National Library of Energy BETA

Sample records for remote authenticated users

  1. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks...

  2. V-127: Samba Bug Lets Remote Authenticated Users Modify Files...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was...

  3. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  4. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system.

  5. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information

    Broader source: Energy.gov [DOE]

    Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information.

  6. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates

    Broader source: Energy.gov [DOE]

    A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases.

  7. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote authenticated user can execute arbitrary code on the target system. A remote authenticated user can modify the configuration on the target system. A remote user can cause denial of service conditions.

  8. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let Remote Users Conduct Cross-Site Scripting Attacks | Department of Energy 51: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks May 8, 2013 - 12:06am Addthis PROBLEM: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks

  9. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Password | Department of Energy 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker

  10. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  11. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote ... The vendor has issued a fix (5.3SP1). Addthis Related Articles V-084: RSA Archer eGRC ...

  12. U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases.

  13. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  14. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    issued a fix (7.1.2). Addthis Related Articles U-267: RSA Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability...

  15. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated...

  16. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration.

  17. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain...

  18. V-223: RSA Authentication Agent for PAM Allows Remote Users to...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    has issued a fix Addthis Related Articles U-267: RSA Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability...

  19. U-084: Cisco Digital Media Manager Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port 8443 to access administrative resources and gain administrative privileges....

  20. T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges.

  1. U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444 Bugtraq ID: 55184 CVE-2012-4595, CVE-2012-4596, CVE-2012-4597 IMPACT ASSESSMENT: Medium Discussion A remote...

  2. U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions.

  3. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent...

  4. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access

    Broader source: Energy.gov [DOE]

    Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition. Additionally, Cisco TelePresence TC Software contain an adjacent root access vulnerability that could allow an attacker on the same physical or logical Layer-2 network as the affected system to gain an unauthenticated root shell.

  5. User Authentication Policy | Argonne Leadership Computing Facility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Accounts Policy Account Sponsorship & Retention Policy ALCC Quarterly Report Policy ALCF Acknowledgment Policy Data Policy INCITE Quarterly Report Policy Job Scheduling Policy on BG/Q Job Scheduling Policies on Cooley Pullback Policy Refund Policy Software Policy User Authentication Policy Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. [Feedback Form] User Authentication Policy Users of the Argonne

  6. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  7. U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands

    Broader source: Energy.gov [DOE]

    A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system.

  8. T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

  9. V-195: RSA Authentication Manager Lets Local Users View the Administra...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password...

  10. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication...

  11. V-220: Juniper Security Threat Response Manager Lets Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute...

  12. U-267: RSA® Authentication Agent 7.1 for Microsoft Windows®...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662 CVE-2012-2287...

  13. V-231: Cisco Identity Services Engine Discloses Authentication...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users ... Lets Remote Users Obtain Database Contents V-076: Cisco Wireless LAN Controller Bugs Let ...

  14. U-074: Microsoft.NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.

  15. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 -...

  16. U-047: Siemens Automation License Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or...

  17. V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive...

  18. V-231: Cisco Identity Services Engine Discloses Authentication Credentials

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to Remote Users | Department of Energy 1: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users August 30, 2013 - 3:01am Addthis PROBLEM: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials. PLATFORM: Cisco Identity Services Engine (ISE) 1.x ABSTRACT: A vulnerability was reported in Cisco Identity Services

  19. U-203: HP Photosmart Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions.

  20. U-176: Wireshark Multiple Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  1. T-636: Wireshark Multiple Flaws Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  2. T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw

    Broader source: Energy.gov [DOE]

    An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session.

  3. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

  4. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 57: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis December 28 2012 - 6:00am PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions.

  5. T-574: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis...

  6. V-218: HP Service Manager Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-029: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain Unauthorized Access...

  7. U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access October 13, 2011 - 8:15am...

  8. V-166: HP-UX Directory Server Discloses Passwords to Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users May...

  9. U-212: RSA Authentication Manager Flaws Permit Cross-Site and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user can conduct cross-frame scripting attacks CVE-2012-2280. Imp act: A remote user can access the target user's cookies (including authentication cookies), if any, ...

  10. U-277: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were...

  11. U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.

  12. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    BSAFE SSL-C Lets Remote Users Decrypt SSLTLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSLTLS ...

  13. User guide for remote access to VDI and Workplace using RSA token...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    User guide for remote access to VDI and Workplace using RSA token User guide for remote access to VDI and Workplace using RSA token User guide for remote access to VDI and ...

  14. User Guide for Remote Access to VDI/Workplace Using PIV | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    User Guide for Remote Access to VDIWorkplace Using PIV User Guide for Remote Access to VDIWorkplace Using PIV User guide for remote access to VDIWorkplace using a PIV card . PDF ...

  15. V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

  16. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain...

  17. V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ISC BIND RUNTIMECHECK Error Lets Remote Users Deny Service Against Recursive Resolvers V-172: ISC BIND RUNTIMECHECK Error Lets Remote Users Deny Service Against Recursive...

  18. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code ...

  19. U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache modproxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache modproxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6,...

  20. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain...

  1. U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-046: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers November 28, 2011 -...

  2. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information

  3. T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service.

  4. U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  5. U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  6. T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  7. U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  8. U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system.

  9. U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information.

  10. T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases.

  11. U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Apple OS X. A remote user can execute arbitrary code on the target system. A remote user can obtain a password hash in certain cases. A local user can obtain elevated privileges on the target system. A local user can obtain password keystrokes.

  12. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions.

  13. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote ... Vendor fixes are available at Cisco Support Addthis Related Articles V-048: Cisco Wireless ...

  14. U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands

    Broader source: Energy.gov [DOE]

    Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator.

  15. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system.

  16. U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system.

  17. U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  18. U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system

  19. U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system.

  20. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  1. U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

  2. U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code...

  3. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or ...

  4. T-692: VMware vFabric tc Server Lets Remote Users Login Using...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords August 12, 2011 -...

  5. V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis...

  6. V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle...

  7. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

  8. V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote...

  9. U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis...

  10. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code...

  11. V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM:...

  12. V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari...

  13. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

  14. V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks June 24, 2013 -...

  15. V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Samba smbd CPU Processing Loop Lets Remote Users Deny Service V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny Service August 6, 2013 - 6:00am Addthis PROBLEM: A...

  16. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls ...

  17. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code ... Lets Local Users Gain Elevated Privileges T-536: Cisco ASA Multiple Flaws Let Remote ...

  18. V-144: HP Printers Let Remote Users Access Files on the Printer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: HP Printers Let Remote Users Access Files on the Printer V-144: HP Printers Let Remote Users Access Files on the Printer April 29, 2013 - 12:27am Addthis PROBLEM: HP Printers...

  19. U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service.

  20. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System...

  1. U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system.

  2. U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Data Protection Advisor. A remote user can cause denial of service conditions.

  3. T-719:Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can cause the backend server to remain in an error state until the retry timeout expires.

  4. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  5. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  6. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Linux kexec. A remote or local user can obtain potentially sensitive information.

  7. U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target

  8. U-135: HP WBEM Discloses Diagnostic Data to Remote and Local Users

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP WBEM. A remote or local user can gain access to diagnostic data.

  9. U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions.

  10. U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.

  11. T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

  12. U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause the target application to execute arbitrary code on the target user's system.

  13. T-570: HP Security Bulletin- HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass.

  14. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

  15. T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code.

  16. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system

  17. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Buffer Overflow Lets Remote Users Execute Arbitrary Code | Department of Energy 59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute

  18. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Arbitrary Code and Local Users Gain Elevated Privileges | Department of Energy 5: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges June 2, 2011 - 4:38pm Addthis PROBLEM: The Cisco AnyConnect Secure Mobility Client is the Cisco next-generation VPN client, which provides remote users with secure

  19. V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote...

  20. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Controls | Department of Energy 6: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple

  1. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Arbitrary Code and Deny Service | Department of Energy 79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall

  2. V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected

  3. V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Login Anonymously | Department of Energy 5: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously September 5, 2013 - 12:33am Addthis PROBLEM: A vulnerability was reported in Cisco Mobility Services Engine. A remote user can login anonymously. PLATFORM: Cisco Mobility Services Engine ABSTRACT: A vulnerability in Cisco Mobility Services Engine could allow an

  4. T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system.

  5. U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 91: cURL Lets Remote Users Decrypt SSL/TLS Traffic U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic January 30, 2012 - 6:45am Addthis PROBLEM: A vulnerability was reported in cURL. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) : Version(s): 7.10.6 through 7.23.1 ABSTRACT: A remote user can decrypt SSL/TLS sessions in certain cases. reference LINKS: CVE-2011-3389 SecurityTracker Alert ID: 1026587 Vendor Advisory IMPACT ASSESSMENT: Moderate Discussion: A remote user with the

  6. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. PLATFORM: Nexus 1000v, 5000, and 7000 Series Switches ABSTRACT: A remote user can send a specially crafted IP packet to cause the target device to reload. reference LINKS: Cisco

  7. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addresses | Department of Energy 39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20, 2012 - 7:00am Addthis PROBLEM: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses PLATFORM: Version(s): 6 beta 4 and prior versions ABSTRACT: A remote user can spoof SMS source addresses. Reference LINKS: SecurityTracker Alert ID: 1027410 Apple.com PCMag.com

  8. T-598: Apache Tomcat HTTP BIO Connector Error Discloses Information From Different Requests to Remote Users

    Broader source: Energy.gov [DOE]

    When using HTTP pipelining, the system may return information from a different request to a remote user. The vulnerability resides in the HTTP BIO connector.

  9. U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system.

  10. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions ... U-033: Microsoft Security Bulletin Summary for November 2011 T-706: Microsoft Fraudulent ...

  11. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) ...

  12. Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook access using HSPD-12 Badge. PDF icon HSPD-12 Badge Instructions More Documents & Publications User Guide for Remote Access to VDI/Workplace Using PIV Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Audit Report: IG-0860

  13. T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory

    Broader source: Energy.gov [DOE]

    The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software.

  14. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: ... the target user to a spoofed site with a URL that appears to be a legitimate domain. ...

  15. U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system.

  16. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RealPlayer. A remote user can cause arbitrary code to be executed on the target user's system.

  17. U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.

  18. U-177: Lotus Quickr for Domino ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Lotus Quickr for Domino. A remote user can cause arbitrary code to be executed on the target user's system.

  19. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system.

  20. U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization.

  1. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Sessions | Department of Energy 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows

  2. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Commands on the Target System | Department of Energy 49: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System December 1, 2011 - 9:00am Addthis PROBLEM: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System. PLATFORM: IBM Tivoli Netcool Reporter prior to 2.2.0.8 ABSTRACT: A vulnerability was reported in IBM Tivoli Netcool

  3. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Address Bar URLs | Department of Energy 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in

  4. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execute Arbitrary Code | Department of Energy 9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code December 18, 2012 - 1:30am Addthis PROBLEM: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were reported in RealPlayer. REFERENCE

  5. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Spoof the Server | Department of Energy 65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server May 28, 2013 - 12:46am Addthis PROBLEM: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server PLATFORM: Cisco WebEx for iOS 4.1, Other versions may also be affected. ABSTRACT: A vulnerability was reported in Cisco WebEx for iOS. REFERENCE LINKS:

  6. U-137: HP Performance Manager Unspecified Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute...

  7. U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    aixefixessecurityicmpfix.tar Addthis Related Articles U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service V-031: IBM WebSphere DataPower...

