نتایج جستجو برای: irc
تعداد نتایج: 1097 فیلتر نتایج به سال:
Over the last few years, researchers and network operators have examined networks of DDoS agents, more recently called botnets due to their connection to Internet Relay Chat (IRC). In the continued quest to take down these networks of bots, two important questions arise: how many bots are there, and how to find every last bot? When one reads about a ten thousand, hundred thousand, one million n...
The recent detection of the hydrocarbon anion C6H − in the interstellar medium has led us to investigate the synthesis of hydrocarbon anions in a variety of interstellar and circumstellar environments. We find that the anion/neutral abundance ratio can be quite large, on the order of at least a few percent, once the neutral has more than five carbon atoms. Detailed modeling shows that the colum...
Click to increase image sizeClick decrease size Notes on contributorSinéad C. M. Harrington is a IRC Scholar and PhD candidate, Department of Political Science, Trinity College Dublin.
bacterium Thiobacillus X. A fifth fraction (acidic fraction) contained two additional cytochrome components with x bands at 550 and 557 msi respectively in the reduced state. 2. All the cytochromes appear to be ofthe c type, are labile to heat and acid and do not combine with carbon monoxide. They are auto-oxidizable to varying degrees. 3. Cytochromes 550 (1) and 557 (1) are basic, and are adso...
For a long time, dialogue analysis has separated spoken language from written language. This dichotomy is valid in many cases as it is mostly parallel to the distinction of synchronous and asynchronous communication with the associated affinity to graphic and acoustic media, respectively. During the present decade, many forms of computer mediated communication (CMC) have become widespread. With...
High angular resolution images of IRC+10216 taken at various bandpasses within the nearinfrared h, k & l bands are presented. The maps have the highest angular resolution yet recovered, and were reconstructed from interferometric measurements obtained at the Keck 1 telescope in 1997 December and 1998 April, forming a subset of a 7-epoch monitoring program presented earlier (Tuthill, Monnier, Da...
The rapid growth of botnets represents the greatest computer security threat facing individuals and corporations today. Fuelled by financial incentives and readily available source code, malware authors pursue aggressively the development of newer modules and the exploitation of code into these bots. For an organization, internal bot infections can have serious repercussions, including the loss...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید