Dr. Watson(Postmortem Debugger) Mini Dump Analysis using WinDBG

Size: px
Start display at page:

Download "Dr. Watson(Postmortem Debugger) Mini Dump Analysis using WinDBG"

Transcription

1 Dr. Watson(Postmortem Debugger) Mini Dump Analysis using WinDBG Debugging Steps using WinDBG 1) Open the.dmp file using WinDBG 2) Make sure your symbol server path is set correctly(file->symbol File Path), below is what I have set it to srv*c:\temp\symbols* 3) You should save the workspace to save your symbol path information unless you are using _NT_SYMBOL_PATH otherwise you will loose the information next time you start WinDBG. Remember to save it without opening a dump file to use it for the next debugging session 4) Run!analyze -v 5) 0:182>!analyze -v FAULTING_IP: kernel32!raiseexception+53 77e4bee7 5e pop esi EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff) ExceptionAddress: 77e4bee7 (kernel32!raiseexception+0x ) ExceptionCode: e0434f4d (CLR exception) ExceptionFlags: NumberParameters: 1 Parameter[0]: e DEFAULT_BUCKET_ID: CLR_EXCEPTION ERROR_CODE: (NTSTATUS) 0xe0434f4d - <Unable to get error code text> MANAGED_STACK:!dumpstack -EE OS Thread Id: 0xdd0 (182) TEB information is not available so a stack size of 0xFFFF is assumed Current frame: ChildEBP RetAddr Caller,Callee ADDITIONAL_DEBUG_TEXT: Followup set via attribute from Frame ffffffff on thread ffffffff FAULTING_THREAD: 00000dd0 PRIMARY_PROBLEM_CLASS: CLR_EXCEPTION BUGCHECK_STR: APPLICATION_FAULT_CLR_EXCEPTION LAST_CONTROL_TRANSFER: from 79f071ac to 77e4bee7 STACK_TEXT: 15d9f418 79f071ac e0434f4d kernel32!raiseexception+0x53 15d9f478 79f9293a 75c9cb mscorwks!raisetheexceptioninternalonly+0x2a8 15d9f4b0 7a00e74a 15d9f508 7a3c441c 9ae216b2 mscorwks!unwindandcontinuerethrowhelperaftercatch+0x70 15d9f a858c 0874cd af628 mscorwks!jit_newfast+0x105 15d9f578 79e7c74b d9f5e0 15d9f608 mscorlib_ni+0x2e858c 15d9f588 79e7c6cc d9f714 mscorwks!calldescrworker+0x33 15d9f608 79f00eca d9f714 mscorwks!calldescrworkerwithhandler+0xa3 15d9f628 79f00e d9f714 mscorwks!dispatchcallbody+0x1e 15d9f68c 79f00f d9f714 mscorwks!dispatchcalldebuggerwrapper+0x3d 15d9f6c0 79f d9f714 mscorwks!dispatchcallnoeh+0x51

2 15d9f720 79ef d9f870 7a3b57d mscorwks!addtimercallback_worker+0x79 15d9f734 79ef31a3 15d9f810 15d9f7bc 79f91478 mscorwks!thread::doadcallback+0x32a 15d9f7c8 79ef30c3 15d9f810 9ae21bee 7a3b57d8 mscorwks!thread::shouldchangeaborttounload+0xe3 15d9f804 79ef d9f mscorwks!thread::shouldchangeaborttounload+0x30a 15d9f82c 79ef48cf f d9f870 mscorwks!thread::shouldchangeaborttounload+0x33e 15d9f844 79f f d9f870 mscorwks!managedthreadbase::threadpool+0x13 15d9f88c 79f0288c 106bcc mscorwks!addtimercallbackex+0x83 15d9f8a0 79f bcc ae21b36 mscorwks!addtimercallback+0x10 15d9f8dc 79f024cf 2a023e70 9ae21ac2 79f02030 mscorwks!threadpoolmgr::asynctimercallbackcompletion+0x64 15d9f928 79f0202a e619d1 mscorwks! UnManagedPerAppDomainTPCount::DispatchWorkItem+0xb2 15d9f93c 79f021a0 9ae21a7e f0207d mscorwks!threadpoolmgr::executeworkrequest+0xaf 15d9f994 79f95a2e c81c5f0 15d9fa48 mscorwks!threadpoolmgr::workerthreadstart+0x223 15d9ffb8 77e f61d mscorwks!thread::intermediatethreadproc+0x49 15d9ffec f959e8 106f61d kernel32!basethreadstart+0x34 6) RaiseTheExceptionInternalOnly method signature is RaiseTheExceptionInternalOnly(OBJECTREF, BOOL, BOOL) 7) 2nd parameter evaluates to whether the exception is re-thrown and the 3 rd parameter tells you if this is a stack overflow exception but in this case both of them are false 8) ExceptionCode: e0434f4d (CLR exception) which applies to any unhandled CLR exception e.g DivideByZero 9) mini dump reports 1204 threads, as shown below 0:182> ~ 0 Id: Suspend: 1 Teb: 7ffdf000 Unfrozen 1 Id: 968.c34 Suspend: 1 Teb: 7ffde000 Unfrozen 2 Id: 968.8e0 Suspend: 1 Teb: 7ffdd000 Unfrozen 3 Id: 968.a90 Suspend: 1 Teb: 7ffdc000 Unfrozen Id: b0 Suspend: 1 Teb: 7fbd6000 Unfrozen 1201 Id: 968.1bc4 Suspend: 1 Teb: 7fae4000 Unfrozen 1202 Id: ac Suspend: 1 Teb: 7faba000 Unfrozen 1203 Id: 968.1b7c Suspend: 1 Teb: 7fab8000 Unfrozen More than 200 threads have the following stack trace 10) 0:182> ~*k 1201 Id: 968.1bc4 Suspend: 1 Teb: 7fae4000 Unfrozen ChildEBP RetAddr 7b22ebec 7c827d0b ntdll!kifastsystemcallret 7b22ebf0 77e61d1e ntdll!ntwaitforsingleobject+0xc 7b22ec60 79e789c6 kernel32!waitforsingleobjectex+0xac 7b22eca4 79e7898f mscorwks!peimage::loadimage+0x1af 7b22ecf4 79e78944 mscorwks!clrevent::waitex+0x117 7b22ed08 79fbc82a mscorwks!clrevent::wait+0x17 7b22ed1c 79fbc6da mscorwks!svr::gcheap::waituntilgccomplete+0x34 7b22ed58 79fc51bf mscorwks!thread::raredisablepreemptivegc+0x1a0 7b22ed8c 79fc529b mscorwks!thread::usersleep+0xb1 7b22ee2c 0deb1401 mscorwks!threadnative::sleep+0xce WARNING: Frame IP not in any known module. Following frames may be wrong. 7b22ef18 793b0d1f 0xdeb1401 7b22ef ab mscorlib_ni+0x2f0d1f 7b22ef30 79e7c74b mscorlib_ni+0x2b40ab 7b22ef40 79e7c6cc mscorwks!calldescrworker+0x33 7b22efc0 79e7c8e1 mscorwks!calldescrworkerwithhandler+0xa3 7b22f0fc 79e7c783 mscorwks!methoddesc::calldescr+0x19c 7b22f118 79e7c90d mscorwks!methoddesc::calltargetworker+0x1f 7b22f12c 79eb300f mscorwks!methoddesccallsite::call_retargslot+0x18

3 7b22f2f8 79eb2f31 mscorwks!executecodewithguaranteedcleanuphelper+0x9b 7b22f3a ff7 mscorwks!reflectioninvocation::executecodewithguaranteedcleanup+0xf9 11) There are 2 GC threads (2 and 3) since this process is running on Windows Server 2003 with 2 CPUs so one GC thread per CPU. 0:182> ~2 kb 00b7fd88 7c827d0b 77e61d1e e ntdll!kifastsystemcallret 00b7fd8c 77e61d1e e ntdll!ntwaitforsingleobject+0xc 00b7fdfc 79e789c e8 ffffffff kernel32!waitforsingleobjectex+0xac 00b7fe40 79e7898f e8 ffffffff mscorwks!peimage::loadimage+0x1af 00b7fe90 79e78944 ffffffff mscorwks!clrevent::waitex+0x117 00b7fea4 79efa6c3 ffffffff mscorwks!clrevent::wait+0x17 00b7fee8 79efb5b f mscorwks!svr::t_join::join+0xae 00b7ff28 79efa9ba f8 mscorwks!svr::gc_heap::mark_phase+0x16f 00b7ff54 79efaf60 ffffffff f8 mscorwks!svr::gc_heap::gc1+0x46 00b7ff74 79efa72f f8 mscorwks!svr::gc_heap::garbage_collect+0x246 00b7ff98 79fc fc e fc857c mscorwks!svr::gc_heap::gc_thread_function+0x6a 00b7ffb8 77e f mscorwks!svr::gc_heap::gc_thread_stub+0x92 00b7ffec fc f kernel32!basethreadstart+0x34 0:182> ~3 kb 00c7fc9c 79efd1d0 55b4de f8 mscorwks!svr::gc_heap::mark_object_simple1+0xdf 00c7fce4 79efba ffcc c94 mscorwks!svr::gc_heap::mark_object_simple+0x254 00c7fd10 79fbb49d 09063c ffcc mscorwks!svr::gcheap::promote+0x115 00c7fd28 79fc3a38 00c7fdd c mscorwks!gcenumobject+0x2d 00c7fd48 79fc39e fbb475 00c7fdd0 mscorwks!module::enumstaticgcrefs+0x59 00c7fd74 79fc3ada 79fbb475 00c7fdd ea8 mscorwks!domainassembly::enumstaticgcrefs+0x38 00c7fd98 79fc3a9b 79fbb475 00c7fdd0 2a03d8b0 mscorwks!appdomain::enumstaticgcrefs+0x29 00c7fdb4 79fc399b 79fbb475 00c7fdd0 79efba5a mscorwks!systemdomain::enumallstaticgcrefs+0x4e 00c7fddc 79efb mscorwks!cnamespace::gcscanroots+0x1a2 00c7fe28 79efa9ba d30 mscorwks!svr::gc_heap::mark_phase+0x111 00c7fe54 79efaf60 ffffffff d30 mscorwks!svr::gc_heap::gc1+0x46 00c7fe74 79efa72f d30 mscorwks!svr::gc_heap::garbage_collect+0x246 00c7fe98 79fc c8276bf 00c7fef8 mscorwks!svr::gc_heap::gc_thread_function+0x6a 00c7ffb8 77e d mscorwks!svr::gc_heap::gc_thread_stub+0x92 00c7ffec fc d kernel32!basethreadstart+0x34 12) Mark_Phase signature is mark_phase (int gen_number, BOOL mark_only_p parameters passed are 2, 0, that means GC was triggered for generation 2 13)Thread # 345 has triggered garbage collection for generation 2 with a request to allocate memory from GC Heap(see highleted in red) 0:182> ~345 kb e0bc 7c827d0b 77e61d1e ntdll!kifastsystemcallret 2484e0c0 77e61d1e ntdll!ntwaitforsingleobject+0xc 2484e130 79e789c ffffffff kernel32!waitforsingleobjectex+0xac 2484e174 79e7898f ffffffff mscorwks!peimage::loadimage+0x1af 2484e1c4 79e78944 ffffffff mscorwks!clrevent::waitex+0x e1d8 79efafc5 ffffffff mscorwks!clrevent::wait+0x e1fc 79efad3d ffffffff 71ca dd4 mscorwks!svr::gc_heap::wait_for_gc_done+0x e224 79fd1cf d30 mscorwks!svr::gcheap::garbagecollectgeneration+0x1b5 2484e2b4 79ef98cf 14fa94e c mscorwks!svr::gc_heap::try_allocate_more_space+0x e2d0 79ef9b9c 14fa94e c mscorwks!svr::gc_heap::allocate_more_space+0x2e 2484e2f0 79e7510e 14fa94e c mscorwks!svr::gcheap::alloc+0x e30c 79e c mscorwks!alloc+0x e34c 79e858cb abbf001a d8 mscorwks!fastallocateobject+0x38

