS& LAPACK library for linear algebra (most likely provided by vendor) • open mp enabled fortran and C++ compiler Useful: • gnuplot for fast plotting. • gsl (Gnu scientific library) for implementation of various scientific algorithms. Kristjan Haule, 2016 –2– KH Computational Physics- 2016 Introduction Installation on MAC • Install Xcode package from App Store. • Install ‘‘Command Line Tools’’ from Apple’s software site. For Mavericks and lafter, open Xcode program, and choose from the menu Xcode -> Open Developer Tool -> More Developer Tools... You will be linked to the Apple page that allows you to access downloads for Xcode. You wil have to register as a developer (free). Search for the Xcode Command Line Tools in the search box in the upper left. Download and install the correct version of the Command Line Tools, for example for OS ”El Capitan” and Xcode 7.2, Kristjan Haule, 2016 –3– KH Computational Physics- 2016 Introduction you need Command Line Tools OS X 10.11 for Xcode 7.2 Apple’s Xcode contains many libraries and compilers for Mac systems.
    [Show full text]
  • Fulltext PDF 3,1 MB
    alpaka Parallel Programming – Online Tutorial Lecture 00 – Getting Started with alpaka Lesson 04: Installation www.casus.science Lesson 04: Installation How to download alpaka ● Install git for your operating system: ● Linux: sudo dnf install git (RPM) or sudo apt install git (DEB) ● macOS: Enter git --version in your terminal, you will be asked if you want to install git ● Windows: Download the installer from https://git-scm.com/download/win ● Open the terminal (Linux / macOS) or PowerShell (Windows) ● Navigate to a directory of your choice: cd /path/to/some/directory ● Download alpaka: git clone -b release-0.5.0 https://github.com/alpaka-group/alpaka.git alpaka Parallel Programming – Online Tutorial – Lesson 04: Installation | 2 Lesson 04: Installation Install alpaka’s dependencies ● alpaka only requires Boost and a modern C++ compiler (g++, clang++, Visual C++, …) ● Linux: ● sudo dnf install boost-devel (RPM) ● sudo apt install libboost-all-dev (DEB) ● macOS: ● brew install boost (Using Homebrew, https://brew.sh) ● sudo port install boost (Using MacPorts, https://macports.org) ● Windows: vcpkg install boost (Using vcpkg, https://github.com/microsoft/vcpkg) ● Depending on your target platform you may need additional packages ● NVIDIA GPUs: CUDA Toolkit (https://developer.nvidia.com/cuda-toolkit) ● AMD GPUs: ROCm / HIP (https://rocmdocs.amd.com/en/latest/index.html) alpaka Parallel Programming – Online Tutorial – Lesson 04: Installation | 3 Lesson 04: Installation Preparing alpaka for installation, Part 1 ● CMake is the preferred system
    [Show full text]
  • Systematic Scoping Review on Social Media Monitoring Methods and Interventions Relating to Vaccine Hesitancy
    TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy www.ecdc.europa.eu ECDC TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy This report was commissioned by the European Centre for Disease Prevention and Control (ECDC) and coordinated by Kate Olsson with the support of Judit Takács. The scoping review was performed by researchers from the Vaccine Confidence Project, at the London School of Hygiene & Tropical Medicine (contract number ECD8894). Authors: Emilie Karafillakis, Clarissa Simas, Sam Martin, Sara Dada, Heidi Larson. Acknowledgements ECDC would like to acknowledge contributions to the project from the expert reviewers: Dan Arthus, University College London; Maged N Kamel Boulos, University of the Highlands and Islands, Sandra Alexiu, GP Association Bucharest and Franklin Apfel and Sabrina Cecconi, World Health Communication Associates. ECDC would also like to acknowledge ECDC colleagues who reviewed and contributed to the document: John Kinsman, Andrea Würz and Marybelle Stryk. Suggested citation: European Centre for Disease Prevention and Control. Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy. Stockholm: ECDC; 2020. Stockholm, February 2020 ISBN 978-92-9498-452-4 doi: 10.2900/260624 Catalogue number TQ-04-20-076-EN-N © European Centre for Disease Prevention and Control, 2020 Reproduction is authorised, provided the
    [Show full text]
  • CSI Web Server for Linux
    INSTRUCTION CSI Web Server for Linux Installation Guide Revision: 3/18 MANUAL Copyright © 2006- 2018 Campbell Scientific, Inc. License for Use This software is protected by United States copyright law and international copyright treaty provisions. The installation and use of this software constitutes an agreement to abide by the provisions of this license agreement. Campbell Scientific grants you a non-exclusive license to use this software in accordance with the following: (1) The purchase of this software allows you to install and use a single instance of the software on one physical computer or one virtual machine only. (2) This software cannot be loaded on a network server for the purposes of distribution or for access to the software by multiple operators. If the software can be used from any computer other than the computer on which it is installed, you must license a copy of the software for each additional computer from which the software may be accessed. (3) If this copy of the software is an upgrade from a previous version, you must possess a valid license for the earlier version of software. You may continue to use the earlier copy of software only if the upgrade copy and earlier version are installed and used on the same computer. The earlier version of software may not be installed and used on a separate computer or transferred to another party. (4) This software package is licensed as a single product. Its component parts may not be separated for use on more than one computer. (5) You may make one (1) backup copy of this software onto media similar to the original distribution, to protect your investment in the software in case of damage or loss.