  8. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    overflow CVE-2012-0670. A specially crafted '.pict' file can trigger a memory corruption error CVE-2012-0671. Impact: A remote user can create a file that, when loaded by...

  9. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system.

  10. User Guide Remote Access to VDI/Workplace Using PIV

    Energy Savers [EERE]

    About the Bioenergy Technologies Office » User Facilities User Facilities Feedstock Preprocessing at INL The Process Demonstration Unit at Idaho National Laboratory's Energy Systems Laboratory facility provides pilot- and industrial-scale testing for a variety of preprocessing techniques. Preprocessing is essential to preparing biomass feedstock for conversion, ensuring the material is high-quality and provides as much fuel as possible. The facility's Characterization Laboratory enables

  11. U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  12. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY...

  13. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    in the slapd.conf file. 3) An error exists within the handling of certain MODRDN requests, which can be exploited to cause a crash by submitting specially crafted MODRDN requests. ...

  14. U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions.

  15. U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.

  16. Multi-factor authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  17. Instructions for using HSPD-12 Authenticated Outlook Web Access...

    Energy Savers [EERE]

    Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook...

  18. T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

  19. T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions

    Broader source: Energy.gov [DOE]

    Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions.

  20. T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash.

  1. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  2. T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability

    Broader source: Energy.gov [DOE]

    It was found that the 'Change Password' page / screen of the Samba Web Administration Tool did not properly sanitize content of the user-provided "user" field, prior printing it back to the page content. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could allow the attacker to conduct cross-site scripting attacks (execute arbitrary HTML or script code).

  3. Secure authenticated video equipment

    SciTech Connect (OSTI)

    Doren, N.E.

    1993-07-01

    In the verification technology arena, there is a pressing need for surveillance and monitoring equipment that produces authentic, verifiable records of observed activities. Such a record provides the inspecting party with confidence that observed activities occurred as recorded, without undetected tampering or spoofing having taken place. The secure authenticated video equipment (SAVE) system provides an authenticated series of video images of an observed activity. Being self-contained and portable, it can be installed as a stand-alone surveillance system or used in conjunction with existing monitoring equipment in a non-invasive manner. Security is provided by a tamper-proof camera enclosure containing a private, electronic authentication key. Video data is transferred communication link consisting of a coaxial cable, fiber-optic link or other similar media. A video review station, located remotely from the camera, receives, validates, displays and stores the incoming data. Video data is validated within the review station using a public key, a copy of which is held by authorized panics. This scheme allows the holder of the public key to verify the authenticity of the recorded video data but precludes undetectable modification of the data generated by the tamper-protected private authentication key.

  4. Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Directions to CAMD Policy on Acknowledgements Policy on Collaborations Hotel Accommodations User Information All users | New users | Returning users Non-consortium users may apply for beamtime by submitting a request to GCPCC that includes a brief description of your project and when you would like beam time. The beamline staff will make every effort to accommodate your request. We will accept forms used by other beamlines for this purpose. In addition to the traditional onsite access, we can

  5. A proposed generic authentication information element

    SciTech Connect (OSTI)

    Tarman, T.D.

    1995-08-01

    This contribution describes a proposed information element that can convey authentication information within an ATM signaling message. The design of this information element provides a large amount of flexibility to the user because it does not specify a particular signature algorithm, and it does not specify which information elements must accompany the Authentication IE in a signaling message. This allows the user to implement authenticated signaling based on her site`s security policies and performance requirements.

  6. U-275: HP IBRIX X9000 Storage Discloses Information to Remote Users

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP IBRIX X9000 Storage. The vulnerability could be remotely exploited to allow disclosure of information.

  7. U-201: HP System Management Homepage Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code.

  8. V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data.

  9. Obfuscated authentication systems, devices, and methods

    DOE Patents [OSTI]

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  10. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2013-1009,...

  11. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system - CVE-2010-1823,...

  12. Low-bandwidth authentication.

    SciTech Connect (OSTI)

    Donnelly, Patrick Joseph; McIver, Lauren; Gaines, Brian R.; Anderson, Erik; Collins, Michael Joseph; Thomas,Kurt Adam; McDaniel, Austin

    2007-09-01

    Remotely-fielded unattended sensor networks generally must operate at very low power--in the milliwatt or microwatt range--and thus have extremely limited communications bandwidth. Such sensors might be asleep most of the time to conserve power, waking only occasionally to transmit a few bits. RFID tags for tracking or material control have similarly tight bandwidth constraints, and emerging nanotechnology devices will be even more limited. Since transmitted data is subject to spoofing, and since sensors might be located in uncontrolled environments vulnerable to physical tampering, the high-consequence data generated by such systems must be protected by cryptographically sound authentication mechanisms; but such mechanisms are often lacking in current sensor networks. One reason for this undesirable situation is that standard authentication methods become impractical or impossible when bandwidth is severely constrained; if messages are small, a standard digital signature or HMAC will be many times larger than the message itself, yet it might be possible to spare only a few extra bits per message for security. Furthermore, the authentication tags themselves are only one part of cryptographic overhead, as key management functions (distributing, changing, and revoking keys) consume still more bandwidth. To address this problem, we have developed algorithms that provide secure authentication while adding very little communication overhead. Such techniques will make it possible to add strong cryptographic guarantees of data integrity to a much wider range of systems.

  13. T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system.

  14. U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CTA 7.3.1 and later with Hotfix ESA-2012-034 Addthis Related Articles V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions V-036: EMC Smarts Network...

  15. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2011-3016, CVE-2011-3021,...

  16. Authentication techniques for smart cards

    SciTech Connect (OSTI)

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system.

  17. T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A defect in the affected BIND 9 versions allows an attacker to remotely cause the "named" process to exit using a specially crafted packet. This defect affects both recursive and authoritative servers. The code location of the defect makes it impossible to protect BIND using ACLs configured within named.conf or by disabling any features at compile-time or run-time. A remote attacker would need to be able to send a specially crafted packet directly to a server running a vulnerable version of BIND. There is also the potential for an indirect attack via malware that is inadvertently installed and run, where infected machines have direct access to an organization's nameservers.

  18. System and method for authentication

    DOE Patents [OSTI]

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  19. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  20. Method and system for normalizing biometric variations to authenticate users from a public database and that ensures individual biometric data privacy

    DOE Patents [OSTI]

    Strait, Robert S.; Pearson, Peter K.; Sengupta, Sailes K.

    2000-01-01

    A password system comprises a set of codewords spaced apart from one another by a Hamming distance (HD) that exceeds twice the variability that can be projected for a series of biometric measurements for a particular individual and that is less than the HD that can be encountered between two individuals. To enroll an individual, a biometric measurement is taken and exclusive-ORed with a random codeword to produce a "reference value." To verify the individual later, a biometric measurement is taken and exclusive-ORed with the reference value to reproduce the original random codeword or its approximation. If the reproduced value is not a codeword, the nearest codeword to it is found, and the bits that were corrected to produce the codeword to it is found, and the bits that were corrected to produce the codeword are also toggled in the biometric measurement taken and the codeword generated during enrollment. The correction scheme can be implemented by any conventional error correction code such as Reed-Muller code R(m,n). In the implementation using a hand geometry device an R(2,5) code has been used in this invention. Such codeword and biometric measurement can then be used to see if the individual is an authorized user. Conventional Diffie-Hellman public key encryption schemes and hashing procedures can then be used to secure the communications lines carrying the biometric information and to secure the database of authorized users.

  1. Data Authentication Demonstration for Radionuclide Stations

    SciTech Connect (OSTI)

    Harris, Mark; Herrington, Pres; Miley, Harry; Ellis, J. Edward; McKinnon, David; St. Pierre, Devon

    1999-08-03

    Data authentication is required for certification of sensor stations in the International Monitoring System (IMS). Authentication capability has been previously demonstrated for continuous waveform stations (seismic and infrasound). This paper addresses data surety for the radionuclide stations in the IMS, in particular the Radionuclide Aerosol Sampler/Analyzer (RASA) system developed by Pacific Northwest National Laboratory (PNNL). Radionuclide stations communicate data by electronic mail using formats defined in IMS 1.0, Formats and Protocols for Messages. An open message authentication standard exists, called S/MIME (Secure/Multipurpose Internet Mail Extensions), which has been proposed for use with all IMS radionuclide station message communications. This standard specifies adding a digital signature and public key certificate as a MIME attachment to the e-mail message. It is advantageous because it allows authentication to be added to all IMS 1.0 messages in a standard format and is commercially supported in e-mail software. For command and control, the RASA system uses a networked Graphical User Interface (GUI) based upon Common Object Request Broker Architecture (CORBA) communications, which requires special authentication procedures. The authors have modified the RASA system to meet CTBTO authentication guidelines, using a FORTEZZA card for authentication functions. They demonstrated signing radionuclide data messages at the RASA, then sending, receiving, and verifying the messages at a data center. They demonstrated authenticating command messages and responses from the data center GUI to the RASA. Also, the particular authentication system command to change the private/public key pair and retrieve the new public key was demonstrated. This work shows that data surety meeting IMS guidelines may be immediately applied to IMS radionuclide systems.

  2. Authentication of byte sequences

    SciTech Connect (OSTI)

    Stearns, S.D.

    1991-06-01

    Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

  3. Proposed DSS-specific fields for the generic authentication information element

    SciTech Connect (OSTI)

    Tarman, T.D.

    1995-08-06

    This contribution proposes the format of the ``Algorithm-Specific Information`` and ``Signature`` fields within the ``Proposed Generic Authentication Information Element`` for authentication IEs based on the Digital Signature Standard (DSS). These fields are designed to allow various levels of authentication ``strength`` (or robustness), and many of these fields may be omitted in systems that optimize authentication performance by sharing common (public) Digital Signature Algorithm (DSA) parameters. This allows users and site security officers to design their authenticated signaling according to site security and performance requirements.

  4. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

  5. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June...

  6. Authentication of quantum messages.

    SciTech Connect (OSTI)

    Barnum, Howard; Crépeau, Jean-Claude; Gottesman, D.; Smith, A.; Tapp, Alan

    2001-01-01

    Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing a classical private key want to exchange a classical message with the guarantee that the message has not been modified or replaced by a dishonest party with control of the communication line. In this paper we study the authentication of messages composed of quantum states. We give a formal definition of authentication in the quantum setting. Assuming A and B have access to an insecure quantum channel and share a private, classical random key, we provide a non-interactive scheme that both enables A to encrypt and authenticate (with unconditional security) an m qubit message by encoding it into m + s qubits, where the probability decreases exponentially in the security parameter s. The scheme requires a private key of size 2m + O(s). To achieve this, we give a highly efficient protocol for testing the purity of shared EPR pairs. It has long been known that learning information about a general quantum state will necessarily disturb it. We refine this result to show that such a disturbance can be done with few side effects, allowing it to circumvent cryptographic protections. Consequently, any scheme to authenticate quantum messages must also encrypt them. In contrast, no such constraint exists classically: authentication and encryption are independent tasks, and one can authenticate a message while leaving it publicly readable. This reasoning has two important consequences: On one hand, it allows us to give a lower bound of 2m key bits for authenticating m qubits, which makes our protocol asymptotically optimal. On the other hand, we use it to show that digitally signing quantum states is impossible, even with only computational security.

  7. Authentication Without Secrets

    SciTech Connect (OSTI)

    Pierson, Lyndon G.; Robertson, Perry J.

    2015-11-01

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.