4 2484e3f0 793ab e mscorwks!jit_newfast+0x9e 2484e aaef0 f1dcc000 ffffffbc mscorlib_ni+0x2eb e b0d1f 3a5a ab mscorlib_ni+0x2eaef0 2484e ab fa94a0 2484e640 mscorlib_ni+0x2f0d1f 2484e630 79e7c74b e6c0 mscorlib_ni+0x2b40ab 2484e640 79e7c6cc 2484e e6e0 mscorwks!calldescrworker+0x e6c0 79e7c8e1 2484e e6e0 mscorwks!calldescrworkerwithhandler+0xa3 2484e7fc 79e7c c01c0 2484e92c 2484e84c mscorwks!methoddesc::calldescr+0x19c 2484e818 79e7c90d 796c01c0 2484e92c 2484e84c mscorwks!methoddesc::calltargetworker+0x1f 2484e82c 79eb300f 2484e84c abbf0a12 14fa94a0 mscorwks!methoddesccallsite::call_retargslot+0x e9f8 79eb2f ea8c abbf mscorwks!executecodewithguaranteedcleanuphelper+0x9b 2484eaa ff7 2484ea4c c8 0109dd28 mscorwks! ReflectionInvocation::ExecuteCodeWithGuaranteedCleanup+0xf9 2484eac ede 4a34402c 2484eaf0 2484eb1c mscorlib_ni+0x2b3ff mscorlib_ni+0x2b3ede Analysis 1. Application has thrown exception at the top of stack 2. In CLR 2.0, unhandled exceptions at the top of the stack on any thread will terminate the application 3. Exception has occurred after GC was triggered 4. Mark Phase was triggered for Generation 2 that means it was under severe memory pressure 5. since there are more than 1200 threads that itself amounts to 1.2 GB of virtual memory for just the user mode stack and each thread has user mode plus kernel mode stack although not much but kernel stack will also add up to another 3 virtual pages(12kb) 1200*12KB of physical memory, kernel stack is physical memory resident. There will be around 100 MB or so in MEM_IMAGE itself 6. Since this exception has occurred while starting a worker thread from managed thread pool and at the same GC was also triggered. So that means there was not enough memory 7. There is no thread leak, these many threads are by design(one thread per request, I don't know why) 8. Some of the interesting points There are more than 200 threads with preemptive GC disabled what that means is these threads can't be suspended and GC Threads will have to wait for these threads to return to preemptive GC mode in order to claim the memory. Managed threads should not be in a state with preemptive GC disabled because this is very rare as interpreted from the call stack Thread::RareDisablePreemptiveGC Below is the description of Preemptive GC from Preemptive GC: also very important. In Rotor, this is m_fpreemptivegcdisabled field of C++ Thread class. It indicates what GC mode the thread is in: "enabled" in the table means the thread is in preemptive mode where GC could preempt this thread at any time; "disabled" means the thread is in cooperative mode where GC has to wait the thread to give up its current work (the work is related to GC objects so it can't allow GC to move the objects around). When the thread is executing managed code (the current IP is in managed code), it is always in cooperative mode; when the thread is in Execution Engine (unmanaged code), EE code could choose to stay in either mode and could switch mode at any time; when a thread are outside of CLR (e.g, calling into native code using interop), it is always in preemptive mode. CLR rotor source code has the following comments before calling Thread::RareDisablePreemptiveGC We must do the following in this order, because otherwise we would be constructing the exception for the abort

5 without synchronizing with the GC. Also, we have no CLR SEH set up, despite the fact that we may throw a ThreadAbortException. Most likely it crashed because of not having enough memory to start a worker thread since it crashed with the call stack pointing to WokerThreadStart The real challenge is how will you find out the exception detail for sure?how will you make sure that this is indeed a out of memory exception? Since this is a mini dump with no information on CLR Data structures. Effective managed debugging requires a mini dump with full virtual memory because managed heap is created with virtualalloc but Dr. Watson as a postmortem debugger with default options creates a minidump which includes all thread contexts and 10 instructions

Experiments in musical similarity.

Experiments in musical similarity. Experiments in musical similarity hamish.allan@gold.ac.uk What is musical similarity? Melodic Rhythmic Harmonic Timbral What is musical similarity? Chronological Artist Lyrical Cultural What is musical

More information

The cache is 4-way set associative, with 4-byte blocks, and 16 total lines

The cache is 4-way set associative, with 4-byte blocks, and 16 total lines Sample Problem 1 Assume the following memory setup: Virtual addresses are 20 bits wide Physical addresses are 15 bits wide The page size if 1KB (2 10 bytes) The TLB is 2-way set associative, with 8 total

More information

CIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1

CIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1 Version 1 Instructions Write your name on the exam paper. Write your name and version number on the top of the yellow paper. Answer Question 1 on the exam paper. Answer Questions 2-4 on the yellow paper.

More information

4. Specifications and Additional Information

4. Specifications and Additional Information 4. Specifications and Additional Information AGX52004-1.0 8B/10B Code This section provides information about the data and control codes for Arria GX devices. Code Notation The 8B/10B data and control

More information

CIS-331 Fall 2014 Exam 1 Name: Total of 109 Points Version 1

CIS-331 Fall 2014 Exam 1 Name: Total of 109 Points Version 1 Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. Router A Router B Router C Router D Network Next Hop Next Hop Next Hop Next

More information

CIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1

CIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1 Version 1 1. (20 Points) Given the class A network address 117.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 4,000 subnets? b. (5 Points) What is

More information

.NET Memory. Dump Analysis. Version 2.0. Dmitry Vostokov Software Diagnostics Services

.NET Memory. Dump Analysis. Version 2.0. Dmitry Vostokov Software Diagnostics Services .NET Memory Dump Analysis Version 2.0 Dmitry Vostokov Software Diagnostics Services WinDbg Commands Prerequisites We use these boxes to introduce some WinDbg commands used in practice exercises Basic.NET

More information

CIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1

CIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1 Version 1 1. (20 Points) Given the class A network address 119.0.0.0 will be divided into a maximum of 15,900 subnets. a. (5 Points) How many bits will be necessary to address the 15,900 subnets? b. (5

More information

CIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1

CIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1 Version 1 1. (20 Points) Given the class A network address 121.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 8,100 subnets? b. (5 Points) What is

More information

CIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1

CIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1 Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. NOTE: Router E should only be used for Internet traffic. Router A Router

More information

Transactions in Euclidean Geometry

Transactions in Euclidean Geometry Transactions in Euclidean Geometry Volume 207F Issue # 8 Table of Contents Title Author Regular Triangles Cameron Hertzler Regular Pentagon Cameron Hertzler Hemispheres and Right Angles Cameron Hertzler

More information

CIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1

CIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1 Version 1 Instructions 1. Write your name and version number on the top of the yellow paper and the routing tables sheet. 2. Answer Question 2 on the routing tables sheet. 3. Answer Questions 1, 3, 4,

More information

Cryptanalysis of the Dragonfly Key Exchange Protocol

Cryptanalysis of the Dragonfly Key Exchange Protocol Cryptanalysis of the Dragonfly Key Exchange Protocol Dylan Clarke, Feng Hao School of Computing Science Newcastle University {dylan.clarke, feng.hao}@ncl.ac.uk February 5, 2013 Abstract Dragonfly is a

More information

Custom Identity Confirmation Process

Custom Identity Confirmation Process Custom Identity Confirmation Process August 2017 Cvent, Inc 1765 Greensboro Station Place McLean, VA 22102 www.cvent.com Contents 1.0 Overview... 3 2.0 Client Setup... 4 3.0 WSDL... 5 3.1 Fields and Identifiers...

More information

CDR File Information. Comments Direct PCM

CDR File Information. Comments Direct PCM IMPORTANT NOTICE: Robert Bosch LLC and the manufacturers whose vehicles are accessible using the CDR System urge end users to use the latest production release of the Crash Data Retrieval system software

More information

B: Modbus Map and Retrieving Logs

B: Modbus Map and Retrieving Logs B: Modbus Map and Retrieving Logs B.: Introduction Communicator EXT User Manual B.: Modbus Register Map Sections B.3: Data Formats # B.4: Floating Point Values The formula to interpret a Floating Point

More information

CIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1

CIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1 Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present

More information

!"#$%!&'#()#*+,-. %/ %70/89

!#$%!&'#()#*+,-. %/ %70/89 !"$%!&'()*+,-. %/012345657%70/89 F90$(/'4(0).!!%+!&'()*+,-%% '!"$%M%!(4!3/ % 85H90>4>%C6L>4:%4%M+'$%'$(',*0$'4($*!, % 01L4%058N%0()3.(0'$(')*+$!,(-(.' *./0'$%'2.(-(+$'$(/'&.%/',!&$!+"'%&&'*))!4(+$*,,9'M(+'

More information

Public key cryptographic algorithm SM2 based on elliptic curves Part 2: Digital signature algorithm

Public key cryptographic algorithm SM2 based on elliptic curves Part 2: Digital signature algorithm Public key cryptographic algorithm SM2 based on elliptic curves Part 2: Digital signature algorithm Contents 1 Scope... 1 2 Normative references... 1 3 Terms and definitions... 1 3.1 message... 1 3.2 signed

More information

NOVEMBER 1994 ISSN THE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL CONTENTS IN THIS ISSUE:

NOVEMBER 1994 ISSN THE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL CONTENTS IN THIS ISSUE: ISSN 0956-9979 NOVEMBER 1994 THE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL IN THIS ISSUE: CONTENTS 2 VIRUS BULLETIN NOVEMBER 1994 EDITORIAL The More the Merrier VIRUS

More information

APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC

APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC This update to the AppleShare PC User's Guide discusses AppleShare PC support for the use of international character sets, paper sizes, and date

More information

CS 537: Introduction to Operating Systems Fall 2015: Midterm Exam #1

CS 537: Introduction to Operating Systems Fall 2015: Midterm Exam #1 CS 537: Introduction to Operating Systems Fall 2015: Midterm Exam #1 This exam is closed book, closed notes. All cell phones must be turned off. No calculators may be used. You have two hours to complete

More information

2. In general, dilations do not preserve distance so they are not rigid transformations. Dilations cause the size of the shape to change.

2. In general, dilations do not preserve distance so they are not rigid transformations. Dilations cause the size of the shape to change. 6.1 Dilations 1. To perform a dilation, draw rays starting at the center of dilation through each point. Move each point along the ray according to the scale factor. 2. In general, dilations do not preserve

More information

Orbit Corporation CISCO ASA LAN Based Active / Standby Failover. Waqas

Orbit Corporation CISCO ASA LAN Based Active / Standby Failover. Waqas Orbit Corporation CISCO ASA - 5520 LAN Based Active / Standby Failover Waqas 13 Cisco ASA LAN Based Active / Standby Failover Configuration Primary ASA Cli Configuration Changes Highlighted in Yellow for

More information

UNH-IOL MIPI Alliance Test Program

UNH-IOL MIPI Alliance Test Program DSI Receiver Protocol Conformance Test Report UNH-IOL 121 Technology Drive, Suite 2 Durham, NH 03824 +1-603-862-0090 mipilab@iol.unh.edu +1-603-862-0701 Engineer Name engineer@company.com Panel Company

More information

EDR Report Information

EDR Report Information EDR Report File Information Value VIN 5YJXCDE20HF041782 Retrieval Date 2017/06/30 02:16:00 (UTC) Retrieval User Comments Retrieval Program Information EDR Report Information Tesla EDR Reporting Service

More information

MC68705U3 Bootstrap ROM

MC68705U3 Bootstrap ROM MC68705U3 Bootstrap ROM ;This is a listing of the Bootstrap ROM which resides in Motorola's MC68705U3 single chip ;micros. Its sole purpose is to program its own EPROM by copying the data from an external

More information

Gateway Ascii Command Protocol

Gateway Ascii Command Protocol Gateway Ascii Command Protocol Table Of Contents Introduction....2 Ascii Commands.....3 Messages Received From The Gateway....3 Button Down Message.....3 Button Up Message....3 Button Maintain Message....4

More information

WinDbg: trivial examining of the stack

WinDbg: trivial examining of the stack WinDbg: trivial examining of the stack revision: 1 author: Alexandre Borges Hello readers, how are you? It has passed a long time since my last post. As I've explained previously, my time for writing is

More information

ECHO Process Instrumentation, Inc. Modbus RS485 Module. Operating Instructions. Version 1.0 June 2010

ECHO Process Instrumentation, Inc. Modbus RS485 Module. Operating Instructions. Version 1.0 June 2010 ECHO Process Instrumentation, Inc. Modbus RS485 Module Operating Instructions Version 1.0 June 2010 ECHO Process Instrumentation, Inc. PO Box 800 Shalimar, FL 32579 PH: 850-609-1300 FX: 850-651-4777 EM:

More information

BINARY LOAD AND PUNCH

BINARY LOAD AND PUNCH BINARY LOAD AND PUNCH To easily decrease the amount of time it takes to load a long tape (Cassette or paper) a BINARY formatting technique can be used instead of the conventional ASCII format used by the

More information

6.1 Font Types. Font Types

6.1 Font Types. Font Types 6 Font This chapter explains basic features of GP-Pro EX's "Font" and basic ways of placing text with each font. Please start by reading "6.1 Font Types" (page 6-2) and then turn to the corresponding page.

