Learn More
App • ovo l fir public releaw; distribution is uilhmlted. NOTICES DISTRIBUTION: This Research Note has been cleared for release, to the Defense Technical Information Center (DTIC) to comply with regulatory requirements. It has been given no primary distribution other than to DTIC and will be available only through DTIC or the National Technical Information(More)
The recent Conficker worm has garnered considerable attention by infecting millions of machines and having the potential to cause many problems. Conficker has created a new level of cohesion between security, domain-name-administration, routing, and code-analysis professionals, according to the Shadowserver Foundation's Di Mino.
The design and synthesis of a series of novel inhibitors of protein kinase C (PKC) is described. These 2,3-bisarylmaleimides were derived from the structural lead provided by the indolocarbazoles, staurosporine and K252a. Optimum activity required the imide NH, both carbonyl groups, and the olefinic bond of the maleimide ring. 2,3-Bisindolylmaleimides were(More)
Experts have talked about the dangers of mobile malware since the first Palm Pilot Trojan horse, called Liberty, was reported in 2000, and the first mobile-phone virus, Cabir, was reported in 2004. However, each year, mobile viruses and similar threats have turned out to be a minor concern. In part, this is because there have been far fewer smart mobile(More)
There are many more machines - defined as things with mechanical, electrical, or electronic properties - in the world than people. And a growing number of machines are networked. Harbor Research, a technology consultancy and analysis firm, estimates that by 2010, at least 1.5 billion devices will be Internet-connected worldwide. The increasingly popular(More)
In the past, two key storage technologies, hard drives and flash chips, each had distinct uses. The bigger-selling hard drive technology was used in machines requiring high storage volumes, such as servers, PCs, laptops, and even digital music players. Flash memory was used in machines that needed less storage capacity, such as digital cameras, cell phones,(More)
By its very nature, Web 2.0 is interactive, allowing users to add input such as participatory book reviews, blogs, wikis, social net works, and video- and photo sharing services to Web sites. Web 2.0 has consequently become very popular with users and Web site operators. However, the approach's interactivity has also made it popular with hackers. This paper(More)