National Library of Energy BETA

Sample records for file upload vulnerability

  1. U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

  2. V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 3: ownCloud Cross-Site Scripting and File Upload Vulnerabilities V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities November 26, 2012 - 2:00am Addthis PROBLEM: ownCloud Cross-Site Scripting and File Upload Vulnerabilities PLATFORM: ownCloud 4.5.2, 4.5.1, 4.0.9 ABSTRACT: Multiple vulnerabilities have been reported in ownCloud REFERENCE LINKS: ownCloud Server Advisories Secunia Advisory SA51357 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Input passed via the

  3. V-177: VMware vCenter Chargeback Manager File Upload Handling Vulnerability

    Broader source: Energy.gov [DOE]

    The vCenter Chargeback Manager contains a critical vulnerability that allows for remote code execution

  4. Help:Uploading Files | Open Energy Information

    Open Energy Info (EERE)

    Uploading Files Jump to: navigation, search Click on the upload file link at the bottom of the page (NOTE: you must be logged in to have this option). Uploading tutorial.JPG Click...

  5. File FTP Document Upload Website | Open Energy Information

    Open Energy Info (EERE)

    Not Provided DOI Not Provided Check for DOI availability: http:crossref.org Online Internet link for File FTP Document Upload Website Citation Vermont Agency of Natural...

  6. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let Remote Users Conduct Cross-Site Scripting Attacks | Department of Energy 51: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks May 8, 2013 - 12:06am Addthis PROBLEM: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks

  7. T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System

    Office of Energy Efficiency and Renewable Energy (EERE)

    PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected.

  8. FTP Document Upload Website | Open Energy Information

    Open Energy Info (EERE)

    FTP Document Upload Website Abstract The Drinking Water and Groundwater Protection Division's (DWGPD) File Transfer Protocol (FTP) document upload website. The DWGPD is a division...

  9. NERSC FTP Upload Service

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NERSC FTP Upload Service The NERSC FTP Upload service is designed for external collaborators to be able to send data to NERSC staff and users. It allows you to create a...

  10. T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability.

  11. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Energy Savers [EERE]

    Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users ...

  12. U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability in WorkStation files (.ws) by IBM Personal Communications could allow a remote attacker to cause a denial of service (application crash) or potentially execute arbitrary code on vulnerable installations of IBM Personal Communications.

  13. U-173: Symantec Web Gateway Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks. A remote user can view/delete/upload files on the target system.

  14. PARS II 104 Contractor Monthly Upload | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    104 Contractor Monthly Upload PARS II 104 Contractor Monthly Upload PDF icon PARS II 104 Contractor Monthly Upload More Documents & Publications PARS II TRAINING PARS II Training ...

  15. Energy.gov File Naming Conventions for Downloads | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    File Naming Conventions for Downloads Energy.gov File Naming Conventions for Downloads When uploading files to download pages in Energy.gov's content management system (CMS), ...

  16. California GAMA Special Study:Archival Data Conversion & Upload

    SciTech Connect (OSTI)

    Visser, A.; Eppich, G.; Bibby, R.; Singleton, M.; Hillegonds, D.; Moran, J.; Esser, B.

    2014-02-18

    LLNL has uploaded over 3000 tritium analyses and over 4000 noble gas analyses to the GeoTracker GAMA database.

  17. EISA 432 Compliance Tracking System Data Upload Templates | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy EISA 432 Compliance Tracking System Data Upload Templates EISA 432 Compliance Tracking System Data Upload Templates These generic Excel templates are available for federal contractors and service providers to provide federal clients with reports in the format agencies are required to use. Providing data in these templates will make it easy for agencies to upload your data into the EISA 432 Compliance Tracking System. Data may be batch imported by the federal agencies into the EISA 432

  18. T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

  19. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  20. Tips & Tricks for Uploading Images with Research Highlights

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for Uploading Images with Research Highlights Images: (optional) Only images in JPEG, BMP, GIF, or PNG can be accepted up to 10 Mb. The image caption is limited to 500 characters. ...

  1. GPFA-AB_Phase1RiskAnalysisTask5DataUpload

    SciTech Connect (OSTI)

    Teresa E. Jordan

    2015-09-30

    This submission contains information used to compute the risk factors for the GPFA-AB project (DE-EE0006726). The risk factors are natural reservoir quality, thermal resource quality, potential for induced seismicity, and utilization. The methods used to combine the risk factors included taking the product, sum, and minimum of the four risk factors. The files are divided into images, rasters, shapefiles, and supporting information. The image files show what the raster and shapefiles should look like. The raster files contain the input risk factors, calculation of the scaled risk factors, and calculation of the combined risk factors. The shapefiles include definition of the fairways, definition of the US Census Places, the center of the raster cells, and locations of industries. Supporting information contains details of the calculations or processing used in generating the files. An image of the raster will have the same name except *.png as the file ending instead of *.tif. Images with “fairways” or “industries” added to the name are composed of a raster with the relevant shapefile added. The file About_GPFA-AB_Phase1RiskAnalysisTask5DataUpload.pdf contains information the citation, special use considerations, authorship, etc. More details on each file are given in the spreadsheet “list_of_contents.csv” in the folder “SupportingInfo”. Code used to calculate values is available at https://github.com/calvinwhealton/geothermal_pfa under the folder “combining_metrics”.

  2. GPFA-AB_Phase1RiskAnalysisTask5DataUpload

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Teresa E. Jordan

    2015-09-30

    This submission contains information used to compute the risk factors for the GPFA-AB project (DE-EE0006726). The risk factors are natural reservoir quality, thermal resource quality, potential for induced seismicity, and utilization. The methods used to combine the risk factors included taking the product, sum, and minimum of the four risk factors. The files are divided into images, rasters, shapefiles, and supporting information. The image files show what the raster and shapefiles should look like. The raster files contain the input risk factors, calculation of the scaled risk factors, and calculation of the combined risk factors. The shapefiles include definition of the fairways, definition of the US Census Places, the center of the raster cells, and locations of industries. Supporting information contains details of the calculations or processing used in generating the files. An image of the raster will have the same name except *.png as the file ending instead of *.tif. Images with fairways or industries added to the name are composed of a raster with the relevant shapefile added. The file About_GPFA-AB_Phase1RiskAnalysisTask5DataUpload.pdf contains information the citation, special use considerations, authorship, etc. More details on each file are given in the spreadsheet list_of_contents.csv in the folder SupportingInfo. Code used to calculate values is available at https://github.com/calvinwhealton/geothermal_pfa under the folder combining_metrics.

  3. V-177: VMware vCenter Chargeback Manager File Upload Handling...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

  4. FILE

    Office of Legacy Management (LM)

    c&o--L>+/ co.o-09 ~~Epq-J+~~jDU" 1 . [o( / 5-/-- 1, "I ' -i, [ . - -. j s: FILE :3r.jNER is} -------.- pas',: Current: -----__---_---__-------- ----____-_________________ Cwner ccntacted 0 yes 0 nag i+ yet,? date czntacted ----___--I__- Ty-;Pfz ,' F iTiC~CC2~j 1 iljbj AA-r-ti--=' ="L---- /8;' ; z.eseaf-ch & sevei apment EJ F' raducticx scale tssting rJ Pilot si-jle 0 ' jench Scale Fracess 0 Theoretical Studies 0 Samp:! e & haivsis 0 Fz-citity Tvpe 0 Manui artur i ng

  5. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  6. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  7. GPFA-AB_Phase1UtilizationTask4DataUpload

    SciTech Connect (OSTI)

    Teresa E. Jordan

    2015-09-30

    This submission of Utilization Analysis data to the Geothermal Data Repository (GDR) node of the National Geothermal Data System (NGDS) is in support of Phase 1 Low Temperature Geothermal Play Fairway Analysis for the Appalachian Basin (project DE-EE0006726). The submission includes data pertinent to the methods and results of an analysis of the Surface Levelized Cost of Heat (SLCOH) for US Census Bureau ‘Places’ within the study area. This was calculated using a modification of a program called GEOPHIRES, available at http://koenraadbeckers.net/geophires/index.php. The MATLAB modules used in conjunction with GEOPHIRES, the MATLAB data input file, the GEOPHIRES output data file, and an explanation of the software components have been provided. Results of the SLCOH analysis appear on 4 .png image files as mapped ‘risk’ of heat utilization. For each of the 4 image (.png) files, there is an accompanying georeferenced TIF (.tif) file by the same name. In addition to calculating SLCOH, this Task 4 also identified many sites that may be prospects for use of a geothermal district heating system, based on their size and industry, rather than on the SLCOH. An industry sorted listing of the sites (.xlsx) and a map of these sites plotted as a layer onto different iterations of maps combining the three geological risk factors (Thermal Quality, Natural Reservoir Quality, and Risk of Seismicity) has been provided. In addition to the 6 image (.png) files of the maps in this series, a shape (.shp) file and 7 associated files are included as well. Finally, supporting files (.pdf) describing the utilization analysis methodology and summarizing the anticipated permitting for a deep district heating system are supplied.

  8. GPFA-AB_Phase1UtilizationTask4DataUpload

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Teresa E. Jordan

    2015-09-30

    This submission of Utilization Analysis data to the Geothermal Data Repository (GDR) node of the National Geothermal Data System (NGDS) is in support of Phase 1 Low Temperature Geothermal Play Fairway Analysis for the Appalachian Basin (project DE-EE0006726). The submission includes data pertinent to the methods and results of an analysis of the Surface Levelized Cost of Heat (SLCOH) for US Census Bureau Places within the study area. This was calculated using a modification of a program called GEOPHIRES, available at http://koenraadbeckers.net/geophires/index.php. The MATLAB modules used in conjunction with GEOPHIRES, the MATLAB data input file, the GEOPHIRES output data file, and an explanation of the software components have been provided. Results of the SLCOH analysis appear on 4 .png image files as mapped risk of heat utilization. For each of the 4 image (.png) files, there is an accompanying georeferenced TIF (.tif) file by the same name. In addition to calculating SLCOH, this Task 4 also identified many sites that may be prospects for use of a geothermal district heating system, based on their size and industry, rather than on the SLCOH. An industry sorted listing of the sites (.xlsx) and a map of these sites plotted as a layer onto different iterations of maps combining the three geological risk factors (Thermal Quality, Natural Reservoir Quality, and Risk of Seismicity) has been provided. In addition to the 6 image (.png) files of the maps in this series, a shape (.shp) file and 7 associated files are included as well. Finally, supporting files (.pdf) describing the utilization analysis methodology and summarizing the anticipated permitting for a deep district heating system are supplied.

  9. GPFA-AB_Phase1ReservoirTask2DataUpload

    SciTech Connect (OSTI)

    Teresa E. Jordan

    2015-10-22

    This submission to the Geothermal Data Repository (GDR) node of the National Geothermal Data System (NGDS) in support of Phase 1 Low Temperature Geothermal Play Fairway Analysis for the Appalachian Basin. The files included in this zip file contain all data pertinent to the methods and results of this task’s output, which is a cohesive multi-state map of all known potential geothermal reservoirs in our region, ranked by their potential favorability. Favorability is quantified using a new metric, Reservoir Productivity Index, as explained in the Reservoirs Methodology Memo (included in zip file). Shapefile and images of the Reservoir Productivity and Reservoir Uncertainty are included as well.

  10. GPFA-AB_Phase1ReservoirTask2DataUpload

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Teresa E. Jordan

    2015-10-22

    This submission to the Geothermal Data Repository (GDR) node of the National Geothermal Data System (NGDS) in support of Phase 1 Low Temperature Geothermal Play Fairway Analysis for the Appalachian Basin. The files included in this zip file contain all data pertinent to the methods and results of this tasks output, which is a cohesive multi-state map of all known potential geothermal reservoirs in our region, ranked by their potential favorability. Favorability is quantified using a new metric, Reservoir Productivity Index, as explained in the Reservoirs Methodology Memo (included in zip file). Shapefile and images of the Reservoir Productivity and Reservoir Uncertainty are included as well.

  11. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  12. V-237: TYPO3 Security Bypass Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities September 9, 2013 - 6:00am Addthis PROBLEM: Some vulnerabilities have been reported in TYPO3 PLATFORM: TYPO3 6.x ABSTRACT: TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations REFERENCE LINKS: Secunia Advisory SA54717 Security Focus ID 62257 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Some errors

  13. V-127: Samba Bug Lets Remote Authenticated Users Modify Files...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was...

  14. Original Signatures on File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Signatures on File

  15. Original Signatures on File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Original Signatures on File

  16. File Storage

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Storage File Storage Disk Quota Change Request Form Carver File Systems Carver has 3 kinds of file systems available to users: home directories, scratch directories and project directories, all provided by the NERSC Global File system. Each file system serves a different purpose. File System Home Scratch Project Environment Variable Definition $HOME $SCRATCH or $GSCRATCH No environment variable /project/projectdirs/ Description Global homes file system shared by all NERSC systems except

  17. File storage

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File storage File storage Disk Quota Change Request Form Euclid File Systems Euclid has 3 kinds of file systems available to users: home directories, scratch directories and project directories, all provided by the NERSC Global File system. Each file system serves a different purpose. File System Home Scratch Project Environment Variable Definition $HOME $SCRATCH or $GSCRATCH No environment variable /project/projectdirs/ Description Global homes file system shared by all NERSC systems except

  18. Lessons about vulnerability assessments.

    SciTech Connect (OSTI)

    Johnston, R. G.

    2004-01-01

    The Vulnerability Assessment Team (VAT) at Los Alamos National Laboratory believes that physical security can only be optimized through the use of effective vulnerability assessments. As a result of conducting vulnerability assessments on hundreds of different security devices and systems in the last few years, we have identified some of the attributes of effective assessments. These, along with our recommendations and observations about vulnerability assessments, are summarized in this paper. While our work has primarily involved physical security (in contrast to, for example, computer, network, or information security), our experiences may have applicability to other types of security as well.

  19. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Systems File Systems For a general description of the different file systems available on PDSF please see Eliza File Systems and Other File Systems. Below is a summary of how ATLAS uses the various systems: /common In the past ATLAS used /common primarily for their software installations but with cvmfs (see below) this is no longer necessary. ATLAS users also have made personal directories under /common/atlas. However, this is not the intended use of /common, as described on Other File

  20. Signature on File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Signature on File Signature on File 5/29/08

  1. U-115: Novell GroupWise Client Address Book Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when processing Novell Address Book (".nab") files and can be exploited to cause a heap-based buffer overflow via an overly long email address.

  2. Facility Environmental Vulnerability Assessment

    SciTech Connect (OSTI)

    Van Hoesen, S.D.

    2001-07-09

    From mid-April through the end of June 2001, a Facility Environmental Vulnerability Assessment (FEVA) was performed at Oak Ridge National Laboratory (ORNL). The primary goal of this FEVA was to establish an environmental vulnerability baseline at ORNL that could be used to support the Laboratory planning process and place environmental vulnerabilities in perspective. The information developed during the FEVA was intended to provide the basis for management to initiate immediate, near-term, and long-term actions to respond to the identified vulnerabilities. It was expected that further evaluation of the vulnerabilities identified during the FEVA could be carried out to support a more quantitative characterization of the sources, evaluation of contaminant pathways, and definition of risks. The FEVA was modeled after the Battelle-supported response to the problems identified at the High Flux Beam Reactor at Brookhaven National Laboratory. This FEVA report satisfies Corrective Action 3A1 contained in the Corrective Action Plan in Response to Independent Review of the High Flux Isotope Reactor Tritium Leak at the Oak Ridge National Laboratory, submitted to the Department of Energy (DOE) ORNL Site Office Manager on April 16, 2001. This assessment successfully achieved its primary goal as defined by Laboratory management. The assessment team was able to develop information about sources and pathway analyses although the following factors impacted the team's ability to provide additional quantitative information: the complexity and scope of the facilities, infrastructure, and programs; the significantly degraded physical condition of the facilities and infrastructure; the large number of known environmental vulnerabilities; the scope of legacy contamination issues [not currently addressed in the Environmental Management (EM) Program]; the lack of facility process and environmental pathway analysis performed by the accountable line management or facility owner; and poor

  3. Energy vulnerability relationships

    SciTech Connect (OSTI)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  4. Plutonium Vulnerability Management Plan

    SciTech Connect (OSTI)

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  5. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Systems File Systems For a general description of the different file systems available on PDSF please see Eliza File Systems and Other File Systems. Below is a summary of how ALICE uses the various systems: /common ALICE uses /common to build the software that supports its grid-based automated production work. This software includes AliRoot, Geant, AliEn, and XRootD. /eliza6, /eliza8, /eliza17 ALICE has space on 3 elizas: 16TB on /eliza6, 6TB on /eliza8 and 11TB on /eliza17. The space on

  6. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Systems File Systems For a general description of the different file systems available on PDSF please see Eliza File Systems and Other File Systems. Below is a summary of how STAR uses the various systems: /common The STAR software is installed on /common. For 32sl44 it is under /common/star/star44 and for sl53 it is under /common/star/star53. In both cases the software consists primarily of a STAR-specific ROOT installation on which releases of the STAR libraries are built as shown on the

  7. SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced

  8. FileSys.pptx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Navigating NERSC File Systems May 3, 2011 David Turner NERSC User Services Group * Focus on user-writable file systems * Global file systems * Local file systems * Policies * ...

  9. To: File

    Office of Legacy Management (LM)

    In 1931 and 19Siz the Atomic Energy Commission He; and Safety Division participated in ... Information obtained from EPFI files indicates that the facilit continued operations ...

  10. Climate Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Climate Vulnerabilities Climate Vulnerabilities The Energy Sector's Vulnerabilities to Climatic Conditions x Impacts Due to... Increasing Temperatures Decreasing Water Availability Increasing Storms, Flooding, and Sea Level Rise See All Impacts Map locations are approximate. Find out more about this data here. Click and drag the map to read about each location

  11. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  12. 1987 RECS Public Use Microdata Files

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    cvs file File 3: Type of Energy and Equipment text file cvs file File 4: Household Demographics text file cvs file File 5: Presence of Appliances text file cvs file File 6: Energy...

  13. TO: FILE

    Office of Legacy Management (LM)

    Homer Watson, Wright Paterson Air Force Base, as a starting point. AWmb ' I. .' ..x; . .:yx . . . . : File a.%-I. (d : AIR FORCE PLANT.36. EvENGALE, OilIO 'w .*:3 '. - ...

  14. File storage

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    This file system is not configured for high IO performance. Home directories should ... Furthermore, SSH will not allow you to login if HOME.ssh is writeable by anyone other ...

  15. TO: FILE

    Office of Legacy Management (LM)

    ... C . Young ,.+-' E. Mitchal file FUS,RAP WI.4,, PA.40 L.-J Iany in :ee, anda Area ' radioactive *hap 6 as a d2 EC stop for 100 employee, and )mme :nd both these Ind Milwaukee

  16. Method and tool for network vulnerability analysis

    DOE Patents [OSTI]

    Swiler, Laura Painton; Phillips, Cynthia A.

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  17. Common Control System Vulnerability

    SciTech Connect (OSTI)

    Trent Nelson

    2005-12-01

    The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an attacker can then map out the

  18. U-117: Potential security vulnerability has been identified with...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Senders ABSTRACT: Remote attackers could execute arbitrary code by using a session on TCP port 9100 to upload a crafted firmware update. reference LINKS: Vendor Advisory...

  19. Regional Climate Vulnerabilities and Resilience Solutions | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Regional Climate Vulnerabilities and Resilience Solutions Regional Climate Vulnerabilities and Resilience Solutions This interactive map is not viewable in your browser. Please ...

  20. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    Open Energy Info (EERE)

    Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability...

  1. V-092: Pidgin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

  2. U-117: Potential security vulnerability has been identified with certain HP printers and HP digital senders

    Broader source: Energy.gov [DOE]

    Remote attackers could execute arbitrary code by using a session on TCP port 9100 to upload a crafted firmware update.

  3. Are Vulnerability Disclosure Deadlines Justified?

    SciTech Connect (OSTI)

    Miles McQueen; Jason L. Wright; Lawrence Wellman

    2011-09-01

    Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

  4. CEKRM. FILES

    Office of Legacy Management (LM)

    *:-I c-Y,- -.>A - L z.23 ' ,gQ+ CEKRM. FILES : -- i" ry .' ;,:;;:i ;- ' _ :;, I' -. .-,- p.." * .i' ' --yr:,? ,5 .Y' :?!, .I I >L L qgy~T.5 ,-:,,. \>,' yt r, .,-:,7 ,A : _ . . T_ 31' :;:: . .' : z ^., - -; &.' -" ' \-,-y . ..L' .:"A .:1i2*;,1 1- .,: _.,-.- 1 ,... _ . , , 2; J..i"!w , . . . .' _ \ ' d>; : r. . _ " ' . ;I 2: a : ..i. ,. 7, I . :ri cij?TL-i; 12, ;;,2;-,: ;. ." * 1. 1 .:1 : :: .' I .-=-. I. Iv-.. . . . . - i. ; i -2. ./ ..l,..- '

  5. NERSC File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sharing between platforms. File systems are configured for different purposes. On each machine you have access to at least three different file system Home: Permanent, relatively...

  6. NX Configuration File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Configuration File NX Configuration File This is the NX configuration file that you will need to connect to NERSC NX Server: NX5Confgure.nxs.zip To use this file, please follow the Online Tutorial. Last edited: 2016-04-29 11:34:57

  7. V-059: MoinMoin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data.

  8. T-540: Sybase EAServer Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Sybase EAServer is prone to a security-bypass vulnerability and a directory-traversal vulnerability. Attackers may exploit these issues to execute arbitrary code within the context of the application or to disclose sensitive information.

  9. V-208: Google Chrome Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in Google Chrome which allows attackers to access and compromise a user's system.

  10. U-169: Sympa Multiple Security Bypass Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Sympa, which can be exploited by malicious people to bypass certain security restrictions.

  11. V-087: Adobe Flash Player Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities are reported as 0-day which can be exploited by malicious people to compromise a user's system.

  12. V-131: Adobe Shockwave Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This update addresses vulnerabilities that could allow an attacker to run malicious code on the affected system

  13. V-224: Google Chrome Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Multiple Vulnerabilities V-224: Google Chrome Multiple Vulnerabilities August 22, 2013 - 1:05am Addthis PROBLEM: Multiple vulnerabilities have been reported in...

  14. V-121: Google Chrome Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Google Chrome Multiple Vulnerabilities V-121: Google Chrome Multiple Vulnerabilities March 28, 2013 - 12:29am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM:...

  15. V-207: Wireshark Multiple Denial of Service Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Wireshark Multiple Denial of Service Vulnerabilities V-207: Wireshark Multiple Denial of Service Vulnerabilities July 31, 2013 - 1:59am Addthis PROBLEM: Multiple vulnerabilities...

  16. Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Vulnerability & Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs

  17. Cyber-Based Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber-Based Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs

  18. Navigating NERSC File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Navigating NERSC File Systems May 3, 2011 David-Turner.jpg NERSC Training Event 10:00 - ... Navigating NERSC File Systems David Turner, NERSC User Services Group NERSC hosts a number ...

  19. Fast Global File Status

    Energy Science and Technology Software Center (OSTI)

    2013-01-01

    Fast Global File Status (FGFS) is a system software package that implimints a scalable mechanism to retrieve file information, such as its degree of distribution or replication and consistency.

  20. Standard interface file handbook

    SciTech Connect (OSTI)

    Shapiro, A.; Huria, H.C. )

    1992-10-01

    This handbook documents many of the standard interface file formats that have been adopted by the US Department of Energy to facilitate communications between and portability of, various large reactor physics and radiation transport software packages. The emphasis is on those files needed for use of the VENTURE/PC diffusion-depletion code system. File structures, contents and some practical advice on use of the various files are provided.

  1. Assessing the Security Vulnerabilities of Correctional Facilities

    SciTech Connect (OSTI)

    Morrison, G.S.; Spencer, D.S.

    1998-10-27

    The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  2. Mining Bug Databases for Unidentified Software Vulnerabilities

    SciTech Connect (OSTI)

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  3. NSTB Summarizes Vulnerable Areas | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    NSTB Summarizes Vulnerable Areas Experts at the National SCADA Test Bed (NSTB) discovered ... Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems ...

  4. V-157: Adobe Reader / Acrobat Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system

  5. Vulnerability Analysis of Energy Delivery Control Systems

    Broader source: Energy.gov (indexed) [DOE]

    ... Attackers can search for vulnerabilities in firewalls, ... organization, measured in terms of confidentiality, ... in which an adversary can enter the system and potentially ...

  6. US Energy Sector Vulnerabilities to Climate Change

    Broader source: Energy.gov (indexed) [DOE]

    Photo credits: iStockphoto U.S. ENERGY SECTOR VULNERABILITIES TO CLIMATE CHANGE AND ... and International Affairs (DOE-PI) and the National Renewable Energy Laboratory (NREL). ...

  7. Eliza File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Eliza File Systems Eliza File Systems Storage at PDSF is organized by group and available to all the nodes in PDSF. Please note that files on these file systems are not backed up. It is the responsibility of users to back up their files themselves as necessary. Over the years at PDSF there have been incidents which resulted in a loss of data from disk, often related to aging hardware. You can display the UGE io units with the command "qconf -se global". Disk Vault Experiments SGE io

  8. Proliferation Vulnerability Red Team report

    SciTech Connect (OSTI)

    Hinton, J.P.; Barnard, R.W.; Bennett, D.E.

    1996-10-01

    This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

  9. U-179: IBM Java 7 Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

  10. File:Bureauofreclamationfactsheet.pdf | Open Energy Information

    Open Energy Info (EERE)

    Bureauofreclamationfactsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Bureauofreclamationfactsheet.pdf Size of this preview: 463 599 pixels....

  11. File:20121127144703735.pdf | Open Energy Information

    Open Energy Info (EERE)

    20121127144703735.pdf Jump to: navigation, search File File history File usage File:20121127144703735.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  12. File:Windyclassroom.pdf | Open Energy Information

    Open Energy Info (EERE)

    Windyclassroom.pdf Jump to: navigation, search File File history File usage Metadata File:Windyclassroom.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  13. File:Npsfactsheet.pdf | Open Energy Information

    Open Energy Info (EERE)

    Npsfactsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Npsfactsheet.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  14. File:Oregonshpodocumentationstandards.pdf | Open Energy Information

    Open Energy Info (EERE)

    Oregonshpodocumentationstandards.pdf Jump to: navigation, search File File history File usage File:Oregonshpodocumentationstandards.pdf Size of this preview: 463 599 pixels....

  15. File:Noaafactsheet.pdf | Open Energy Information

    Open Energy Info (EERE)

    Noaafactsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Noaafactsheet.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  16. File:Drillinghandbook.pdf | Open Energy Information

    Open Energy Info (EERE)

    Drillinghandbook.pdf Jump to: navigation, search File File history File usage File:Drillinghandbook.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  17. File:Energydatabusfacthseet.pdf | Open Energy Information

    Open Energy Info (EERE)

    Energydatabusfacthseet.pdf Jump to: navigation, search File File history File usage Metadata File:Energydatabusfacthseet.pdf Size of this preview: 463 599 pixels. Other...

  18. File:Bonnevillepowerfactsheet.pdf | Open Energy Information

    Open Energy Info (EERE)

    Bonnevillepowerfactsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Bonnevillepowerfactsheet.pdf Size of this preview: 463 599 pixels. Other...

  19. Other File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Home Directories Your home directory is located at homelogin-name. Home directories ... Home directories are backed up as insurance against catastrophic file system failure. ...

  20. EIA-411 Data File

    Annual Energy Outlook [U.S. Energy Information Administration (EIA)]

    Form EIA-411 Database Form EIA-411 - Coordinated Bulk Power Supply Program Report Data ... except No. 7 (Transmission Outages) which will continue to be a voluntary filing. ...

  1. Original Signature on File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Original Signature on File Page8 of 8 M. EMERGENCY PROCEDURES 1. The owneroperator must maintain an adequately trained onsite RCRA emergency coordinator to direct emergency...

  2. Determining Vulnerability Importance in Environmental Impact Assessment

    SciTech Connect (OSTI)

    Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat

    2012-01-15

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: Black-Right-Pointing-Pointer The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. Black-Right-Pointing-Pointer The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. Black-Right-Pointing-Pointer A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. Black-Right-Pointing-Pointer Results in Colombia highlight the usefulness and objectivity of this method.

  3. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    Open Energy Info (EERE)

    Colombia-Cartagena Vulnerability Assessment Jump to: navigation, search Name Colombia-CDKN-Cartagena Vulnerability Assessment AgencyCompany Organization Climate and Development...

  4. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    Open Energy Info (EERE)

    Colombia-Cartagena Vulnerability Assessment (Redirected from CDKN-Colombia-Cartagena Vulnerability Assessment) Jump to: navigation, search Name Colombia-CDKN-Cartagena...

  5. U-273: Multiple vulnerabilities have been reported in Wireshark

    Broader source: Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

  6. Nuclear Fuel Cycle & Vulnerabilities (Technical Report) | SciTech...

    Office of Scientific and Technical Information (OSTI)

    Nuclear Fuel Cycle & Vulnerabilities Citation Details In-Document Search Title: Nuclear Fuel Cycle & Vulnerabilities The objective of safeguards is the timely detection of ...

  7. V-094: IBM Multiple Products Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple ...

  8. Nuclear Fuel Cycle & Vulnerabilities (Technical Report) | SciTech...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: Nuclear Fuel Cycle & Vulnerabilities Citation Details In-Document Search Title: Nuclear Fuel Cycle & Vulnerabilities You are accessing a document from the ...

  9. Potential Vulnerability of US Petroleum Refineries to Increasing...

    Energy Savers [EERE]

    Potential Vulnerability of US Petroleum Refineries to Increasing Water Temperature andor Reduced Water Availability Potential Vulnerability of US Petroleum Refineries to ...

  10. V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could be exploited on the same device.

  11. V-111: Multiple vulnerabilities have been reported in Puppet...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    vulnerable system. SOLUTION: Update to a fixed version. Addthis Related Articles V-090: Adobe Flash Player AIR Multiple Vulnerabilities V-083: Oracle Java Multiple...

  12. V-051: Oracle Solaris Java Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Related Articles U-191: Oracle Java Multiple Vulnerabilities U-105:Oracle Java SE Critical Patch Update Advisory T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities...

  13. OLADE-Central America Climate Change Vulnerability Program |...

    Open Energy Info (EERE)

    Central America Climate Change Vulnerability Program Jump to: navigation, search Name OLADE-Central America Climate Change Vulnerability Program AgencyCompany Organization Latin...

  14. India-Vulnerability Assessment and Enhancing Adaptive Capacities...

    Open Energy Info (EERE)

    Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities to...

  15. T-681:IBM Lotus Symphony Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple unspecified vulnerabilities in IBM Lotus Symphony 3 before FP3 have unknown impact and attack vectors, related to "critical security vulnerability issues."

  16. V-187: Mozilla Firefox Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.

  17. U-104: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

  18. V-126: Mozilla Firefox Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing and cross-site scripting attacks and compromise a user's system

  19. V-097: Google Chrome Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

  20. Register file soft error recovery

    DOE Patents [OSTI]

    Fleischer, Bruce M.; Fox, Thomas W.; Wait, Charles D.; Muff, Adam J.; Watson, III, Alfred T.

    2013-10-15

    Register file soft error recovery including a system that includes a first register file and a second register file that mirrors the first register file. The system also includes an arithmetic pipeline for receiving data read from the first register file, and error detection circuitry to detect whether the data read from the first register file includes corrupted data. The system further includes error recovery circuitry to insert an error recovery instruction into the arithmetic pipeline in response to detecting the corrupted data. The inserted error recovery instruction replaces the corrupted data in the first register file with a copy of the data from the second register file.

  1. T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment Service for the BlackBerry Enterprise Server

    Broader source: Energy.gov [DOE]

    BlackBerry advisory describes a security issue that the BlackBerry Attachment Service component of the BlackBerry Enterprise Server is susceptible to. The issue relates to a known vulnerability in the PDF distiller component of the BlackBerry Attachment Service that affects how the BlackBerry Attachment Service processes PDF files.

  2. File:DIAsample.pdf | Open Energy Information

    Open Energy Info (EERE)

    DIAsample.pdf Jump to: navigation, search File File history File usage File:DIAsample.pdf Size of this preview: 776 600 pixels. Full resolution (1,650 1,275 pixels, file...