  8. V-093: Symantec PGP Desktop Buffer Overflows Let Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users...

  9. Two-Factor Authentication

    Broader source: Energy.gov [DOE]

    Two-Factor Authentication (2FA) (also known as 2-Step Verification) is a system that employs two methods to identify an individual. More secure than reusable passwords, when a token's random number...

  10. LANSCE | Users | User Office

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Office LANSCE User Office and Visitor Center The LANSCE User Office is responsible for coordinating the users with LANSCE instrument scientist and the facility. Users contact the User Office weeks before they arrive at the LANSCE Visitor Center at Technical Area 53. Among their many responsibilities, the team issues the call for proposals, coordinates proposal experiment schedules, directs users to the training center, issues badges and dosimeters, helps to arrange tours of the facilities,

  11. International safeguards data authentication

    SciTech Connect (OSTI)

    Melton, R.B.; Smith, C.E.; DeLand, S.M.; Manatt, D.R.

    1996-07-01

    The International Safeguards community is becoming increasingly reliant on information stored in electronic form. In international monitoring and related activities it must be possible to verify and maintain the integrity of this electronic information. This paper discusses the use of data authentication technology to assist in accomplishing this task. The paper provides background information, identifies the relevance to international safeguards, discusses issues related to export controls, algorithm patents, key management and the use of commercial vs. custom software.

  12. T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.

  13. User Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Information User Information Print ALSHub User Portal User Guide A step-by-step guide for users about how to apply and prepare for beam time at the ALS. Experiment Safety Upon receiving beam time, complete an Experiment Safety Sheet Prospective Users Users from Industry Contacts for Users User Policy Data Management Users' Executive Committee (UEC) User Meeting

  14. CERTIFICATE OF AUTHENTICITY

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CERTIFICATE OF AUTHENTICITY I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C. ~ i c h a e l G. Mueller, Chair National Coal Council I NATIONAL COAL COUNCIL 1 FULL COUNCIL MEETING FRIDAY NOVEMBER 14, 2 0 0 8 The Full Council meeting convened at 9 : 0 0 a.m. in the Washington Ballroom of the Westin Grand Hotel, 2 3 5 0 M Street, NW, Washington, DC, Chair

  15. Anonymous authenticated communications

    DOE Patents [OSTI]

    Beaver, Cheryl L.; Schroeppel, Richard C.; Snyder, Lillian A.

    2007-06-19

    A method of performing electronic communications between members of a group wherein the communications are authenticated as being from a member of the group and have not been altered, comprising: generating a plurality of random numbers; distributing in a digital medium the plurality of random numbers to the members of the group; publishing a hash value of contents of the digital medium; distributing to the members of the group public-key-encrypted messages each containing a same token comprising a random number; and encrypting a message with a key generated from the token and the plurality of random numbers.

  16. U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks

    Broader source: Energy.gov [DOE]

    RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

  17. Remote monitoring using technologies from the Internet and World Wide Web

    SciTech Connect (OSTI)

    Puckett, J.M.; Burczyk, L.

    1997-11-01

    Recent developments in Internet technologies are changing and enhancing how one processes and exchanges information. These developments include software and hardware in support of multimedia applications on the World Wide Web. In this paper the authors describe these technologies as they have applied them to remote monitoring and show how they will allow the International Atomic Energy Agency to efficiently review and analyze remote monitoring data for verification of material movements. The authors have developed demonstration software that illustrates several safeguards data systems using the resources of the Internet and Web to access and review data. This Web demo allows the user to directly observe sensor data, to analyze simulated safeguards data, and to view simulated on-line inventory data. Future activities include addressing the technical and security issues associated with using the Web to interface with existing and planned monitoring systems at nuclear facilities. Some of these issues are authentication, encryption, transmission of large quantities of data, and data compression.

  18. Training Courses for Argonne User Facilities | Advanced Photon...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Training Courses for Argonne User Facilities All core courses can be taken via the Remote Training web site. See the user training requirements summary for general information....

  19. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information.

  20. Prospective Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Prospective Users Print The Advanced Light Source (ALS) welcomes researchers from universities, government labs, and industry who are interested in performing experiments at the general sciences and structural biology beamlines open to users. An overview of user opportunities, and the procedures to become a user, are outlined below: What is an ALS User? How to Become an ALS User Research Facilities Available to Users Costs to Users Users from Industry User Policy What is an ALS User? The ALS is

  1. LANSCE | Users | User Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    it oversees represents the cutting edge of nuclear and materials science and technology. The User Program plays a key role in training the next generation of top...

  2. Provably Secure Password-based Authentication in TLS

    SciTech Connect (OSTI)

    Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier; Moeller,Bodo; Pointcheval, David

    2005-12-20

    In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised to the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.

  3. User Training | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Training Before performing work at the CNM, you must take certain orientation and safety training courses. We encourage you to take these courses remotely before you arrive at Argonne. Go to the Remote Training web site. Enter your Argonne badge number. Locate the "CNM Facilitiy Core Courses" section and follow the links to the courses. For your information, the CNM core courses are: CNM 101: Center for Nanoscale Materials User Orientation (2-year training interval) ESH 100U:

  4. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Contact User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment...

  5. Remote switch actuator

    DOE Patents [OSTI]

    Haas, Edwin Gerard; Beauman, Ronald; Palo, Jr., Stefan

    2013-01-29

    The invention provides a device and method for actuating electrical switches remotely. The device is removably attached to the switch and is actuated through the transfer of a user's force. The user is able to remain physically removed from the switch site obviating need for protective equipment. The device and method allow rapid, safe actuation of high-voltage or high-current carrying electrical switches or circuit breakers.

  6. User Facilities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Facilities User Facilities User facility agreements allow Los Alamos partners and other entities to conduct research at our unique facilities. In 2011, LANL hosted more than 1,200 users at CINT, LANSCE, and NHMFL. Users came from across the DOE complex, from international academia, and from industrial companies from 45 states across the U.S. Unique world-class user facilities foster rich research opportunities Through its technology transfer efforts, LANL can implement user facility

  7. AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES

    SciTech Connect (OSTI)

    Poland, R.; Drayer, R.; Wilson, J.

    2013-08-12

    This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operator’s and the IAEA’s interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using “joint use” equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEA’s ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

  8. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system.

  9. User Facilities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Collaboration User Facilities collaborationassetsimagesicon-collaboration.jpg User Facilities A new research frontier awaits Our door is open and we thrive on mutually...

  10. CERTIFICATE OF AUTHENTICITY | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CERTIFICATE OF AUTHENTICITY CERTIFICATE OF AUTHENTICITY I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C. Tran_001.pdf PDF icon CERTIFICATE OF AUTHENTICITY More Documents & Publications U.S. Offshore Wind Advanced Technology Demonstration Projects Public Meeting Transcript for Offshore Wind Demonstrations Office of Information Resources Office of

  11. User Guide

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Guide User Guide Print Wednesday, 16 September 2009 08:53 1. Register with the ALS Create an account on ALSHub-the ALS user portal. 2. Apply for Beam Time 3. Establish a User Agreement 4. Comply with Experiment Safety Requirements Upon receiving beam time, complete an Experiment Safety Sheet. 5. Get Access to Work Onsite 6. Complete Online Safety Training 7. Utilize Available Resources 8. Complete the User Satisfaction Survey 9. Report Publications, Awards, Talks, Acknowledging Work at ALS

  12. CERTIFICATE OF AUTHENTICITY | Department of Energy

    Energy Savers [EERE]

    D.C. Tran001.pdf PDF icon CERTIFICATE OF AUTHENTICITY More Documents & Publications U.S. Offshore Wind Advanced Technology Demonstration Projects Public Meeting Transcript for...

  13. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

  14. JGI Compute User Training Series

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Transfer and Archiving Using the Cray XE6 NERSC User Group Training Remote Setup 2010 Training Events Online Tutorials Courses NERSC Training Accounts Request Form Training Links OSF HPC Seminars Software Policies User Surveys NERSC Users Group User Announcements Help Staff Blogs Request Repository Mailing List Operations for: Passwords & Off-Hours Status 1-800-66-NERSC, option 1 or 510-486-6821 Account Support https://nim.nersc.gov accounts@nersc.gov 1-800-66-NERSC, option 2 or

  15. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  16. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Contacts for Users User Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address

  17. V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service August 23, 2013 - 1:26am...

  18. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server May ...

  19. Remote Connections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Remote Alaskan Communities Energy Efficiency Competition Remote Alaskan Communities Energy Efficiency Competition Remote Alaskan Communities Energy Efficiency Competition FAIRBANKS, AK: At the Rural Energy Conference in Fairbanks, AK, April 26, the U.S. Department of Energy (DOE) announced 13 recipients of Remote Alaska Communities Energy Efficiency (RACEE) technical assistance. The RACEE Competition is a $4 million joint effort between DOE's offices of Indian Energy (IE) and Energy

  20. User Environment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Getting Started Configuration User Environment Programming Running Jobs File Storage Software and Tools Performance and Optimization Retirement Plans Jesup Dirac Edison Phase I Euclid - Retired 01/31/2013 Franklin - Retired 04/30/12 Bassi Storage & File Systems Data & Analytics Connecting to NERSC Queues and Scheduling Job Logs & Statistics Application Performance Training & Tutorials Software Policies User Surveys NERSC Users Group User Announcements Help Staff Blogs Request

  1. User Guide

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Guide Print 1. Register with the ALS Create an account on ALSHub-the ALS user portal. 2. Apply for Beam Time 3. Establish a User Agreement 4. Comply with Experiment Safety Requirements Upon receiving beam time, complete an Experiment Safety Sheet. 5. Get Access to Work Onsite 6. Complete Online Safety Training 7. Utilize Available Resources 8. Complete the User Satisfaction Survey 9. Report Publications, Awards, Talks, Acknowledging Work at ALS

  2. User Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs

  3. User Guide

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Guide User Guide Print 1. Register with the ALS Create an account on ALSHub-the ALS user portal. 2. Apply for Beam Time 3. Establish a User Agreement 4. Comply with Experiment Safety Requirements Upon receiving beam time, complete an Experiment Safety Sheet. 5. Get Access to Work Onsite 6. Complete Online Safety Training 7. Utilize Available Resources 8. Complete the User Satisfaction Survey 9. Report Publications, Awards, Talks, Acknowledging Work at ALS

  4. User Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Policy User Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing

  5. User Guide

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Guide Print 1. Register with the ALS Create an account on ALSHub-the ALS user portal. 2. Apply for Beam Time 3. Establish a User Agreement 4. Comply with Experiment Safety Requirements Upon receiving beam time, complete an Experiment Safety Sheet. 5. Get Access to Work Onsite 6. Complete Online Safety Training 7. Utilize Available Resources 8. Complete the User Satisfaction Survey 9. Report Publications, Awards, Talks, Acknowledging Work at ALS

  6. User Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs

  7. AUTHENTICATED

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1 Contract No. 11PB-12330 AMENDMENT executed by the BONNEVILLE POWER ADMINISTRATION and PORT TOWNSEND PAPER CORPORATION This AMENDMENT to the Firm Power Sales Agreement (Agreement)...

  8. User Packages

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Packages User Packages There is more than one way for users to manage installation of Python packages on their own. Users of the Anaconda distribution may create their own environments as described here. Users of the NERSC-built modules can use virtualenv, pip, or compile and install Python packages directly. Using "pip" on Edison and Cori There is an issue with the pip command on the Cray systems because of an SSL certificate verification problem. One symptom is that you create

  9. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Author Guidelines User Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address

  10. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Services General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address is being protected from

  11. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address is being protected

  12. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address is being protected

  13. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address is being protected

  14. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address is being protected

  15. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address is being protected

  16. Remote Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Access Remote Access Laboratory employees can access Research Library databases and products from offsite using our EZproxy service. This service is limited to LANL employees with active Z numbers and cryptocards. Access Electronic Collections with EZproxy Remote Access Journals - Books - Standards - Databases (WOK, etc) How to use EZproxy: From this page: Click on the icon above. From external site: Select "OFFSITE LANL Employee". Enter your Z number and Cryptocard passcode.

