"Kaliyan" could refer to different concepts depending on the context. It might be a misspelling or variation of "Kalyan," which could refer to places in India, such as Kalyan-Dombivli, a city in Maharashtra. Alternatively, "Kaliyan" could also relate to specific cultural, historical, or mythological figures, texts, or traditions, like in certain regional narratives or folklore.
The Gudea cylinders refer to a set of two inscribed clay cylinders from ancient Mesopotamia, specifically from the reign of Gudea, the ruler (or "ensi") of the Sumerian city-state of Lagash around 2100 BCE. These cylinders are famous for their detailed inscriptions that provide insight into Gudea's policies, achievements, and the religious and political climate of the time.
The Ob-Ugric creation myth is part of the folklore and mythology of the Ob-Ugric peoples, primarily the Khanty (Ostyak) and Mansi (Vogul) groups in western Siberia. These indigenous peoples have a rich oral tradition, and their creation myths reflect their deep connection to nature, animals, and the spiritual world.
Foundation IRB (Institutional Review Board) is an organization that provides ethical review and oversight for research studies, particularly in the fields of healthcare and behavioral sciences. Foundation IRB helps researchers ensure that their studies comply with ethical standards and regulations, protecting the rights and welfare of human subjects involved in research.
Margin at Risk (MaR) is a risk management metric used in the context of trading and investments to quantify the potential loss that a trader could face based on the margin they have in their trading account. Essentially, it reflects how much of a trader's margin is at risk of being lost due to adverse price movements in the assets they are trading.
Antun Karlo Bakotić appears to be a name that may refer to a specific individual, but there is limited publicly available information regarding this person up to my knowledge cutoff in October 2023. It's possible that he is not a widely recognized public figure or that he has emerged in prominence in a niche area after that date.
Dynamic encryption is a method of encrypting data that changes over time or is generated in real-time, providing enhanced security by ensuring that the encryption keys or algorithms used are not static. This approach can effectively protect data from unauthorized access, especially in scenarios where data is frequently updated or transmitted.
"SecureLog" can refer to a few different concepts or products, depending on the context. Generally, it relates to logging systems or services designed to enhance security by ensuring that log data is protected against tampering, unauthorized access, and breaches. 1. **Logging Systems**: In cybersecurity, secure logging systems keep detailed records of system activities, user interactions, and security events. These logs are crucial for security audits, forensic investigations, and compliance with regulations.
A **ciphertext-only attack** is a type of cryptographic attack in which an attacker attempts to break a cipher and retrieve the original plaintext message by analyzing only the ciphertext—the encrypted message—without any access to the plaintext or the key used for encryption. In other words, the attacker only has the output of the encryption process and tries to deduce information about the input.
Duqu is a type of malware that was discovered in 2011 and is associated with sophisticated cyber espionage activities. It is believed to be linked to the same group responsible for the Stuxnet worm, which targeted Iran's nuclear facilities. Duqu functions primarily as a framework for collecting information from infected systems. Its architecture allows it to communicate with its command and control servers to exfiltrate data.
A replay attack is a type of network attack where an unauthorized party intercepts and captures a valid data transmission (such as a login request or a financial transaction) and then retransmits that data to deceive the system into thinking that it is a legitimate request. The attacker aims to gain unauthorized access, repeat transactions, or otherwise exploit the communication for malicious purposes. ### Key Characteristics of Replay Attacks: 1. **Interception**: The attacker must first intercept the original data being transmitted over a network.
Pinwheel is a cryptographic technique that is primarily associated with secure multi-party computation (MPC) and is often used to facilitate secure computations among multiple parties without revealing their private inputs. The concept was introduced in the context of efficient protocols for performing computations on encrypted data, allowing different parties to compute a function collaboratively while keeping their respective inputs confidential. The key feature of Pinwheel is its approach to handling the interactions between the parties involved in the computation.