  3. Justification Memo NNSA - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Diane Johnson Upload File Upload the file here JM-NNSA -8 -4.doc - 39 KB Short Name justification_memo_nnsa-1

  4. zeller-panic2011-upload.ppt

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in precision & search for smaller and smaller effects) 1 2 3 m 2 ATM m 2 SOL S. Zeller, PANIC, July 26, 2011 Neutrino Cross Sections 3 NOvA T2K LBNE CNGS * pursuit...

  5. zeller-aps2011-upload.ppt

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... is on D 2 * QE considered the "golden channel" - it's simple ... clean - know size & ... 68k Pb, 65k Fe (DIS event reconstructed in iron) M I N E R A 1 s t g l i m p s e ...

  6. Upload Data - OpenEI Datasets

    Open Energy Info (EERE)

    open data DOE Open Data add to the catalog&3; for DOE-funded data GDR: DOE's Geothermal Data Repository Geothermal Data add a submission to DOE's &3;Geothermal Data Repository...

  7. zeller-sbl2011-upload.ppt

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2011 FSI Models 41 * data in heavy use by model builders (U. Mosel) (P. dePerio) (T. Golan) * need measurements on other targets * and at higher energies (multi-) - LAr:...

  8. UTILITY Submit to BPA: Upload Template

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    achieved. (mmddyyyy) Was measure installed in a federal facility? (Dropdown box below) Utility assigned end user account or member number. Maximum length 50 characters....

  9. Construction of file database management

    SciTech Connect (OSTI)

    MERRILL,KYLE J.

    2000-03-01

    This work created a database for tracking data analysis files from multiple lab techniques and equipment stored on a central file server. Experimental details appropriate for each file type are pulled from the file header and stored in a searchable database. The database also stores specific location and self-directory structure for each data file. Queries can be run on the database according to file type, sample type or other experimental parameters. The database was constructed in Microsoft Access and Visual Basic was used for extraction of information from the file header.

  10. Filing Information | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Filing Information Filing Information The Office of Hearings and Appeals (OHA) encourages electronic filing of submissions, by e-mail or by telefax. OHA's e-mail address for filing submissions is OHA.filings@hq.doe.gov; the OHA telefax number is (202) 287-1415. Note, however, that because of signature issues, we may ask you to file a signed original of a document. We will send an acknowledgment (by letter or e-mail) upon our receipt of all principal pleadings. If you choose to file by regular

  11. Unix File Permissions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    also sometimes known as "world" permissions, and applies to all users who can login to the system. The command "ls -l" displays the permissions and associated group for any file. ...

  12. MEMORANDUM TO: FILE FROM:

    Office of Legacy Management (LM)

    p' : , .; ' ' < 3.518 MEMORANDUM TO: FILE FROM: -Ye L&a ---...e---e--- DATE 6j88 7 v---s -- ---... SUBJECT: ;&l a+-b IA Tcornqm Q afib4 SITE NAME: CITY: & &&at leg co ...

  13. File:NREL-banglmetst-221.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit with form History File:NREL-banglmetst-221.pdf Jump to: navigation, search File File history File usage Selected Meteorological Stations and Elevation Size of this...

  14. V-083: Oracle Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert.

  15. CYBER/PHYSICAL SECURITY VULNERABILITY ASSESSMENT INTEGRATION

    SciTech Connect (OSTI)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-07-17

    This internally funded Laboratory-Directed R&D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  16. Chemical Safety Vulnerability Working Group Report

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

  17. File:S-38-Well-Construction-and-Modification-Permit.pdf | Open...

    Open Energy Info (EERE)

    S-38-Well-Construction-and-Modification-Permit.pdf Jump to: navigation, search File File history File usage File:S-38-Well-Construction-and-Modification-Permit.pdf Size of this...

  18. T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability

    Broader source: Energy.gov [DOE]

    Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulnerability reported to Microsoft.

  19. Hopper File Storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Storage and IO File Storage and IO Disk Quota Change Request Form Hopper File Systems Hopper has 5 user file systems which provide different degrees of storage, performance...

  20. File:Methane.pdf | Open Energy Information

    Open Energy Info (EERE)

    Methane.pdf Jump to: navigation, search File File history File usage File:Methane.pdf Size of this preview: 448 600 pixels. Go to page 1 2 3 4 5 Go next page next page ...

  1. File:Mmpa.pdf | Open Energy Information

    Open Energy Info (EERE)

    Mmpa.pdf Jump to: navigation, search File File history File usage File:Mmpa.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3 4 5 6...

  2. File:Keystone.pdf | Open Energy Information

    Open Energy Info (EERE)

    Keystone.pdf Jump to: navigation, search File File history File usage File:Keystone.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

  3. File:Handbook.pdf | Open Energy Information

    Open Energy Info (EERE)

    Handbook.pdf Jump to: navigation, search File File history File usage File:Handbook.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

  4. File:Install.pdf | Open Energy Information

    Open Energy Info (EERE)

    Install.pdf Jump to: navigation, search File File history File usage File:Install.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Full resolution...

  5. File:Hydrofracking.pdf | Open Energy Information

    Open Energy Info (EERE)

    Hydrofracking.pdf Jump to: navigation, search File File history File usage File:Hydrofracking.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go...

  6. File:Consultants.pdf | Open Energy Information

    Open Energy Info (EERE)

    Consultants.pdf Jump to: navigation, search File File history File usage File:Consultants.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to...

  7. File:Installnot.pdf | Open Energy Information

    Open Energy Info (EERE)

    Installnot.pdf Jump to: navigation, search File File history File usage File:Installnot.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Full...

  8. File:RSC.pdf | Open Energy Information

    Open Energy Info (EERE)

    RSC.pdf Jump to: navigation, search File File history File usage File:RSC.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3 4 5 6 7...

  9. Category:Map Files | Open Energy Information

    Open Energy Info (EERE)

    has the following 4 subcategories, out of 4 total. M Map Image Files Map PDF Files N NREL Map Files 1 pages S SWERA Map Files Media in category...

  10. File:Primer.pdf | Open Energy Information

    Open Energy Info (EERE)

    Primer.pdf Jump to: navigation, search File File history File usage File:Primer.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3 4...

  11. File:600.pdf | Open Energy Information

    Open Energy Info (EERE)

    600.pdf Jump to: navigation, search File File history File usage File:600.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3 4 5 6 7...

  12. File:SGI.pdf | Open Energy Information

    Open Energy Info (EERE)

    SGI.pdf Jump to: navigation, search File File history File usage Metadata File:SGI.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

  13. File:038392007).pdf | Open Energy Information

    Open Energy Info (EERE)

    8392007).pdf Jump to: navigation, search File File history File usage File:038392007).pdf Size of this preview: 463 599 pixels. Other resolution: 463 600 pixels. Go to page 1...

  14. Setting up File Permissions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Setting up File Permissions Setting up File Permissions Recommendations for Setting up "Shared" Directories This section shows the recommended commands for setting up shared directories. Please read the full page to get an understanding of what these commands are doing. These recommendations are based on the common use-case at the JGI for user/group read/write and global read access. Creating a New Shared Directory dmj@genepool04:~$ umask 002 # or have this set in .bashrc.ext

  15. OHA Misc Cases Archive File

    Office of Energy Efficiency and Renewable Energy (EERE)

    This is a archive file of our Misc decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the bookmark section of the...

  16. OHA Whistleblower Cases Archive File

    Office of Energy Efficiency and Renewable Energy (EERE)

    This is a archive file of our Whistleblower decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the bookmark...

  17. OHA Security Cases Archive File

    Office of Energy Efficiency and Renewable Energy (EERE)

    This is a archive file of our Security decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the bookmark section of...

  18. OHA EIA CASES ARCHIVE FILE

    Office of Energy Efficiency and Renewable Energy (EERE)

    This is a archive file of our EIA decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the bookmark section of the...

  19. OHA FOIA Cases Archive File

    Office of Energy Efficiency and Renewable Energy (EERE)

    This is a archive file of our FOIA decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the bookmark section of the...

  20. Look At (Search) Large Files

    Energy Science and Technology Software Center (OSTI)

    1992-07-13

    Scanning large files for information can be time consuming and expensive when using edit utilities on large mainframe computers. The reason is that editors must usually load the file into a buffer.

  1. File storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File storage and I/O File storage and I/O Disk Quota Change Request Form Franklin File Systems The Franklin system has 4 different file systems mounted which provide different levels of disk storage, I/O performance and file permanence. The table below describes the various Franklin file systems File System Home Local Scratch Project Environment Variable Definition $HOME $SCRATCH $SCRATCH2 No environment variable /project/projectdirs/ Description Global homes file system shared with other NERSC

  2. Vendor System Vulnerability Testing Test Plan

    SciTech Connect (OSTI)

    James R. Davidson

    2005-01-01

    The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system

  3. V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: IBM Security AppScan Enterprise Multiple Vulnerabilities V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities March 26, 2013 - 12:56am Addthis PROBLEM: IBM Security...

  4. V-191: Apple Mac OS X Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X...

  5. U-171: DeltaV Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

  6. T-731:Symantec IM Manager Code Injection Vulnerability | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-731:Symantec IM Manager Code Injection Vulnerability T-731:Symantec IM Manager Code Injection Vulnerability September 30, 2011 - 8:30am Addthis PROBLEM: Symantec IM Manager Code...

  7. Vulnerability Analysis of Energy Delivery Control Systems (September 2011)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems (September 2011) The Vulnerability Analysis of Energy Delivery Control Systems report, prepared by Idaho National Laboratory, describes the common vulnerabilities on energy sector control systems, and provides recommendations for vendors and owners of those systems to identify and reduce those risks. Vulnerability Analysis of Energy Delivery Control Systems (September 2011) (2.69 MB)

  8. U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 7: Cisco Adaptive Security Appliances Denial of Service Vulnerability U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability June 22, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco Adaptive Security Appliances (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: The vulnerability

  9. U-198: IBM Lotus Expeditor Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: IBM Lotus Expeditor Multiple Vulnerabilities U-198: IBM Lotus Expeditor Multiple Vulnerabilities June 25, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Lotus Expeditor. PLATFORM: IBM Lotus Expeditor 6.x ABSTRACT: The vulnerabilities can be exploited by malicious people to conduct cross-site scripting attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.. Reference Links: Vendor Advisory

  10. U-246: Tigase XMPP Dialback Protection Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Tigase, which can be exploited by malicious people to bypass certain security restrictions.

  11. U-013: HP Data Protector Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

  12. V-116: Google Picasa BMP and TIFF Images Processing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been discovered in Google Picasa, which can be exploited by malicious people to compromise a user's system

  13. V-162: Apache Struts "ParameterInterceptor" Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Apache Struts, which can be exploited by malicious people to bypass certain security restrictions.

  14. T-564: Vulnerabilities in Citrix Licensing administration components

    Broader source: Energy.gov [DOE]

    The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console.

  15. U-122 Google Chrome Two Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system.

  16. V-074: IBM Informix Genero libpng Integer Overflow Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 74: IBM Informix Genero libpng Integer Overflow Vulnerability V-074: IBM Informix Genero libpng Integer Overflow Vulnerability January 22, 2013 - 12:11am Addthis PROBLEM: IBM Informix Genero libpng Integer Overflow Vulnerability PLATFORM: IBM Informix Genero releases prior to 2.41 - all platforms ABSTRACT: A vulnerability has been reported in libpng. REFERENCE LINKS: IBM Security Bulletin: 1620982 Secunia Advisory SA51905 Secunia Advisory SA48026 CVE-2011-3026 IMPACT

  17. V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 0: IBM Application Manager For Smart Business Multiple Vulnerabilities V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities June 18, 2013 - 12:38am Addthis PROBLEM: IBM Application Manager For Smart Business Multiple Vulnerabilities PLATFORM: IBM Application Manager For Smart Business 1.x ABSTRACT: A security issue and multiple vulnerabilities have been reported in IBM Application Manager For Smart Business REFERENCE LINKS: Security Bulletin

  18. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  19. Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

  20. MEMORANDUfl J: FILE DATE

    Office of Legacy Management (LM)

    J: FILE DATE r so ---...w------m FROM: 9. 34oyc -w---...v----- SUBJECT: D3 Bo;s CL&;C J mL-;+J; - Rcc cap 049 'A :j: &336;s L-.fh w-f L-1 ALE"nirTE ---...

  1. MPI File Tree Walk

    Energy Science and Technology Software Center (OSTI)

    2007-04-30

    MPI-FTW is a scalable MPI based software application that navigates a directory tree by dynamically allocating processes to navigate sub-directories found. Upon completion, MPI-FTW provides statistics on the number of directories found, files found, and time to complete. Inaddition, commands can be executed at each directory level.

  2. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. Guide to Critical Infrastructure Protection

  3. U-187: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

  4. COMMON VULNERABILITIES IN CRITICAL INFRASTRUCTURE CONTROL SYSTEMS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    COMMON VULNERABILITIES IN CRITICAL INFRASTRUCTURE CONTROL SYSTEMS Jason Stamp, John Dillinger, and William Young Networked Systems Survivability and Assurance Department Jennifer DePoy Information Operations Red Team & Assessments Department Sandia National Laboratories Albuquerque, NM 87185-0785 22 May 2003 (2 nd edition, revised 11 November 2003) Copyright © 2003, Sandia Corporation. All rights reserved. Permission is granted to display, copy, publish, and distribute this document in its

  5. US Energy Sector Vulnerabilities to Climate Change

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    On the cover: Trans-Alaska oil pipeline; aerial view of New Jersey refinery; coal barges on Mississippi River in St. Paul, Minnesota; power plant in Prince George's County, Maryland; Grand Coulee Dam in Washington State; corn field near Somers, Iowa; wind turbines in Texas. Photo credits: iStockphoto U.S. ENERGY SECTOR VULNERABILITIES TO CLIMATE CHANGE AND EXTREME WEATHER Acknowledgements This report was drafted by the U.S. Department of Energy's Office of Policy and International Affairs

  6. U-162: Drupal Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591

  7. DOE - Fossil Energy: Introduction Page to E-Filing System

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    E-Filing Natural Gas Import & Export Regulation - E-Filing DOE's Natural Gas E-Filing System More Info E-Filing Instructions Go directly to e-Filing Form View Sample e-File...

  8. File:WSR flowchart-introduction.pdf | Open Energy Information

    Open Energy Info (EERE)

    Apps Datasets Community Login | Sign Up Search File Edit History File:WSR flowchart-introduction.pdf Jump to: navigation, search File File history File usage File:WSR...

  9. File:0 - Overall Flow (Solar).pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit History File:0 - Overall Flow (Solar).pdf Jump to: navigation, search File File history File usage Metadata File:0 - Overall Flow (Solar).pdf Size of this preview: 463 ...

  10. File:01UTALandUsePlanning.pdf | Open Energy Information

    Open Energy Info (EERE)

    Datasets Community Login | Sign Up Search File Edit History File:01UTALandUsePlanning.pdf Jump to: navigation, search File File history File usage Metadata File:01UTALandUsePlan...

  11. File:01CAALandUsePlanning.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit History File:01CAALandUsePlanning.pdf Jump to: navigation, search File File history File usage Metadata File:01CAALandUsePlanning.pdf Size of this preview: 463 599...

  12. File:01IDALandUseConsiderations.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit History File:01IDALandUseConsiderations.pdf Jump to: navigation, search File File history File usage Metadata File:01IDALandUseConsiderations.pdf Size of this preview:...

  13. File:08COCStateTransmissionProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    Community Login | Sign Up Search File Edit History File:08COCStateTransmissionProcess.pdf Jump to: navigation, search File File history File usage Metadata File:08COCStateTransm...

  14. File:01MTALandUseConsiderations.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit History File:01MTALandUseConsiderations.pdf Jump to: navigation, search File File history File usage Metadata File:01MTALandUseConsiderations.pdf Size of this preview:...

  15. File:03COCEncroachmentOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit History File:03COCEncroachmentOverview.pdf Jump to: navigation, search File File history File usage Metadata File:03COCEncroachmentOverview.pdf Size of this preview: 463...

  16. File Storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Storage and I/O File Storage and I/O Disk Quota Change Request Form Hopper File Systems Hopper has 5 user file systems which provide different degrees of storage, performance and permanence. The table below summarizes these file systems: File System Home Local Scratch Global Scratch Project Environment Variable Definition $HOME $SCRATCH $SCRATCH2 $GSCRATCH None. Must use /project/projectdirs/ Description Global home file system shared with other NERSC systems. All NERSC machines mount the

  17. Detailed Drawings of NERSC File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File System Drawing Detailed Drawings of NERSC File Systems Cori Global Scratch cori scratch Global Project project Abbreviations CMP Chip Multicore Processor OSS Object Storage Server: a component of a Lustre File System OST Object Storage Target: a component of a Lustre File System LNET Lustre Network router MDS Metadata Server, manage file operation, e.g., create new file, write to shared file DVS Data Virtualization Server, Running a service to mount external storage to Cray systems HPSS

  18. Original Signature On File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Signature On File Department of Energy Carl sbad Field Office P. O. Box 3090 Carlsbad , New Mexico 8822 1 June 10, 2009 Mr. Steve Zappe, Project Leader Hazardous Waste Bureau New Mexico Environment Department 2905 Rodeo Park Drive East, Building 1 Santa Fe, New Mexico 87505-6303 Subject: Transmittal of CBFO Final Audit Report A-09-12 , Los Alamos National Laboratory Central Characterization Project TRU Waste Characterization and Certification Dear Mr. Zappe: Enclosed is the Carlsbad Field Office

  19. File:Federal Hydropower - Southwestern Power Administration.pdf...

    Open Energy Info (EERE)

    Federal Hydropower - Southwestern Power Administration.pdf Jump to: navigation, search File File history File usage Metadata File:Federal Hydropower - Southwestern Power...

  20. File:Federal Hydropower - Western Area Power Administration.pdf...

    Open Energy Info (EERE)

    Hydropower - Western Area Power Administration.pdf Jump to: navigation, search File File history File usage Metadata File:Federal Hydropower - Western Area Power Administration.pdf...

  1. File:Texas Construction General Permit (TXR150000).pdf | Open...

    Open Energy Info (EERE)

    Texas Construction General Permit (TXR150000).pdf Jump to: navigation, search File File history File usage Metadata File:Texas Construction General Permit (TXR150000).pdf Size of...

  2. File:03NVCEncroachment (1).pdf | Open Energy Information

    Open Energy Info (EERE)

    NVCEncroachment (1).pdf Jump to: navigation, search File File history File usage Metadata File:03NVCEncroachment (1).pdf Size of this preview: 463 599 pixels. Other resolution:...

  3. Data Storage & File Systems | Argonne Leadership Computing Facility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    continue to build documentation for our new computing resource. Feedback Form Data Storage & File Systems BGQ File Systems BGQ File Systems: An overview of the BGQ file...

  4. File:0 - Overall Flow - Transmission.pdf | Open Energy Information

    Open Energy Info (EERE)

    - Overall Flow - Transmission.pdf Jump to: navigation, search File File history File usage Metadata File:0 - Overall Flow - Transmission.pdf Size of this preview: 463 599...

  5. File:07FDCPURPAQualifyingFacilityCertificationProcess.pdf | Open...

    Open Energy Info (EERE)

    FDCPURPAQualifyingFacilityCertificationProcess.pdf Jump to: navigation, search File File history File usage Metadata File:07FDCPURPAQualifyingFacilityCertificationProcess.pdf Size...

  6. File:07TXBRECGeneratorCertification.pdf | Open Energy Information

    Open Energy Info (EERE)

    7TXBRECGeneratorCertification.pdf Jump to: navigation, search File File history File usage Metadata File:07TXBRECGeneratorCertification.pdf Size of this preview: 463 599 pixels....

  7. File:04AKBGeophysicalExplorationPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    AKBGeophysicalExplorationPermit.pdf Jump to: navigation, search File File history File usage Metadata File:04AKBGeophysicalExplorationPermit.pdf Size of this preview: 463 599...

  8. File:07FDBPlantCommissioning.pdf | Open Energy Information

    Open Energy Info (EERE)

    FDBPlantCommissioning.pdf Jump to: navigation, search File File history File usage Metadata File:07FDBPlantCommissioning.pdf Size of this preview: 463 599 pixels. Other...

  9. File:07HIAGeothermalAndCableSystemDevelopmentPermitting.pdf ...

    Open Energy Info (EERE)

    HIAGeothermalAndCableSystemDevelopmentPermitting.pdf Jump to: navigation, search File File history File usage Metadata File:07HIAGeothermalAndCableSystemDevelopmentPermitting.pdf...

  10. File:ApplicationtoAppropriate.pdf | Open Energy Information

    Open Energy Info (EERE)

    ApplicationtoAppropriate.pdf Jump to: navigation, search File File history File usage File:ApplicationtoAppropriate.pdf Size of this preview: 463 599 pixels. Other resolution:...

  11. File:08CABCaliforniaTransmissionCPUCProcess.pdf | Open Energy...

    Open Energy Info (EERE)

    8CABCaliforniaTransmissionCPUCProcess.pdf Jump to: navigation, search File File history File usage File:08CABCaliforniaTransmissionCPUCProcess.pdf Size of this preview: 463 599...

  12. File:AlaskaTitleVApplicationSubmittalInstructions.pdf | Open...

    Open Energy Info (EERE)

    AlaskaTitleVApplicationSubmittalInstructions.pdf Jump to: navigation, search File File history File usage File:AlaskaTitleVApplicationSubmittalInstructions.pdf Size of this...

  13. File:03ORENoncompetitiveGeothermalLease.pdf | Open Energy Information

    Open Energy Info (EERE)

    ORENoncompetitiveGeothermalLease.pdf Jump to: navigation, search File File history File usage Metadata File:03ORENoncompetitiveGeothermalLease.pdf Size of this preview: 463 599...

  14. File:07CAAPlantCommissioningProcessApplicationForCertification...

    Open Energy Info (EERE)

    7CAAPlantCommissioningProcessApplicationForCertification.pdf Jump to: navigation, search File File history File usage Metadata File:07CAAPlantCommissioningProcessApplicationForCert...

  15. File:08IDAStateTransmission.pdf | Open Energy Information

    Open Energy Info (EERE)

    IDAStateTransmission.pdf Jump to: navigation, search File File history File usage Metadata File:08IDAStateTransmission.pdf Size of this preview: 463 599 pixels. Other...

  16. File:03AKCEncroachmentOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    AKCEncroachmentOverview.pdf Jump to: navigation, search File File history File usage Metadata File:03AKCEncroachmentOverview.pdf Size of this preview: 463 599 pixels. Other...

  17. File:06ORATransportationPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    ORATransportationPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06ORATransportationPermit.pdf Size of this preview: 463 599 pixels. Other...

  18. File:06NVATransportationPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    NVATransportationPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06NVATransportationPermit.pdf Size of this preview: 463 599 pixels. Other...

  19. File:08CAACaliforniaTransmission.pdf | Open Energy Information

    Open Energy Info (EERE)

    CAACaliforniaTransmission.pdf Jump to: navigation, search File File history File usage Metadata File:08CAACaliforniaTransmission.pdf Size of this preview: 463 599 pixels. Other...

  20. File:06AKATransportationOversizeOverweight.pdf | Open Energy...

    Open Energy Info (EERE)

    6AKATransportationOversizeOverweight.pdf Jump to: navigation, search File File history File usage Metadata File:06AKATransportationOversizeOverweight.pdf Size of this preview: 463...

  1. File:07CACCaliforniaEnergyFacilityCPUCProcess.pdf | Open Energy...

    Open Energy Info (EERE)

    CACCaliforniaEnergyFacilityCPUCProcess.pdf Jump to: navigation, search File File history File usage Metadata File:07CACCaliforniaEnergyFacilityCPUCProcess.pdf Size of this preview:...

  2. File:03CACEncroachmentPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    CACEncroachmentPermit.pdf Jump to: navigation, search File File history File usage Metadata File:03CACEncroachmentPermit.pdf Size of this preview: 463 599 pixels. Other...

  3. File:06FDAEPAConstructionGeneralPermitConstructionStormwater...

    Open Energy Info (EERE)

    06FDAEPAConstructionGeneralPermitConstructionStormwater.pdf Jump to: navigation, search File File history File usage Metadata File:06FDAEPAConstructionGeneralPermitConstructionStor...

  4. File:07ORDExpeditedPlantCommissioningProcess.pdf | Open Energy...

    Open Energy Info (EERE)

    ORDExpeditedPlantCommissioningProcess.pdf Jump to: navigation, search File File history File usage Metadata File:07ORDExpeditedPlantCommissioningProcess.pdf Size of this preview:...

  5. File:03IDCEncroachmentPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    IDCEncroachmentPermit.pdf Jump to: navigation, search File File history File usage Metadata File:03IDCEncroachmentPermit.pdf Size of this preview: 463 599 pixels. Other...

  6. File:08MTATransmission (3).pdf | Open Energy Information

    Open Energy Info (EERE)

    08MTATransmission (3).pdf Jump to: navigation, search File File history File usage Metadata File:08MTATransmission (3).pdf Size of this preview: 463 599 pixels. Other...

  7. File:CDPHE Industrial Individual Wastewater Discharge Permit...

    Open Energy Info (EERE)

    CDPHE Industrial Individual Wastewater Discharge Permit Application.pdf Jump to: navigation, search File File history File usage Metadata File:CDPHE Industrial Individual...

  8. File:(PECC) Special Program on Climate Change SUMMARY (english...

    Open Energy Info (EERE)

    (PECC) Special Program on Climate Change SUMMARY (english).pdf Jump to: navigation, search File File history File usage File:(PECC) Special Program on Climate Change SUMMARY...

  9. T-550: Apache Denial of Service Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Apache 'APR-util' is prone to a vulnerability that may allow attackers to cause a denial-of-service condition. Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, may allow remote users to cause a Denial of Service (DoS - memory consumption).

  10. Vulnerability Analysis of Energy Delivery Control Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0-18381 Vulnerability Analysis of Energy Delivery Control Systems September 2011 Idaho National Laboratory Idaho Falls, Idaho 83415 http://www.inl.gov Prepared for the U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Under DOE Idaho Operations Office Contract DE-AC07-05ID14517 The INL is a U.S. Department of Energy National Laboratory operated by Battelle Energy Alliance DISCLAIMER This information was prepared as an account of work sponsored by an agency of the

  11. File:06COBConstructionStormWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    Login | Sign Up Search File Edit History File:06COBConstructionStormWaterPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06COBConstructio...

  12. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G.; Pedretti, Kevin Thomas Tauke; Mueller, Frank; Fiala, David; Brightwell, Ronald Brian

    2012-05-01

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  13. Social vulnerability indicators as a sustainable planning tool

    SciTech Connect (OSTI)

    Lee, Yung-Jaan

    2014-01-15

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts

  14. Policy Flash Archive Search File

    Office of Environmental Management (EM)

    ... Policy Flash Archive Search File 4 Flash2002-10 ... Principles; 2) Contract Terms and Conditions Required to ... Transaction Authority to enter into Technology Investment ...

  15. 1999 CBECS Public Use Files

    U.S. Energy Information Administration (EIA) Indexed Site

    only. Geographic identifiers and National Oceanic and Atmospheric Administration Weather Division identifiers are not included on any data files delivered to EIA. Geographic...

  16. File:INL-geothermal-mt.pdf | Open Energy Information

    Open Energy Info (EERE)

    current 12:41, 16 December 2010 Thumbnail for version as of 12:41, 16 December 2010 5,100 4,200 (1.99 MB) MapBot (Talk | contribs) Automated upload from NREL's "mapsearch"...

  17. Top 10 Vulnerabilities of Control Systems and Their Associated Migitations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (2006) | Department of Energy Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) This document addresses potential risks that can apply to some electricity sector organizations and provides practices that can help mitigate the risks. Each organization decides for itself the risks it can accept and the practices it deems appropriate to manage those risks. Top 10 Vulnerabilities of

  18. Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy System Vulnerabilities to Climate Change and Extreme Weather Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather This U.S. Department of Energy Office of Indian Energy report assesses climate change and extreme weather vulnerabilities specific to tribal energy infrastructure and systems in the contiguous United States and Alaska. It includes information about the impacts from climate change and extreme weather events on both onsite and offsite

  19. T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities

    Broader source: Energy.gov [DOE]

    Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities.

  20. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides practices that can help mitigate the potential risks that can occur to some electricity sector organizations. Each organization decides for itself the risks it can accept and the practices it deems appropriate to manage those risks. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED

  1. U-035: Adobe Flash Player Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    35: Adobe Flash Player Multiple Vulnerabilities U-035: Adobe Flash Player Multiple Vulnerabilities November 14, 2011 - 10:15am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities. PLATFORM: Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems Adobe Flash Player 11.0.1.153 and earlier versions for Android Adobe AIR 3.0 and earlier versions for Windows, Macintosh, and Android ABSTRACT: Adobe recommends users of Adobe Flash Player

  2. MEMORANDUM TO: FILE

    Office of Legacy Management (LM)

    ' a 7 > 3gI, q OH.I-r7.-I (jt' , ""7 MEMORANDUM TO: FILE FROM: ' 'Y OIL&i cz ,,,',, -------we- SUBJECT: SITE NAME: _____ CITY:-AQY&- --------------e----e-- OWNER(S) Owner contacted n yes =urr="t: ----- -Llz2-:---,-- -----___ &,&/4$- '1 :) ' if yes, data contacted ------------- TYPE OF OPERATION ----------------- a Research t Development lti- Facility Type 0 Production scale testing a Manufacturing 5 University 0 Research Organization 0 Government Sponsored

  3. MEMORANDUM TO: FILE FROM:

    Office of Legacy Management (LM)

    p' : , .; ' _ ' < 3.518 MEMORANDUM TO: FILE FROM: -Ye L&a --------e---e--- DATE 6j8/8 7 v---s -- ---------- SUBJECT: ;&l a+-b IA T~cornqm Q afib4 SITE NAME: CITY: & &&at leg co Current: ------------------------ Owner contacted 0 yes p no; if yem, date contacted --w---w------ TYPE OF OPERATION The T$SYI L-- Tj flmf ----------------- FResearch & Development a Facility 0 Production scale testing 0 Pilot Scale p Manufacturing 0 Bench Scale Process [3 University 0

  4. GlNTRM FILES

    Office of Legacy Management (LM)

    : .; GlNTRM FILES .- Red Rwtaaie!a .=?%A .-m JJullen mtoxges8ntuuo -006 .017 .olb J-m .021 .OLt .Ol2 *Jeta Lhh .029 .0X9 ,026 ~k~exwteethaae~oyeencloee~ttothxflcmrof bUckaide. After the deccxmdnatimpxcblarrrro mlved.the rt8tma dt&itO lo- &ctioacoilrpasdistuEeed. 1. . ,, -. . . ' The conparty visited 3~ciali.z.e~ ja the a.ppLicatica of Znductiw beat. The purpose of this trip wa s to advise on haaBh and safety measures for the preoceeptance testing of inductioo heat treating equipment

  5. HEMORANDUH TO: FILE DATE

    Office of Legacy Management (LM)

    HEMORANDUH TO: FILE DATE 1123 lLjl ---WV-------------- FROM: P. s&w+ -------v-----s-- SUBJECT: lJ+ - e;& SITE NAME: LJo"zL - /L,' de Cd -J--h=- ALTERNATE l --e-e-- ------w------- ---,,,' ,m--, NAME: ---------------------- CITY: LL-pL~ ------------ ------------- STATE3 e--w-- OWNER tS) -----w-- Past I --k-!!.l~ -pa L . -v-----w------- Current: Owner contac?-ed 0 yes 0 no; if yes, I+Lff A zid;&m - -------------------------- date contacted ------B--m--- TYPE OF OPERATION

  6. GTRI: Removing Vulnerable Civilian Nuclear and Radiological Material...

    National Nuclear Security Administration (NNSA)

    GTRI: Removing Vulnerable Civilian Nuclear and Radiological Material May 29, 2014 GTRI's Remove Program works around the world to remove excess nuclear and radiological materials ...

  7. V-107: Wireshark Multiple Denial of Service Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service).

  8. Mitigations for Security Vulnerabilities Found in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Mitigations for Security Vulnerabilities Found in Control System Networks (425.98 KB) More Documents & Publications Cyber Assessment Methods for SCADA Security Introduction SCADA ...

  9. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Introduction SCADA Security for Managers and Operators DOE National SCADA Test Bed Program ...

  10. Common Cyber Security Vulnerabilities Observed in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems - 2011 Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems

  11. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Ireland) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Ireland Coordinates...

  12. U-172: OpenOffice.org Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in OpenOffice.org, which can be exploited by malicious people to compromise a user's system.

  13. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  14. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    France) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country France Coordinates...

  15. T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.

  16. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    United Kingdom) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country United Kingdom...