  17. User Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs

  18. User Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs

  19. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address is being protected from

  20. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address is being protected from

  1. User Update

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Edison and Cori: User Update - 1 - Zhengji Zhao, Helen He, Wahid Bhimji NERSC User Group Meeting Berkeley, CA, March 24, 2016 Edison Update - 2 - Zhengji Zhao Edison upgrades (11/30/2015-3/15) * Edison move 11/30-12/23/2015 - Edison disassembled, reassembled, integrated, reconfigured and tested at CRT - 1/4/2016 users were enabled - Free charging period 1/4 - 1/10/2016 * Switch to Slurm - Slurm configuraDon has been in conDnuous improvement and adjustment - Users needed a lot of help with

  2. Industrial Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    by cosmic-ray-induced neutrons upon miniature electronic devices, such as chips that help control aircraft or complex integrated circuits in automobiles. Industrial User...

  3. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address is being protected from

  4. Prospective Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    from universities, government labs, and industry who are interested in performing experiments at the general sciences and structural biology beamlines open to users. An...

  5. Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    More Documents & Publications Citrix2FAAuthentication09.09 Using Two-Factor RSA Token with WebVPN User guide for remote access to VDI and Workplace using RSA token

  6. Hardware device binding and mutual authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  7. User Program | Prospective Users US

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    US Citizens Prospective users that are US citizens can review the protocol for visiting LANSCE. Information for Prospective Users - US Citizens Before You Arrive: After submitting a proposal and having your beam time approved, the WNR User Program Administrator will contact you by email with instructions for scheduling your visit. Visit registration is done on our Proposal Submission website: https://www.lanl.gov/orgs/lansce. We ask the Principal Investigator to make sure that all the members of

  8. Industrial Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Industrial Users - Media Publications and Information The Invisible Neutron Threat Neutron-Induced Failures in Semiconductor Devices Nuclear Science Research at the LANSCE-WNR Facility Links About WNR Industrial Users 4FP30L-A/ICE House 4FP30R/ICE II Media

  9. U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lets Remote Users Execute Arbitrary Code January 17, 2012 - 1:00pm Addthis PROBLEM: PHP Null Pointer Dereference in zendstrndup() Lets Local Users Deny Service PLATFORM: PHP...

  10. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's...

  11. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    DOE Patents [OSTI]

    Kent, Alexander Dale (Los Alamos, NM)

    2008-09-02

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  12. User information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Information: Project Proposal Form Beamtime Request Form Emergency procedure policy Experimental Hall Policy Publications Lodging New Users First, please fill out the Project Proposal Form and submit to Craig Stevens. Next a beamtime request form should be completed and submitted to Lisa Bovenkamp along with any questions or requests for special accommodations. Before your first visit to CAMD, everyone must take and pass the CAMD Radiation Safety Test which may be taken online prior to your

  13. Cooperative Remote Monitoring, Arms control and nonproliferation technologies: Fourth quarter 1995

    SciTech Connect (OSTI)

    Alonzo, G M

    1995-01-01

    The DOE`s Cooperative Remote Monitoring programs integrate elements from research and development and implementation to achieve DOE`s objectives in arms control and nonproliferation. The contents of this issue are: cooperative remote monitoring--trends in arms control and nonproliferation; Modular Integrated Monitoring System (MIMS); Authenticated Tracking and Monitoring Systems (ATMS); Tracking and Nuclear Materials by Wide-Area Nuclear Detection (WAND); Cooperative Monitoring Center; the International Remote Monitoring Project; international US and IAEA remote monitoring field trials; Project Dustcloud: monitoring the test stands in Iraq; bilateral remote monitoring: Kurchatov-Argonne-West Demonstration; INSENS Sensor System Project.

  14. V-174: RSA Authentication Manager Writes Operating System, SNMP...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System,...

  15. ALS User Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Meeting ALS User Meeting web banner ALS User Meeting: October 5-7, 2015 Home Agenda Awards Exhibitors Lodging Posters Registration Transportation Workshops Contact Us User...

  16. T-646: Debian fex authentication bypass | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    46: Debian fex authentication bypass T-646: Debian fex authentication bypass June 14, 2011 - 3:45pm Addthis PROBLEM: The vulnerability is caused due to the application not properly verifying the existence of "auth-ID" when uploading files and can be exploited to bypass the authentication mechanism. PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service for transferring very large, files, is not properly validating authentication IDs. While the service

  17. NIF Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NIF Users Research Opportunities at the National Ignition Facility The National Ignition Facility provides the scientific community with an unprecedented capability for studying materials at extreme pressures, temperatures, and densities. NIF is expected to achieve temperatures and densities almost an order of magnitude greater than those in the sun's core and pressures far in excess of those at the core of Jupiter. The density of neutrons during the tens of picoseconds the NIF target undergoes

  18. Authentication of data for monitoring a comprehensive test ban treaty

    SciTech Connect (OSTI)

    Craft, R.L.; Draelos, T.J.

    1996-05-01

    The important issue of data integrity in the CTBT International Monitoring System (IMS) is discussed and a brief tutorial on data authentication techniques is offered. The utilization of data authentication as a solution to the data integrity problem is evaluated. Public key data authentication is recommended for multilateral monitoring regimes such as the CTBT. The ramifications and system considerations of applying data authentication at various locations in the IMS, or not at all, are reviewed in a data surety context. The paper concludes with a recommendation of authenticating data at all critical monitoring stations.

  19. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote ...

  20. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Articles U-083:Oracle Critical Patch Update Advisory - January 2012 V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code T-576: Oracle Solaris Adobe Flash Player...

  1. NERSC User Group Annual Meeting February 1-3, 2012

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Oakland Scientific Facility in Oakland, CA. All three days will be available as a WebEx web meeting for remote participation. All NERSC users are invited to attend all three...

  2. National User Facilities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National User Facilities Our Vision National User Facilities Research Areas In Focus Global Solutions Navigate Section Our Vision National User Facilities Research Areas In...

  3. NERSC Users Group (NUG)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Policies User Surveys NERSC Users Group Monthly NUG Webinars Annual Meetings NUGEX Elections Charter User Announcements Help Staff Blogs Request Repository Mailing List...

  4. User Financial Account Form

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    22013 User Financial Account Form Establish a user financial account at SLAC to procure gases, chemicals, supplies or services to support your experiment at SLAC's user ...

  5. 2013 ALS User Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 ALS User Meeting banner Home Agenda Awards Exhibitors Lodging Posters Registration T-Shirt Contest Transportation Workshops Contact Us User Meeting Archives Users' Executive...

  6. 2013 ALS User Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2013 ALS User Meeting Print banner Home Agenda Awards Exhibitors Lodging Posters Registration T-Shirt Contest Transportation Workshops Contact Us User Meeting Archives Users'...

  7. ALS User Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ALS User Meeting Print web banner ALS User Meeting: October 5-7, 2015 Home Agenda Awards Exhibitors Lodging Posters Registration Transportation Workshops Contact Us User Meeting...

  8. System and method for authentication of goods

    DOE Patents [OSTI]

    Kaish, Norman; Fraser, Jay; Durst, David I.

    1999-01-01

    An authentication system comprising a medium having a plurality of elements, the elements being distinctive, detectable and disposed in an irregular pattern or having an intrinsic irregularity. Each element is characterized by a determinable attribute distinct from a two-dimensional coordinate representation of simple optical absorption or simple optical reflection intensity. An attribute and position of the plurality of elements, with respect to a positional reference is detected. A processor generates an encrypted message including at least a portion of the attribute and position of the plurality of elements. The encrypted message is recorded in physical association with the medium. The elements are preferably dichroic fibers, and the attribute is preferably a polarization or dichroic axis, which may vary over the length of a fiber. An authentication of the medium based on the encrypted message may be authenticated with a statistical tolerance, based on a vector mapping of the elements of the medium, without requiring a complete image of the medium and elements to be recorded.

  9. V-036: EMC Smarts Network Configuration Manager Database Authentication

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Bypass Vulnerability | Department of Energy 6: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability November 29, 2012 - 3:30am Addthis PROBLEM: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability PLATFORM: EMC Smarts Network Configuration Manager (NCM) all versions prior 9.1 ABSTRACT: Two vulnerabilities were reported in EMC Smarts

  10. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, A.M.

    1996-08-06

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user`s local host, thereby providing ease of use and minimal software maintenance for users of that remote service. 16 figs.

  11. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, A.M.

    1997-12-09

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user`s local host, thereby providing ease of use and minimal software maintenance for users of that remote service. 16 figs.

  12. PST user`s guide

    SciTech Connect (OSTI)

    Rempe, J.L.; Cebull, M.J.; Gilbert, B.G.

    1996-10-01

    The Parametric Source Term (PST) software allows estimation of radioactivity release fractions for Level 2 Probabilistic Safety Assessments (PSAs). PST was developed at the Idaho National Engineering Laboratory (INEL) for the Nuclear Regulatory Commission`s (NRC`s) Accident Sequence Precursor (ASP) Program. PST contains a framework of equations that model activity transport between volumes in the release pathway from the core, through the vessel, through the containment, and to the environment. PST quickly obtains exact solutions to differential equations for activity transport in each volume for each time interval. PST provides a superior method for source term estimation because it: ensures conservation of activity transported across various volumes in the release pathway; provides limited consideration of the time-dependent behavior of input parameter uncertainty distributions; allows input to be quantified using state-of-the-art severe accident analysis code results; increases modeling flexibility because linkage between volumes is specified by user input; and allows other types of Light Water Reactor (LWR) plant designs to be evaluated with minimal modifications. PST is a microcomputer-based system that allows the analyst more flexibility than a mainframe system. PST has been developed to run with both MS DOS and MS Windows 95/NT operating systems. PST has the capability to load ASP Source Term Vector (STV) information, import pre-specified default input for the 6 Pressurized Water Reactors (PWRs) initially analyzed in the NRC ASP program, allow input value modifications for release fraction sensitivity studies, export user-specified default input for the LWR being modeled, report results of radioactivity release calculations at each time interval, and generate formatted results that can interface with other risk assessment codes. This report describes the PST model and provides guidelines for using PST.

  13. Checkpoint-Restart in User Space

    Energy Science and Technology Software Center (OSTI)

    2013-07-19

    CRUISE implements a user-space file system that stores data in main memory and transparently spills over to other storage, like local flash memory or the parallel file system, as needed. CRUISE also exposes file contents fo remote direct memory access, allowing external tools to copy files to the parallel file system in the background with reduced CPU interruption.

  14. V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Execute Arbitrary Code | Department of Energy 8: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code August 27, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities were reported in RealPlayer PLATFORM: RealPlayer 16.0.2.32 and prior ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system REFERENCE LINKS:

  15. T-646: Debian fex authentication bypass | Department of Energy

    Energy Savers [EERE]

    PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service for transferring very large, files, is not properly validating authentication IDs. While the ...

