Search Results

Search found 2051 results on 83 pages for 'neural networks'.

Page 31/83 | < Previous Page | 27 28 29 30 31 32 33 34 35 36 37 38  | Next Page >

  • Reality behind wireless security - the weakness of encrypting

    - by Cawas
    I welcome better key-wording here, both on tags and title, and I'll add more links as soon as possible. For some years I'm trying to conceive a wireless environment that I'd setup anywhere and advise for everyone, including from big enterprises to small home networks of 1 machine. I've always had the feeling using any kind of the so called "wireless security" methods is actually a bad design. I'm talking mostly about encrypting and pass-phrasing (which are actually two different concepts), since I won't even considering hiding SSID and mac filtering. I understand it's a natural way of thinking. With cable networking nobody can access the network unless they have access to the physical cable, so you're "secure" in the physical way. In a way, encrypting is for wireless what walling (building walls) is for the cables. And giving pass-phrases is adding a door with a key. But the cabling without encryption is also insecure. Someone just need to plugin and get your data! And while I can see the use for encrypting data, I don't think it's a security measure in wireless networks. As I said elsewhere, I believe we should encrypt only sensitive data regardless of wires. And passwords should be added to the users, always, not to wifi. For securing files, truly, best solution is backup. Sure all that doesn't happen that often, but I won't consider the most situations where people just don't care. I think there are enough situations where people actually care on using passwords on their OS users, so let's go with that in mind. For being able to break the walls or the door someone will need proper equipment such as a hammer or a master key of some kind. Same is true for breaking the wireless walls in the analogy. But, I'd say true data security is at another place. I keep promoting the Fonera concept as an instance. It opens up a free wifi port, if you choose so, and anyone can connect to the internet through that, without having any access to your LAN. It also uses a QoS which will never let your bandwidth drop from that public usage. That's security, and it's open. And who doesn't want to be able to use internet freely anywhere you can find wifi spots? I have 3G myself, but that's beyond the point here. If I have a wifi at home I want to let people freely use it for internet as to not be an hypocrite and even guests can easily access my files, just for reading access, so I don't need to keep setting up encryption and pass-phrases that are not whole compatible. I'll probably be bashed for promoting the non-usage of WPA 2 with AES or whatever, but I wanted to know from more experienced (super) users out there: what do you think? Is there really a need for encryption to have true wireless security?

    Read the article

  • Adaboost algorithm and its usage in face detection

    - by Hani
    I am trying to understand Adaboost algorithm but i have some troubles. After reading about Adaboost i realized that it is a classification algorithm(somehow like neural network). But i could not know how the weak classifiers are chosen (i think they are haar-like features for face detection) and how finally the H result which is the final strong classifier can be used. I mean if i found the alpha values and compute the H ,how am i going to benefit from it as a value (one or zero) for new images. Please is there an example describes it in a perfect way? i found the plus and minus example that is found in most adaboost tutorials but i did not know how exactly hi is chosen and how to adopt the same concept on face detection. I read many papers and i had many ideas but until now my ideas are not well arranged. Thanks....

    Read the article

  • Design for a machine learning artificial intelligence framework (community wiki)

    - by Lirik
    This is a community wiki which aims to provide a good design for a machine learning/artificial intelligence framework (ML/AI framework). Please contribute to the design of a language-agnostic framework which would allow multiple ML/AI algorithms to be plugged into a single framework which: runs the algorithms with a user-specified data set. facilitates learning, qualification, and classification. allows users to easily plug in new algorithms. can aggregate or create an ensemble of the existing algorithms. can save/load the progress of the algorithm (i.e. save the network and weights of a neural network, save the tree of a decision tree, etc.). What is a good design for this sort of ML/AI framework?

    Read the article

  • Help with router and spotty wireless...

    - by Moshe
    Time Warner Cable/ Road Runner router shows up some times on the network list on Mac OS X 10.6.3 Snow Leopard. It makes a spotty appearence on the list. The router is a SMC Networks Model # SMC8014WG-SI. The default gateway numbers all do not work. 192.168.0.1 192.168.1.1 192.168.2.1 10.10.10.1 What IP adress am I looking for here to log in to the router to fix the issue?

    Read the article

  • Setup VPN access on a windows dedicated server for browsing

    - by Pasta
    I have a dedicated windows server. I want to create a VPN to encrypt my traffic (browsing, IM, etc) as I browse on my laptop using public wifi networks. What keywords should I be using to search Google? Are there any resources that help me do this? Most of the solutions are just to encrypt communication between the server to a machine. It does not act like an internet gateway, etc.

    Read the article

  • Block all but http traffic on a network interface

    - by Oli
    I've got two network interfaces on an Ubuntu machine which go out to two different networks but both have internet gateways. I need to limit it so that any outgoing http requests it makes (ie through wget) only go through eth0 and all other traffic goes through eth1. I dare say the solution might have something to do with iptables but I've no experience with it so would appreciate all help.