  17. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    :"","inlineLabel":"","visitedicon":"" Display map Period 2011-2014 References EU Smart Grid Projects Map1 Overview AFTER addresses vulnerability evaluation and contingency...

  18. V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by vulnerabilities in the IBM JRE

  19. Tribal Energy System Vulnerabilities to Climate Change and Extreme...

    Broader source: Energy.gov (indexed) [DOE]

    on both onsite and offsite tribally owned and non-tribally owned energy infrastructure. ... Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience ...

  20. T-578: Vulnerability in MHTML Could Allow Information Disclosure |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 8: Vulnerability in MHTML Could Allow Information Disclosure T-578: Vulnerability in MHTML Could Allow Information Disclosure March 15, 2011 - 3:05pm Addthis PROBLEM: Microsoft Windows is prone to a vulnerability that may allow attackers to inject arbitrary script code into the current browser session. PLATFORM: Windows 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct

  1. Tribal Energy System Vulnerabilities to Climate Change and Extreme...

    Broader source: Energy.gov (indexed) [DOE]

    Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather ii NOTICE This ... States government or any agency thereof. energy.govindianenergy | indianenergy@hq.doe.go...

  2. V-082: Novell GroupWise Client Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Novell GroupWise Client, which can be exploited by malicious people to compromise a user's system.

  3. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Germany) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Germany Coordinates...

  4. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits.

  5. V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    source code repository Addthis Related Articles V-222: SUSE update for Filezilla V-157: Adobe Reader Acrobat Multiple Vulnerabilities V-066: Adobe AcrobatReader Multiple Flaws...

  6. U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

  7. V-062: Asterisk Two Denial of Service Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Asterisk, which can be exploited by malicious users and malicious people to cause a DoS (Denial of Service).

  8. Costs of strikes between vulnerable missile forces

    SciTech Connect (OSTI)

    Canavan, G.H.

    1997-02-01

    This note derives the first and second strike magnitudes and costs for strikes between vulnerable missile forces with multiple warheads. The extension to mixes with invulnerable missiles is performed in a companion note. Stability increases as the number of weapons per missile is reduced. The optimal allocation of weapons between missiles and value is significant in predicting the stability impact of the reduction of the number of weapons per missile at large numbers of missiles, less significant in reducing the number of missiles for fixed weapons per missile. At low numbers of missiles, the stability indices for singlet and triplet configurations are comparable, as are the number of weapons each would deliver on value targets.

  9. MODELING UNDERGROUND STRUCTURE VULNERABILITY IN JOINTED ROCK

    SciTech Connect (OSTI)

    R. SWIFT; D. STEEDMAN

    2001-02-01

    The vulnerability of underground structures and openings in deep jointed rock to ground shock attack is of chief concern to military planning and security. Damage and/or loss of stability to a structure in jointed rock, often manifested as brittle failure and accompanied with block movement, can depend significantly on jointed properties, such as spacing, orientation, strength, and block character. We apply a hybrid Discrete Element Method combined with the Smooth Particle Hydrodynamics approach to simulate the MIGHTY NORTH event, a definitive high-explosive test performed on an aluminum lined cylindrical opening in jointed Salem limestone. Representing limestone with discrete elements having elastic-equivalence and explicit brittle tensile behavior and the liner as an elastic-plastic continuum provides good agreement with the experiment and damage obtained with finite-element simulations. Extending the approach to parameter variations shows damage is substantially altered by differences in joint geometry and liner properties.

  10. File Storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Storage and I/O File Storage and I/O Disk Quota Change Request Form Cori File Systems The Cori system has 3 different user-accessible file systems; they provide different levels of disk storage and I/O performance. The table below describes these systems. File System Home Scratch Project Environment Variable $HOME $SCRATCH None. Must use /project/projectdirs/ Description Global home file system shared with other NERSC systems. All NERSC machines mount the same home directory. GPFS

  11. Resolved: Hopper /scratch file system slow

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hopper /scratch file system slow Resolved: Hopper /scratch file system slow August 6, 2014 Symptom: Users have reported scripts hung when involving file copies from/to the /scratch file system, or jobs running in /scratch are slower than before since late last week. Workaround: If it is convenient, move your workflow to /scratch2 temporarily, avoid any reference to /scratch. It includes setting your input files directory, your batch job submission directory, your executable file location, and

  12. Portable File Format (PFF) specifications.

    SciTech Connect (OSTI)

    Dolan, Daniel H.,

    2015-02-01

    Created at Sandia National Laboratories, the Portable File Format (PFF) allows binary data transfer across computer platforms. Although this capability is supported by many other formats, PFF files are still in use at Sandia, particularly in pulsed power research. This report provides detailed PFF specifications for accessing data without relying on legacy code.

  13. Resolved: Hopper /scratch file system slow

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    your input files directory, your batch job submission directory, your executable file location, and the TMPDIR setting (which is set to SCRATCH by default). Status: This...

  14. Instructions to CBECS 1995 Microdata Files

    U.S. Energy Information Administration (EIA) Indexed Site

    5 Files WHAT IS CBECS? Please Note: These microdata files, which contain building characteristics, energy consumption and expenditures, and energy end-use estimates replace the...

  15. Help:Managing files | Open Energy Information

    Open Energy Info (EERE)

    file." Click "Browse" next to the "Source filename:" to locate the file on your computer (the name of the "browse" button depends on your web browser). Change the...

  16. Amended Environmental Impact Statement Filing System Guidance...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Amended Environmental Impact Statement Filing System Guidance (EPA, 2012) Amended Environmental Impact Statement Filing System Guidance (EPA, 2012) Amended Environmental Impact ...

  17. PDF File Information (pbl/help)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Site Help > Help Power Services Site Map Searching for Text Other Navigation Aids PDF File Info Firstgov PDF File Information Many of the documents available on the Power...

  18. Edison File Storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Storage & File Systems Application Performance Data & Analytics Job Logs & Statistics ... File System Home Local Scratch Project Global Scratch Environment Variable Definition ...

  19. Storing files in a parallel computing system using list-based index to identify replica files

    DOE Patents [OSTI]

    Faibish, Sorin; Bent, John M.; Tzelnic, Percy; Zhang, Zhenhua; Grider, Gary

    2015-07-21

    Improved techniques are provided for storing files in a parallel computing system using a list-based index to identify file replicas. A file and at least one replica of the file are stored in one or more storage nodes of the parallel computing system. An index for the file comprises at least one list comprising a pointer to a storage location of the file and a storage location of the at least one replica of the file. The file comprises one or more of a complete file and one or more sub-files. The index may also comprise a checksum value for one or more of the file and the replica(s) of the file. The checksum value can be evaluated to validate the file and/or the file replica(s). A query can be processed using the list.

  20. File:NREL-bhutan-wind.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit with form History File:NREL-bhutan-wind.pdf Jump to: navigation, search File File history File usage Bhutan - 50m Wind Power Size of this preview: 776 600 pixels. Full...

  1. File:NREL-BioMap.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit with form History File:NREL-BioMap.pdf Jump to: navigation, search File File history File usage Biomass Power Potential (GW) on Federal Lands by County Size of this...

  2. File:NREL-brazil-glo.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit with form History File:NREL-brazil-glo.pdf Jump to: navigation, search File File history File usage Brazil - Annual Global Horizontal Solar Radiation Size of this...

  3. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  4. EnergyPlus File Generator

    Broader source: Energy.gov [DOE]

    EERE EnergyPlus Factsheet - This fact sheet discusses the EnergyPlus Example File Generator, a free, Web-based service which makes it easier to use EnergyPlus, DOE's building energy analysis and thermal load simulation program. The web-based form allows a user to enter general information about a building and the application then automatically creates a complete EnergyPlus input file, runs an annual simulation, and emails the EnergyPlus input, output, DXF and other files along with an annual summary of the energy results.

  5. U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  6. U-022: Apple QuickTime Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  7. Reading File Bonneville Power Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Reading File Bonneville Power Administration P.O. Box 3621 Portland, Oregon 97208-3621 POWER SERVICES In reply refer to: PG-5 Ms. Renata Kurschner Director, Generation Resource...

  8. Automated Vulnerability Detection for Compiled Smart Grid Software

    SciTech Connect (OSTI)

    Prowell, Stacy J; Pleszkoch, Mark G; Sayre, Kirk D; Linger, Richard C

    2012-01-01

    While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

  9. Vulnerability Assessment for Cascading Failures in Electric Power Systems

    SciTech Connect (OSTI)

    Baldick, R.; Chowdhury, Badrul; Dobson, Ian; Dong, Zhao Yang; Gou, Bei; Hawkins, David L.; Huang, Zhenyu; Joung, Manho; Kim, Janghoon; Kirschen, Daniel; Lee, Stephen; Li, Fangxing; Li, Juan; Li, Zuyi; Liu, Chen-Ching; Luo, Xiaochuan; Mili, Lamine; Miller, Stephen; Nakayama, Marvin; Papic, Milorad; Podmore, Robin; Rossmaier, John; Schneider, Kevin P.; Sun, Hongbin; Sun, Kai; Wang, David; Wu, Zhigang; Yao, Liangzhong; Zhang, Pei; Zhang, Wenjie; Zhang, Xiaoping

    2008-09-10

    Cascading failures present severe threats to power grid security, and thus vulnerability assessment of power grids is of significant importance. Focusing on analytic methods, this paper reviews the state of the art of vulnerability assessment methods in the context of cascading failures in three categories: steady-state modeling based analysis; dynamic modeling analysis; and non-traditional modeling approaches. The impact of emerging technologies including phasor technology, high-performance computing techniques, and visualization techniques on the vulnerability assessment of cascading failures is then addressed, and future research directions are presented.

  10. T-614: Cisco Unified Communications Manager Database Security Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 14: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis PROBLEM: Cisco Unified Communications Manager contains a vulnerability that could allow an authenticated, remote attacker to inject arbitrary script code on a targeted system. PLATFORM: Cisco Unified Communications Manager versions prior to 8.5(1), 8.0(3), 7.1(5)su1, and 6.1(5)su2 are

  11. U-191: Oracle Java Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Oracle Java Multiple Vulnerabilities U-191: Oracle Java Multiple Vulnerabilities June 14, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Oracle Java, which can be exploited by malicious local users PLATFORM: Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Sun Java JDK 1.5.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x Sun Java SDK 1.4.x ABSTRACT: The Critical Patch Update for Java SE also includes

  12. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect (OSTI)

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  13. U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system.

  14. T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system.

  15. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience ...

  16. U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

  17. T-625: Opera Frameset Handling Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

  18. V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

  19. T-542: SAP Crystal Reports Server Multiple Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE)

    Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system.

  20. Mapping Climate Change Vulnerability and Impact Scenarios - A...

    Open Energy Info (EERE)

    guidebook assists planners working at the sub-national levels to identify and map the nature of current and future vulnerability to long-term climate change so that appropriate...

  1. V-118: IBM Lotus Domino Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to version 9.0 or update to version 8.5.3 Fix Pack 4 when available Addthis Related Articles T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment Service...

  2. V-173: Plesk 0-Day Vulnerability | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    versions 8.6, 9.0, 9.2, 9.3, and 9.5.4 ABSTRACT: The vulnerability is caused due to PHP misconfiguration in the affected application REFERENCE LINKS: Seclist.org TrendMicro...

  3. File:SWERA-247.pdf | Open Energy Information

    Open Energy Info (EERE)

    navigation, search File File history File usage Solar: monthly global horizontal (GHI) GIS data at 40km resolution for Bangladesh from NREL Size of this preview: 776 600...

  4. File:INL-geothermal-ca.pdf | Open Energy Information

    Open Energy Info (EERE)

    ca.pdf Jump to: navigation, search File File history File usage California Geothermal Resources Size of this preview: 439 599 pixels. Other resolution: 439 600 pixels. Full...

  5. File:PoliticsofFracking.pdf | Open Energy Information

    Open Energy Info (EERE)

    instructions for more information) File usage The following page links to this file: Hydraulic Fracturing Retrieved from "http:en.openei.orgwindex.php?titleFile:Politicso...

  6. File:PerspectiveHealthNatGas.pdf | Open Energy Information

    Open Energy Info (EERE)

    instructions for more information) File usage The following page links to this file: Hydraulic Fracturing Retrieved from "http:en.openei.orgwindex.php?titleFile:Perspecti...

  7. File:FrackingFacts.pdf | Open Energy Information

    Open Energy Info (EERE)

    instructions for more information) File usage The following page links to this file: Hydraulic Fracturing Retrieved from "http:en.openei.orgwindex.php?titleFile:FrackingF...

  8. File:INL-geothermal-west-usa.pdf | Open Energy Information

    Open Energy Info (EERE)

    INL-geothermal-west-usa.pdf Jump to: navigation, search File File history File usage Western United States Geothermal Resources Size of this preview: 653 599 pixels. Other...

  9. File:Breakout Session Groups.pdf | Open Energy Information

    Open Energy Info (EERE)

    information) File usage The following page links to this file: Energy Data InitiativeResources Retrieved from "http:en.openei.orgwindex.php?titleFile:BreakoutSessionGro...

  10. File:EIA-conventional-gas.pdf | Open Energy Information

    Open Energy Info (EERE)

    conventional-gas.pdf Jump to: navigation, search File File history File usage Natural Gas Production in Conventional Fields, Lower 48 States Size of this preview: 776 600...

  11. File:BrazilTMYst 238.pdf | Open Energy Information

    Open Energy Info (EERE)

    238.pdf Jump to: navigation, search File File history File usage Meteorology: map of Brazil selected meteorological stations and elevation from NREL Size of this preview: 776 ...

  12. File:NREL-brazil-dir.pdf | Open Energy Information

    Open Energy Info (EERE)

    brazil-dir.pdf Jump to: navigation, search File File history File usage Brazil - Annual Direct Normal Solar Radiation Size of this preview: 776 600 pixels. Full resolution...

  13. File:Cubametst 59.pdf | Open Energy Information

    Open Energy Info (EERE)

    59.pdf Jump to: navigation, search File File history File usage Meteorology: map of Cuba selected meteorological stations and elevation from NREL Size of this preview: 776 ...

  14. File:Fut oilp 03.pdf | Open Energy Information

    Open Energy Info (EERE)

    Jump to: navigation, search File File history File usage Future Oil Resources and Country Oil Consumption (September 2005) Size of this preview: 800 585 pixels. Full resolution...

  15. U.S. Energy Sector Vulnerability Report | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U.S. Energy Sector Vulnerability Report U.S. Energy Sector Vulnerability Report As part of the Administration's efforts to support climate change preparedness and resilience planning -- and to advance the Energy Department's goal of promoting energy security -- the Department is assessing the threats of climate change and extreme weather to the Nation' energy system. Two reports have been released that examine the current and potential future impacts of climate change and extreme weather on the

  16. T-596: 0-Day Windows Network Interception Configuration Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 96: 0-Day Windows Network Interception Configuration Vulnerability T-596: 0-Day Windows Network Interception Configuration Vulnerability April 6, 2011 - 5:48am Addthis PROBLEM: 0-Day exploit of IPv4 and IPv6 mechanics and how it applies to Microsoft Windows Operating systems. PLATFORM: Microsoft Operating Systems (OS) Windows Vista, Windows 7, and Windows 2008 Server ABSTRACT: The links below describe a parasitic IPv6 layered over a native IPv4 network. This attack can

  17. Common Cyber Security Vulnerabilities Observed in Control System

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessments by the INL NSTB Program | Department of Energy Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program This document presents results from 16 control system assessments performed under the NSTB program from 2003 through 2007. Information found in individual stakeholder reports is protected from disclosure. Researchers recognized that

  18. File:DIA Visual Development.pdf | Open Energy Information

    Open Energy Info (EERE)

    DIA Visual Development.pdf Jump to: navigation, search File File history File usage File:DIA Visual Development.pdf Size of this preview: 800 600 pixels. Go to page 1 2 3 4 5 6...

  19. File:05NVBSundryNotice (2).pdf | Open Energy Information

    Open Energy Info (EERE)

    5NVBSundryNotice (2).pdf Jump to: navigation, search File File history File usage Metadata File:05NVBSundryNotice (2).pdf Size of this preview: 463 599 pixels. Other resolution:...

  20. File:DEQ Circular 2.pdf | Open Energy Information

    Open Energy Info (EERE)

    DEQ Circular 2.pdf Jump to: navigation, search File File history File usage File:DEQ Circular 2.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go...

  1. File:(131112) Presentacion LAC LEDs.pdf | Open Energy Information

    Open Energy Info (EERE)

    (131112) Presentacion LAC LEDs.pdf Jump to: navigation, search File File history File usage File:(131112) Presentacion LAC LEDs.pdf Size of this preview: 800 600 pixels. Go to...

  2. File:09HICHawaiiEISProcess (1).pdf | Open Energy Information

    Open Energy Info (EERE)

    09HICHawaiiEISProcess (1).pdf Jump to: navigation, search File File history File usage File:09HICHawaiiEISProcess (1).pdf Size of this preview: 463 599 pixels. Other resolution:...

  3. File:04HIAExplorationPermit (1).pdf | Open Energy Information

    Open Energy Info (EERE)

    4HIAExplorationPermit (1).pdf Jump to: navigation, search File File history File usage Metadata File:04HIAExplorationPermit (1).pdf Size of this preview: 463 599 pixels. Other...

  4. File:03CODAccessPermit (1).pdf | Open Energy Information

    Open Energy Info (EERE)

    3CODAccessPermit (1).pdf Jump to: navigation, search File File history File usage Metadata File:03CODAccessPermit (1).pdf Size of this preview: 463 599 pixels. Other resolution:...

  5. File:Sw swppp guide.pdf | Open Energy Information

    Open Energy Info (EERE)

    Sw swppp guide.pdf Jump to: navigation, search File File history File usage File:Sw swppp guide.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go...

  6. File:INL-geothermal-hi.pdf | Open Energy Information

    Open Energy Info (EERE)

    hi.pdf Jump to: navigation, search File File history File usage Hawaii Geothermal Resources Size of this preview: 748 600 pixels. Full resolution (4,566 3,660 pixels, file...

  7. File:HI well abandonment.pdf | Open Energy Information

    Open Energy Info (EERE)

    HI well abandonment.pdf Jump to: navigation, search File File history File usage File:HI well abandonment.pdf Size of this preview: 364 600 pixels. Full resolution (1,275 ...

  8. File:Title V Checklist.pdf | Open Energy Information

    Open Energy Info (EERE)

    Title V Checklist.pdf Jump to: navigation, search File File history File usage File:Title V Checklist.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  9. File:Wind-turbine-economics-student.pdf | Open Energy Information

    Open Energy Info (EERE)

    Wind-turbine-economics-student.pdf Jump to: navigation, search File File history File usage Metadata File:Wind-turbine-economics-student.pdf Size of this preview: 463 599...

  10. File:Wind-turbine-economics-teacher.pdf | Open Energy Information

    Open Energy Info (EERE)

    Wind-turbine-economics-teacher.pdf Jump to: navigation, search File File history File usage Metadata File:Wind-turbine-economics-teacher.pdf Size of this preview: 463 599...

  11. File:Wind-turbine-economics-lp.pdf | Open Energy Information

    Open Energy Info (EERE)

    Wind-turbine-economics-lp.pdf Jump to: navigation, search File File history File usage Metadata File:Wind-turbine-economics-lp.pdf Size of this preview: 463 599 pixels. Other...

  12. File:DOD DOI MOU.pdf | Open Energy Information

    Open Energy Info (EERE)

    DOD DOI MOU.pdf Jump to: navigation, search File File history File usage File:DOD DOI MOU.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to...

  13. File:0 - OverallFlow-1.pdf | Open Energy Information

    Open Energy Info (EERE)

    OverallFlow-1.pdf Jump to: navigation, search File File history File usage Metadata File:0 - OverallFlow-1.pdf Size of this preview: 463 599 pixels. Other resolution: 464 ...

  14. File:Application procedures.pdf | Open Energy Information

    Open Energy Info (EERE)

    Application procedures.pdf Jump to: navigation, search File File history File usage File:Application procedures.pdf Size of this preview: 463 599 pixels. Other resolution: 464...

  15. File:07HICCertificationOfPublicConvenienceAndNecessity.pdf |...

    Open Energy Info (EERE)

    7HICCertificationOfPublicConvenienceAndNecessity.pdf Jump to: navigation, search File File history File usage Metadata File:07HICCertificationOfPublicConvenienceAndNecessity.pdf...

  16. File:03IDDIndustrialLease.pdf | Open Energy Information

    Open Energy Info (EERE)

    03IDDIndustrialLease.pdf Jump to: navigation, search File File history File usage File:03IDDIndustrialLease.pdf Size of this preview: 463 599 pixels. Other resolution: 464 ...

  17. File:07NVCStatePUCProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    07NVCStatePUCProcess.pdf Jump to: navigation, search File File history File usage Metadata File:07NVCStatePUCProcess.pdf Size of this preview: 463 599 pixels. Other resolution:...

  18. File:OperatingPermitCheckList.pdf | Open Energy Information

    Open Energy Info (EERE)

    OperatingPermitCheckList.pdf Jump to: navigation, search File File history File usage File:OperatingPermitCheckList.pdf Size of this preview: 463 599 pixels. Other resolution:...

  19. File:04IDAStateExplorationProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    IDAStateExplorationProcess.pdf Jump to: navigation, search File File history File usage Metadata File:04IDAStateExplorationProcess.pdf Size of this preview: 463 599 pixels....

  20. File:01AKALandUseConsiderations.pdf | Open Energy Information

    Open Energy Info (EERE)

    1AKALandUseConsiderations.pdf Jump to: navigation, search File File history File usage Metadata File:01AKALandUseConsiderations.pdf Size of this preview: 463 599 pixels. Other...

  1. File:04UTAStateExplorationProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    04UTAStateExplorationProcess.pdf Jump to: navigation, search File File history File usage Metadata File:04UTAStateExplorationProcess.pdf Size of this preview: 463 599 pixels....

  2. File:09FDDBLMAppealsProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    9FDDBLMAppealsProcess.pdf Jump to: navigation, search File File history File usage Metadata File:09FDDBLMAppealsProcess.pdf Size of this preview: 463 599 pixels. Other...

  3. File:04TXAStateExplorationProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    4TXAStateExplorationProcess.pdf Jump to: navigation, search File File history File usage Metadata File:04TXAStateExplorationProcess.pdf Size of this preview: 463 599 pixels....

  4. File:CaveProtectionLaw.pdf | Open Energy Information

    Open Energy Info (EERE)

    CaveProtectionLaw.pdf Jump to: navigation, search File File history File usage Metadata File:CaveProtectionLaw.pdf Size of this preview: 463 599 pixels. Other resolution: 464 ...

  5. File:03IDFLandUsePermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    3IDFLandUsePermit.pdf Jump to: navigation, search File File history File usage File:03IDFLandUsePermit.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  6. File:Salt2.pdf | Open Energy Information

    Open Energy Info (EERE)

    Salt2.pdf Jump to: navigation, search File File history File usage Metadata File:Salt2.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page...

  7. File:UtilityPermitFranchiseApp.pdf | Open Energy Information

    Open Energy Info (EERE)

    UtilityPermitFranchiseApp.pdf Jump to: navigation, search File File history File usage Metadata File:UtilityPermitFranchiseApp.pdf Size of this preview: 463 599 pixels. Other...

  8. File:2008Guidelines.pdf | Open Energy Information

    Open Energy Info (EERE)

    2008Guidelines.pdf Jump to: navigation, search File File history File usage File:2008Guidelines.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go...

  9. File:AEO2012earlyrelease.pdf | Open Energy Information

    Open Energy Info (EERE)

    AEO2012earlyrelease.pdf Jump to: navigation, search File File history File usage File:AEO2012earlyrelease.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  10. File:08TXATransmissionSiting.pdf | Open Energy Information

    Open Energy Info (EERE)

    08TXATransmissionSiting.pdf Jump to: navigation, search File File history File usage Metadata File:08TXATransmissionSiting.pdf Size of this preview: 463 599 pixels. Other...

  11. File:04AKCGeothermalExplorationPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    4AKCGeothermalExplorationPermit.pdf Jump to: navigation, search File File history File usage Metadata File:04AKCGeothermalExplorationPermit.pdf Size of this preview: 463 599...

  12. File:Notify98.pdf | Open Energy Information

    Open Energy Info (EERE)

    Notify98.pdf Jump to: navigation, search File File history File usage File:Notify98.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

  13. File:06IDCDrinkingWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    6IDCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06IDCDrinkingWaterPermit.pdf Size of this preview: 463 599 pixels. Other...

  14. File:03UTCStateEncroachmentOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    UTCStateEncroachmentOverview.pdf Jump to: navigation, search File File history File usage Metadata File:03UTCStateEncroachmentOverview.pdf Size of this preview: 463 599 pixels....

  15. File:01HIALandUseConsiderations.pdf | Open Energy Information

    Open Energy Info (EERE)

    01HIALandUseConsiderations.pdf Jump to: navigation, search File File history File usage Metadata File:01HIALandUseConsiderations.pdf Size of this preview: 463 599 pixels. Other...

  16. File:05AKADrillingWellDevelopment.pdf | Open Energy Information

    Open Energy Info (EERE)

    AKADrillingWellDevelopment.pdf Jump to: navigation, search File File history File usage Metadata File:05AKADrillingWellDevelopment.pdf Size of this preview: 463 599 pixels....

  17. File:0708pmtgpres.pdf | Open Energy Information

    Open Energy Info (EERE)

    0708pmtgpres.pdf Jump to: navigation, search File File history File usage File:0708pmtgpres.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to...

  18. File:01ORALandUseConsiderations.pdf | Open Energy Information

    Open Energy Info (EERE)

    1ORALandUseConsiderations.pdf Jump to: navigation, search File File history File usage Metadata File:01ORALandUseConsiderations.pdf Size of this preview: 463 599 pixels. Other...

  19. File:03TXBLandAccess.pdf | Open Energy Information

    Open Energy Info (EERE)

    TXBLandAccess.pdf Jump to: navigation, search File File history File usage Metadata File:03TXBLandAccess.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  20. File:03UTBStateEasementProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    03UTBStateEasementProcess.pdf Jump to: navigation, search File File history File usage Metadata File:03UTBStateEasementProcess.pdf Size of this preview: 463 599 pixels. Other...

  1. File:FormA1.pdf | Open Energy Information

    Open Energy Info (EERE)

    FormA1.pdf Jump to: navigation, search File File history File usage File:FormA1.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Full resolution...

  2. File:Div15.pdf | Open Energy Information

    Open Energy Info (EERE)

    Div15.pdf Jump to: navigation, search File File history File usage File:Div15.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3 4 5...

  3. File:03MTCEncroachmentOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    03MTCEncroachmentOverview.pdf Jump to: navigation, search File File history File usage Metadata File:03MTCEncroachmentOverview.pdf Size of this preview: 463 599 pixels. Other...

  4. File:03AKELandUsePermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    3AKELandUsePermit.pdf Jump to: navigation, search File File history File usage Metadata File:03AKELandUsePermit.pdf Size of this preview: 463 599 pixels. Other resolution: 464...

  5. File:06HICDrinkingWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    6HICDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06HICDrinkingWaterPermit.pdf Size of this preview: 463 599 pixels. Other...

  6. File:OilSands.pdf | Open Energy Information

    Open Energy Info (EERE)

    OilSands.pdf Jump to: navigation, search File File history File usage File:OilSands.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

  7. File:FormA2.pdf | Open Energy Information

    Open Energy Info (EERE)

    FormA2.pdf Jump to: navigation, search File File history File usage File:FormA2.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Full resolution...

  8. File:06UTATransportation.pdf | Open Energy Information

    Open Energy Info (EERE)

    6UTATransportation.pdf Jump to: navigation, search File File history File usage Metadata File:06UTATransportation.pdf Size of this preview: 463 599 pixels. Other resolution: 464...

  9. File:09IDAStateEnvironmentalProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    IDAStateEnvironmentalProcess.pdf Jump to: navigation, search File File history File usage File:09IDAStateEnvironmentalProcess.pdf Size of this preview: 463 599 pixels. Other...

  10. File:08HIABulkTransmissionSiting.pdf | Open Energy Information

    Open Energy Info (EERE)

    HIABulkTransmissionSiting.pdf Jump to: navigation, search File File history File usage Metadata File:08HIABulkTransmissionSiting.pdf Size of this preview: 463 599 pixels. Other...

  11. File:08CADPermitToConstruct.pdf | Open Energy Information

    Open Energy Info (EERE)

    CADPermitToConstruct.pdf Jump to: navigation, search File File history File usage Metadata File:08CADPermitToConstruct.pdf Size of this preview: 463 599 pixels. Other...

  12. File:FormA3.pdf | Open Energy Information

    Open Energy Info (EERE)

    FormA3.pdf Jump to: navigation, search File File history File usage File:FormA3.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Full resolution...

  13. File:VallesGeothermalAreasMap.pdf | Open Energy Information

    Open Energy Info (EERE)

    VallesGeothermalAreasMap.pdf Jump to: navigation, search File File history File usage Metadata File:VallesGeothermalAreasMap.pdf Size of this preview: 593 599 pixels. Other...

  14. File:08NVATransmission.pdf | Open Energy Information

    Open Energy Info (EERE)

    8NVATransmission.pdf Jump to: navigation, search File File history File usage File:08NVATransmission.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  15. File:FormA4.pdf | Open Energy Information

    Open Energy Info (EERE)

    FormA4.pdf Jump to: navigation, search File File history File usage File:FormA4.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3...

  16. File:05IDADrillingWellDevelopment.pdf | Open Energy Information

    Open Energy Info (EERE)

    5IDADrillingWellDevelopment.pdf Jump to: navigation, search File File history File usage Metadata File:05IDADrillingWellDevelopment.pdf Size of this preview: 463 599 pixels....

  17. File:03UTFEncroachmentPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    3UTFEncroachmentPermit.pdf Jump to: navigation, search File File history File usage Metadata File:03UTFEncroachmentPermit.pdf Size of this preview: 463 599 pixels. Other...

  18. File:03AKDStateNoncompetitiveMineralLeasingProcess.pdf | Open...

    Open Energy Info (EERE)

    3AKDStateNoncompetitiveMineralLeasingProcess.pdf Jump to: navigation, search File File history File usage Metadata File:03AKDStateNoncompetitiveMineralLeasingProcess.pdf Size of...

  19. File:VallesLocationMap.pdf | Open Energy Information

    Open Energy Info (EERE)

    VallesLocationMap.pdf Jump to: navigation, search File File history File usage Metadata File:VallesLocationMap.pdf Size of this preview: 800 479 pixels. Full resolution (934...

  20. File:06UTCDrinkingWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    UTCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06UTCDrinkingWaterPermit.pdf Size of this preview: 463 599 pixels. Other...

  1. File:App easement pdf.pdf | Open Energy Information

    Open Energy Info (EERE)

    App easement pdf.pdf Jump to: navigation, search File File history File usage File:App easement pdf.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  2. File:471503p.pdf | Open Energy Information

    Open Energy Info (EERE)

    471503p.pdf Jump to: navigation, search File File history File usage File:471503p.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3...

  3. File:EnergyResourcePermittingNV.pdf | Open Energy Information

    Open Energy Info (EERE)

    EnergyResourcePermittingNV.pdf Jump to: navigation, search File File history File usage File:EnergyResourcePermittingNV.pdf Size of this preview: 463 599 pixels. Other...

  4. File:LulApplicationForm.pdf | Open Energy Information

    Open Energy Info (EERE)

    LulApplicationForm.pdf Jump to: navigation, search File File history File usage File:LulApplicationForm.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  5. File:08COAStateTransmission.pdf | Open Energy Information

    Open Energy Info (EERE)

    8COAStateTransmission.pdf Jump to: navigation, search File File history File usage Metadata File:08COAStateTransmission.pdf Size of this preview: 463 599 pixels. Other...

  6. File:303003p.pdf | Open Energy Information

    Open Energy Info (EERE)

    303003p.pdf Jump to: navigation, search File File history File usage File:303003p.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3...

  7. File:03HICEncroachmentPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    3HICEncroachmentPermit.pdf Jump to: navigation, search File File history File usage Metadata File:03HICEncroachmentPermit.pdf Size of this preview: 463 599 pixels. Other...

  8. File:01WAALandUsePlanning.pdf | Open Energy Information

    Open Energy Info (EERE)

    1WAALandUsePlanning.pdf Jump to: navigation, search File File history File usage Metadata File:01WAALandUsePlanning.pdf Size of this preview: 463 599 pixels. Other resolution:...