  16. New User Training: October 30, 2014

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    10/30/2014 New User Training: October 30, 2014 October 30, 2014 NERSC will present a three-hour training for new users on October 30, 2014 from 09:00 to 12:00 PDT. This event is targeted to new users of NERSC and will help them navigate the center and its systems. Location This event will be presented online using WebEx technology and in person at NERSC Oakland Scientific Facility. Please see the remote setup page for connection information. Registration There is no registration for the online

  17. New User Training: Sep. 10, 2013

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Training New User Training: Sep. 10, 2013 September 10, 2013 NERSC will present a four-hour training for new users on Sep. 10, 2013 from 10:00 to 14:00 PDT. This event is targeted to new users of NERSC and will help them navigate the center and its systems. Attemdamce: 104 Location This event will be presented online using WebEx technology and in person at NERSC Oakland Scientific Facility. Please see the remote setup page for connection information. Registration There is no registration for the

  18. LANSCE | Training Office | User Training

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users User Office User Program LANSCE User Group Rosen Scholar Rosen Prize News & Multimedia News Multimedia Events Profiles Highlights Seminars Activity Reports The Pulse User ...

  19. LANSCE | Users | LUG | Election Ballot

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users User Office User Program LANSCE User Group Rosen Scholar Rosen Prize News & Multimedia News Multimedia Events Profiles Highlights Seminars Activity Reports The Pulse User ...

  20. Authenticating concealed private data while maintaining concealment

    DOE Patents [OSTI]

    Thomas, Edward V. (Albuquerque, NM); Draelos, Timothy J. (Albuquerque, NM)

    2007-06-26

    A method of and system for authenticating concealed and statistically varying multi-dimensional data comprising: acquiring an initial measurement of an item, wherein the initial measurement is subject to measurement error; applying a transformation to the initial measurement to generate reference template data; acquiring a subsequent measurement of an item, wherein the subsequent measurement is subject to measurement error; applying the transformation to the subsequent measurement; and calculating a Euclidean distance metric between the transformed measurements; wherein the calculated Euclidean distance metric is identical to a Euclidean distance metric between the measurement prior to transformation.

  1. JLab Users Group

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    JLab Users Group Please upgrade your browser. This site's design is only visible in a graphical browser that supports web standards, but its content is accessible to any browser. Concerns? JLab Users Group User Liaison Home Users Group Program Advisory Committee User/Researcher Information print version UG Resources Background & Purpose Users Group Wiki By Laws Board of Directors Board of Directors Minutes Directory of Members Events At-A-Glance Member Institutions News Users Group Mailing

  2. User Meeting Awards

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Meeting Awards web banner ALS User Meeting Awards See the 2013 User Meeting Awards Winners Home Agenda Awards Exhibitors Lodging Posters Registration Transportation Workshops This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Meeting Archives Users' Executive Committee The ALS Users' Executive Committee invites ALS users and staff to submit nominations in recognition of the people who have made significant contributions to the scientific and

  3. User Meeting Awards

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Meeting Awards Print web banner ALS User Meeting Awards See the 2013 User Meeting Awards Winners Home Agenda Awards Exhibitors Lodging Posters Registration Transportation Workshops This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Meeting Archives Users' Executive Committee The ALS Users' Executive Committee invites ALS users and staff to submit nominations in recognition of the people who have made significant contributions to the scientific

  4. T-659: Update support for RSA Authentication Manager

    Broader source: Energy.gov [DOE]

    RSA posted SP4 Patch 4 of their Authentication Manager product 06/30/2011. There are a few pages of fixes in the README, but the most significant is that Authentication Manager can now be installed on Windows Server 2008 (both 32 and 64bit).

  5. Multiple node remote messaging

    DOE Patents [OSTI]

    Blumrich, Matthias A.; Chen, Dong; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Ohmacht, Martin; Salapura, Valentina; Steinmacher-Burow, Burkhard; Vranas, Pavlos

    2010-08-31

    A method for passing remote messages in a parallel computer system formed as a network of interconnected compute nodes includes that a first compute node (A) sends a single remote message to a remote second compute node (B) in order to control the remote second compute node (B) to send at least one remote message. The method includes various steps including controlling a DMA engine at first compute node (A) to prepare the single remote message to include a first message descriptor and at least one remote message descriptor for controlling the remote second compute node (B) to send at least one remote message, including putting the first message descriptor into an injection FIFO at the first compute node (A) and sending the single remote message and the at least one remote message descriptor to the second compute node (B).

  6. 2012 NERSC User Survey Text

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2012 User Survey Text 2010/2011 User Survey Results 2009/2010 User Survey Results 2008/2009 User Survey Results 2007/2008 User Survey Results 2006 User Survey Results 2005 User Survey Results 2004 User Survey Results 2003 User Survey Results 2002 User Survey Results 2001 User Survey Results 2000 User Survey Results 1999 User Survey Results 1998 User Survey Results HPC Requirements for Science HPC Workshop Reports NERSC Staff Publications & Presentations Journal Cover Stories Galleries

  7. Public-key data authentication for treaty verification

    SciTech Connect (OSTI)

    Draelos, T.J.; Goldsmith, S.Y.

    1992-08-01

    A public-key Treaty Data Authentication Module (TDAM) based on the National Institute of Standards and Technology (NIST) Digital Signature Standard (DSS) has been developed to support treaty verification systems. The TDAM utilizes the Motorola DSP56001 Digital Signal Processor as a coprocessor and supports both the STD Bus and PC-AT Bus platforms. The TDAM is embedded within an Authenticated Data Communication Subsystem (ADCS) which provides transparent data authentication and communications, thereby concealing the details of securely authenticating and communicating compliance data and commands. The TDAM has been designed according to the NIST security guidelines for cryptographic modules. Public-key data authentication is important for support of both bilateral and multi-lateral treaties. 8 refs.

  8. Public-key data authentication for treaty verification

    SciTech Connect (OSTI)

    Draelos, T.J.; Goldsmith, S.Y.

    1992-01-01

    A public-key Treaty Data Authentication Module (TDAM) based on the National Institute of Standards and Technology (NIST) Digital Signature Standard (DSS) has been developed to support treaty verification systems. The TDAM utilizes the Motorola DSP56001 Digital Signal Processor as a coprocessor and supports both the STD Bus and PC-AT Bus platforms. The TDAM is embedded within an Authenticated Data Communication Subsystem (ADCS) which provides transparent data authentication and communications, thereby concealing the details of securely authenticating and communicating compliance data and commands. The TDAM has been designed according to the NIST security guidelines for cryptographic modules. Public-key data authentication is important for support of both bilateral and multi-lateral treaties. 8 refs.

  9. LANSCE | Users | LUG | Topical User Workshop

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 LANSCE Topical User Meeting | January 9-10 2012 LANSCE Topical User Workshop LANSCE will host the 2012 Topical User Workshop, January 9-10, 2012. We hope to see you there! Registration | Accommodations | Agenda (some presentations are included on the agenda) LANL foreign nationals may register at anytime. | Poster Dimensions: 32 in x 40 in This workshop will solicit user input for the scientific opportunities offered by the pulse stacker and superconducting accelerator that LANSCE has proposed

  10. Aggregate Remote Memory Copy Interface

    Energy Science and Technology Software Center (OSTI)

    2006-02-23

    The purpose of the Aggregate Remote Memory Copy (ARMCI) library is to provide a general- purpose, efficient, and Widely portable remote memory access (RMA) operations (one-sided communication) optimized for Contiguous and noncontiguous (strided, scatter/gather, I/O vector) data transfers. In addition, ARMCI includes a set of atomic and mutual exclusion operations. The development ARMCI is driven by the need to support the global-addres space communication model in context of distributed regular or irregular distributed data structures,more » communication libraries, and compilers. ARMCI is a standalone system that could be used to support user-level libraries and applications that use MPI or PVM.« less

  11. JLF User Group

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    JLF User Group NIF and Jupiter User Group Meeting 2016 The 2016 NIF User Group Meeting will take place the first week of February. The exact dates are Sunday evening, January 31th,...

  12. ALS Users' Association Charter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    users and will enable users to plan more efficiently the utilization of the facility. The role of the ALSUA shall be to advise the ALS Director on matters of concern to users....

  13. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, Allan M.

    1999-01-01

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user's local host, thereby providing ease of use and minimal software maintenance for users of that remote service.

  14. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, Allan M.

    1996-01-01

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user's local host, thereby providing ease of use and minimal software maintenance for users of that remote service.

  15. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, Allan M.

    1997-01-01

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user's local host, thereby providing ease of use and minimal software maintenance for users of that remote service.

  16. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users' Executive Committee Print The ALS Users' Executive Committee (UEC) is responsible for conveying the concerns and interests of users to ALS management. Members are elected annually by ALS users. To contact a member of the UEC, please email This e-mail address is being protected from spambots. You need JavaScript enabled to view it . ALS Users' Executive Committee Web Site ALS Users' Association Charter The current members of the committee (with terms), as of January 1, 2016, are David

  17. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users' Executive Committee Print The ALS Users' Executive Committee (UEC) is responsible for conveying the concerns and interests of users to ALS management. Members are elected annually by ALS users. To contact a member of the UEC, please email This e-mail address is being protected from spambots. You need JavaScript enabled to view it . ALS Users' Executive Committee Web Site ALS Users' Association Charter The current members of the committee (with terms), as of January 1, 2016, are David

  18. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users' Executive Committee Print The ALS Users' Executive Committee (UEC) is responsible for conveying the concerns and interests of users to ALS management. Members are elected annually by ALS users. To contact a member of the UEC, please email This e-mail address is being protected from spambots. You need JavaScript enabled to view it . ALS Users' Executive Committee Web Site ALS Users' Association Charter The current members of the committee (with terms), as of January 1, 2016, are David

  19. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users' Executive Committee Print The ALS Users' Executive Committee (UEC) is responsible for conveying the concerns and interests of users to ALS management. Members are elected annually by ALS users. To contact a member of the UEC, please email This e-mail address is being protected from spambots. You need JavaScript enabled to view it . ALS Users' Executive Committee Web Site ALS Users' Association Charter The current members of the committee (with terms), as of January 1, 2016, are David

  20. NIF User Group

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    users NIF User Group The National Ignition Facility User Group provides an organized framework and independent vehicle for interaction between the scientists who use NIF for "Science Use of NIF" experiments and NIF management. Responsibility for NIF and the research programs carried out at NIF resides with the NIF Director. The NIF User Group advises the NIF Director on matters of concern to users, as well as providing a channel for communication for NIF users with funding agencies and

  1. User Liaison Office

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Liaison Please upgrade your browser. This site's design is only visible in a graphical browser that supports web standards, but its content is accessible to any browser. Concerns? User Liaison Office User Liaison Home Users Group Program Advisory Committee User/Researcher Information print version ULO Services Driving in VA Housing Accomodations Office Space Student Affairs Office Telephone Services ULO Staff Lorelei Chopard User Liaison (ULO) (757) 269-6388 Bldg 12 L111 Hari Areti Head of

  2. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users' Executive Committee Print The ALS Users' Executive Committee (UEC) is responsible for conveying the concerns and interests of users to ALS management. Members are elected annually by ALS users. To contact a member of the UEC, please email This e-mail address is being protected from spambots. You need JavaScript enabled to view it . ALS Users' Executive Committee Web Site ALS Users' Association Charter The current members of the committee (with terms), as of January 1, 2016, are David

  3. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users' Executive Committee Print The ALS Users' Executive Committee (UEC) is responsible for conveying the concerns and interests of users to ALS management. Members are elected annually by ALS users. To contact a member of the UEC, please email This e-mail address is being protected from spambots. You need JavaScript enabled to view it . ALS Users' Executive Committee Web Site ALS Users' Association Charter The current members of the committee (with terms), as of January 1, 2016, are David

