Amethyst

 view release on metacpan or  search on metacpan

Amethyst/Brain/Infobot/Module/Excuse.pm  view on Meta::CPAN

The kernel license has expired
Netscape has crashed
The cord jumped over and hit the power switch.
It was OK before you touched it.
Bit rot
U.S. Postal Service
Your Flux Capacitor has gone bad.
The Dilithium Cyrstals need to be rotated.
The static electricity routing is acting up...
Traceroute says that there is a routing problem in the backbone.  It's not our problem.
The co-locator cannot verify the frame-relay gateway to the ISDN server.
High altitude condensation from U.S.A.F prototype aircraft has contaminated the primary subnet mask. Turn off your computer for 9 days to avoid damaging it.
Lawn mower blade in your fan need sharpening
Electrons on a bender
Telecommunications is upgrading. 
Telecommunications is downgrading.
Telecommunications is downshifting.
Hard drive sleeping. Let it wake up on it's own...
Interference between the keyboard and the chair.
The CPU has shifted, and become decentralized.
Due to the CDA, we no longer have a root account.

factpacks/Linux.fact  view on Meta::CPAN

CGM Viewer Applet => <reply> $who, Scriptable vector graphics viewer written in Java.. URL: http://www.online.de/home/bdaum/howto.htm
cgvg => <reply> $who, Tools for command-line source browsing.. URL: http://linux.ucla.edu/~uzi/cgvg.html
Chameleon => <reply> $who, X utility to customize desktop colors. URL: ftp://ftp.lagged.net/pub/software/
Chaperon memory access checker => <reply> $who, Checks memory accesses for bad behavior. URL: http://www.BitWagon.com/chaperon.html
chbg => <reply> $who, Desktop background changer and manager. URL: http://www.idata.sk/~ondrej/chbg/
CHC => <reply> $who, Columbia House Play Club Catalog Browser. URL: http://www.dnc.net/users/collver/chc.tar.gz
Chebyshev => <reply> $who, Engine for forwarding email service (w/spam filtering). URL: http://www.jab.org/cheb
check-ps => <reply> $who, Reports or kills processes 'hidden' from the system administrator. URL: http://checkps.alcom.co.uk/
Check.pl => <reply> $who, Filesystem permission auditing tool. URL: http://opop.nols.com/
Checker => <reply> $who, . URL: http://www.gnu.org/software/checker/checker.html
checkhosts.pl => <reply> $who, Tool for verifying your /etc/hosts file to an arbitrary nameserver.. URL: http://www.cs.dal.ca/~stern/
Checklinks => <reply> $who, HTML link checker that supports SSI, many Apache options, and more (in Perl 5). URL: http://www.jmarshall.com/tools/cl/
Checkmail => <reply> $who, A POP3 email checking tcl script.. URL: http://www.icehouse.net/kevinl
checkmails => <reply> $who, Very simple pop3 mail biff with GUI setup. URL: http://www.image.dk/~jessth/checkmail.html
CheckURL => <reply> $who, Sends notification e-mails for changed URLs. URL: http://anders.fix.no/software/#unix
ChemApp => <reply> $who, A thermochemistry library for your software. URL: http://gttserv.lth.rwth-aachen.de/gtt/
Cheops => <reply> $who, Network User Interface. URL: http://www.marko.net/cheops/
ZMech => <reply> $who, State machine development tool. URL: http://www.demon.co.uk/titan/ZMECH/
Chester => <reply> $who, Newsgroup article-downloader. URL: http://www.io.com/~brettw/Chester/Chester.html
Chinese Lyx Patch => <reply> $who, patch to make lyx a Chinese writing tool.. URL: 
chord2html => <reply> $who, A Perl script to convert CHORD input files to HTML. URL: http://helllabs.org/~claudio/chord/

