list

IPSet List 3.6

ipset_list is a wrapper script written in bash for listing sets of the netfilter ipset program. It allows you to match and display sets, headers, and elements in various ways. The output can optionally be colorized. An interactive mode allows to select the query options in a wizard based manner.




list

IPSet List 3.7

ipset_list is a wrapper script written in bash for listing sets of the netfilter ipset program. It allows you to match and display sets, headers, and elements in various ways. The output can optionally be colorized. An interactive mode allows to select the query options in a wizard based manner.




list

IPSet List 3.7.1

ipset_list is a wrapper script written in bash for listing sets of the netfilter ipset program. It allows you to match and display sets, headers, and elements in various ways. The output can optionally be colorized. An interactive mode allows to select the query options in a wizard based manner.




list

IPSet List 3.7.2

ipset_list is a wrapper script written in bash for listing sets of the netfilter ipset program. It allows you to match and display sets, headers, and elements in various ways. The output can optionally be colorized. An interactive mode allows to select the query options in a wizard based manner.




list

DVD X Player 5.5 .plf PlayList Buffer Overflow

This Metasploit module exploits a stack-based buffer overflow on DVD X Player 5.5 Pro and Standard. By supplying a long string of data in a plf file (playlist), the MediaPlayerCtrl.dll component will attempt to extract a filename out of the string, and then copy it on the stack without any proper bounds checking, which causes a buffer overflow, and results arbitrary code execution under the context of the user. This Metasploit module has been designed to target common Windows systems such as: Windows XP SP2/SP3, Windows Vista, and Windows 7.




list

COVERT-2000-07.listserv

Network Associates COVERT Labs Security Advisory - The L-Soft LISTSERV web archive (wa,wa.exe) component contains an unchecked buffer allowing remote execution of arbitrary code with the privileges of the LISTSERV daemon. Vulnerable systems include L-Soft LISTSERV Web Archives 1.8d (confirmed) and 1.8c (inferred) for Windows 9x, Windows NT 3.5x, Windows NT 4.0, Windows 2000, UNIX (all vendors), and OpenVMS VAX.






list

Geothermal-powered Italian Town Asks Why Populists Are Abandoning It

Italy’s Five Star Movement used to rave about towns like Montieri, a village in the verdant Tuscan foothills that burns little coal or natural gas. Instead, the local power plant harnesses steam rising naturally from hot springs deep underground to generate electricity.




list

Listen Up: Buying an EV and Charging with Solar

The combination of rooftop solar and electric vehicles (EVs) is the Reese's Peanut Butter Cup of the renewable industry. Although EVs started off slowly the second time around (the first time was in the early 1900s), in some areas EVs are becoming ubiquitous. Whether it's a combination of tax credits, car pool lane preferences, expensive gas or concern about the environment, the trend seems unstoppable.




list

Listen Up: Electricity from Nuclear Too Cheap to Meter — Or Not

It's the environmentalist's third rail question: "Should we promote nuclear power as an expedient way to reduce CO2 emissions?" On the one hand, nuclear power generates electricity with almost negligible CO2 emissions — potentially a good way for our society to reverse the current global warming trends. On the other hand, nuclear power is...well...nuclear. Problems related to waste disposal, proliferation and high costs have not been solved, and we still have the occasional disaster.




list

Innovation, Progress and Scale: Introducing the 2014 Project of the Year Award Finalists

This year’s Project of the Year Award finalists truly represent the evolving energy landscape and exciting global efforts to transition to a cleaner, renewable future. The five projects vying for the Renewable Energy Project of the Year crown include a wide range of innovative technologies from coal-to-biomass conversion to concentrating solar power.




list

Listen Up: Can We Get To 100 Percent Renewables?

We've made great progress with renewable energy — but from an almost zero base we still have a long way to go. Fortunately, the path is clear. California is already over 12 percent with a combination of hydroelectric, wind and solar (unfortunately not much hydro this year). Getting to 50 percent only requires the deployment of existing technology. But can we get to 100 percent?




list

5. März 2020 - Taiwan Union Technology Corporation erhält als erstes Unternehmen die Rezertifizierung nach IPC-4101 Qualified Products Listing (QPL)




list

10. März 2020 - Fabrication Technologies Inc./IGM Solutions in die Liste qualifizierter Hersteller nach IPC J-STD-001 und IPC-A-610 aufgenommen




list

11. März 2020 - Precisionworks/Condunet in die Liste qualifizierter Hersteller nach IPC/WHMA-A-620 aufgenommen





list

Spotify's new new 'Daily Wellness' playlist is worth a try but has a few flaws

With all the stress in the world — you know, a deadly, terrifying global pandemic — Spotify dropped a new service: a daily, personalized aimed at wellness. Fittingly, it's called Daily Wellness and I gave it a try. 

OK, first, let me drop my biases: I can be a cynical person and I'm pretty high energy — like hyper hyper — which has made meditation difficult for me. I can get both mentally and physically uncomfortable while trying anything resembling meditation or therapy or sincere reflection.

That being said, amid the pandemic — and battling some, let's say, serious anxiety — I've been taking active steps to try to improve my mental health. Therapy, meditation, exercise, whatever else, it all seemed like a good idea to help me get through the day. Read more...

More about Spotify, Meditation, Playlists, Self Care, and Coronavirus




list

Insight – From good to Greater: Why Australian F&B exporters should consider Taiwan as part of a holistic strategy

While the China market has been a miracle for Australian food exporters, the data belies many of the operating challenges individual Australian firms face.




list

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




list

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




list

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




list

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




list

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




list

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




list

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




list

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




list

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




list

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




list

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




list

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




list

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




list

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




list

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




list

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




list

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




list

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




list

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




list

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




list

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




list

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




list

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




list

[Ticker] Panama to be added to EU money-laundering blacklist

Panama, the Bahamas, and Mauritius are to be added to an EU blacklist of countries on Thursday that "pose significant threats to the financial system of the [European] Union" on money-laundering grounds due to lax legislation at home, Reuters reports, citing a draft EU document. Barbados, Botswana, Cambodia, Ghana, Jamaica, Mongolia, Myanmar, Nicaragua and Zimbabwe are also on the list, meaning EU banks must do enhanced due diligence on transactions.




list

[Ticker] Berlin journalists attacked by lockdown protesters

For the second time in a week, journalists in Berlin have been attacked by anti-lockdown protesters, Deutsche Welle reports. Each time a TV crew with camera were attacked when they approached a group of people protesting against measures to contain the coronavirus. Germany's foreign minister Heiko Maas condemned the attacks, saying on Twitter "those who attack journalists also attack our democracy."




list

New Journalist Exchange Focuses on China’s Growing Clout

New Journalist Exchange Focuses on China’s Growing Clout

L.A. Mayor Antonio Villaraigosa (center, left) with participants in the EWC’s China-U.S. Journalists Exchange program discussing Chinese investment in Los Angeles.

The East-West Center’s first China-United States Journalists Exchange focused on China’s more assertive role in regional issues and its increasing economic might.




list

Slain Sri Lankan Journalist was EWC Jefferson Fellow

Slain Sri Lankan Journalist was EWC Jefferson Fellow
(HONOLULU) Jan. 9 -- Prominent Sri Lankan journalist Lasantha Wickramatunga, who was gunned down yesterday in Colombo, was a 1995 participant in the East-West Center’s Jefferson Fellowships for journalists. Wickramatunga, the editor of the weekly Sunday Leader newspaper, was shot by unidentified gunmen on motorcycles as he drove to work.

“Our deepest sympathies go out to Mr. Wickramatunga’s family and loved ones,” said East-West Center President Charles E. Morrison. “His tragic death underscores the courage with which so many of the international journalists who have participated in Center programs pursue their vital work at great personal risk.”




list

EWC guide to Specialists on the Asia Pacific Region (2009-2010)

EWC Guide to Specialists on the Asia Pacific Region Now Available
The latest edition of the EWC guide to Specialists on the Asia Pacific Region (2009-2010) is now available as a free pdf download here . It includes a list of the specialists affiliated with the East-West Center, their expertise, their contact info and a brief bio of each.

Using the guide’s cross-indexes by subject and region, you can quickly locate specialists in such topics as politics, international relations, economics, environment, energy, health, population, education and culture, indexed by regional expertise in Northeast Asia, Southeast Asia, South Asia and the Pacific islands.




list

Video: Beijing journalists speak on Post-Olympics China

Video: Beijing journalists speak on Post-Olympics China

Haili Cao, Josephine Ma, and Mark Magnier

On Sept. 5, four eminent Beijing-based journalists participating in the EWC’s Northeast Asia Journalists Dialogue presented a lively discussion panel at the Center on “Post-Olympics China.”

Click here to view a video of the event via the news website “Think Tech Hawaii.” (Note: requires email registration to view.)

Speaking at the event were:




list

Spotlight on Seminars: U.S. and Asian Muslim Journalists Explore Each Other’s Worlds

Spotlight on Seminars: U.S. and Asian Muslim Journalists Explore Each Other’s Worlds