  9. File:04FDBExplorationPreApplicationProcess.pdf | Open Energy...

    Open Energy Info (EERE)

    FDBExplorationPreApplicationProcess.pdf Jump to: navigation, search File File history File usage Metadata File:04FDBExplorationPreApplicationProcess.pdf Size of this preview: 463...

  10. File:01TXALandUsePlanning.pdf | Open Energy Information

    Open Energy Info (EERE)

    1TXALandUsePlanning.pdf Jump to: navigation, search File File history File usage Metadata File:01TXALandUsePlanning.pdf Size of this preview: 463 599 pixels. Other resolution:...

  11. File:06MTCDrinkingWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    6MTCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06MTCDrinkingWaterPermit.pdf Size of this preview: 463 599 pixels. Other...

  12. File:1985facilitysitingguide.pdf | Open Energy Information

    Open Energy Info (EERE)

    1985facilitysitingguide.pdf Jump to: navigation, search File File history File usage File:1985facilitysitingguide.pdf Size of this preview: 389 600 pixels. Go to page 1 2 3 4 5...

  13. File:06HIDOtherOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    06HIDOtherOverview.pdf Jump to: navigation, search File File history File usage File:06HIDOtherOverview.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  14. File:03FDBTribalLandLeasing.pdf | Open Energy Information

    Open Energy Info (EERE)

    03FDBTribalLandLeasing.pdf Jump to: navigation, search File File history File usage Metadata File:03FDBTribalLandLeasing.pdf Size of this preview: 463 599 pixels. Other...

  15. File:1200Capplicationf.pdf | Open Energy Information

    Open Energy Info (EERE)

    200Capplicationf.pdf Jump to: navigation, search File File history File usage File:1200Capplicationf.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  16. File:WindP.pdf | Open Energy Information

    Open Energy Info (EERE)

    WindP.pdf Jump to: navigation, search File File history File usage Metadata File:WindP.pdf Size of this preview: 466 599 pixels. Other resolution: 467 600 pixels. Go to page...

  17. File:04AKAStateExplorationProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    4AKAStateExplorationProcess.pdf Jump to: navigation, search File File history File usage Metadata File:04AKAStateExplorationProcess.pdf Size of this preview: 463 599 pixels....

  18. File:03NVBStateLandAccess.pdf | Open Energy Information

    Open Energy Info (EERE)

    NVBStateLandAccess.pdf Jump to: navigation, search File File history File usage Metadata File:03NVBStateLandAccess.pdf Size of this preview: 463 599 pixels. Other resolution:...

  19. File:08FDCNIETCProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    08FDCNIETCProcess.pdf Jump to: navigation, search File File history File usage Metadata File:08FDCNIETCProcess.pdf Size of this preview: 463 599 pixels. Other resolution: 464 ...

  20. File:06CAATransportationPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    6CAATransportationPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06CAATransportationPermit.pdf Size of this preview: 463 599 pixels. Other...

  1. File:06NVCDrinkingWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    6NVCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06NVCDrinkingWaterPermit.pdf Size of this preview: 463 599 pixels. Other...

  2. File:06AKCDrinkingWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    AKCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06AKCDrinkingWaterPermit.pdf Size of this preview: 463 599 pixels. Other...

  3. File:06IDATransportationPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    06IDATransportationPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06IDATransportationPermit.pdf Size of this preview: 463 599 pixels. Other...

  4. File:03MTEEncroachmentPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    3MTEEncroachmentPermit.pdf Jump to: navigation, search File File history File usage Metadata File:03MTEEncroachmentPermit.pdf Size of this preview: 463 599 pixels. Other...

  5. File:09HIBHawaiiEAProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    09HIBHawaiiEAProcess.pdf Jump to: navigation, search File File history File usage Metadata File:09HIBHawaiiEAProcess.pdf Size of this preview: 463 599 pixels. Other resolution:...

  6. File:03IDGTermEasement.pdf | Open Energy Information

    Open Energy Info (EERE)

    3IDGTermEasement.pdf Jump to: navigation, search File File history File usage Metadata File:03IDGTermEasement.pdf Size of this preview: 463 599 pixels. Other resolution: 464 ...

  7. File:05DrillingPermittingOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    5DrillingPermittingOverview.pdf Jump to: navigation, search File File history File usage Metadata File:05DrillingPermittingOverview.pdf Size of this preview: 463 599 pixels....

  8. File:03FDAFederalLandLeasing.pdf | Open Energy Information

    Open Energy Info (EERE)

    03FDAFederalLandLeasing.pdf Jump to: navigation, search File File history File usage Metadata File:03FDAFederalLandLeasing.pdf Size of this preview: 463 599 pixels. Other...

  9. File:03TXAStateGeothermalLease.pdf | Open Energy Information

    Open Energy Info (EERE)

    TXAStateGeothermalLease.pdf Jump to: navigation, search File File history File usage Metadata File:03TXAStateGeothermalLease.pdf Size of this preview: 463 599 pixels. Other...

  10. File:04FDAExplorationApplication.pdf | Open Energy Information

    Open Energy Info (EERE)

    4FDAExplorationApplication.pdf Jump to: navigation, search File File history File usage Metadata File:04FDAExplorationApplication.pdf Size of this preview: 463 599 pixels. Other...

  11. File:06UTBStormWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    UTBStormWaterPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06UTBStormWaterPermit.pdf Size of this preview: 463 599 pixels. Other resolution:...

  12. File:01ORALandUsePlanning.pdf | Open Energy Information

    Open Energy Info (EERE)

    1ORALandUsePlanning.pdf Jump to: navigation, search File File history File usage Metadata File:01ORALandUsePlanning.pdf Size of this preview: 463 599 pixels. Other resolution:...

  13. File:08AKATransmission.pdf | Open Energy Information

    Open Energy Info (EERE)

    8AKATransmission.pdf Jump to: navigation, search File File history File usage Metadata File:08AKATransmission.pdf Size of this preview: 463 599 pixels. Other resolution: 464 ...

  14. File:01LandUseOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    1LandUseOverview.pdf Jump to: navigation, search File File history File usage Metadata File:01LandUseOverview.pdf Size of this preview: 463 599 pixels. Other resolution: 464 ...

  15. File:UtahEnergyForumSiting.pdf | Open Energy Information

    Open Energy Info (EERE)

    UtahEnergyForumSiting.pdf Jump to: navigation, search File File history File usage File:UtahEnergyForumSiting.pdf Size of this preview: 800 600 pixels. Go to page 1 2 3 4 5 6 7...

  16. File:05NVADrillingWellDevelopment.pdf | Open Energy Information

    Open Energy Info (EERE)

    05NVADrillingWellDevelopment.pdf Jump to: navigation, search File File history File usage Metadata File:05NVADrillingWellDevelopment.pdf Size of this preview: 463 599 pixels....

  17. File:01NMALandUsePlanning.pdf | Open Energy Information

    Open Energy Info (EERE)

    01NMALandUsePlanning.pdf Jump to: navigation, search File File history File usage Metadata File:01NMALandUsePlanning.pdf Size of this preview: 463 599 pixels. Other resolution:...

  18. File:03IDELicenseAgreement.pdf | Open Energy Information

    Open Energy Info (EERE)

    IDELicenseAgreement.pdf Jump to: navigation, search File File history File usage File:03IDELicenseAgreement.pdf Size of this preview: 463 599 pixels. Other resolution: 464 ...

  19. File:04COAStateExplorationProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    4COAStateExplorationProcess.pdf Jump to: navigation, search File File history File usage Metadata File:04COAStateExplorationProcess.pdf Size of this preview: 463 599 pixels....

  20. File:06ORCDrinkingWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    06ORCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06ORCDrinkingWaterPermit.pdf Size of this preview: 463 599 pixels. Other...

  1. File:08HIATransmissionLineApproval.pdf | Open Energy Information

    Open Energy Info (EERE)

    8HIATransmissionLineApproval.pdf Jump to: navigation, search File File history File usage Metadata File:08HIATransmissionLineApproval.pdf Size of this preview: 463 599 pixels....

  2. File:06IDBConstructionStormwaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    6IDBConstructionStormwaterPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06IDBConstructionStormwaterPermit.pdf Size of this preview: 463 599...

  3. File:04CAAExploration.pdf | Open Energy Information

    Open Energy Info (EERE)

    4CAAExploration.pdf Jump to: navigation, search File File history File usage Metadata File:04CAAExploration.pdf Size of this preview: 463 599 pixels. Other resolution: 464 ...

  4. File:ExpeditedReview.pdf | Open Energy Information

    Open Energy Info (EERE)

    ExpeditedReview.pdf Jump to: navigation, search File File history File usage File:ExpeditedReview.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels....

  5. File:Ca1.pdf | Open Energy Information

    Open Energy Info (EERE)

    Ca1.pdf Jump to: navigation, search File File history File usage Metadata File:Ca1.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

  6. File:07TXAEnergyFacilitySiting.pdf | Open Energy Information

    Open Energy Info (EERE)

    07TXAEnergyFacilitySiting.pdf Jump to: navigation, search File File history File usage Metadata File:07TXAEnergyFacilitySiting.pdf Size of this preview: 463 599 pixels. Other...

  7. File:03COAGeothermalLease (5).pdf | Open Energy Information

    Open Energy Info (EERE)

    3COAGeothermalLease (5).pdf Jump to: navigation, search File File history File usage Metadata File:03COAGeothermalLease (5).pdf Size of this preview: 463 599 pixels. Other...

  8. File:4003-3 (1).pdf | Open Energy Information

    Open Energy Info (EERE)

    4003-3 (1).pdf Jump to: navigation, search File File history File usage File:4003-3 (1).pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Full...

  9. File:3-200-71.pdf | Open Energy Information

    Open Energy Info (EERE)

    3-200-71.pdf Jump to: navigation, search File File history File usage File:3-200-71.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

  10. File:3-200-43.pdf | Open Energy Information

    Open Energy Info (EERE)

    3-200-43.pdf Jump to: navigation, search File File history File usage File:3-200-43.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

  11. File:Invitation-English (2).pdf | Open Energy Information

    Open Energy Info (EERE)

    Invitation-English (2).pdf Jump to: navigation, search File File history File usage File:Invitation-English (2).pdf Size of this preview: 321 598 pixels. Other resolution: 322...

  12. File:Air Density Lab.pdf | Open Energy Information

    Open Energy Info (EERE)

    Air Density Lab.pdf Jump to: navigation, search File File history File usage Metadata File:Air Density Lab.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  13. File System Licenses in SLURM

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File System Licenses in SLURM Introduction Users can now specify the filesystems required for their jobs by requesting "licenses" for them in their batch scripts. With this new SLURM license feature, a batch job will not start if the specified file system is unavailable due to maintenance or an outage, or if we've detected that it's having performance issues. This will protect your jobs from failures or decreased performance from known issues. We encourage everyone to use the SLURM

  14. Property:File/Author | Open Energy Information

    Open Energy Info (EERE)

    Author Jump to: navigation, search Property Name FileAuthor Property Type String Description Individual that created the original file. Note that this will often not be the same...

  15. OHA Worker Appeal Cases Archive File

    Office of Energy Efficiency and Renewable Energy (EERE)

    This is a archive file of our Worker Appeal decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the bookmark...

  16. EPA to Require Electronic Filing of EISs

    Broader source: Energy.gov [DOE]

    Starting October 1, 2012, all Federal agencies must file their draft and final EISs electronically, pursuant to amended EIS Filing System Guidelines issued by the Environmental Protection Agency (EPA) (77 FR 51530; August 24, 2012).

  17. Climate variability and climate change vulnerability and adaptation. Workshop summary

    SciTech Connect (OSTI)

    Bhatti, N.; Cirillo, R.R.; Dixon, R.K.

    1995-12-31

    Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

  18. U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    42: Mac RealPlayer Multiple Vulnerabilities U-042: Mac RealPlayer Multiple Vulnerabilities November 21, 2011 - 9:15am Addthis PROBLEM: Mac RealPlayer Multiple Vulnerabilities. PLATFORM: Versions 12.0.0.1701 and prior. ABSTRACT: Multiple vulnerabilities have been reported in Mac RealPlayer, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory: SA46963 Secunia Vulnerability Report: Mac RealPlayer 12.x Secunia Advisory: SA46954 IMPACT

  19. Index of /radsafe/files

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    radsafe/files [ICO] Name Last modified Size Description [DIR] Parent Directory - [ ] directions for the radiation detector.doc 23-Jul-1999 00:13 38K [DIR] groundloop/ 05-Sep-2016 00:54 - [DIR] logs/ 05-Sep-2016 09:36 - [ ] test.eps 16-Nov-2010 08:28 25K

  20. The International Reactor Dosimetry File.

    Energy Science and Technology Software Center (OSTI)

    1994-01-19

    Version 01 The International Reactor Dosimetry File (IRDF-90) contains recommended neutron cross-section data to be used for reactor neutron dosimetry by foil activation. It also contains selected recommended values for radiation damage cross-sections and benchmark neutron spectra. This library supersedes all earlier versions of IRDF.

  1. Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains the Executive summary; Introduction; Summary of vulnerabilities; Management systems weaknesses; Commendable practices; Summary of management response plan; Conclusions; and a Glossary of chemical terms.

  2. Energy Department Issues Tribal Energy System Vulnerabilities to Climate

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Change and Extreme Weather Report, $6M for Native American Clean Energy Projects | Department of Energy Energy System Vulnerabilities to Climate Change and Extreme Weather Report, $6M for Native American Clean Energy Projects Energy Department Issues Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather Report, $6M for Native American Clean Energy Projects September 2, 2015 - 3:30pm Addthis NEWS MEDIA CONTACT 202-586-4940 DOENews@hq.doe.gov The U.S. Department of Energy

  3. A Metadata-Rich File System

    SciTech Connect (OSTI)

    Ames, S; Gokhale, M B; Maltzahn, C

    2009-01-07

    Despite continual improvements in the performance and reliability of large scale file systems, the management of file system metadata has changed little in the past decade. The mismatch between the size and complexity of large scale data stores and their ability to organize and query their metadata has led to a de facto standard in which raw data is stored in traditional file systems, while related, application-specific metadata is stored in relational databases. This separation of data and metadata requires considerable effort to maintain consistency and can result in complex, slow, and inflexible system operation. To address these problems, we have developed the Quasar File System (QFS), a metadata-rich file system in which files, metadata, and file relationships are all first class objects. In contrast to hierarchical file systems and relational databases, QFS defines a graph data model composed of files and their relationships. QFS includes Quasar, an XPATH-extended query language for searching the file system. Results from our QFS prototype show the effectiveness of this approach. Compared to the defacto standard, the QFS prototype shows superior ingest performance and comparable query performance on user metadata-intensive operations and superior performance on normal file metadata operations.

  4. File:07COCCertificateOfPublicConvenienceAndNecessity.pdf | Open...

    Open Energy Info (EERE)

    | Sign Up Search File Edit History File:07COCCertificateOfPublicConvenienceAndNecessity.pdf Jump to: navigation, search File File history File usage Metadata File:07COCCertificate...

  5. File:03COEUtilitySpecialUsePermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    Community Login | Sign Up Search File Edit History File:03COEUtilitySpecialUsePermit.pdf Jump to: navigation, search File File history File usage Metadata File:03COEUtilitySpec...

  6. Regulatory Guide on Conducting a Security Vulnerability Assessment

    SciTech Connect (OSTI)

    Ek, David R.

    2016-01-01

    This document will provide guidelines on conducting a security vulnerability assessment at a facility regulated by the Radiation Protection Centre. The guidelines provide a performance approach assess security effectiveness. The guidelines provide guidance for a review following the objectives outlined in IAEA NSS#11 for Category 1, 2, & 3 sources.

  7. Vulnerability of the US to future sea level rise

    SciTech Connect (OSTI)

    Gornitz, V. . Goddard Inst. for Space Studies); White, T.W.; Cushman, R.M. )

    1991-01-01

    The differential vulnerability of the conterminous United States to future sea level rise from greenhouse climate warming is assessed, using a coastal hazards data base. This data contains information on seven variables relating to inundation and erosion risks. High risk shorelines are characterized by low relief, erodible substrate, subsidence, shoreline retreat, and high wave/tide energies. Very high risk shorelines on the Atlantic Coast (Coastal Vulnerability Index {ge}33.0) include the outer coast of the Delmarva Peninsula, northern Cape Hatteras, and segments of New Jersey, Georgia and South Carolina. Louisiana and sections of Texas are potentially the most vulnerable, due to anomalously high relative sea level rise and erosion, coupled with low elevation and mobile sediments. Although the Pacific Coast is generally the least vulnerable, because of its rugged relief and erosion-resistant substrate, the high geographic variability leads to several exceptions, such as the San Joaquin-Sacramento Delta area, the barrier beaches of Oregon and Washington, and parts of the Puget Sound Lowlands. 31 refs., 2 figs., 3 tabs.