    [Show full text]
  • The TEX Live Guide TEX Live 2012
    The TEX Live Guide TEX Live 2012 Karl Berry, editor http://tug.org/texlive/ June 2012 Contents 1 Introduction 2 1.1 TEX Live and the TEX Collection...............................2 1.2 Operating system support...................................3 1.3 Basic installation of TEX Live.................................3 1.4 Security considerations.....................................3 1.5 Getting help...........................................3 2 Overview of TEX Live4 2.1 The TEX Collection: TEX Live, proTEXt, MacTEX.....................4 2.2 Top level TEX Live directories.................................4 2.3 Overview of the predefined texmf trees............................5 2.4 Extensions to TEX.......................................6 2.5 Other notable programs in TEX Live.............................6 2.6 Fonts in TEX Live.......................................7 3 Installation 7 3.1 Starting the installer......................................7 3.1.1 Unix...........................................7 3.1.2 MacOSX........................................8 3.1.3 Windows........................................8 3.1.4 Cygwin.........................................9 3.1.5 The text installer....................................9 3.1.6 The expert graphical installer.............................9 3.1.7 The simple wizard installer.............................. 10 3.2 Running the installer...................................... 10 3.2.1 Binary systems menu (Unix only).......................... 10 3.2.2 Selecting what is to be installed...........................
    [Show full text]
  • Mahasen: Distributed Storage Resource Broker K
    Mahasen: Distributed Storage Resource Broker K. Perera, T. Kishanthan, H. Perera, D. Madola, Malaka Walpola, Srinath Perera To cite this version: K. Perera, T. Kishanthan, H. Perera, D. Madola, Malaka Walpola, et al.. Mahasen: Distributed Storage Resource Broker. 10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.380-392, 10.1007/978-3-642-40820-5_32. hal-01513774 HAL Id: hal-01513774 https://hal.inria.fr/hal-01513774 Submitted on 25 Apr 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License Mahasen: Distributed Storage Resource Broker K.D.A.K.S.Perera1, T Kishanthan1, H.A.S.Perera1, D.T.H.V.Madola1, Malaka Walpola1, Srinath Perera2 1 Computer Science and Engineering Department, University Of Moratuwa, Sri Lanka. {shelanrc, kshanth2101, ashansa.perera, hirunimadola, malaka.uom}@gmail.com 2 WSO2 Lanka, No 59, Flower Road, Colombo 07, Sri Lanka [email protected] Abstract. Modern day systems are facing an avalanche of data, and they are being forced to handle more and more data intensive use cases. These data comes in many forms and shapes: Sensors (RFID, Near Field Communication, Weather Sensors), transaction logs, Web, social networks etc.