More information

C1098 JPEG Module User Manual

C1098 JPEG Module User Manual C1098 JPEG Module User Manual General Description C1098 is VGA camera module performs as a JPEG compressed still camera that can be attached to a wireless or PDA host. Users can send out a snapshot command

More information

Libero. Integrated Design Environment (IDE) Frequently Asked Questions

Libero. Integrated Design Environment (IDE) Frequently Asked Questions Libero Integrated Design Environment (IDE) Frequently Asked Questions Last update July 26, 2006 Actel Software/Tools Marketing 1 Table of Contents 1. LIBERO IDE EDITIONS AND COMPONENTS... 3 1.1. WHAT ARE

More information

ZN-DN312XE-M Quick User Guide

ZN-DN312XE-M Quick User Guide ZN-DN312XE-M Quick User Guide This manual provides instructions for quick installation and basic configuration of your IP device. Step1. Connect cables to IP device Connect required cables to the device

More information

COMPUTING SCIENCE. Cryptanalysis of the Dragonfly Key Exchange Protocol. Dylan Clarke and Feng Hao TECHNICAL REPORT SERIES

COMPUTING SCIENCE. Cryptanalysis of the Dragonfly Key Exchange Protocol. Dylan Clarke and Feng Hao TECHNICAL REPORT SERIES COMPUTING SCIENCE Cryptanalysis of the Dragonfly Key Exchange Protocol Dylan Clarke and Feng Hao TECHNICAL REPORT SERIES No. CS-TR-1370 February 2013 TECHNICAL REPORT SERIES No. CS-TR-1370 February, 2013

More information

Last name... You must show full analytical work to receive full credit, even on the multiple choice problems.

Last name... You must show full analytical work to receive full credit, even on the multiple choice problems. 2985F580-997C-41F9-BB84-A93984C5FD64 #1 1 of 24 Math 233, Final Exam, Spring 2018 May 3rd, 2018 Last name............................... First name.............................. UNC E-MAIL (ONYEN)................

More information

Revit s Project Base Point

Revit s Project Base Point Update your NLM! Revit s Project Base Point Autodesk Network License Manager (AdLM) FLEXnet Installation and Configuration Guide Single Server License Model Outline of installation and configuration actions:

More information

6.1 Combinational Circuits. George Boole ( ) Claude Shannon ( )

6.1 Combinational Circuits. George Boole ( ) Claude Shannon ( ) 6. Combinational Circuits George Boole (85 864) Claude Shannon (96 2) Signals and Wires Digital signals Binary (or logical ) values: or, on or off, high or low voltage Wires. Propagate digital signals

More information

Report for PowerInRoads PID 5752 Date 08_20_2015 Time_08_31_07AM 938 Secon

Report for PowerInRoads PID 5752 Date 08_20_2015 Time_08_31_07AM 938 Secon Page 1 of 13 Analysis Summary Type Description Recommendation Error In PowerInRoads PID 5752 Date 08_20_2015 Time_08_31_07AM 938 Second_Chance_Exception_C0000005.dmp the assembly instruction at Bentley.Civil.CadSystem.CadContext..ctor()+2f

More information

6. Specifications & Additional Information

6. Specifications & Additional Information 6. Specifications & Additional Information SIIGX52004-3.1 Transceier Blocks Table 6 1 shows the transceier blocks for Stratix II GX and Stratix GX deices and compares their features. Table 6 1. Stratix

More information

July Registration of a Cyrillic Character Set. Status of this Memo

July Registration of a Cyrillic Character Set. Status of this Memo Network Working Group Request for Comments: 1489 A. Chernov RELCOM Development Team July 1993 Status of this Memo Registration of a Cyrillic Character Set This memo provides information for the Internet

More information

COMOS. Lifecycle FLEXnet License Installation and Management. Security information 1. Notices 2. License types 3. Get the HostID 4.

COMOS. Lifecycle FLEXnet License Installation and Management. Security information 1. Notices 2. License types 3. Get the HostID 4. Security information 1 Notices 2 COMOS Lifecycle FLEXnet License Installation and Management Operating Manual License types 3 Get the HostID 4 Licenses Files 5 Installing the License Server 6 License Installation

More information

Day 6: Triangle Congruence, Correspondence and Styles of Proof HOMEWORK

Day 6: Triangle Congruence, Correspondence and Styles of Proof HOMEWORK Day 6: Triangle Congruence, Correspondence and Styles of Proof HOMEWORK 1. If AB DE and ABC DEF as shown in the diagram, what additional information would make the triangles congruent using only SAS SAS

More information

CS 537: Introduction to Operating Systems Fall 2016: Midterm Exam #1. All cell phones must be turned off and put away.

CS 537: Introduction to Operating Systems Fall 2016: Midterm Exam #1. All cell phones must be turned off and put away. CS 537: Introduction to Operating Systems Fall 2016: Midterm Exam #1 This exam is closed book, closed notes. All cell phones must be turned off and put away. No calculators may be used. You have two hours

More information

TEST DVD-VIDEO/ DVD-ROM For Checking DVD Players, DVD Recorders and DVD Drives TDH-940

TEST DVD-VIDEO/ DVD-ROM For Checking DVD Players, DVD Recorders and DVD Drives TDH-940 TEST DVD-VIDEO/ DVD-ROM For Checking DVD Players, DVD Recorders and DVD Drives TDH-940 Product Introduction. Purpose of use, Features TDH-940 is a Test Disc designed for confirmation of operation of DVD

More information

SEC X.2: Recommended Elliptic Curve Domain Parameters

SEC X.2: Recommended Elliptic Curve Domain Parameters STANDARS FOR EFFICIENT CRYPTOGRAPHY SEC X.2: Recommended Elliptic Curve Domain Parameters Nippon Telephone and Telegraph Corporation Contact: Kazumaro Aoki, Tetsutaro Kobayashi, and Akira Nagai (publickey@lab.ntt.co.jp)

More information

"Files and Exchange" Report

Files and Exchange Report David Johnson Subject: FW: Files and Exchange : Sent: Tuesday, 23 October 2012 12:10 AM To: sonic Subject: Files and Exchange : "Files and Exchange" Report Backup to: External hard drive Date: Tuesday,

More information

Hash Constant C Determinants leading to collisionfree

Hash Constant C Determinants leading to collisionfree Hash Constant C Determinants leading to collisionfree (Ernst Erich Schnoor) eschnoor@multi-matrix.de Addendum to article: Core of the CypherMatrix Method http://www.telecypher.net/corecyph.htm#z6 Object