factpacks/Linux.fact  view on Meta::CPAN

tree.pl => <reply> $who, Simple script to generate a html sitemap. URL: http://www.ev-stift-gymn.guetersloh.de/server/tree_e.html
TreeMultimap => <reply> $who, A Java class derived from java.util.TreeMap which allows nonunique keys. URL: http://www.linuxstart.com/~groovyjava/TreeMultimap/
treeps => <reply> $who, X/Motif graphical process tree visualizer. URL: http://www.slip.net/~gmd/tps/treeps.htm
treeutils => <reply> $who, Set of shell scripts for managing software installed from source distributions. URL: http://fly.srk.fer.hr/~edgy/treeutils/treeutils-latest.tar.gz
treeview.cgi => <reply> $who, treeview 'widget' for html. URL: http://webrum.uni-mannheim.de/math/rschiele/
Trestlemail => <reply> $who, Automatically redistributes multi-drop Fetchmail. URL: http://www.trestle.com/linux/trestlemail/
Trf => <reply> $who, Filtering channels for Tcl, MAC, Encryption, Error correction, various encodings. URL: http://www.purl.org/NET/akupries/soft/trf/
Trfcrypt => <reply> $who, Add-on to Trf with various encryption algorithms.. URL: http://www.purl.org/NET/akupries/soft/trfcrypt/
Trinux => <reply> $who, 2-disk distribution that includes network security tools and runs in RAM. URL: http://www.trinux.org/
trio => <reply> $who, very portable *printf() clones and generic string functions. URL: http://www.fts.frontec.se/~dast/trio/
Triplight => <reply> $who, Intrusion detection/integrity monitor, uses md5sum to verify a list of files.. URL: http://linux.rice.edu/magic/triplight/
Tripwire => <reply> $who, Intrusion Detection System for Linux. URL: http://www.tripwiresecurity.com
trn => <reply> $who, Text-based newsreader with threading. URL: http://www.clari.net/~wayne/
Troll-FTPd => <reply> $who, A free, small, and secure virtual FTP server. URL: http://www.troll.no/freebies/ftpd.html
TRONtium => <reply> $who, A clone of the classic TRON light-cycles game.. URL: http://www.jigsawdezign.demon.co.uk/trontium.htm
TroubleTickets => <reply> $who, HelpDesk Trouble Ticket Web Application. URL: http://faculty.cinstate.cc.oh.us/TroubleTickets/
truc => <reply> $who, Two shell scripts that allow you to transfer big files via e-mail. URL: http://www.ensg.u-nancy.fr/~segonds/truc/
TrueReality => <reply> $who, N64 Emulator. URL: http://www.emuhq.com/truereality/
Truth VSA => <reply> $who, Open Source Lie Detection. URL: http://www.accessone.com/~rivero/POLITICS/VSA/truthvsa.html
TSambaClass => <reply> $who, Cross platform C++ class library for accessing smb.conf file.. URL: http://www.spanware.com/
tsbiff => <reply> $who, Tsbiff will oversee your mailbox and notify you when new messages appears. URL: http://www.tildeslash.com/tsbiff/