    [Show full text]
  • Hacktivism Cyberspace Has Become the New Medium for Political Voices
    White Paper Hacktivism Cyberspace has become the new medium for political voices By François Paget, McAfee Labs™ Table of Contents The Anonymous Movement 4 Origins 4 Defining the movement 6 WikiLeaks meets Anonymous 7 Fifteen Months of Activity 10 Arab Spring 10 HBGary 11 The Sony ordeal 11 Lulz security and denouncements 12 Groups surrounding LulzSec 13 Green rights 14 Other operations 15 AntiSec, doxing, and copwatching 16 Police responses 17 Anonymous in the streets 18 Manipulation and pluralism 20 Operation Megaupload 21 Communications 21 Social networks and websites 21 IRC 22 Anonymity 23 DDoS Tools 24 Cyberdissidents 25 Telecomix 26 Other achievements 27 Patriots and Cyberwarriors 28 Backlash against Anonymous 29 TeaMp0isoN 30 Other achievements 30 Conclusion 32 2 Hacktivism What is hacktivism? It combines politics, the Internet, and other elements. Let’s start with the political. Activism, a political movement emphasising direct action, is the inspiration for hacktivism. Think of Greenpeace activists who go to sea to disrupt whaling campaigns. Think of the many demonstrators who protested against human rights violations in China by trying to put out the Olympic flame during its world tour in 2008. Think of the thousands of activists who responded to the Adbusters call in July 2011 to peacefully occupy a New York City park as part of Occupy Wall Street. Adding the online activity of hacking (with both good and bad connotations) to political activism gives us hacktivism. One source claims this term was first used in an article on the filmmaker Shu Lea Cheang; the article was written by Jason Sack and published in InfoNation in 1995.
    [Show full text]
  • List of Search Engines
    A blog network is a group of blogs that are connected to each other in a network. A blog network can either be a group of loosely connected blogs, or a group of blogs that are owned by the same company. The purpose of such a network is usually to promote the other blogs in the same network and therefore increase the advertising revenue generated from online advertising on the blogs.[1] List of search engines From Wikipedia, the free encyclopedia For knowing popular web search engines see, see Most popular Internet search engines. This is a list of search engines, including web search engines, selection-based search engines, metasearch engines, desktop search tools, and web portals and vertical market websites that have a search facility for online databases. Contents 1 By content/topic o 1.1 General o 1.2 P2P search engines o 1.3 Metasearch engines o 1.4 Geographically limited scope o 1.5 Semantic o 1.6 Accountancy o 1.7 Business o 1.8 Computers o 1.9 Enterprise o 1.10 Fashion o 1.11 Food/Recipes o 1.12 Genealogy o 1.13 Mobile/Handheld o 1.14 Job o 1.15 Legal o 1.16 Medical o 1.17 News o 1.18 People o 1.19 Real estate / property o 1.20 Television o 1.21 Video Games 2 By information type o 2.1 Forum o 2.2 Blog o 2.3 Multimedia o 2.4 Source code o 2.5 BitTorrent o 2.6 Email o 2.7 Maps o 2.8 Price o 2.9 Question and answer .
    [Show full text]
  • Degree of Loop Assessment in Microvideo
    DEGREE OF LOOP ASSESSMENT IN MICROVIDEO Shumpei Sano, Toshihiko Yamasaki, and Kiyoharu Aizawa Department of Information and Communication Engineering, The University of Tokyo 7-3-1 Hongo, Bunkyo-ku, Tokyo 113-8656, Japan fsano, yamasaki, [email protected] ABSTRACT Table 1. Ratio of loop/non-loop video in 1,022 microvideo This paper presents a degree-of-loop assessment method for on Vine with a tag “#loop”. microvideo clips. Loop video is one of the popular features non-loop video loop video in microvideo, but there are so many non-loop video tagged Number of video 906 116 with “loop” on microvideo services. This is because upload- Ratio 88.6 % 11.4 % ers or spammers also know that loop video is popular and they their official web site, Vine is introduced as “a mobile service want to draw attention from viewers. In this paper, we statisti- 5 cally analyze the scene dynamics of the video by using color, that lets you capture and share short looping video ,” there optical flow, saliency maps, and evaluate the degree-of-loop. are two characteristics in Vine. First is video length shortness. We have collected more than 1,000 video clips from Vine and Max video length in Vine is 6.5 seconds, which is shorter than subjectively evaluated their degree-of-loop. Experimental re- the other similar services. Second is looping. Shared video sults show that our proposed algorithm can classify loop/non- on Vine are automatically played repeatedly, and many loop loop video with 85.7% accuracy and categorize them into five video which seamlessly connect the last and the first frames degree-of-loop categories with 61.5% accuracy.
    [Show full text]