More information

VT Advantage System Crashes on the Install PC

VT Advantage System Crashes on the Install PC VT Advantage System Crashes on the Install PC Document ID: 50842 Contents Introduction Prerequisites Requirements Components Used Conventions Set up Your PC to Capture a System Crash Use the Microsoft

More information

First Data EMV Test Card Set. Version 1.30

First Data EMV Test Card Set. Version 1.30 First Data EMV Test Card Set.30 January, 2018 Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available from industry

More information

Acquirer JCB EMV Test Card Set

Acquirer JCB EMV Test Card Set Acquirer JCB EMV Test Card Set July, 2017 Powered by Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available

More information

; Once Initialized, monitor character in calls to CN05 ; set carry for input, to be tested CN35 C SEC

; Once Initialized, monitor character in calls to CN05 ; set carry for input, to be tested CN35 C SEC // // Serialcode.s // 256 Byte Prom P8 and 512 Byte PROM P9A (second version) for Apple II Serial Card // P9A differs from P9 by adding RTS/ACK software flow control to output and // by removing batch

More information

CS 537: Introduction to Operating Systems (Summer 2017) University of Wisconsin-Madison Department of Computer Sciences.

CS 537: Introduction to Operating Systems (Summer 2017) University of Wisconsin-Madison Department of Computer Sciences. CS 537: Introduction to Operating Systems (Summer 2017) University of Wisconsin-Madison Department of Computer Sciences Midterm Exam 2 July 21 st, 2017 3 pm - 5 pm There are sixteen (16) total numbered

More information

First Data EMV Test Card Set. Version 2.00

First Data EMV Test Card Set. Version 2.00 First Data EMV Test Card Set.00 February, 2018 Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available from industry

More information

Linux Howtos. Fedora 9 Install (114) CIS Fall Fedora 9 Install (114) Fedora 9 installation with custom partitions.

Linux Howtos. Fedora 9 Install (114) CIS Fall Fedora 9 Install (114) Fedora 9 installation with custom partitions. Linux Howtos Fedora 9 Install (114) CIS 191 - Fall 2008 Fedora 9 Install (114) Fedora 9 installation with custom partitions. Requirements: Fedora 9 DVD ISO files http://iso.linuxquestions.org/ VMWare Server

More information

DBK24. Isolated Digital Output Chassis. Overview

DBK24. Isolated Digital Output Chassis. Overview DBK24 Isolated Digital Output Chassis Overview 1 Power Requirements 2 Hardware Setup 2 Card Connection 2 Card Configuration 3 DaqBook and DaqBoard Connection 4 DaqBoard/2000 Series Board Connection 5 DaqBook

More information

21/02/2012. BIOS and boot process Storage devices Partitions. CSN08101 Digital Forensics Lecture 5A: PC Boot Sequence and Storage Devices.

21/02/2012. BIOS and boot process Storage devices Partitions. CSN08101 Digital Forensics Lecture 5A: PC Boot Sequence and Storage Devices. CSN08101 Digital Forensics Lecture 5A: PC Boot Sequence and Storage Devices Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Objectives BIOS and boot process Storage devices Partitions Computer

More information

Systems/DBG Debugger Version 2.20

Systems/DBG Debugger Version 2.20 Systems/DBG Debugger Version 2.20 Copyright c 2018, Dignus, LLC Systems/DBG Debugger Version 2.20 i Copyright c 2018 Dignus LLC, 8378 Six Forks Road Suite 203, Raleigh NC, 27615. World rights reserved.

More information

StarVault Cloud Backup PRO v7 Microsoft Hyper-V Guest Virtual Machine Backup & Restore

StarVault Cloud Backup PRO v7 Microsoft Hyper-V Guest Virtual Machine Backup & Restore StarVault Cloud Backup PRO v7 Microsoft Hyper-V Guest Virtual Machine Backup & Restore StarVault Systems Corporation Limited 15 September 2016 www.starvault.com Table of Contents 1 Requirements and Recommendations...

More information

isource+ RS-232 Capabilities AppNote

isource+ RS-232 Capabilities AppNote isource+ RS-232 Capabilities AppNote Revised 19 April 2004 Setting & Using the RS-232 Capabilities of Different Rubidium Models CONTENTS 1. RS-232 CONNECTION TYPES... 2 1.1 Pin Layout of Different Rubidium

More information

RSA SecurID Authentication for AnyConnect Clients on a Cisco IOS Headend Configuration Example

RSA SecurID Authentication for AnyConnect Clients on a Cisco IOS Headend Configuration Example RSA SecurID Authentication for AnyConnect Clients on a Cisco IOS Headend Configuration Example Document ID: 118778 Contributed by Atri Basu, Cisco TAC Engineer, and Vasavi Yellampalli, Cisco Engineering.

More information

Hunting Zero Days in Crash Dumps. hotwing

Hunting Zero Days in Crash Dumps. hotwing Hunting Zero Days in Crash Dumps hotwing /usr/bin/whoami D923AE0C-190D-4EDF-B07A-76AC571FBFD4 SCSKEX.cab filever /v SCSKEX.ocx --a-- W32i DLL ENU 4.0.31.7 shp 858,832 scskex.ocx Language 0x0409 (English

More information

One subset of FEAL, called FEAL-NX, is N round FEAL using a 128-bit key without key parity.

One subset of FEAL, called FEAL-NX, is N round FEAL using a 128-bit key without key parity. FEAL-NX SPECIFICATIONS 1 Introduction 1.1 Outline of the FEAL-NX cipher FEAL, the Fast Data Encipherment Algorithm, is a 64-bit block cipher algorithm that enciphers 64-bit plaintexts into 64-bit ciphertexts

More information

Autodesk AutoCAD DWG-AC1021 Heap Corruption

Autodesk AutoCAD DWG-AC1021 Heap Corruption security research Autodesk AutoCAD DWG-AC1021 Heap Corruption Mar 2013 AutoCAD is a software for computer-aided design (CAD) and technical drawing in 2D/3D, being one of the worlds leading CAD design tools.