factpacks/MacErrorCodes.fact  view on Meta::CPAN

Mac Error -56 => ( nsDrvErr ) no such drive (tried to mount a bad drive num) **File System Error**
Mac Error -57 => ( noMacDskErr ) not a mac diskette (sig bytes are wrong) **File System Error**
Mac Error -58 => ( extFSErr ) External file system - file system identifier is nonzero **File System Error**
Mac Error -59 => ( fsRnErr ) file system internal error: during rename the old entry was deleted but could not be restored **File System Error**
Mac Error -60 => ( badMDBErr ) bad master directory block **File System Error**
Mac Error -61 => ( wrPermErr ) Write permissions error; Not a publisher **File System Error**
Mac Error -64 => ( fontDecError ) error during font declaration **Font Manager Error** or  ( lastDskErr ) **Disk, Serial Ports, Clock Specific Error** or ( noDriveErr ) drive not installed **Disk, Serial Ports, Clock Specific Error**
Mac Error -65 => ( fontNotDeclared ) font not declared **Font Manager Error** or  ( offLinErr ) r/w requested for an off-line drive **Disk, Serial Ports, Clock Specific Error**
Mac Error -66 => ( fontSubErr ) font substitution occured **Font Manager Error** or  ( noNybErr ) couldn't find 5 nybbles in 200 tries **Disk, Serial Ports, Clock Specific Error**
Mac Error -67 => ( noAdrMkErr ) couldn't find valid addr mark **Disk, Serial Ports, Clock Specific Error**
Mac Error -68 => ( dataVerErr ) read verify compare failed **Disk, Serial Ports, Clock Specific Error**
Mac Error -69 => ( badCksmErr ) addr mark checksum didn't check **Disk, Serial Ports, Clock Specific Error**
Mac Error -70 => ( badBtSlpErr ) bad addr mark bit slip nibbles **Disk, Serial Ports, Clock Specific Error**
Mac Error -71 => ( noDtaMkErr ) couldn't find a data mark header **Disk, Serial Ports, Clock Specific Error**
Mac Error -72 => ( badDCksum ) bad data mark checksum **Disk, Serial Ports, Clock Specific Error**
Mac Error -73 => ( badDBtSlp ) bad data mark bit slip nibbles **Disk, Serial Ports, Clock Specific Error**
Mac Error -74 => ( wrUnderrun ) write underrun occurred **Disk, Serial Ports, Clock Specific Error**
Mac Error -75 => ( cantStepErr ) step handshake failed **Disk, Serial Ports, Clock Specific Error**
Mac Error -76 => ( tk0BadErr ) track 0 detect doesn't change **Disk, Serial Ports, Clock Specific Error**
Mac Error -77 => ( initIWMErr ) unable to initialize IWM **Disk, Serial Ports, Clock Specific Error**
Mac Error -78 => ( twoSideErr ) tried to read 2nd side on a 1-sided drive **Disk, Serial Ports, Clock Specific Error**
Mac Error -79 => ( spdAdjErr ) unable to correctly adjust disk speed **Disk, Serial Ports, Clock Specific Error**
Mac Error -80 => ( seekErr ) track number wrong on address mark **Disk, Serial Ports, Clock Specific Error**
Mac Error -81 => ( sectNFErr ) sector number never found on a track **Disk, Serial Ports, Clock Specific Error**
Mac Error -82 => ( fmt1Err ) can't find sector 0 after track format **Disk, Serial Ports, Clock Specific Error**
Mac Error -83 => ( fmt2Err ) can't get enough sync **Disk, Serial Ports, Clock Specific Error**
Mac Error -84 => ( verErr ) track failed to verify **Disk, Serial Ports, Clock Specific Error** or ( firstDskErr ) **Disk, Serial Ports, Clock Specific Error**
Mac Error -85 => ( clkRdErr ) unable to read same clock value twice **Disk, Serial Ports, Clock Specific Error**
Mac Error -86 => ( clkWrErr ) time written did not verify **Disk, Serial Ports, Clock Specific Error**
Mac Error -87 => ( prWrErr ) parameter ram written didn't read-verify **Disk, Serial Ports, Clock Specific Error**
Mac Error -88 => ( prInitErr ) InitUtil found the parameter ram uninitialized **Disk, Serial Ports, Clock Specific Error**
Mac Error -89 => ( rcvrErr ) SCC receiver error (framing, parity, OR) **Disk, Serial Ports, Clock Specific Error**
Mac Error -90 => ( breakRecd ) Break received (SCC) **Disk, Serial Ports, Clock Specific Error**
Mac Error -91 => ( ddpSktErr ) Error opening socket OR **AppleTalk Error** or ( eMultiErr ) Invalid address or table is full **AppleTalk Error**
Mac Error -92 => ( ddpLenErr ) Data length too big OR **AppleTalk Error** or ( eLenErr ) Packet too large or first entry of the write-data structure did not contain the full 14-byte header **AppleTalk Error**
Mac Error -93 => ( noBridgeErr ) No router available [for non-local send] **AppleTalk Error**
Mac Error -94 => ( lapProtErr ) error in attaching/detaching protocol OR **AppleTalk Error** or ( LAPProtErr ) Protocol handler is already attached, node's protocol table is full, protocol not attached, or protocol handler pointer was not 0 **AppleTa...
Mac Error -95 => ( excessCollsns ) Hardware error [excessive collisions on write] **AppleTalk Error**
Mac Error -97 => ( portInUse ) driver Open error code (port is in use) **AppleTalk Error**
Mac Error -98 => ( portNotCf ) driver Open error code (parameter RAM not configured for this connection) **AppleTalk Error**

factpacks/dos.fact  view on Meta::CPAN

SUBMENU => (Internal) SUBMENU=blockname, [menutext] Used in the CONFIG.SYS file to create a multilevel menu from which you can select start-up options.
SUBST => (External) SUBST d: d:path SUBST d: /D Substitutes a virtual drive letter for a path designation.
SWITCHES => (Internal) SWITCHES= [/K][/F][/N][/W] Used in the CONFIG.SYS file to configure DOS in a special way; for example, to tell DOS to emulate different hardware configurations.
SYS => (External) SYS [source] d: Transfers the operating system files to another disk.
TIME => (Internal) TIME hh:mm[:ss][.cc][A|P] Displays current time setting of system clock and provides a way for you to reset the time. 
TREE => (External) TREE [d:][path] [/A][/F] Displays directory paths and (optionally) files in each subdirectory. 
TYPE => (Internal) TYPE [d:][path]filename Displays the contents of a file.
UNDELETE => (External) UNDELETE [d:][path][filename] [/DT|/DS|/DOS] Restores files deleted with the DELETE command.
UNFORMAT => (External) UNFORMAT d: [/J][/L][/test][/partn][/P][/U]  Used to undo the effects of formatting a disk.
VER => (Internal) VER Displays the DOS version number.
VERIFY => (Internal) VERIFY on|off Turns on the verify mode; the program checks all copying operations to assure that files are copied correctly.
VOL => (Internal) VOL [d:] Displays a disk's volume label.
VSAFE => (External) VSAFE is a memory-resident program that continuously monitors your computer for viruses and displays a warning when it finds one.
XCOPY => (External) XCOPY [d:][path]filename [d:][path][filename] [/A][/D:(date)] [/E][/M][/P][/S][/V][/W][Y\-Y]Copies directories, subdirectories, and files.



