Karlsruhe is the second-largest city of the German federal state of Baden-Württemberg after its capital of Stuttgart, its 309,999 inhabitants make it the 21st largest city of Germany. On the right bank of the Rhine, the city lies near the French-German border, between the Mannheim/Ludwigshafen conurbation to the north, the Strasbourg/Kehl conurbation to the south, it is the largest city of a region named after Hohenbaden Castle in the city of Baden-Baden. Karlsruhe is the largest city in the South Franconian dialect area, the only other larger city in that area being Heilbronn; the city is the seat of the Federal Constitutional Court, as well as of the Federal Court of Justice and the Public Prosecutor General of the Federal Court of Justice. Karlsruhe was the capital of the Margraviate of Baden-Durlach, the Margraviate of Baden, the Electorate of Baden, the Grand Duchy of Baden, the Republic of Baden, its most remarkable building is Karlsruhe Palace, built in 1715. There are nine institutions of higher education in the city, most notably the Karlsruhe Institute of Technology.
Karlsruhe/Baden-Baden Airport is the second-busiest airport of Baden-Württemberg after Stuttgart Airport, the 17th-busiest airport of Germany. Karlsruhe lies to the east of the Rhine, completely on the Upper Rhine Plain, it contains the Turmberg in the east, lies on the borders of the Kraichgau leading to the Northern Black Forest. The Rhine, one of the world's most important shipping routes, forms the western limits of the city, beyond which lie the towns of Maximiliansau and Wörth am Rhein in the German state of Rhineland-Palatinate; the city centre is about 7.5 km from the river. Two tributaries of the Rhine, the Alb and the Pfinz, flow through the city from the Kraichgau to join the Rhine; the city lies at an altitude between 100 and 322 m. Its geographical coordinates are 49°00′N 8°24′E, its course is marked by a stone and painted line in the Stadtgarten. The total area of the city is 173.46 km2, hence it is the 30th largest city in Germany measured by land area. The longest north-south distance is 19.3 km in the east-west direction.
Karlsruhe is part of the urban area of Karlsruhe/Pforzheim, to which certain other towns in the district of Karlsruhe such as Bruchsal, Ettlingen and Rheinstetten, as well as the city of Pforzheim, belong. The city was planned with the palace tower at the center and 32 streets radiating out from it like the spokes of a wheel, or the ribs of a folding fan, so that one nickname for Karlsruhe in German is the "fan city". All of these streets survive to this day; because of this city layout, in metric geometry, Karlsruhe metric refers to a measure of distance that assumes travel is only possible along radial streets and along circular avenues around the centre. The city centre is the oldest part of town and lies south of the palace in the quadrant defined by nine of the radial streets; the central part of the palace runs east-west, with two wings, each at a 45° angle, directed southeast and southwest. The market square lies on the street running south from the palace to Ettlingen; the market square has the town hall to the west, the main Lutheran church to the east, the tomb of Margrave Charles III William in a pyramid in the buildings, resulting in Karlsruhe being one of only three large cities in Germany where buildings are laid out in the neoclassical style.
The area north of the palace is a forest. The area to the east of the palace consisted of gardens and forests, some of which remain, but the Karlsruhe Institute of Technology, Wildparkstadion football stadium, residential areas have been built there; the area west of the palace is now residential. Karlsruhe experiences an oceanic climate and its winter climate is milder, compared to most other German cities, except for the Rhine-Ruhr area. Summers are hotter than elsewhere in the country and it is one of the sunniest cities in Germany, like the Rhine-Palatinate area. Precipitation is evenly spread throughout the year. In 2008, the weather station in Karlsruhe, operating since 1876, was closed. According to legend, the name Karlsruhe, which translates as "Charles’ repose" or "Charles' peace", was given to the new city after a hunting trip when Margrave Charles III William of Baden-Durlach, woke from a dream in which he dreamt of founding his new city. A variation of this story claims. Charles William founded the city on June 17, 1715, after a dispute with the citizens of his previous capital, Durlach.