More information

' ' +*% %( ', ' )- ' ' ' '* % % ). (( % +* * ( % /0.' * % ' %, * % '' '' ().' * %% *( ( )

' ' +*% %( ', ' )- ' ' ' '* % % ). (( % +* * ( % /0.' * % ' %, * % '' '' ().' * %% *( ( ) ! "# $ #%&& ! "# ' (( % '' ) %* ' ' +*% %( ', ' )- ' ' ' '* % % ). (( % +* * ( % /0.' * % ' % ' '''' ') %%(' '*', * % '' '' ().' * %% *( ( ) 12''*%% '*32*4#(*3'' -5))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

More information

Triple DES and AES 192/256 Implementation Notes

Triple DES and AES 192/256 Implementation Notes Triple DES and AES 192/256 Implementation Notes Sample Password-to-Key and KeyChange results of Triple DES and AES 192/256 implementation For InterWorking Labs customers who require detailed information

More information

Register Map: Ecoflair Indirect Air Economizer

Register Map: Ecoflair Indirect Air Economizer Register Map: Ecoflair Indirect Air Economizer Notes: 1. 16-bit registers (INT16, UINT16, ENUM) are transmitted MSB first (i.e., big-endian). 2. INT32 and UINT32 are most-significant word in n+0, least

More information

First Data Dual Interface EMV Test Card Set. Version 1.20

First Data Dual Interface EMV Test Card Set. Version 1.20 First Data Dual Interface EMV Test Card Set August, 2016 Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available

More information

PCL ISO 8859/5 Latin/Cyrillic

PCL ISO 8859/5 Latin/Cyrillic Page 1 of 5 PCL Symbol Se t: 10N Unicode gly ph correspondence tables. Contact:help@redtitan.com http://pcl.to $20 U0020 Space -- -- -- -- $21 U0021 Ê Exclamation mark -- -- -- -- $22 U0022 Ë Quotation

More information

OpenSSL s Implementation of Infinite Garble Extension Version 0.1. Ben Laurie

OpenSSL s Implementation of Infinite Garble Extension Version 0.1. Ben Laurie OpenSSL s Implementation of Infinite Garble Extension Version 0.1 Ben Laurie (ben@links.org) August 30, 2006 1 Introduction Infinite Garble Extension (IGE) is a block cipher mode[1]. It has the property

More information

Acquirer JCB Dual Interface EMV Test Card Set

Acquirer JCB Dual Interface EMV Test Card Set Acquirer JCB Dual Interface EMV Test Card Set.00 July, 2018 Powered by Disclaimer Information provided in this document describes capabilities available at the time of developing and delivering this document

More information

Digital Lighting Systems, Inc.

Digital Lighting Systems, Inc. Digital Lighting Systems, Inc. Four Channel Dry Contacts Relays Switch Pack DMX512 compatible USER'S MANUAL -UM User's Manual - Page 1 GENERAL DESCRIPTION The is a 4-channel DMX-512 compatible electro-mechanical

More information

Programming Book for 6809 Microprocessor Kit

Programming Book for 6809 Microprocessor Kit Programming Book for 6809 Microprocessor Kit Wichit Sirichote, wichit.sirichote@gmail.com Image By Konstantin Lanzet - CPU collection Konstantin Lanzet, CC BY-SA 3.0, Rev1.2 March 2018 1 Contents Lab 1

More information

Internet Engineering Task Force (IETF) Category: Standards Track. January 2016

Internet Engineering Task Force (IETF) Category: Standards Track. January 2016 Internet Engineering Task Force (IETF) Request for Comments: 7670 Updates: 7296 Category: Standards Track ISSN: 2070-1721 T. Kivinen INSIDE Secure P. Wouters Red Hat H. Tschofenig January 2016 Generic

More information

ENGI 8868/9877 Computer and Communications Security III. BLOCK CIPHERS. Symmetric Key Cryptography. insecure channel

ENGI 8868/9877 Computer and Communications Security III. BLOCK CIPHERS. Symmetric Key Cryptography. insecure channel (a) Introduction - recall symmetric key cipher: III. BLOCK CIPHERS k Symmetric Key Cryptography k x e k y yʹ d k xʹ insecure channel Symmetric Key Ciphers same key used for encryption and decryption two

More information

Scan Results - ( Essentials - Onsharp )

Scan Results -   ( Essentials - Onsharp ) Scan Results - www.onsharp.com ( Essentials - Onsharp ) Overview Open Ports (18) Scan ID: 7675527 Target: www.onsharp.com Max Score: 2.6 Compliance: Passing PCI compliance, Expires undefined Profile: 15

More information

Master Tutorial for "third party" theme

Master Tutorial for third party theme Master Tutorial for "third party" theme We are not talking about changing the wallpapers, changing the taskbar color, saving it and calling it "custom theme"; its about how to create excellent looking

More information

Here is a C function that will print a selected block of bytes from such a memory block, using an array-based view of the necessary logic:

Here is a C function that will print a selected block of bytes from such a memory block, using an array-based view of the necessary logic: Pointer Manipulations Pointer Casts and Data Accesses Viewing Memory The contents of a block of memory may be viewed as a collection of hex nybbles indicating the contents of the byte in the memory region;

More information

Autodesk, Backburner, FBX, Maya, MotionBuilder, Mudbox, Softimage, and 3ds Max are registered trademarks or trademarks of Autodesk, Inc.

Autodesk, Backburner, FBX, Maya, MotionBuilder, Mudbox, Softimage, and 3ds Max are registered trademarks or trademarks of Autodesk, Inc. 2012 Autodesk, Backburner, FBX, Maya, MotionBuilder, Mudbox, Softimage, and 3ds Max are registered trademarks or trademarks of Autodesk, Inc., and/or its subsidiaries and/or affiliates in the USA and/or

More information

ETSI TS V ( )

ETSI TS V ( ) TS 135 233 V12.1.0 (2014-10) TECHNICAL SPECIFICATION Universal Mobile Telecommunications System (UMTS); LTE; Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication

More information

MIDI-Scope. Artistic Licence Engineering Ltd. Software Version V1.3 Manual Revision V1.91

MIDI-Scope. Artistic Licence Engineering Ltd. Software Version V1.3 Manual Revision V1.91 MIDI-Scope Artistic Licence Engineering Ltd Software Version V1.3 Manual Revision V1.91 Product Registration Form Product: MIDI-Scope Version No. Serial No. Date Purchased: Supplier: Name: Company Name:

More information

Data Protector 10.x VSS Integration Support Matrix

Data Protector 10.x VSS Integration Support Matrix Data Protector 0.x VSS Integration Support Matrix Version:.4 Date: September 08 Volume Shadow Copy Service (VSS) is a software service introduced by Microsoft in 003. Data Protector Integration with Volume