factpacks/jargon-split.fact  view on Meta::CPAN

phreaking is  [from `phone phreak'] n. 1. The art and science of   cracking the phone network (so as, for example, to make free   long-distance calls).  2. By extension, security-cracking in any   other context (especially, but not exclusively, on co...
phreaking2 is  phreaking was a semi-respectable activity among   hackers; there was a gentleman's agreement that phreaking as an   intellectual game and a form of exploration was OK, but serious   theft of services was taboo.  There was significant c...
phreaking3 is  hard-core phone phreaks who   ran semi-underground networks of their own through such media as   the legendary `TAP Newsletter'.  This ethos began to break   down in the mid-1980s as wider dissemination of the techniques put   them in ...
phreaking4 is  the same   time, changes in the phone network made old-style technical   ingenuity less effective as a way of hacking it, so phreaking came   to depend more on overtly criminal acts such as stealing phone-card   numbers.  The crimes an...
phreaking5 is  turned that game very ugly.  A few old-time hackers still phreak   casually just to keep their hand in, but most these days have   hardly even heard of `blue boxes' or any of the other   paraphernalia of the great phreaks of yore. 
pico- is  [SI a quantifier   meaning * 10^-12]   pref. Smaller than {nano-}; used in the same rather loose   connotative way as {nano-} and {micro-}.  This usage is not yet   common in the way {nano-} and {micro-} are, but should be   instantly recog...
pico-2 is  {{quantifiers}},   {micro-}. 
run like a pig is  v. To run very slowly on given hardware, said of   software.  Distinct from {hog}.
pilot error is  [Sun from aviation] n. A user's misconfiguration or   misuse of a piece of software, producing apparently buglike results   (compare {UBD}).  "Joe Luser reported a bug in sendmail that   causes it to generate bogus headers."  "That's ...
ping is  [from the TCP/IP acronym `Packet INternet Groper', prob.   originally contrived to match the submariners' term for a sonar   pulse] 1. n.  Slang term for a small network message (ICMP ECHO)   sent by a computer to check for the presence and ...
ping2 is  a phone greeting.  See {ACK},   also {ENQ}.  2. vt. To verify the presence of.  3. vt. To get   the attention of.  From the UNIX command `ping(1)' that sends   an ICMP ECHO packet to another host.  4. vt. To send a message to   all members ...
ping3 is  order   to verify that everybody's addresses are reachable).  "We haven't   heard much of anything from Geoff, but he did respond with an ACK   both times I pinged jargon-friends."   The funniest use of `ping' to date was described in Janua...
ping4 is  comp.sys.next.  He was trying   to isolate a faulty cable segment on a TCP/IP Ethernet hooked up to   a NeXT machine, and got tired of having to run back to his console   after each cabling tweak to see if the ping packets were getting   th...
ping5 is  on the NeXT, then   wrote a script that repeatedly invoked `ping(8)', listened for   an echo, and played back the recording on each returned packet.   Result?  A program that caused the machine to repeat, over and   over, "Ping ... ping ......
ping6 is  turned the volume to maximum, ferreted through   the building with one ear cocked, and found a faulty tee connector   in no time. 
Pink-Shirt Book is  `The Peter Norton Programmer's Guide to the IBM   PC'.  The original cover featured a picture of Peter Norton with a   silly smirk on his face, wearing a pink shirt.  Perhaps in   recognition of this usage, the current edition has...
Pink-Shirt Book2 is  pink shirt.  See also {{book titles}}. 
PIP is  /pip/ [Peripheral Interchange Program] vt.,obs. To copy; from   the program PIP on CP/M, RSX-11, RSTS/E, and OS/8 (derived from a   utility on the PDP-6) that was used for file copying (and in OS/8   and RT-11 for just about every other file ...
PIP2 is  that when the program was originated, during the   development of the PDP-6 in 1963, it was called ATLATL (`Anything,   Lord, to Anything, Lord'). 
pistol is  [IBM] n. A tool that makes it all too easy for you to   shoot yourself in the foot.  "UNIX `rm *' makes such a nice   pistol!"
pizza box is  [Sun] n. The largish thin box housing the electronics   in (especially Sun) desktop workstations, so named because of its   size and shape and the dimpled pattern that looks like air holes.   Two meg single-platter removable disk packs ...
pizza box2 is  they were stuck into was referred to as a pizza   oven.  It's an index of progress that in the old days just the disk   was pizza-sized, while now the entire computer is. 