The founding of the city is linked to the construction of the palace. Karlsruhe became the capital of Baden-Durlach, in 1771, of the united Baden until 1945. Built in 18
Antivirus software, or anti-virus software known as anti-malware, is a computer program used to prevent and remove malware. Antivirus software was developed to detect and remove computer viruses, hence the name. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect users from: malicious browser helper objects, browser hijackers, keyloggers, rootkits, trojan horses, malicious LSPs, fraudtools and spyware; some products include protection from other computer threats, such as infected and malicious URLs, spam and phishing attacks, online identity, online banking attacks, social engineering techniques, advanced persistent threat and botnet DDoS attacks. Although the roots of the computer virus date back as early as 1949, when the Hungarian scientist John von Neumann published the "Theory of self-reproducing automata", the first known computer virus appeared in 1971 and was dubbed the "Creeper virus".
This computer virus infected Digital Equipment Corporation's PDP-10 mainframe computers running the TENEX operating system. The Creeper virus was deleted by a program created by Ray Tomlinson and known as "The Reaper"; some people consider "The Reaper" the first antivirus software written – it may be the case, but it is important to note that the Reaper was a virus itself designed to remove the Creeper virus. The Creeper virus was followed by several other viruses; the first known that appeared "in the wild" was "Elk Cloner", in 1981, which infected Apple II computers. In 1983, the term "computer virus" was coined by Fred Cohen in one of the first published academic papers on computer viruses. Cohen used the term "computer virus" to describe a program that: "affect other computer programs by modifying them in such a way as to include a copy of itself." The first IBM PC compatible "in the wild" computer virus, one of the first real widespread infections, was "Brain" in 1986. From the number of viruses has grown exponentially.
Most of the computer viruses written in the early and mid-1980s were limited to self-reproduction and had no specific damage routine built into the code. That changed when more and more programmers became acquainted with computer virus programming and created viruses that manipulated or destroyed data on infected computers. Before internet connectivity was widespread, computer viruses were spread by infected floppy disks. Antivirus software came into use, but was updated infrequently. During this time, virus checkers had to check executable files and the boot sectors of floppy disks and hard disks. However, as internet usage became common, viruses began to spread online. There are competing claims for the innovator of the first antivirus product; the first publicly documented removal of an "in the wild" computer virus was performed by Bernd Fix in 1987. In 1987, Andreas Lüning and Kai Figge, who founded G Data Software in 1985, released their first antivirus product for the Atari ST platform. In 1987, the Ultimate Virus Killer was released.
This was the de facto industry standard virus killer for the Atari ST and Atari Falcon, the last version of, released in April 2004. In 1987, in the United States, John McAfee founded the McAfee company and, at the end of that year, he released the first version of VirusScan. In 1987, Peter Paško, Rudolf Hrubý, Miroslav Trnka created the first version of NOD antivirus. In 1987, Fred Cohen wrote that there is no algorithm that can detect all possible computer viruses. At the end of 1987, the first two heuristic antivirus utilities were released: Flushot Plus by Ross Greenberg and Anti4us by Erwin Lanting. In his O'Reilly book, Malicious Mobile Code: Virus Protection for Windows, Roger Grimes described Flushot Plus as "the first holistic program to fight malicious mobile code."However, the kind of heuristic used by early AV engines was different from those used today. The first product with a heuristic engine resembling modern ones was F-PROT in 1991. Early heuristic engines were based on dividing the binary in different sections: data section, code section.
Indeed, the initial viruses re-organized the layout of the sections, or overrode the initial portion of section in order to jump to the end of the file where malicious code was located—only going back to resume execution of the original code. This was a specific pattern, not used at the time by any legitimate software, which represented an elegant heuristic to catch suspicious code. Other kinds of more advanced heuristics were added, such as suspicious section names, incorrect header size, regular expressions, partial pattern in-memory matching. In 1988, the growth of antivirus companies continued. In Germany, Tjark Auerbach released the first version of AntiVir. In Bulgaria, Dr. Vesselin Bontchev released his first freeware antivirus program. Frans Veldman released the first version of ThunderByte Antivirus known as TBAV. In Czechoslovakia, Pavel Baudiš and Eduard Kučera started avast! (at th
In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot. Encryption does not itself prevent interference, but denies the intelligible content to a would-be interceptor. In an encryption scheme, the intended information or message, referred to as plaintext, is encrypted using an encryption algorithm – a cipher – generating ciphertext that can be read only if decrypted. For technical reasons, an encryption scheme uses a pseudo-random encryption key generated by an algorithm, it is in principle possible to decrypt the message without possessing the key, for a well-designed encryption scheme, considerable computational resources and skills are required. An authorized recipient can decrypt the message with the key provided by the originator to recipients but not to unauthorized users. In symmetric-key schemes, the encryption and decryption keys are the same. Communicating parties must have the same key.