More information

CS 537: Introduction to Operating Systems Fall 2015: Midterm Exam #1

CS 537: Introduction to Operating Systems Fall 2015: Midterm Exam #1 CS 537: Introduction to Operating Systems Fall 2015: Midterm Exam #1 This exam is closed book, closed notes. All cell phones must be turned off. No calculators may be used. You have two hours to complete

More information

Digital Lighting Systems, Inc. CD400-DMX DMX512 Four Channel Dimmer and Switch module

Digital Lighting Systems, Inc. CD400-DMX DMX512 Four Channel Dimmer and Switch module , Inc. DMX512 Four Channel Dimmer and Switch module Input: 5 Amps @ 6-24 VDC Outputs: 5 Amps Maximum each, total 4 outputs 8 Amps Maximum. FRONT BACK USER'S MANUAL -UM User's Manual - Page 1 GENERAL DESCRIPTION

More information

Fundamentals of Cryptography

Fundamentals of Cryptography Fundamentals of Cryptography Topics in Quantum-Safe Cryptography June 23, 2016 Part III Data Encryption Standard The Feistel network design m m 0 m 1 f k 1 1 m m 1 2 f k 2 2 DES uses a Feistel network

More information

BACKUP APP V7 MICROSOFT EXCHANGE DATABASE BACKUP AND RESTORE GUIDE

BACKUP APP V7 MICROSOFT EXCHANGE DATABASE BACKUP AND RESTORE GUIDE V7 MICROSOFT EXCHANGE DATABASE BACKUP AND RESTORE GUIDE Revision History Date Descriptions Type of modification 15 July 2016 First Draft New 3 February 2017 Added instructions and screen shots for Encryption

More information

First Data DCC Test Card Set. Version 1.30

First Data DCC Test Card Set. Version 1.30 First Data DCC Test Card Set.30 April, 2018 Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available from industry

More information

Inspiron 22. Setup and Specifications Series. Computer Model: Inspiron Regulatory Model: W17B Regulatory Type: W17B001

Inspiron 22. Setup and Specifications Series. Computer Model: Inspiron Regulatory Model: W17B Regulatory Type: W17B001 Inspiron 22 3000 Series Setup and Specifications Computer Model: Inspiron 22-3265 Regulatory Model: W17B Regulatory Type: W17B001 Notes, cautions, and warnings NOTE: A NOTE indicates important information

More information

Request for Comments: May More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE)

Request for Comments: May More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE) Network Working Group Request for Comments: 3526 Category: Standards Track T. Kivinen M. Kojo SSH Communications Security May 2003 More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key

More information

Enhanced Play Fair Cipher

Enhanced Play Fair Cipher P Enhanced Play Fair Cipher 1 1 Naveen KMP P, PDepartment of Information Technology, Velammal Engineering College, Chennai, Tamil Nadu, India. Abstract The theme of this research work is to design and

More information

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012 CMSC 33 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 2, FALL 22 TOPICS TODAY Bits of Memory Data formats for negative numbers Modulo arithmetic & two s complement Floating point formats

More information

Chapter 13, Sequence Data Mining

Chapter 13, Sequence Data Mining CSI 4352, Introduction to Data Mining Chapter 13, Sequence Data Mining Young-Rae Cho Associate Professor Department of Computer Science Baylor University Topics Single Sequence Mining Frequent sequence

More information

Workgroup Bridges with PEAP Authentication Configuration Example

Workgroup Bridges with PEAP Authentication Configuration Example Workgroup Bridges with PEAP Authentication Configuration Example Document ID: 115736 Contributed by Surendra BG, Jeal Jimenez, and Carlos Leiton, Cisco TAC Engineers. Jan 14, 2013 Contents Introduction

More information

PCL Greek-8 - Code Page 869

PCL Greek-8 - Code Page 869 PCL Greek-8 - Code Page 869 Page 1 of 5 PCL Symbol Se t: 8G Unicode glyph correspondence tables. Contact:help@redtitan.com http://pcl.to $20 U0020 Space $90 U038A Ê Greek capita l letter iota with tonos

More information

ME 4447 / ME 6405: Introduction to Mechatronics

ME 4447 / ME 6405: Introduction to Mechatronics ME 4447 / ME 6405: Introduction to Mechatronics Interrupts and Resets Rohan Bansal Edward Chyau Anirudh Rudraraju Interrupts and Resets 1 Telephone Analogy How do we know if someone is calling? Use polling

More information

NOTE: ESCAPE is not always being checked for when the Monitor is performing a selected function,

NOTE: ESCAPE is not always being checked for when the Monitor is performing a selected function, Last Updated: December 21, 2018 VIP2K Monitor Program Ver. 1.4 NOTE: RCA Basic 3 by Ron Cenker Copyright 1981 NOTE: The VIP2K Membership Card Kit by Lee Hart, Copyright 2018 NOTE: VIP2K Monitor Program

More information

SPAREPARTSCATALOG: CONNECTORS SPARE CONNECTORS KTM ART.-NR.: 3CM EN

SPAREPARTSCATALOG: CONNECTORS SPARE CONNECTORS KTM ART.-NR.: 3CM EN SPAREPARTSCATALOG: CONNECTORS ART.-NR.: 3CM3208201EN CONTENT SPARE CONNECTORS AA-AN SPARE CONNECTORS AO-BC SPARE CONNECTORS BD-BQ SPARE CONNECTORS BR-CD 3 4 5 6 SPARE CONNECTORS CE-CR SPARE CONNECTORS

More information

KNX TinySerial 810. Communication Protocol. WEINZIERL ENGINEERING GmbH

KNX TinySerial 810. Communication Protocol. WEINZIERL ENGINEERING GmbH WEINZIERL ENGINEERING GmbH KNX TinySerial 810 Communication Protocol WEINZIERL ENGINEERING GmbH Bahnhofstr. 6 DE-84558 Tyrlaching GERMAY Tel. +49 8623 / 987 98-03 Fax +49 8623 / 987 98-09 E-Mail: info@weinzierl.de

More information

Peter Van Eeckhoutte s Blog

Peter Van Eeckhoutte s Blog http://www.corelan.be:88 - Page 1 / 25 Peter Van Eeckhoutte s Blog :: [Knowledge is not an object, it s a flow] :: Exploit writing tutorial part 3 : SEH Based Exploits Peter Van Eeckhoutte Saturday, July

More information