factpacks/jargon.fact  view on Meta::CPAN

phase => 1. n. The phase of one's waking-sleeping schedule with respect to the standard 24-hour cycle. This is a useful concept among people who often work at night and/or according to no fixed schedule. It is not uncommon to change one's phase by as...
phase of the moon => n. Used humorously as a random parameter on which something is said to depend. Sometimes implies unreliability of whatever is dependent, or that reliability seems to be dependent on conditions nobody has been able to determine. "...
phase of the moon2 => channel open in mumble mode, having the foo switch set, and on the phase of the moon." True story Once upon a time there was a bug that really did depend on the phase of the moon. There is a little subroutine that had traditiona...
phase of the moon3 => MIT to calculate an approximation to the moon's true phase. GLS incorporated this routine into a LISP program that, when it wrote out a file, would print a timestamp line almost 80 characters long. Very occasionally the first li...
phase of the moon4 => and would overflow onto the next line, and when the file was later read back in the program would barf. The length of the first line depended on both the precise date and time and the length of the phase specification when the t...
phase of the moon5 => bug literally depended on the phase of the moon! The first paper edition of the Jargon File (Steele-1983) included an example of one of the timestamp lines that exhibited this bug, but the typesetter `corrected' it. This has sin...
phreaking => [from `phone phreak'] n. 1. The art and science of cracking the phone network (so as, for example, to make free long-distance calls). 2. By extension, security-cracking in any other context (especially, but not exclusively, on communicat...
pico- => [SI a quantifier meaning * 10^-12] pref. Smaller than nano-; used in the same rather loose connotative way as nano- and micro-. This usage is not yet common in the way nano- and micro- are, but should be instantly recognizable to any hacker....
run like a pig => v. To run very slowly on given hardware, said of software. Distinct from hog.
pilot error => [Sun from aviation] n. A user's misconfiguration or misuse of a piece of software, producing apparently buglike results (compare UBD). "Joe Luser reported a bug in sendmail that causes it to generate bogus headers." "That's not a bug, ...
ping => [from the TCP/IP acronym `Packet INternet Groper', prob. originally contrived to match the submariners' term for a sonar pulse] 1. n. Slang term for a small network message (ICMP ECHO) sent by a computer to check for the presence and alivenes...
Pink-Shirt Book => `The Peter Norton Programmer's Guide to the IBM PC'. The original cover featured a picture of Peter Norton with a silly smirk on his face, wearing a pink shirt. Perhaps in recognition of this usage, the current edition has a differ...
Pink-Shirt Book2 => pink shirt. See also {{book titles}}. 
PIP => /pip/ [Peripheral Interchange Program] vt.,obs. To copy; from the program PIP on CP/M, RSX-11, RSTS/E, and OS/8 (derived from a utility on the PDP-6) that was used for file copying (and in OS/8 and RT-11 for just about every other file operati...
pistol => [IBM] n. A tool that makes it all too easy for you to shoot yourself in the foot. "UNIX `rm *' makes such a nice pistol!"
pizza box => [Sun] n. The largish thin box housing the electronics in (especially Sun) desktop workstations, so named because of its size and shape and the dimpled pattern that looks like air holes. Two meg single-platter removable disk packs used to...
pizza box2 => they were stuck into was referred to as a pizza oven. It's an index of progress that in the old days just the disk was pizza-sized, while now the entire computer is. 
ANSI standard pizza => /an'see stan'd*rd peet'z*/ [CMU] Pepperoni and mushroom pizza. Coined allegedly because most pizzas ordered by CMU hackers during some period leading up to mid-1990 were of that flavor. See also {rotary debugger}; compare {tea,...
plain-ASCII => /playn-as'kee/ Syn. flat-ASCII.
plan file => [UNIX] n. On systems that support finger, the `.plan' file in a user's home directory is displayed when the user is fingered. This feature was originally intended to be used to keep potential fingerers apprised of one's location and near...
plan file2 => almost universally to humorous and self-expressive purposes (like a {sig block}). See {Hacking X for Y}. 