An example of a symmetric key scheme would be the one used by the German Enigma Machine that sent information from a central location to troops in various other locations in secret. When the Allies captured one of these machines and figured out how it worked, they were able to decipher the information encoded within the messages as soon as they could discover the encryption key for a given day's transmissions. In public-key encryption schemes, the encryption key is published for anyone to use and encrypt messages. However, only the receiving party has access to the decryption key. Public-key encryption was first described in a secret document in 1973. Although published subsequently, the work of Diffie and Hellman, was published in a journal with a large readership, the value of the methodology was explicitly described and the method became known as the Diffie Hellman key exchange. A publicly available public key encryption application called Pretty Good Privacy was written in 1991 by Phil Zimmermann, distributed free of charge with source code.
Encryption has long been used by governments to facilitate secret communication. It is now used in protecting information within many kinds of civilian systems. For example, the Computer Security Institute reported that in 2007, 71% of companies surveyed utilized encryption for some of their data in transit, 53% utilized encryption for some of their data in storage. Encryption can be used to protect data "at rest", such as information stored on computers and storage devices. In recent years, there have been numerous reports of confidential data, such as customers' personal records, being exposed through loss or theft of laptops or backup drives. Digital rights management systems, which prevent unauthorized use or reproduction of copyrighted material and protect software against reverse engineering, is another somewhat different example of using encryption on data at rest. In response to encryption of data at rest, cyber-adversaries have developed new types of attacks; these more recent threats to encryption of data at rest include cryptographic attacks, stolen ciphertext attacks, attacks on encryption keys, insider attacks, data corruption or integrity attacks, data destruction attacks, ransomware attacks.
Data fragmentation and active defense data protection technologies attempt to counter some of these attacks, by distributing, moving, or mutating ciphertext so it is more difficult to identify, corrupt, or destroy. Encryption is used to protect data in transit, for example data being transferred via networks, mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines. There have been numerous reports of data in transit being intercepted in recent years. Data should be encrypted when transmitted across networks in order to protect against eavesdropping of network traffic by unauthorized users. Encryption, by itself, can protect the confidentiality of messages, but other techniques are still needed to protect the integrity and authenticity of a message. Standards for cryptographic software and hardware to perform encryption are available, but using encryption to ensure security may be a challenging problem. A single error in system design or execution can allow successful attacks.
Sometimes an adversary can obtain unencrypted information without directly undoing the encryption. See, e.g. traffic analysis, TEMPEST, or Trojan horse. Digital signature and encryption must be applied to the ciphertext when it is created to avoid tampering. Encrypting at the time of creation is only secure if the encryption device itself has not been tampered with. Conventional methods for deleting data permanently from a storage device involve overwriting its whole content with zeros, ones or other patterns – a process which can take a significant amount of time, depending on the capacity and the type of the medium. Cryptography offers a way of making the erasure instantaneous; this method is called crypto-shredding. An example implementation of this method can be found on iOS devices, where the cryptographic key is kept in a dedicated'Effaceable Storage'; because the
Symantec Corporation is an American software company headquartered in Mountain View, United States. The company provides services. Symantec is a member of the S&P 500 stock-market index; the company has development centers in Pune and Bengaluru. On October 9, 2014, Symantec declared it would split into two independent publicly traded companies by the end of 2015. One company would focus on the other on information management. On January 29, 2016, Symantec sold its information-management subsidiary, named Veritas Technologies to The Carlyle Group; the name "Symantec" is a portmanteau of the words "syntax" and "semantics" with "technology". Founded in 1982 by Gary Hendrix with a National Science Foundation grant, Symantec was focused on artificial intelligence-related projects, including a database program. Hendrix hired several Stanford University natural language processing researchers as the company's first employees, among them Barry Greenstein. Hendrix hired Jerry Kaplan as a consultant to build the in-RAM database for Q&A.
