I am currently migrating the blog
things are not 100% tidy yet
In this context, operators have deployed femto-cells systems in order to decrease the distance to the EU and to maintain good signal quality. However, femto-cells must operate in the designated band frequency for such communication and match to the assigned frequencies to the operator.
Applications which facilitate the data processing when we need to work with research result, whether mathematical or network. Below, a list of useful applications for processing data from research, documents, images and other related management system is described.
Groups are useful for grouping a number of special permissions on the system to a group of users, each user must belong to at least one group. In any system there must be a superuser (root), which will have all the permits and maximum privileges allowing to do any work on the system.
A recent study by Orr Dunkelman and Nathan Keller shows that security can be compromised by the omission of such transformation. The results show that in the case of the analysis by omitting MixColumns, the algorithm complexity is reduced by a factor of 2^16.
In this article, we describe how to obtain a traffic model for VoIP which is quite easy to interpret and it provides some of the things that must be done.
VoIP refers to the technology required for voice communication over IP, while ToIP is a telephone service for users, which uses VoIP technology to give such service. VoIP allows voice transmission via an IP network, including those connected to the Internet. It involves digitizing voice signals, via a codec.
Some time ago, I read an interesting article of a "successful attack" against AES, the famous symmetric-key algorithm. Raphael C.-W. Phan presented a seven rounds "impossible differential attack" for AES-192 and AES-256. Someone may ask what kind of attack is this?, well, it is a crypt-analysis that takes advantage of the differences that are impossible to be, in a data block through encryption, in order to discover the key?. Without going into many details of the method used, below I comment some of the most important results of this study.
Package managers are tools to automate the process of installing, upgrading, uninstalling or configuring software on Linux.
Now, we discuss some details of the so-called transformations (ByteSub, ShiftRow, MixColumns and AddRoundKey) and the subkey generation process. To see more details in a more dynamic way the Rijndael Animation application is recommended.
The AES (Advanced Encryption Standard) algorithm, known as Rijndael, was so-named by its creators Joan Daemen and Vincent Rijmen, it is the current international standard for communications encryption since october 2000. This algorithm is characterized by a symmetric block cipher with variable key length, the default key length is 128 bits but can also be set to 192 or 256 bits.