factpacks/security.fact  view on Meta::CPAN

algorithm => A mathematical procedure that can usually be explicitly encoded in a set of computer language instructions that manipulate data. Cryptographic algorithms are mathematical procedures used for such purposes as encrypting and decrypting mes...
API => Application Program Interface - System access point or library function that has a well- defined syntax and is accessible from application programs or user code to provide well-defined functionality.
architectural design => a phase of the Development Process wherein the top level definition and design of a Target of Evaluation is specified.
assignment => Requirement in a protection profile taken directly as stated, without change, from the list of components or derived by placing a bound on a threshold definition. Note: The assignment of environment-specific requirements to generic comp...
assurance => the confidence that may be held in the security provided by a Target of Evaluation.
assurance level => In evaluation criteria, a specific level on a hierarchical scale representing successively increased confidence that a TOE adequately fulfills the security requirements.
attack => The act of trying to bypass security controls on a system.  An attack may be active, resulting in the alteration of data; or passive, resulting in the release of data.  Note: The fact that an attack is made does not necessarily mean that it...
audit => Independent review and examination of records and activities to determine compliance with established usage policies and to detect possible inadequacies in product technical security policies of their enforcement.
audit trail => A chronological record of system activities that is sufficient to enable the reconstruction, reviewing, and examination of the sequence of environments and activities surrounding or leading to an operation, a procedure, or an event in ...
augmentation => The addition of one or more assurance component(s) to an assurance
authenticate => (1) To verify the identity of a user, device, or other entity in a computer system, often as a prerequisite to allowing access to resources in a system. (2) To verify the integrity of data that have been stored, transmitted, or otherw...
authentication => (1) To establish the validity of a claimed identity. (2) To provide protection against fraudulent transactions by establishing the validity of message, station, individual, or originator.
authenticator => The means used to confirm the identity or to verify the eligibility of a station, originator, or individual.
authorised user => A user who has a specific right or permission to do something described in the TSP.
authorization => The granting of access rights to a user, program, or process.
authorized - Entitled to a specific mode of access.
AIS => Automated Information System - Any equipment or interconnected systems or subsystems of equipment that is used in the automatic acquisition, storage, manipula- tion, management, movement, control, display, switching, interchange, transmission ...
ADP => Automated Data Processing - Synonymous with automated information systems security.
availability => The prevention of the unauthorised withholding of information or resources.
back door => Synonymous with trap door. 
backup plan => Synonymous with contingency plan.
bandwidth => Rate at which information is transmitted through a channel=2E (See channel capacity)  Note: Bandwidth is originally a term used in analog communication, measured in Hertz, and related to information rate by the "sampling theorem" (genera...
basic component => a component that is identifiable at the lowest hierarchical level of specification produced during Detailed Design.

factpacks/security.fact  view on Meta::CPAN

developer => the person or organisation that manufactures a Target of Evaluation.
developer security => the physical, procedural and personnel security controls imposed by a developer on his Development Environment.
development assurance => Sources of IT product assurance ranging from how a product was designed and implemented to how it is tested, operated and maintained.
development assurance component => Fundamental building block, specifying how an IT product is developed, from which development assurance requirements are assembled.
development assurance package => Grouping of development assurance components assembled to ease specification and common understanding of how an IT product is developed.
development assurance requirements => Requirements in a protection profile which address how each conforming IT product is developed including the production of ap- propriate supporting developmental process evidence and how that product will be main...
development environment => the organisational measures, procedures and standards used whilst constructing a Target of Evaluation.
development process => The set of phases and tasks whereby a Target of Evaluation is constructed, translating requirements into actual hardware and software.
dial back => Synonymous with call back.
dialup => The service whereby a computer terminal can use the telephone to initiate and effect communication with a computer.
digital signature => A cryptographic method, provided by public key cryptography, used by a message's recipient and any third party to verify the identity of the message's sender. It can also be used to verify the authenticity of the message. A sende...
DSS => Digital Signature Standard - A US Federal Information Processing Standard proposed by NIST (National Institute of Standards and Technology) to support digital signature.
digital telephony => Telephone systems that use digital communications technology.
disaster plan => Synonymous with contingency plan.
DAC => Discretionary Access Control - a means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are discretionary in the sense that: (a) A subject with a certain access permission is c...
documentation => the written (or otherwise recorded) information about a Target of Evaluation required for an evaluation. This information may, but need not, be contained within a single document produced for the specified purpose.
TCSEC => DoD Trusted Computer System Evaluation Criteria - A document published by the National Computer Security Center containing a uniform set of basic requirements and evaluation classes for assessing degrees of assurance in the effectiveness of ...
domain => The unique context (for example, access control parameters) in which a program is operating - in effect, the set of objects that a subject has the ability to access. Note: A subject's domain determines which access control attributes an obj...
dominate => Security level S1 is said to dominate security level S2 if the hierarchical classification of S1 is greater than or equal to that of S2 and the non-hierarchical categories of S1 include all those of S2 as a subset.
ease of use => an aspect of the assessment of the effectiveness of a Target of Evaluation, namely that it cannot be configured or used in a manner which is insecure but which an administrator or end-user would reasonably believe to be secure.
effectiveness => In security evaluations, an aspect of assurance assessing how well the applied security functions and mechanisms working together will actually satisfy the security requirements.