  8. Vulnerability analysis for complex networks using aggressive abstraction.

    SciTech Connect (OSTI)

    Colbaugh, Richard; Glass, Kristin L.

    2010-06-01

    Large, complex networks are ubiquitous in nature and society, and there is great interest in developing rigorous, scalable methods for identifying and characterizing their vulnerabilities. This paper presents an approach for analyzing the dynamics of complex networks in which the network of interest is first abstracted to a much simpler, but mathematically equivalent, representation, the required analysis is performed on the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit vulnerability-preserving, finite state abstractions, and develop efficient algorithms for computing these abstractions. We then propose a vulnerability analysis methodology which combines these finite state abstractions with formal analytics from theoretical computer science to yield a comprehensive vulnerability analysis process for networks of realworld scale and complexity. The potential of the proposed approach is illustrated with a case study involving a realistic electric power grid model and also with brief discussions of biological and social network examples.

  9. Sample Approval Memo for Admin Chg - DOE Directives, Delegations, and

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Requirements Sample Approval Memo for Admin Chg by Patricia Greeson Upload File Upload the file here Approval-Memo-AdminChg_6-27-16.docx - 17 KB Short Name approval-memo-adminchg

  10. The International Reactor Dosimetry File.

    Energy Science and Technology Software Center (OSTI)

    2008-08-07

    Version 01 The International Reactor Dosimetry File (IRDF-2002) contains recommended neutron cross-section data to be used for reactor neutron dosimetry by foil activation and subsequent neutron spectrum unfolding. It also contains selected recom�mended values for radiation damage cross-sections and benchmark neutron spectra. Two related programs available from NEADB and RSICC are: SPECTER-ANL (PSR-263) & STAY’SL (PSR-113).

  11. MEMORANDU TO: FILE FHOM: SUBJECT:

    Office of Legacy Management (LM)

    ' .- _. I _ ' 1.3 7 -3 , MEMORANDU TO: FILE FHOM: SUBJECT: Curre"t: Ll&k&&d ________ l- ; if yes, date contacted ___ 0 Production scale testing Cl Pilot Scale 0 Bench Scale Process 0 Theoretical Studies 0 Sample & Analysis 0 Production 0 Disposal /Storage TYPE OF CONTRACT --------------_- 0 Prime 13 Subcontract& 0 Purchase Order 0 Cl Facility Type 0 Manufacturing 0 University 0 Research Organization *i Government Sponsored Facility 0 Other --------------_-----_ Other

  12. BEM~RANDu~~ TO: FILE

    Office of Legacy Management (LM)

    BEM~RANDu~~ TO: FILE FROM: a. Rq- -__-----_- -_--- SUBJECT: cl;-; nAC; a-.. & ~3 -+.e-&&& SITE NAHE: CITY: M; /L-)-J L ce --_--__---__-~_~~~_-~~~~~~ STATE: WE -----_ OWNER(S) ------_- Past: ------------------------ Current: --_----_--_--------------- Owner ctx-atacted 0 yes 0 no) if ye8, date contacted ---__-------- TYPE OF OPERATION -_-__--_--_--_--_ 0 Research & Development w Facility Type 0 Production scale testing 0 Pilot Scale 0 Manufacturing (3 Bench Scale Process 0

  13. File:06MTAMontanaOverdimensionalOrOverweightLoadPermit (1).pdf...

    Open Energy Info (EERE)

    MTAMontanaOverdimensionalOrOverweightLoadPermit (1).pdf Jump to: navigation, search File File history File usage Metadata File:06MTAMontanaOverdimensionalOrOverweightLoadPermit...

  14. Empty values in upload? | OpenEI Community

    Open Energy Info (EERE)

    - 16:20 Groups Menu You must login in order to post into this group. Recent content Hello-Sorry for the delay in... Use of DynamicAggregationProcessor I submitted a pull...

  15. Error 401 on upload? | OpenEI Community

    Open Energy Info (EERE)

    - 14:30 Groups Menu You must login in order to post into this group. Recent content Hello-Sorry for the delay in... Use of DynamicAggregationProcessor I submitted a pull...

  16. Image upload with broken thumbnail image | OpenEI Community

    Open Energy Info (EERE)

    New page curation tool Posted: 7 May 2013 - 08:16 by Rmckeel Rmckeel 2013 Civic Hacking Day Ideas Posted: 19 Apr 2013 - 13:44 by Rmckeel 1 comment(s) 1 of 5 Groups...

  17. Small file aggregation in a parallel computing system

    DOE Patents [OSTI]

    Faibish, Sorin; Bent, John M.; Tzelnic, Percy; Grider, Gary; Zhang, Jingwang

    2014-09-02

    Techniques are provided for small file aggregation in a parallel computing system. An exemplary method for storing a plurality of files generated by a plurality of processes in a parallel computing system comprises aggregating the plurality of files into a single aggregated file; and generating metadata for the single aggregated file. The metadata comprises an offset and a length of each of the plurality of files in the single aggregated file. The metadata can be used to unpack one or more of the files from the single aggregated file.

  18. Climate Change and Infrastructure, Urban Systems, and Vulnerabilities

    SciTech Connect (OSTI)

    Wilbanks, Thomas J; Fernandez, Steven J

    2014-01-01

    This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events

  19. WEATHERIZATION ANNUAL FILE WORKSHEET | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    WEATHERIZATION ANNUAL FILE WORKSHEET WEATHERIZATION ANNUAL FILE WORKSHEET Form is designed to gather specific detail related to the expenditures of the Weatherization grant. WEATHERIZATION ANNUAL FILE WORKSHEET (134.96 KB) More Documents & Publications DOE F 540.3 WPN 06-3: Revised Weatherization Assistance Program Application Instructions and Forms WPN 04-4: Revised Weatherization Assistance Program Application Package and Reporting Format

  20. T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution

    Broader source: Energy.gov [DOE]

    Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

  1. Distributed File System Test Using Small FilesV1.1

    Energy Science and Technology Software Center (OSTI)

    2004-04-09

    This program tests distributed filesystems using small files for lock and metadata contention. It is useful for debugging.

  2. File:USFWSList.pdf | Open Energy Information

    Open Energy Info (EERE)

    1,650 pixels, file size: 79 KB, MIME type: applicationpdf, 5 pages) Summary US Fish and Wildlife Service Species List - Salt Wells Geothermal Drilling Project EA Licensing...

  3. Discussion of EIA-411 Data Files

    U.S. Energy Information Administration (EIA) Indexed Site

    Discussion of Data Files Release Date: December 22, 2011 Next Release Date: November 2012 Historical data are shown with the inclusion of the 'old' regional entity names and that information is contained in file marked with the year 2004 or earlier. For the latest reporting, starting in 2005, the current year data are shown in the last row(s) of each file and those data are shown aligned with the updated regional entity names. Each file contains information on the three power grids and/or

  4. Colorado - Access Permit Application File Review Checklist |...

    Open Energy Info (EERE)

    Jump to: navigation, search OpenEI Reference LibraryAdd to library General: Colorado - Access Permit Application File Review Checklist Author Colorado Department of Transportation...

  5. Core File Settings | Argonne Leadership Computing Facility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Core File Settings About Core Files By default, a rank that aborts will dump core, and the control system will signal the other ranks to quit (without dumping core). Multiple core files will be generated only when several ranks abort almost simultaneously. The ranks that do not dump core are those that received the system signal to quit before anything bad happened on that rank. The settings listed below can modify this behaviour in various ways. The core files generated will be in a lightweight

  6. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  7. U-028: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

  8. U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS).

  9. U-146: Adobe Reader/Acrobat Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe Reader/Acrobat Multiple Vulnerabilities U-146: Adobe Reader/Acrobat Multiple Vulnerabilities April 12, 2012 - 8:30am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Reader and Adobe Acrobat. PLATFORM: Adobe Acrobat 9.x Adobe Acrobat X 10.x Adobe Reader 9.x Adobe Reader X 10.x ABSTRACT: Vulnerabilities can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, gain knowledge of potentially sensitive

  10. Vulnerability, Sensitivity, and Coping/Adaptive Capacity Worldwide

    SciTech Connect (OSTI)

    Malone, Elizabeth L.; Brenkert, Antoinette L.

    2009-10-01

    Research and analyses have repeatedly shown that impacts of climate change will be unevenly distributed and will affect various societies in various ways. The severity of impacts will depend in part on ability to cope in the short term and adapt in the longer term. However, it has been difficult to find a comparative basis on which to assess differential impacts of climate change. This chapter describes the Vulnerability-Resilience Indicator Model that uses 18 proxy indicators, grouped into 8 elements, to assess on a quantitative basis the comparative potential vulnerability and resilience of countries to climate change. The model integrates socioeconomic and environmental information such as land use, crop production, water availability, per capita GDP, inequality, and health status. Comparative results for 160 countries are presented and analyzed.

  11. Subsidence vulnerability in shallow room-and-pillar mines

    SciTech Connect (OSTI)

    Missavage, R.

    1985-07-01

    Concern over mining-related subsidence is inhibiting the development of surface land uses in previously mined areas and is constraining the recovery of coal resources in areas with established land uses that might be impacted by subsequent subsidence. The determination of subsidence vulnerability of mined-out areas (especially abandoned mine areas) can be a useful tool in the design and location of surface structures. A model has been developed for assessing subsidence vulnerability in shallow room-and-pillar mines based on the flexural rigidity and strength characteristics of the overlying strata. The model does not predict the subsidence profile or when the subsidence will occur. It only predicts those areas that are likely to subside. This paper briefly describes the model and its testing.

  12. Agenda: Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  13. Briefing Memo: Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE)

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  14. Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution

    SciTech Connect (OSTI)

    Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

    2010-04-30

    Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

  15. Vulnerability Analysis of Energy Delivery Control Systems - 2011 |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Systems - 2011 Vulnerability Analysis of Energy Delivery Control Systems - 2011 Cybersecurity for energy delivery systems has emerged as one of the Nation's most serious grid modernization and infrastructure protection issues. Cyber adversaries are becoming increasingly targeted, sophisticated, and better financed. The energy sector must research, develop and deploy new cybersecurity capabilities faster than the adversary can launch new attack tools and techniques. The

  16. T-682:Double free vulnerability in MapServer

    Broader source: Energy.gov [DOE]

    MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

  17. Temperature-based Instanton Analysis: Identifying Vulnerability in Transmission Networks

    SciTech Connect (OSTI)

    Kersulis, Jonas; Hiskens, Ian; Chertkov, Michael; Backhaus, Scott N.; Bienstock, Daniel

    2015-04-08

    A time-coupled instanton method for characterizing transmission network vulnerability to wind generation fluctuation is presented. To extend prior instanton work to multiple-time-step analysis, line constraints are specified in terms of temperature rather than current. An optimization formulation is developed to express the minimum wind forecast deviation such that at least one line is driven to its thermal limit. Results are shown for an IEEE RTS-96 system with several wind-farms.

  18. Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather ii NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use

  19. Microsoft Word - MitigationsForVulnerabilitiesInCSNetworks.doc

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6 by ISA - The Instrumentation, Systems and Automation Society. Presented at 16th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference; http://www.isa.org Mitigations for Security Vulnerabilities Found in Control System Networks May Permann John Hammer Computer Security Researcher Computer Security Researcher Communications & Cyber Security Communications & Cyber Security Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 Kathy

  20. Climate Change Vulnerability Assessment for Idaho National Laboratory

    SciTech Connect (OSTI)

    Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

    2014-10-01

    The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

  1. File:Secondary wind factsheet.pdf | Open Energy Information

    Open Energy Info (EERE)

    this file. Metadata This file contains additional information, probably added from the digital camera or scanner used to create or digitize it. If the file has been modified from...

  2. File:Beaufort wind scale.pdf | Open Energy Information

    Open Energy Info (EERE)

    this file. Metadata This file contains additional information, probably added from the digital camera or scanner used to create or digitize it. If the file has been modified from...

  3. File:Intermediate wind factsheet.pdf | Open Energy Information

    Open Energy Info (EERE)

    this file. Metadata This file contains additional information, probably added from the digital camera or scanner used to create or digitize it. If the file has been modified from...

  4. File:Skystream specs powercurve.pdf | Open Energy Information

    Open Energy Info (EERE)

    this file. Metadata This file contains additional information, probably added from the digital camera or scanner used to create or digitize it. If the file has been modified from...

  5. File:TCEQ-CoreDataForm.pdf | Open Energy Information

    Open Energy Info (EERE)

    this file. Metadata This file contains additional information, probably added from the digital camera or scanner used to create or digitize it. If the file has been modified from...

  6. File:UST Construction Notification Form 0495.pdf | Open Energy...

    Open Energy Info (EERE)

    this file. Metadata This file contains additional information, probably added from the digital camera or scanner used to create or digitize it. If the file has been modified from...

  7. File:Hrow-application-checklist.pdf | Open Energy Information

    Open Energy Info (EERE)

    this file. Metadata This file contains additional information, probably added from the digital camera or scanner used to create or digitize it. If the file has been modified from...

  8. File:GWS-32.pdf | Open Energy Information

    Open Energy Info (EERE)

    this file. Metadata This file contains additional information, probably added from the digital camera or scanner used to create or digitize it. If the file has been modified from...

  9. File:Wind rough example.pdf | Open Energy Information

    Open Energy Info (EERE)

    this file. Metadata This file contains additional information, probably added from the digital camera or scanner used to create or digitize it. If the file has been modified from...

  10. File:GWS-31.pdf | Open Energy Information

    Open Energy Info (EERE)

    this file. Metadata This file contains additional information, probably added from the digital camera or scanner used to create or digitize it. If the file has been modified from...

  11. File:TCEQ-10204.pdf | Open Energy Information

    Open Energy Info (EERE)

    this file. Metadata This file contains additional information, probably added from the digital camera or scanner used to create or digitize it. If the file has been modified from...

  12. File:Ger geothermal form 1.pdf | Open Energy Information

    Open Energy Info (EERE)

    this file. Metadata This file contains additional information, probably added from the digital camera or scanner used to create or digitize it. If the file has been modified from...

  13. File:Elementray wind factsheet.pdf | Open Energy Information

    Open Energy Info (EERE)

    this file. Metadata This file contains additional information, probably added from the digital camera or scanner used to create or digitize it. If the file has been modified from...

  14. File:0 Overview - Hydro.pdf | Open Energy Information

    Open Energy Info (EERE)

    this file. Metadata This file contains additional information, probably added from the digital camera or scanner used to create or digitize it. If the file has been modified from...

  15. File:MacGyver windmills.pdf | Open Energy Information

    Open Energy Info (EERE)

    this file. Metadata This file contains additional information, probably added from the digital camera or scanner used to create or digitize it. If the file has been modified from...

  16. File:SWERA-202.pdf | Open Energy Information

    Open Energy Info (EERE)

    File File history File usage Solar: monthly and annual average global horizontal (GHI) GIS data at 40km resolution for Sri Lanka from NREL Size of this preview: 776 600...

  17. File:SWERA-253.pdf | Open Energy Information

    Open Energy Info (EERE)

    File File history File usage Solar: monthly and annual average global horizontal (GHI) GIS data at 40km resolution for Nepal from NREL Size of this preview: 776 600 pixels....

  18. File:CV TidePotential.pdf | Open Energy Information

    Open Energy Info (EERE)

    CV TidePotential.pdf Jump to: navigation, search File File history File usage Cape Verde-Map Summarizing Tide Potential Size of this preview: 776 600 pixels. Full resolution...

  19. File:CV WindSpeed.pdf | Open Energy Information

    Open Energy Info (EERE)

    CV WindSpeed.pdf Jump to: navigation, search File File history File usage Cape Verde-Map Summarizing Average Wind Speed (ms) Size of this preview: 776 600 pixels. Full...

  20. File:NREL-africa-dir.pdf | Open Energy Information

    Open Energy Info (EERE)

    navigation, search File File history File usage Africa - Annual Direct Normal Solar Radiation (PDF) Size of this preview: 776 600 pixels. Full resolution (1,650 1,275...