  4. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users' Executive Committee Print The ALS Users' Executive Committee (UEC) is responsible for conveying the concerns and interests of users to ALS management. Members are elected annually by ALS users. To contact a member of the UEC, please email This e-mail address is being protected from spambots. You need JavaScript enabled to view it . ALS Users' Executive Committee Web Site ALS Users' Association Charter The current members of the committee (with terms), as of January 1, 2016, are David

  5. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Deny Service | Department of Energy 1: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall

  6. User Accounts and Emails

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Accounts and Emails Print User Accounts Once a User Agreement is signed, users may set up an account for miscellaneous supplies and expenses at the ALS. To establish a user account, please contact This e-mail address is being protected from spambots. You need JavaScript enabled to view it , Budget and Planning, (x 6889). Users can keep track of expenses charged to their Berkeley Lab accounts through the Lab's Integrated Reporting and Information System (IRIS) . User Emails Users may sign up

  7. User Accounts and Emails

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Accounts and Emails Print User Accounts Once a User Agreement is signed, users may set up an account for miscellaneous supplies and expenses at the ALS. To establish a user account, please contact This e-mail address is being protected from spambots. You need JavaScript enabled to view it , Budget and Planning, (x 6889). Users can keep track of expenses charged to their Berkeley Lab accounts through the Lab's Integrated Reporting and Information System (IRIS) . User Emails Users may sign up

  8. User Accounts and Emails

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Accounts and Emails Print User Accounts Once a User Agreement is signed, users may set up an account for miscellaneous supplies and expenses at the ALS. To establish a user account, please contact This e-mail address is being protected from spambots. You need JavaScript enabled to view it , Budget and Planning, (x 6889). Users can keep track of expenses charged to their Berkeley Lab accounts through the Lab's Integrated Reporting and Information System (IRIS) . User Emails Users may sign up

  9. Controlling user access to electronic resources without password

    DOE Patents [OSTI]

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  10. Citrix_2FA_Authentication_09.09 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Citrix_2FA_Authentication_09.09 Citrix_2FA_Authentication_09.09 PDF icon Citrix_2FA_Authentication-September09 More Documents & Publications Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc Using Two-Factor RSA Token with WebVPN Microsoft Word - SMail_Secure_Web-Based_Email_v3 _2_.doc

  11. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  12. Franklin: User Experiences

    SciTech Connect (OSTI)

    National Energy Research Supercomputing Center; He, Yun; Kramer, William T.C.; Carter, Jonathan; Cardo, Nicholas

    2008-05-07

    The newest workhorse of the National Energy Research Scientific Computing Center is a Cray XT4 with 9,736 dual core nodes. This paper summarizes Franklin user experiences from friendly early user period to production period. Selected successful user stories along with top issues affecting user experiences are presented.

  13. ALS User Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ALS User Meeting October 3-5, 2011 Lawrence Berkeley National Laboratory, California

  14. LANSCE | User Resources | User Satisfaction Survey

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Satisfaction Survey We hope that your research at the Los Alamos Neutron Science Center was productive and successful. Your feedback is important to the Department of Energy...

  15. U-188: MySQL User Login Security Bypass and Unspecified Vulnerability

    Broader source: Energy.gov [DOE]

    An error when verifying authentication attempts can be exploited to bypass the authentication mechanism.

  16. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  17. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions.

  18. Establish a User Agreement

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Establish a User Agreement Print User Agreements are Required Before a user group can begin their research at the ALS, a User Agreement between Berkeley Lab and the user's sponsoring organization must be signed. Many organizations already have a signed agreement, however if your organization has not established an agreement, please send an email to This e-mail address is being protected from spambots. You need JavaScript enabled to view it to set one up. The User Agreement is valid for up to

  19. Establish a User Agreement

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Establish a User Agreement Print User Agreements are Required Before a user group can begin their research at the ALS, a User Agreement between Berkeley Lab and the user's sponsoring organization must be signed. Many organizations already have a signed agreement, however if your organization has not established an agreement, please send an email to This e-mail address is being protected from spambots. You need JavaScript enabled to view it to set one up. The User Agreement is valid for up to

  20. Users | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users Users June 22, 2011 Each year in mid-summer an event appears on our calendars; the annual meeting of our users' group. The importance of this event cannot be overstated. We claim to the Office of Science that one of our core competencies is the ability to design, construct and operate large user facilities. And indeed we have a nuclear physics user community of 1,300 physicists from all over the world. The Users Group Board of Directors (UGBOD) organizes the meeting. It is customary for

  1. T-703: Cisco Unified Communications Manager Open Query Interface...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain ... Authentication Bypass Vulnerability T-614: Cisco Unified Communications Manager ...

  2. V-160: Wireshark Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    can be exploited to cause a crash via specially crafted packets. 6) An error in the MPEG DSM-CC dissector (dissectorspacket-mpeg-dsmcc.c) can be exploited to cause a crash via...

  3. CYBERSECURITY AND USER ACCOUNTABILITY IN THE C-AD CONTROL SYSTEM

    SciTech Connect (OSTI)

    MORRIS,J.T.; BINELLO, S.; D OTTAVIO, T.; KATZ, R.A.

    2007-10-15

    A heightened awareness of cybersecurity has led to a review of the procedures that ensure user accountability for actions performed on the computers of the Collider-Accelerator Department (C-AD) Control System. Control system consoles are shared by multiple users in control rooms throughout the C-AD complex. A significant challenge has been the establishment of procedures that securely control and monitor access to these shared consoles without impeding accelerator operations. This paper provides an overview of C-AD cybersecurity strategies with an emphasis on recent enhancements in user authentication and tracking methods.

  4. ALS Users' Association Charter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    facility. Thorough discussion with users of current projects, as well as plans for the future, will place ALS management in a better position to evaluate the needs of users and...

  5. Managing Your User Account

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Managing Your Account Managing Your User Account Use the NERSC Information Management (NIM) system to customize your user account and keep your personal information up-to-date. See...

  6. User Financial Account Form

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2/20/13 User Financial Account Form Establish a user financial account at SLAC to procure gases, chemicals, supplies or services to support your experiment at SLAC's user facilities and to send samples, dewars, or other equipment between SLAC and your institution. To open or renew your SLAC user financial account, complete and submit this form along with a Purchase Order (PO) from your institution. The PO should be made to SLAC National Accelerator Laboratory for the amount of estimated

  7. LANSCE | Users | LUG | Charter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Charter I. NAME The name of this organization shall be the Los Alamos Neutron Science Center (LANSCE) User Group. II. PURPOSE The purpose of the LANSCE User Group (LUG) is to: * Provide a formal channel for the exchange of information between LANSCE management and the researchers who use the facilities. * Supply a vehicle for users of LANSCE to transmit concerns and recommendations to the LANSCE management about operating policy, facilities, and other matters affecting the user community. *

  8. 2011 User Meeting Agenda

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1 User Meeting Agenda Home Agenda Awards Exhibitors Lodging Posters Registration Photo Contest Transportation Workshops This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Meeting Archives Users' Executive Committee The 2011 ALS User Meeting begins registation begins at 07:30 on Monday, October 3, outside the Building 50 Auditorium. The meeting itself will start at 08:25 inside the Building 50 Auditorium; all plenary sessions will also be held at

  9. User Financial Account Form

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    10/21/15 User Financial Account Form Establish a user financial account at SLAC to procure gases, chemicals, supplies or services to support your experiment at SLAC's user facilities or to send samples, dewars, or other equipment between SLAC and your institution. To open or renew your SLAC user financial account, complete and submit this form along with a Purchase Order (PO) from your institution. The PO should be made to SLAC National Accelerator Laboratory for the amount of estimated

  10. Field Deployable Tritium Assay System Host Graphical User Interface Software

    Energy Science and Technology Software Center (OSTI)

    1998-05-12

    The FDTASHOST software is a Graphical User Interface for the Field Deployable Tritium Assay System (FDTAS - Invention Disclosure SRS-96-09-091 has been submitted). The program runs on the Host computer which is located in the Laboratory and connected to the FDTAS remote field system via a modem over a phone line. The operator receives status information and messages from the Remote system. The operator can enter in commands to be executed by the remote systemmore » using the mouse and a pull down menu.« less

  11. TRL Computer System User’s Guide

    SciTech Connect (OSTI)

    Engel, David W.; Dalton, Angela C.

    2014-01-31

    We have developed a wiki-based graphical user-interface system that implements our technology readiness level (TRL) uncertainty models. This document contains the instructions for using this wiki-based system.

  12. User Program | Prospective Users Non-US

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Non US Citizens Non US citizens must follow the DOE approval process for visiting LANSCE. // Information for Prospective Users - Non US Citizens Although we encourage the use of LANSCE by non-US citizens, a DOE approval process must be followed. Before You Arrive: After submitting a proposal and having your beam time approved, the WNR User Program Administrator will contact you by email with instructions for scheduling your visit. To ensure sufficient time to receive DOE approval, inform the WNR

  13. Users Meetings | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2015 Users Meeting 2014 Users Meeting 2013 Users Meeting 2012 Users Meeting 2011 Users Meeting 2009 Users Meeting 2008 Users Meeting 2007 Users Meeting Workshops Photos Videos Career Opportunities CNM Intranet CNM on Facebook Career Opportunities CNM Intranet CNM on Facebook Argonne National Laboratory Center for Nanoscale Materials About Research Capabilities For Users People Publications News & Events News & Events RESEARCH HIGHLIGHTS COLLOQUIUM SERIES SEMINAR SERIES Argonne Press

  14. NERSC Usage and User Demographics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Usage Demographics Users and Projects Through the Years Careers Visitor Info Web Policies Home About Usage and User Demographics NERSC Usage and User Demographics Usage...

  15. Monthly PDSF User Meeting Minutes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Software Policies User Surveys NERSC Users Group User Announcements Help Staff Blogs Request Repository Mailing List Operations for: Passwords & Off-Hours Status...

  16. 2012 ALS User Meeting Awards

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2012 ALS User Meeting Awards Print Recipients of the 2012 Users' Executive Committee awards and Student Poster Competition were announced Tuesday, October 9, at the ALS User...

  17. 2012 ALS User Meeting Awards

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 ALS User Meeting Awards Recipients of the 2012 Users' Executive Committee awards and Student Poster Competition were announced Tuesday, October 9, at the ALS User Meeting. David...

  18. Remote reset circuit

    DOE Patents [OSTI]

    Gritzo, Russell E.

    1987-01-01

    A remote reset circuit acts as a stand-alone monitor and controller by clocking in each character sent by a terminal to a computer and comparing it to a given reference character. When a match occurs, the remote reset circuit activates the system's hardware reset line. The remote reset circuit is hardware based centered around monostable multivibrators and is unaffected by system crashes, partial serial transmissions, or power supply transients.

  19. Remote reset circuit

    DOE Patents [OSTI]

    Gritzo, R.E.

    1985-09-12

    A remote reset circuit acts as a stand-along monitor and controller by clocking in each character sent by a terminal to a computer and comparing it to a given reference character. When a match occurs, the remote reset circuit activates the system's hardware reset line. The remote reset circuit is hardware based centered around monostable multivibrators and is unaffected by system crashes, partial serial transmissions, or power supply transients. 4 figs.

  20. Remote Monitoring Transparency Program

    SciTech Connect (OSTI)

    Sukhoruchkin, V.K.; Shmelev, V.M.; Roumiantsev, A.N.; Croessmann, C.D.; Horton, R.D.; Matter, J.C.; Czajkowski, A.F.; Sheely, K.B.; Bieniawski, A.J.