factpacks/security.fact  view on Meta::CPAN

functional protection requirements => Requirements in a protection profile which address what conforming IT products must be capable of doing.
functional testing => The portion of security testing in which the advertised features of a system are tested for correct operation.
functional unit => a functionally distinct part of a basic component.
functionality => The totality of functional properties of a TOE that contributes to security.
functionality class => a predefined set of complementary security enforcing functions capable of being implemented in a Target of Evaluation.
general-purpose system => A computer system that is designed to aid in solving a wide variety of problems.
generic threat => Class of threats with common characteristics pertaining to vulnerabilities, agents, event sequences, and resulting misfortunes=2E
global requirements => Those which require analysis of the entire system and for which separate analysis of the individual TCB (trusted computing base) subsets does not suffice.
granularity => Relative fineness or coarseness to which an access control mechanism or oth- er IT product aspect can be adjusted. Note: Protection at the file level is considered course granularity, whereas protection at the field level is considered...
group => Named collection of user identifiers.
gypsy verification environment => An integrated set of tools for specifying, coding, and verifying programs written in the Gypsy language, a language similar to Pascal which has both specification and programming features.  This methology includes an...
handshaking procedure => A dialogue between two entities (e.g., a user and a computer, a computer and another computer, or a program and another program) for the purpose of identifying and authenticating the entities to one another.
hierarchical decomposition => the ordered, structured reduction of a system or a component to primitives.
hierarchical development methodology => A methodology for specifying and verifying the design programs written in the Special specification language. The tools for this methodology include the Special specification processor, the Boyer-Moore theorem ...
host => any computer-based system connected to the network and containing the necessary protocol interpreter software to initiate network access and carry out information exchange across the communications network. This definition encompasses typical...
identification => The process that enables recognition of an entity by a system, generally by the use of unique machine-readable user names.
impersonating => Synonymous with spoofing.
implementation => a phase of the Development Process wherein the detailed specification of a Target of Evaluation is translated into actual hardware and software.
individual accountability => The ability to associate positively the identity of a user with the time, method, and degree of access to a system.
informal => Expressed in natural language.
informal specification => Statement about (the properties of) a product made using the gram- mar, syntax, and common definitions of a natural language (e.g., English). >Note: While no notational restrictions apply, the informal specification is also ...
information protection policy => Set of laws, rules, and practices that regulate how an IT product will, within specified limits, counter threats expected in the product's assumed operational environment.
ISSO => Information System Security Officer  -  The person responsible to the DAA for ensuring that security is provided for and implemented throughout the life cycle of an AIS from the beginning of the concept development plan through its design, de...
ITSEC => Information Technology Security Evaluation Criteria - European security evaluation criteria for targets of evaluation (TOE).