    Read the article

  • VMware Server 2.0.2 and Firefox 3.6 RC1

    - by Mads
    Hi, it seems that VMware Server 2.0.2 and Firefox 3.6 RC1 don't like each other. I have a reproducible problem on different networks, each with same software configuration (FF3.6 RC1 and VMware Server 2.0.2 on Ubuntu 8.04.3 LTS 64bit). The login screen doesn't show up and the Firefox remarks and non loadable page. It cannot load the page at all. The redirect is done (from http://:8222 to https://:8333 ) Maybe someone can help?

    Read the article

  • TCP/IP networking working as expected, but can't access Windows Shares

    - by Pablo Santa Cruz
    I am trying to fix a Windows 7 Pro SP1 (32 bits) computer. I have a weird problem. It was working fine until two days ago (didn't do anything weird in that day), and suddenly windows network (accessing to Windows Shares, sharing my printer) stopped working. TCP/IP networks words without issues, since I can IM, use the WebBrowser, check my email, you name it. Any ideas on how could I attempt to fix this?

    Read the article

  • No option to connect to wireless network

    - by Casebash
    I don't have any option to connect to wireless. It just doesn't appear in the taskbar at all - even the no wireless networks were found doesn't appear. In network connections, I only have the option of using a wired connection. According to device manager, I have a working VIA Rhine II Fast Ethernet Adapter (this device only appeared after I selected showing hidden devices). I have already attempted restarting the computer a few times. Does anyone have any suggestions?

    Read the article

  • Algorithm on trajectory analysis.

    - by Arman
    Hello, I would like to analyse the trajectory data based on given templates. I need to stack the similar trajectories together. The data is a set of coordinates xy,xy,xy and the templates are again the lines defined by the set of control points. I don't know to what direction to go, maybe to Neural Networks or pattern recognition? Could you please advace me page, book or library to start with? kind regards Arman. PS. Is it the right place to ask the question?

    Read the article

  • Setting up my own VPN or SSH server

    - by confusedWorker
    http://lifehacker.com/#!237227/geek-to-live--encrypt-your-web-browsing-session-with-an-ssh-socks-proxy http://ca.lifehacker.com/5763170/how-to-secure-and-encrypt-your-web-browsing-on-public-networks-with-hamachi-and-privoxy If I set up my own VPN or similar server on my always on computer at home, they say I could access gmail from my work computer. My question is, will the IT guys at work be able to notice something strange is going on if I'm on gchat at work through one of these things? (by IT guys I mean the two guys in charge of our network at work - its a small company)

    Read the article

  • Windows 7 - Sharing a connection through WiFi?

    - by RadiantHex
    Hi folks, I have a PC with Win7 and an iPod touch. Win7 is connected to the internet through a 3G dongle, I have set up an Ad Hoc wifi network and ticked "Allow other network users to connect through this computer's Internet connection". I have connected to both networks, but I'm getting "No Internet access" as access type for the Ad Hoc connection. Any ideas?

    Read the article

  • NetworkManager applet looks like it can't see network

    - by amorfis
    My system is Ubuntu 9.04. There is NetworkManager applet, but it looks like there are no networks. When I click it, there is disabled menu "Wired Network/device not managed". I have working eth0 interface, internet is working fine and I can see eth0 in ifconfig When I right-click and choose "Edit connections", there is only "Auto vboxnet0" under "Wired" tab. No "eth0". It shouldn't be a problem, but I cannot connect to VPN because of this :(

    Read the article

  • OS X 10.6 won't automatically connect to wireless even though remember network is checked

    - by Hendy
    Upgraded to 10.6 recently. 10.5 would connect to my home network whenever I was home. 10.6 constantly pops up the network selection dialog and asks me what network I want to join. I click my home network and the password is already entered (so it "remembers" the network). "Remember network" is checked... but it does it every time. How do I get 10.6 to connect to networks automatically whenever it sees them?

    Read the article

  • Display wireless channels currently in use

    - by DrStalker
    Is there any windows utility to display the wireless channels are currently in use by the available wireless networks? I'd like to be able to see what existing channels are using so I can try to minimize interference on a new access point without a lot of trial and error.

    Read the article

  • Which web services should be integrated?

    - by Adam Matan
    Mail + Social networking? One identity for all sites? Integration between all social networks and IM services? Which web services should be integrated in the future, and why? Edit: Clarification: By "integrating", I mean that two or more services should be seamlessly connected, and that connection would benefit the user. Foe example, I would really like to have an IM application that would support many accounts on many IM providers (And IMHO, Pidgin's not ready yet).

    Read the article

  • Cygwin offline installer?

    - by ripper234
    I hate downloading cygwin, several times I tried to download it from several different computers/networks, and many times it got stuck mid-transfer. Where can I find a reliable offline installer?

    Read the article

  • Plink/Putty fail on return

    - by jasemccarty
    Any one have any idea why a remote command to a NetApp filer would fail when using Plink/Putty (to execute a command) across 2 networks? Everything is open both ways (multiple firewalls), but the filer seems to be responding from port 22 to some random port. So my Windows box on the other side doesn't know to answer because the target port isn't 22. Any thoughts?

    Read the article

< Previous Page | 27 28 29 30 31 32 33 34 35 36 37 38  | Next Page >