Buffer Overflow

In information security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer’s boundary and overwrites adjacent memory locations.Buffers are areas of memory set aside to hold data, often while moving it from one section of a program to another, or between programs. Buffer overflows can often be triggered by malformed inputs; if one assumesRead More

Bounds Checking

In computer programming, bounds checking is any method of detecting whether a variable is within some bounds before it is used. It is usually used to ensure that a number fits into a given type (range checking), or that a variable being used as an array index is within the bounds of the array (index checking). A failed bounds check usually results in theRead More

Schema Crosswalk

A schema crosswalk is a table that shows equivalent elements (or “fields”) in more than one database schema. It maps the elements in one schema to the equivalent elements in another schema.Crosswalk tables are often employed within or in parallel to enterprise systems, especially when multiple systems are interfaced or when the system includes legacy system data. In the context ofRead More


The Metadata Object Description Schema (MODS) is an XML-based bibliographic description schema developed by the United StatesLibrary of Congress‘ Network Development and Standards Office. MODS was designed as a compromise between the complexity of the MARC format used by libraries and the extreme simplicity of Dublin Core metadata.The Library of Congress’ Network Development and MARC Standards Office, with interested experts, developed the MetadataRead More

Supercomputing Applications

NCSA The National Center for Supercomputing Applications (NCSA) is a state-federal partnership to develop and deploy national-scale cyberinfrastructure that advances research, science and engineering based in the United States of America. NCSA operates as a unit of the University of Illinois at Urbana–Champaign, and provides high-performance computing resources to researchers across the country. Support for NCSA comes from the National ScienceRead More

Man in the Middle

What is their ATTACK Vector In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. One example of man-in-the-middle attacks is active eavesdropping, in which the attacker makes independent connections with the victims and relays messages betweenRead More

HTTP Public Key Pinning

HTTP Public Key Pinning (HPKP) is an Internet security mechanism delivered via an HTTPheader which allows HTTPS websites to resist impersonation by attackers using mis-issued or otherwise fraudulent certificates. In order to do so, it delivers a set of public keys to the client (browser), which should be the only ones trusted for connections to this domain.For example, attackers might compromise a certificate authority, and then mis-issueRead More

Safe Place

“Family Connection is happy to welcome our new Safe Place site Cumberland Computer Services., LLC! It is located on Highway 31 across the street from the Pelham Walmart. Remember, Safe Place sites are here for young people who need immediate help and safety.”


Virus “First of all this PUP will slow down your computer. The Ads you see on your screen demand their share of system resources and also of your internet bandwidth. Whenever you load a page your CPU also has to download the data for the Ads and then display them. Needless to say this causesRead More

Browser Modifer

Maleware A browser modifier is a type of malware created for the sole purpose of hijacking and modifying a Web browser’s settings. Browser modifiers are installed when users inadvertently click pop-up messages without reading the content that explains how to cancel the pop-up.  This term is also known as a browser hijacker, although the latterRead More