factpacks/security.fact  view on Meta::CPAN

integrity policy => a security policy to prevent unauthorized users from modifying, viz., writing, sensitive information. See also Security Policy.
interdiction => See denial of service - DOS.
internal security controls => Mechanisms implemented in the hardware, firmware, and soft- ware of an IT product which provide protection for the IT product.
internal subject => a subject which is not acting as direct surrogate for a user. A process which is not associated with any user but performs system-wide functions such as packet switching, line printer spooling, and so on. Also known as a daemon or...
interoperability => The ability of computers to act upon information received from one another.
isolation => The containment of subjects and objects in a system in such a way that they are separated from one another, as well as from the protection controls of the operating system.
IT Security => The state of security in an IT system.
IT System => A specific IT installation, with a particular purpose and operational environment.
key management => A method of electronically transmitting, in a secure fashion, a secret key for use with a secret key cryptographic system. Key management can be used to support communications privacy. This method can be accomplished most securely w...
key escrow system => An electronic means of reconstructing a secret key (for secret key encryption) or a private key (for public key encryption)=2E The reconstructed key can then be used in a process to decrypt a communication.
key => A long string of seemingly random bits used with cryptographic algorithms to create or verify digital signatures and encrypt or decrypt messages and conversations. The keys must be known or guessed to forge a digital signature or decrypt an en...
label => see Security Label and Sensitivity Label.
lattice => A partially ordered set for which every pair of elements has a greatest lower bound and a least upper bound.
least privilege => The principle that requires that each subject be granted the most restrictive set of privileges needed for the performance of authorized tasks. The application of this principle limits the damage that can result from accident, erro...
limited access => Synonymous with access control.
list oriented => A computer protection system in which each protected object has a list of all subjects authorized to access it.  Compare ticket-oriented.
local requirements => Those for which separate analysis of the individual TCB (trusted computing base) subsets suffices to determine compliance for the composite TCB. (See the trusted database interpretation of the Trusted Computer System Evaluation ...
lock and key protection system => A protection system that involves matching a key or password with a specific access requirement.
logic bomb => A resident computer program that triggers the perpetration of an unauthorized act when particular states of the system are realized.
loophole => An error of omission or oversight in software or hardware that permits circumventing the system security policy.
*-property => (Star Property) - A Bell-LaPadula security model rule allowing a subject write access to an object only if the security level of the subject is dominated by the security level of the object.  Also known as the Confinement Property.

factpacks/techdict.fact  view on Meta::CPAN

Over-clocking => This is the act of running a chip at a higher clock speed than it was specified for. Very often, chips are capable of running faster than they are specified for, and can be safely over-clocked. 
P54C => This is the official part number for the Pentium processor from Intel.
P55C => This is the official part number for the Pentium processor with MMX technology from Intel.
Packet => A collection of information. It's often used to refer to the chunks of information sent over computer networks.
Packet Filter => This is anything that filters out network traffic based on sender's address, receiver's address, and the type of protocol being sent. Some routers support packet filtering, all firewalls do, and some proxy servers will as well.
Packet InterNet Gopher => (PING) Part of the standard TCP/IP suite of protocols that allows you to check your connectivity with other devices, or to check whether your own TCP/IP stack is working properly. Normally, you type in something like "ping 2...
Page Fault => This is not an error. It means that the computer had to resort to using the swap file as memory.
Parallel => Meaning in unison, or many things at the same time. Most commonly refers to a computer with multiple processors that can execute multiple instructions at the same time.
Parallel Port => The parallel port is found on just about all PCs. It's a 25-pin interface cable (DB-25) that is designed for connection to a printer. Normally, it will take up IRQ 7. In addition to printers, you can connect many other devices such a...
Parity => Meaning that there is an equality. Usually for the purpose of safety, so that if one goes bad there is still the other.
Parity Memory => Not quite memory that has a twin, but instead, more like a summary. The parity does not exactly have a copy of the original, but rather enough information to verify the integrity of the original.
Partition => You can partition your hard drive by breaking it up into one or more pieces, or "partitions." Partition
Pascal => This is a programming language that was designed to teach computer science students the concepts of programming. It's almost like C for dummies. In fact, the two languages are very similar, but the stoic brackets of C are changed to happy a...
Passive Matrix => LCD panels that are passive matrix have a duller, dimmer image than those with active matrix screens. Visibility and clarity decrease at greater angles off of central viewing.
Patch cable => This is the common name for any 10BaseT network cable that is used to connect, or "patch," any two network ports.
Patch panel => This is a group of network ports stuck together for easy accessibility. Usually, this panel resides in a wiring closet or server room. Connections are made between this panel and ports on a hub to enable a network connection at a remot...
PC Card => This is a newer synonym for PCMCIA Card.
PCI => (Peripheral Connect Interface) This interface was designed to supplant the VL-Bus architecture and provide a standard slot with a reduced size for high-speed peripherals. It normally runs at 33 MHz on a PC, but can run faster. PCI slots are 32...
PCMCIA => (Personal Computer Memory Card International Association) Aside from winning the award for being the longest and most-annoying-to-pronounce technology acronym, PCMCIA is a credit card-sized interface card standard. PCMCIA cards are most com...
PDA => (Personal Digital Assistant) PDAs are basically beefed-up organizers. They have small LCD screens, some form of pen or keyboard input, and software for organization, OCR, and contact management. Some have even more features, such as Web browsi...
Peripherals => Any device that is not part of the motherboard, aside from memory and the CPU. For example, video card, sound card, modem, hard drive.



( run in 0.658 second using v1.01-cache-2.11-cpan-5467b0d2c73 )