    1996-12-31

    The objective of the Remote Monitoring Transparency Program is to evaluate and demonstrate the use of remote monitoring technologies to advance nonproliferation and transparency efforts that are currently being developed by Russia and the US without compromising the national security of the participating parties. Under a lab-to-lab transparency contract between Sandia National Laboratories (SNL) and the Kurchatov Institute (KI RRC), the Kurchatov Institute will analyze technical and procedural aspects of the application of remote monitoring as a transparency measure to monitor inventories of direct-use HEU and plutonium (e.g., material recovered from dismantled nuclear weapons). A goal of this program is to assist a broad range of political and technical experts in learning more about remote monitoring technologies that could be used to implement nonproliferation, arms control, and other security and confidence building measures. Specifically, this program will: (1) begin integrating Russian technologies into remote monitoring systems; (2) develop remote monitoring procedures that will assist in the application of remote monitoring techniques to monitor inventories of HEU and Pu from dismantled nuclear weapons; and (3) conduct a workshop to review remote monitoring fundamentals, demonstrate an integrated US/Russian remote monitoring will have on the national security of participating countries.

  1. Remote Systems Design & Deployment

    SciTech Connect (OSTI)

    Bailey, Sharon A.; Baker, Carl P.; Valdez, Patrick LJ

    2009-08-28

    The Pacific Northwest National Laboratory (PNNL) was tasked by Washington River Protection Solutions, LLC (WRPS) to provide information and lessons learned relating to the design, development and deployment of remote systems, particularly remote arm/manipulator systems. This report reflects PNNL’s experience with remote systems and lays out the most important activities that need to be completed to successfully design, build, deploy and operate remote systems in radioactive and chemically contaminated environments. It also contains lessons learned from PNNL’s work experiences, and the work of others in the national laboratory complex.

  2. Remote inspection system for hazardous sites

    SciTech Connect (OSTI)

    Redd, J.; Borst, C.; Volz, R.A.; Everett, L.J.

    1999-04-01

    Long term storage of special nuclear materials poses a number of problems. One of these is a need to inspect the items being stored from time to time. Yet the environment is hostile to man, with significant radiation exposure resulting from prolonged presence in the storage facility. This paper describes research to provide a remote inspection capability, which could lead to eliminating the need for humans to enter a nuclear storage facility. While there are many ways in which an RI system might be created, this paper describes the development of a prototype remote inspection system, which utilizes virtual reality technology along with robotics. The purpose of this system is to allow the operator to establish a safe and realistic telepresence in a remote environment. In addition, it was desired that the user interface for the system be as intuitive to use as possible, thus eliminating the need for extensive training. The goal of this system is to provide a robotic platform with two cameras, which are capable of providing accurate and reliable stereographic images of the remote environment. One application for the system is that it might be driven down the corridors of a nuclear storage facility and utilized to inspect the drums inside, all without the need for physical human presence. Thus, it is not a true virtual reality system providing simulated graphics, but rather an augmented reality system, which performs remote inspection of an existing, real environment.

  3. PIA - Advanced Test Reactor National Scientific User Facility Users Week

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2009 | Department of Energy Advanced Test Reactor National Scientific User Facility Users Week 2009 PIA - Advanced Test Reactor National Scientific User Facility Users Week 2009 PIA - Advanced Test Reactor National Scientific User Facility Users Week 2009 PDF icon PIA - Advanced Test Reactor National Scientific User Facility Users Week 2009 More Documents & Publications PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL Education Programs Business Enclav

  4. Remote direct memory access over datagrams

    DOE Patents [OSTI]

    Grant, Ryan Eric; Rashti, Mohammad Javad; Balaji, Pavan; Afsahi, Ahmad

    2014-12-02

    A communication stack for providing remote direct memory access (RDMA) over a datagram network is disclosed. The communication stack has a user level interface configured to accept datagram related input and communicate with an RDMA enabled network interface card (NIC) via an NIC driver. The communication stack also has an RDMA protocol layer configured to supply one or more data transfer primitives for the datagram related input of the user level. The communication stack further has a direct data placement (DDP) layer configured to transfer the datagram related input from a user storage to a transport layer based on the one or more data transfer primitives by way of a lower layer protocol (LLP) over the datagram network.

  5. Shifter: User Defined Images

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Shifter: User Defined Images Shifter: User Defined Images Shifter: Bringing Linux containers to HPC NERSC is working to increase flexibility and usability of its HPC systems by enabling Docker-like Linux container technology. Linux containers allow an application to be packaged with its entire software stack - including some portions of the base OS files - as well defining needed user environment variables and application "entry point.". Containers may provide an abstract way of

  6. New Users Guide

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Storing and Retrieving Data Advanced Usage Examples Charging Storage Statistics Troubleshooting I/O Resources for Scientific Applications at NERSC Optimizing I/O performance on the Lustre file system I/O Formats Science Databases Sharing Data Transferring Data Unix Groups at NERSC Unix File Permissions Data & Analytics Connecting to NERSC Queues and Scheduling Job Logs & Statistics Application Performance Training & Tutorials Software Policies User Surveys NERSC Users Group User

  7. ALS Users' Association Charter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users' Executive Committee ALS Users' Association Charter Print The purpose of the Advanced Light Source Users' Association (ALSUA) is to provide an organized framework for the interaction between those who use the Advanced Light Source (ALS) at the Lawrence Berkeley Laboratory (LBL) for their research and the ALS management, as well as to provide a channel for communication with other synchrotron radiation laboratories and, on suitable occasions, with federal agencies. The ALSUA, representing

  8. Users from Industry

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users from Industry Users from Industry Print The Advanced Light Source (ALS) welcomes industrial users from large and small companies whose projects advance scientific knowledge, investigate the development of new products and manufacturing methods, and/or provide economic benefits and jobs to the economy. The nature of industrial research can be different from traditional university and government sponsored projects, so the ALS has created unique opportunities for new and existing industrial

  9. 2013 User Meeting Awards

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 User Meeting Awards Recipients of the 2013 Users' Executive Committee awards and the Student Poster Competition awards, were presented Tuesday, October 8, at the ALS User Meeting. David A. Shirley Award for Outstanding Scientific Achievement at the ALS 2013-shirley The David A. Shirley Award for Scientific Achievement went to Harald Ade, North Carolina State University, "For achievements in polymer science and in particular the elucidation of the chemical nano-morphology of complex

  10. 2015 CAMD Users Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CAMD 2015 Symposium followed by the CAMD Users' Meeting SAXS Workshop Thursday, April 23th, 2015 CAMD, 6980 Jefferson Highway, Baton Rouge, LA 70806 CAMD 2015 Symposium followed by the CAMD Users' Meeting Friday, April 24th, 2015 LTRC Transportation Training and Education Center (Map) The CAMD 2015 Symposium followed by the CAMD Users' Meeting will be held on Friday, April 24th at the LTRC Transportation Training and Education Center, 4099 Gourrier Avenue, Baton Rouge, LA 70808, directly behind

  11. 2011 User Meeting Agenda

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Agenda Home Agenda Awards Exhibitors Lodging Posters Registration Photo Contest Transportation Workshops This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Meeting Archives Users' Executive Committee The 2011 ALS User Meeting begins registation begins at 07:30 on Monday, October 3, outside the Building 50 Auditorium. The meeting itself will start at 08:25 inside the Building 50 Auditorium; all plenary sessions will also be held at this location.

  12. V-109: Google Chrome WebKit Type Confusion Error Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 25.0.1364.160 ABSTRACT: A vulnerability was reported in...

  13. U-192: VMware Workstation/Player VM Remote Device Bug Lets Local...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289...

  14. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  15. Users from Industry

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    industrial users from large and small companies whose projects advance scientific knowledge, investigate the development of new products and manufacturing methods, andor...

  16. 2004 User Survey Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    13 | Next 2004 User Survey Results Table of Contents Response Summary Respondent Demographics Overall Satisfaction and Importance All Satisfaction, Importance and Usefulness...

  17. 2005 User Survey Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    10 | Next 2005 User Survey Results Table of Contents Response Summary Respondent Demographics All Satisfaction, Importance and Usefulness Ratings Hardware Resources Software...

  18. 2003 User Survey Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    10 | Next 2003 User Survey Results Table of Contents Response Summary Respondent Demographics Overall Satisfaction and Importance All Satisfaction Topics and Changes from...

  19. CNMS User Newsletter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Standards and Technology (NIST) and he is working towards developing novel scanning force probes using cavity optomechanics. Research Highlights CNMS User Newsletter Page 7...

  20. ORPS User Registration Form

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Replacement Delete User 9. Computer Security: Indicate by your signature on the line below that you have read, understand and will comply with the following: A. I understand ...

  1. About the User Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    . All proposals are reviewed for scientific merit by the Program Advisory Committee (PAC). In the case of proprietary proposals, such as the case for Industry, users pay for...

  2. 2001 User Survey Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Questions and Changes from Previous Years NERSC Information Management (NIM) System Web and Communications Hardware Resources Software Training User Services Comments about...

  3. ALS Users' Association Charter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Awards: David A. Shirley Award for Outstanding Scientific Achievement at the ALS Klaus Halbach Award for Innovative Instrumentation at the ALS Tim Renner User Services Award for...

  4. Programs & User Facilities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science Programs Office of Science Programs & User Facilities ... Advanced Scientific Computing Research Applied Mathematics Co-Design Centers Exascale Co-design Center ...

  5. 2014 NERSC User Survey

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Survey 2014 NERSC User Survey December 17, 2014 by Francesca Verdier Please take a few minutes to fill out NERSC's annual user survey. Your feedback is important because it allows us to judge the quality of our services, give DOE information on how we are doing, and point us to areas in which we can improve. The survey is on the web at the URL: https://www.nersc.gov/news-publications/publications-reports/user-surveys/2014/ and covers the allocation year 2014. Subscribe via RSS Subscribe

  6. LANSCE | User Resources

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    LANSCE provides its users with resources critical to their experiements and their experience. Lujan Resources WNR Resources Submit a proposal for beam time Visit...

  7. 2012 User Meeting Workshops

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Workshops Print 2012 ALS User Meeting Workshops Home Agenda Awards Exhibitors Lodging Posters Registration Transportation Workshops This e-mail address is being protected from...

  8. 2012 User Meeting Agenda

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 User Meeting Agenda Print Agenda Home Agenda Awards Exhibitors Lodging Posters Registration Transportation Workshops This e-mail address is being protected from spambots. You...

  9. Remote actuated valve implant

    SciTech Connect (OSTI)

    McKnight, Timothy E; Johnson, Anthony; Moise, Jr., Kenneth J; Ericson, Milton Nance; Baba, Justin S; Wilgen, John B; Evans, III, Boyd McCutchen

    2014-02-25

    Valve implant systems positionable within a flow passage, the systems having an inlet, an outlet, and a remotely activatable valve between the inlet and outlet, with the valves being operable to provide intermittent occlusion of the flow path. A remote field is applied to provide thermal or magnetic activation of the valves.

  10. NERSC User Group Annual Meeting February 1-3, 2012

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Group Annual Meeting February 1-3, 2012 NERSC User Group Annual Meeting February 1-3, 2012 January 5, 2012 by Francesca Verdier Registration is open for the NERSC Users' Group Meeting and HPC training on Feb. 1-3, 2012. The meeting will be held at NERSC's Oakland Scientific Facility in Oakland, CA. All three days will be available as a WebEx web meeting for remote participation. All NERSC users are invited to attend all three days. Wednesday and Thursday, Feb. 1 and 2, are day-long training

  11. KDYNA user's manual

    SciTech Connect (OSTI)

    Levatin, J.A.L.; Attia, A.V.; Hallquist, J.O.