The Mercury cipher machine was a cryptographic device used primarily by the German military during World War II. It is one of the many cipher machines developed to securely transmit military communications. Mercury was designed to encrypt messages using a system of rotors and electrical wiring, which created complex ciphers that were intended to be difficult to decode without the proper keys.
Oblivious transfer (OT) is a fundamental concept in the field of cryptography that involves a type of protocol allowing a sender to send information to a receiver in such a way that the sender remains oblivious to what information the receiver has obtained, and the receiver only learns what they are entitled to learn.
The Automatic Certificate Management Environment (ACME) is a protocol designed to automate the process of managing digital certificates, particularly for securing web communications using HTTPS. It was developed by the Internet Security Research Group (ISRG) and is best known for its use in the Let's Encrypt certificate authority. Here's a brief overview of its key features: 1. **Automation**: ACME allows web servers and clients to automatically request, renew, and revoke SSL/TLS certificates without manual intervention.
Big collection of a bunch of ghost stories. 90% of them involve some dude dating a beautiful ghost woman or animal that can shapeshift as a woman.
Organized into 12 chapeters as seen on the Chinese wiki: zh.wikipedia.org/wiki/聊齋志異#章節

Pinned article: Introduction to the OurBigBook Project

Welcome to the OurBigBook Project! Our goal is to create the perfect publishing platform for STEM subjects, and get university-level students to write the best free STEM tutorials ever.
Everyone is welcome to create an account and play with the site: ourbigbook.com/go/register. We belive that students themselves can write amazing tutorials, but teachers are welcome too. You can write about anything you want, it doesn't have to be STEM or even educational. Silly test content is very welcome and you won't be penalized in any way. Just keep it legal!
We have two killer features:
  1. topics: topics group articles by different users with the same title, e.g. here is the topic for the "Fundamental Theorem of Calculus" ourbigbook.com/go/topic/fundamental-theorem-of-calculus
    Articles of different users are sorted by upvote within each article page. This feature is a bit like:
    • a Wikipedia where each user can have their own version of each article
    • a Q&A website like Stack Overflow, where multiple people can give their views on a given topic, and the best ones are sorted by upvote. Except you don't need to wait for someone to ask first, and any topic goes, no matter how narrow or broad
    This feature makes it possible for readers to find better explanations of any topic created by other writers. And it allows writers to create an explanation in a place that readers might actually find it.
    Figure 1.
    Screenshot of the "Derivative" topic page
    . View it live at: ourbigbook.com/go/topic/derivative
  2. local editing: you can store all your personal knowledge base content locally in a plaintext markup format that can be edited locally and published either:
    This way you can be sure that even if OurBigBook.com were to go down one day (which we have no plans to do as it is quite cheap to host!), your content will still be perfectly readable as a static site.
    Figure 2.
    You can publish local OurBigBook lightweight markup files to either https://OurBigBook.com or as a static website
    .
    Figure 3.
    Visual Studio Code extension installation
    .
    Figure 4.
    Visual Studio Code extension tree navigation
    .
    Figure 5.
    Web editor
    . You can also edit articles on the Web editor without installing anything locally.
    Video 3.
    Edit locally and publish demo
    . Source. This shows editing OurBigBook Markup and publishing it using the Visual Studio Code extension.
    Video 4.
    OurBigBook Visual Studio Code extension editing and navigation demo
    . Source.
  3. https://raw.githubusercontent.com/ourbigbook/ourbigbook-media/master/feature/x/hilbert-space-arrow.png
  4. Infinitely deep tables of contents:
    Figure 6.
    Dynamic article tree with infinitely deep table of contents
    .
    Descendant pages can also show up as toplevel e.g.: ourbigbook.com/cirosantilli/chordate-subclade
All our software is open source and hosted at: github.com/ourbigbook/ourbigbook
Further documentation can be found at: docs.ourbigbook.com
Feel free to reach our to us for any help or suggestions: docs.ourbigbook.com/#contact