In 1984, it became clear that the advanced natural language and database system that Symantec had developed could not be ported from DEC minicomputers to the PC. This left Symantec without a product, but with expertise in natural language database query systems and technology; as a result in 1984 Symantec was acquired by another, smaller software startup company, C&E Software, founded by Denis Coleman and Gordon Eubanks and headed by Eubanks. C&E Software developed a combined file management and word processing program called Q&A for "question and answer."The merged company retained the name Symantec. Eubanks became its chairman, Vern Raburn, the former President of the original Symantec, remained as President of the combined company; the new Symantec combined the file management and word processing functionality that C&E had planned, added an advanced Natural Language query system that set new standards for ease of database query and report generation. The natural language system was named "The Intelligent Assistant".
Turner chose the name of Q&A for Symantec's flagship product, in large part because the name lent itself to use in a short merchandised logo. Brett Walter designed the user interface of Q&A. Q&A was released in November 1985. During 1986, Vern Raburn and Gordon Eubanks swapped roles, Eubanks became CEO and president of Symantec, while Raburn became its chairman. Subsequent to this change, Raburn had little involvement with Symantec, in a few years time, Eubanks added the Chairmanship to his other roles. After a slow start for sales of Q&A in the fall of 1985 and spring of 1986, Turner signed up a new advertising agency called Elliott/Dickens, embarked on an aggressive new advertising campaign, came up with the "Six Pack Program" in which all Symantec employees, regardless of role, went on the road and selling dealer sales staff nationwide in the United States. Turner named it Six Pack because employees were to work six days a week, see six dealerships per day, train six sales representatives per store and stay with friends free or at Motel 6.
A promotion was run jointly with SofSell. This promotion was successful in encouraging dealers to try Q&A. During this time, Symantec was advised by Jim Lally and John Doerr — both were board members of Symantec at that stage — that if Symantec would cut its expenses and grow revenues enough to achieve cash flow break-even KPCB would back the company in raising more venture capital. To accomplish this, the management team worked out a salary reduction schedule where the chairman and the CEO would take zero pay, all vice presidents would take a 50% pay cut, all other employees' pay was cut by 15%. Two employees were laid off. Eubanks negotiated a sizable rent reduction on the office space the company had leased in the days of the original Symantec; these expense reductions, combined with strong international sales of Q&A, enabled the company to attain break-even. The increased traction for Q&A from this re-launch grew Symantec's revenues along with early success for Q&A in international markets following Turner's having placed emphasis on establishing international sales distribution and multiple language versions of Q&A from initial shipment.
In 1985, Rod Turner negotiated the publishing agreement with David Whitney for Symantec's second product, which Turner named NoteIt. It was evident to Turner that NoteIt would confuse the dealer channel if it was launched under the Symantec name, because Symantec had built up interest by that stage in Q&A, because the low price for the utility would not be attractive to the dealer channel until demand had been built up. Turner felt. Turner and Gordon E. Eubanks, Jr. chairman of Symantec Corporation, agreed to form a new division of Symantec, Eubanks delegated the choice of name to Turner. Turner chose the name Turner Hall Publishing, to be a new division of Symantec devoted to publishing third-party software and ha
Abingdon-on-Thames AB-ing-dən-, known just as Abingdon between 1974 and 2012, is an historic market town and civil parish in the ceremonial county of Oxfordshire, England. The county town of Berkshire, since 1974 Abingdon has been administered by the Vale of White Horse district within Oxfordshire; the area was occupied from the early to middle Iron Age and the remains of a late Iron Age and Roman defensive enclosure lies below the town centre. Abingdon Abbey was founded around AD 676. In the 13th and 14th centuries, Abingdon was an agricultural centre with an extensive trade in wool, alongside weaving and the manufacture of clothing. Charters for the holding of markets and fairs were granted by various monarchs, from Edward I to George II; the town survived the dissolution of the abbey in 1538, by the 18th and 19th centuries, with the building of Abingdon Lock in 1790, Wilts & Berks Canal in 1810, was a key link between major industrial centres such as Bristol, London and the Black Country.
In 1856 the Abingdon Railway opened. The Wilts & Berks Canal was abandoned in 1906 but a voluntary trust is now working to restore and re-open it. Abingdon railway station was closed to passengers in September 1963; the line remained open for goods until 1984, including serving the MG car factory, which operated from 1929 to October 1980. Abingdon's brewery, whose most famous ale, Old Speckled Hen, was named after an early MG car, was taken over and closed down by Greene King Brewery in 1999, with production moving to Bury St Edmunds in Suffolk; the site of the brewery has been redeveloped into housing. The rock band Radiohead formed in 1985; the 2011 Census recorded the parish's population as 33,130. This is 2,504 more than in the 2001 Census total of 30,626, represents just over 8% growth in the population. Abingdon is 6 miles south of Oxford, 15 miles south-east of Witney and 19 miles north of Newbury in the flat valley of the Thames on its west bank, where the small river Ock flows in from the Vale of White Horse.
It is on the A415 between Witney and Dorchester, adjacent to the A34 trunk road, linking it with the M4 and M40 motorways. The B4017 and A4183 link the town, both being part of the old A34 and heavily congested. Local bus services to Oxford and the surrounding areas are run by Stagecoach Oxfordshire, Thames Travel, the Oxford Bus Company and smaller independent companies. Abingdon has no rail service. However, in recent years, urban expansion has brought Radley railway station close to town's northeastern limits; the small stopping-service, railway stations at Culham and Radley are both just over two miles from the town centre. Abingdon's eastern ring-road and newest suburbs are connected by footpath and cycleway from Radley railway station; the Radley to Abingdon railway station branch line closed to passengers in 1963. The nearest major stations with taxi ranks are Didcot Parkway. All are managed by Great Western Railway. Frequent express buses operate between the local railway stations and Abingdon, run by Oxford Bus Company and its sister company Thames Travel.
A Neolithic stone hand axe was found at Abingdon. Petrological analysis in 1940 identified the stone as epidotised tuff from Stake Pass in the Lake District, 250 miles to the north. Stone axes from the same source have been found at Sutton Courtenay, Alvescot and Minster Lovell. Abingdon has been occupied from the early to middle Iron Age and the remains of a late Iron Age defensive enclosure lies below the town centre; the oppidum was in use throughout the Roman occupation. Abingdon Abbey was founded in Saxon times around AD 676, but its early history is confused by numerous legends, invented to raise its status and explain the place name; the name seems to mean'Hill of a man named Æbba, or a woman named Æbbe' the saint to whom St Ebbe's Church in Oxford was dedicated. However, Abingdon stands in a valley and not on a hill, it is thought that the name was first given to a place on Boars Hill above Chilswell, the name was transferred to its present site when the Abbey was moved. In 1084, William the Conqueror celebrated Easter at the Abbey and left his son, the future Henry I, to be educated there.
In the 13th and 14th centuries, Abingdon was a flourishing agricultural centre with an extensive trade in wool and a famous weaving and clothing manufacturing industry. The abbot seems to have held a market from early times and charters for the holding of markets and fairs were granted by various sovereigns, from Edward I to George II. In 1337 there was a famous riot in protest at the Abbot's control of this market in which several of the monks were killed. After the abbey's dissolution in 1538, the town sank into decay and, in 1556, upon receiving a representation of its pitiable condition, Mary I granted a charter establishing a mayor, two bailiffs, twelve chief burgesses and sixteen secondary burgesses, the mayor to be clerk of the market, coroner and a JP; the present Christ's Hospital belonged to the Guild of the Holy Cross, on the dissolution of which Edward VI founded the almshouses instead, under its present name. The council was empowered to elect one burgess to parliament and this right continued until the Redistribution of Seats Act of 1885.
A town clerk and other officers were appointed and the town boundaries described in great detail. Charters, from Elizabeth I, James I, James II, George II and George III, made no considerable change. James II changed the style of the corporation to that of a mayor, twelve