    1990-09-28

    This report is a complete user's manual for KDYNA, the Earth Sciences version of DYNA2D. Because most features of DYNA2D have been retained in KDYNA much of this manual is identical to the DYNA2D user's manual.

  12. Remote Access | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ames Laboratory Information Systems supports VPN for remotely accessing internal computers and network services. These are: Once connected remotely to Ames Laboratory,...

  13. The PANTHER User Experience

    SciTech Connect (OSTI)

    Coram, Jamie L.; Morrow, James D.; Perkins, David Nikolaus

    2015-09-01

    This document describes the PANTHER R&D Application, a proof-of-concept user interface application developed under the PANTHER Grand Challenge LDRD. The purpose of the application is to explore interaction models for graph analytics, drive algorithmic improvements from an end-user point of view, and support demonstration of PANTHER technologies to potential customers. The R&D Application implements a graph-centric interaction model that exposes analysts to the algorithms contained within the GeoGraphy graph analytics library. Users define geospatial-temporal semantic graph queries by constructing search templates based on nodes, edges, and the constraints among them. Users then analyze the results of the queries using both geo-spatial and temporal visualizations. Development of this application has made user experience an explicit driver for project and algorithmic level decisions that will affect how analysts one day make use of PANTHER technologies.

  14. AIRMaster+ User Manual | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    User Manual AIRMaster+ User Manual This user manual is designed to help users understand the AIRMaster+ compressed air software. PDF icon AIRMaster+ User Manual (2000)

  15. User`s guide to MIDAS

    SciTech Connect (OSTI)

    Tisue, S.A.; Williams, N.B.; Huber, C.C.; Chun, K.C.

    1995-12-01

    Welcome to the MIDAS User`s Guide. This document describes the goals of the Munitions Items Disposition Action System (MIDAS) program and documents the MIDAS software. The main text first describes the equipment and software you need to run MIDAS and tells how to install and start it. It lists the contents of the database and explains how it is organized. Finally, it tells how to perform various functions, such as locating, entering, viewing, deleting, changing, transferring, and printing both textual and graphical data. Images of the actual computer screens accompany these explanations and guidelines. Appendix A contains a glossary of names for the various abbreviations, codes, and chemicals; Appendix B is a list of modem names; Appendix C provides a database dictionary and rules for entering data; and Appendix D describes procedures for troubleshooting problems associated with connecting to the MIDAS server and using MIDAS.

  16. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  17. NIM Guide for Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users NIM Guide for Users Getting Started The NERSC Information Management (NIM) system is a web portal that contains user, login name, usage, and allocations information. First Time Login The first time you log in to NIM, you will have to change your NIM password. Your NIM password is also your NERSC password and all NERSC passwords must abide by certain requirements. See Passwords. Logging In To log into the NIM system, point your web browser to the URL http://nim.nersc.gov. Please use this

  18. Remote Alaskan Communities Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Alaskan Communities Energy Efficiency Competition (RACEE) Technical Assistance Guide March 2016 2 Technical Assistance Table of Contents How to Use this Guide ......................................................... Page 2 Technical Assistance Provider Network ..........................................................Page 2 * Regional Liaisons ..........................................................Page 4 * Regional Liaison Contact List

  19. Remote Access Options

    Energy Savers [EERE]

    Remote Access Options November 2013 Remote Access Options for EITS Customers If access is required to DOE Headquarters internal network resources, such as messaging, productivity tools or network-stored files and folders while away from the DOE building, you can access them through a Virtual Private Network. Follow the instructions below. (Note: You must have access to the Internet to use these services) Virtual Private Network A Virtual Private Network (VPN) is a private connection between two

  20. Remote Sensor Placement

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Research Projects Remote Sensor Placement Collaboration between Los Alamos National Laboratory and the University of California at San Diego (UCSD) Jacobs School of Engineering Contact Institute Director Charles Farrar (505) 663-5330 Email UCSD EI Director Michael Todd (858) 534-5951 Professional Staff Assistant Ellie Vigil (505) 667-2818 Email Administrative Assistant Rebecca Duran (505) 665-8899 Email The goal of this work is to develop a new autonomous capability for remotely deploying

  1. Remote electrochemical sensor

    DOE Patents [OSTI]

    Wang, Joseph; Olsen, Khris; Larson, David

    1997-01-01

    An electrochemical sensor for remote detection, particularly useful for metal contaminants and organic or other compounds. The sensor circumvents technical difficulties that previously prevented in-situ remote operations. The microelectrode, connected to a long communications cable, allows convenient measurements of the element or compound at timed and frequent intervals and instrument/sample distances of ten feet to more than 100 feet. The sensor is useful for both downhole groundwater monitoring and in-situ water (e.g., shipboard seawater) analysis.

  2. CNMS User Newsletter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    systems. Access is provided at no cost to users for research that is in the public do- main and intended for publica on in the open literature. The submission deadline is...

  3. User' Software Manual

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MM-Group Home MMG Advisory Committees 4-ID-D Home Recent Publications Beamline Info Optics Instrumentation Software User Info FAQs 4-ID-D Beamline Software Manual Introduction...

  4. ARM User Survey Report

    SciTech Connect (OSTI)

    Roeder, LR

    2010-06-22

    The objective of this survey was to obtain user feedback to, among other things, determine how to organize the exponentially growing data within the Atmospheric Radiation Measurement (ARM) Climate Research Facility, and identify users’ preferred data analysis system. The survey findings appear to have met this objective, having received approximately 300 responses that give insight into the type of work users perform, usage of the data, percentage of data analysis users might perform on an ARM-hosted computing resource, downloading volume level where users begin having reservations, opinion about usage if given more powerful computing resources (including ability to manipulate data), types of tools that would be most beneficial to them, preferred programming language and data analysis system, level of importance for certain types of capabilities, and finally, level of interest in participating in a code-sharing community.

  5. LANSCE | Users | LUG

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    StudentPost-doc representative dotted line Message from the LUG EC Regarding 2015 Elections Dear Users, Thank you very much for participating in the recent email vote regarding...

  6. User Liaison Office

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Office Space User space is available in the ARC, reserve space here. arc-thumb.jpg Click to see Virtual Tour 12000 Jefferson Avenue, Newport News, VA 23606 Phone: (757) 269-7255...

  7. 2012 User Meeting Agenda

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the Amorphous-to-Crystalline Transitions in CaCO3 Biominerals, with 20-nm Resolution Pupa Gilbert, University of Wisconsin 13:55 User Services Update Sue Bailey, LBNL 14:10...

  8. CNMS User Newsletter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    at the 4th annual Na onal User Facility Science Expo for the U.S. House of Representa ves in the foyer of the Ray- burn House Office Building, Capitol Hill Washington D.C.....

  9. VOLTTRON: User Guide

    SciTech Connect (OSTI)

    Lutes, Robert G.; Katipamula, Srinivas; Akyol, Bora A.; Tenney, Nathan D.; Haack, Jereme N.; Monson, Kyle E.; Carpenter, Brandon J.

    2014-04-24

    This document is a user guide for the deployment of the Transactional Network platform and agent/application development within the VOLTTRON. The intent of this user guide is to provide a description of the functionality of the Transactional Network Platform. This document describes how to deploy the platform, including installation, use, guidance, and limitations. It also describes how additional features can be added to enhance its current functionality.

  10. Programs & User Facilities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science Programs » Office of Science » Programs & User Facilities Programs & User Facilities Enabling remarkable discoveries, tools that transform our understanding of energy and matter and advance national, economic, and energy security Advanced Scientific Computing Research Applied Mathematics Co-Design Centers Exascale Co-design Center for Materials in Extreme Environments (ExMatEx) Center for Exascale Simulation of Advanced Reactors (CESAR) Center for Exascale Simulation of

  11. ALS Users' Association Charter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users' Association Charter Print The purpose of the Advanced Light Source Users' Association (ALSUA) is to provide an organized framework for the interaction between those who use the Advanced Light Source (ALS) at the Lawrence Berkeley Laboratory (LBL) for their research and the ALS management, as well as to provide a channel for communication with other synchrotron radiation laboratories and, on suitable occasions, with federal agencies. The ALSUA, representing the research workers, will be in

  12. Become A User

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Become a User TRACC facilities, applications software, and resource allocations are available to the national transportation research community for sponsored research. TRACC welcomes discussions with potential researchers in the development of their proposals for allocations. Submit a User Proposal TRACC welcomes transportation related account applications that fit one of the following categories: The proposed project is a large-scale, complex application of national or regional transportation

  13. JLF User Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    JLF User Program The Jupiter Laser Facility User Program is open to all qualified applicants; US and non-US PIs are welcome to submit proposals. A proposal is necessary for shot-time allocated on the Titan, Janus, and COMET laser platforms at JLF. Using technical evaluations from experts, proposals will be reviewed and ranked by the JLF Advisory Committee based on scientific and/or programmatic quality, impact, and feasibility. Typically, all platforms are overrequested by a factor of two or

  14. LANSCE | User Resources | Schedules

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Schedules You will be notified of your experiment schedule at least 3-6 weeks prior to your start date. Two (2) weeks post-review, beam-time will be scheduled by the Instrument Scientist in consultation with the user. Three (3) weeks post review, schedule letters are sent to the Principal Investigator. After scheduling experiments, the LANSCE User Office will contact you to determine and schedule applicable training, assist with travel arrangements, initiate and required foreign national access

  15. 2011 User Meeting Workshops

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Workshops Home Agenda Awards Exhibitors Lodging Posters Registration Photo Contest Transportation Workshops This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Meeting Archives Users' Executive Committee Workshops will follow the end of the plenary sessions on Tuesday and continue through Wednesday.When registering , you will be asked to select the workshop that you plan to attend; this helps organizers plan room assignments and refreshments.

  16. General User Proposals (GUPs)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    General User Proposals (GUPs) Print General Users are granted beam time through a peer review proposal process. They may use beamlines and endstations provided by the ALS or the Participating Research Team (PRT) that operates the beamline. Before Submitting a Proposal Review the ALS Beamlines Directory to learn about the research capabilities of individual beamlines at the ALS. Contact the beamline scientist or the local contact listed in the tables, for additional information about the

  17. User Requirements Gathered for

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Requirements Gathered for the NERSC 7 Procurement Richard Gerber NERSC User Services NUG 2012 February 3, 2012 NERSC Oakland Scientific Facility User Requirements for NERSC 7 Largely based on a series of NERSC workshops. * Goal: Ensure that NERSC continues to provide the world-class facilities and services needed to support DOE Office of Science Research" * Method: Workshops to derive and document each DOE SC Office's HPC requirements for NERSC in 2013-14" * Deliverables: Reports that

  18. LANSCE | Users | LUG | Topical User Meeting Agenda

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Agenda (some presentations are included below) Sunday 4:00pm-6:00pm Registration: Best Western Monday 7:30am Registration: LANSCE, Bldg 1 Facility Presentations | LANSCE, Rosen Auditorium 8:15am-8:22am LANSCE User Group Executive Committee Welcome: Steve Conradson 2011 LUG-EC Chair 8:23am-8:30am Worshop Goals/Processes Kurt Schoenberg LANSCE Facility Director 8:30am-9:00am LANSCE Overview and Future Opportunities Kurt Schoenberg LANSCE Facility Director 9:00am-9:30am Nuclear Neutron Science at

  19. Restoration Prioritization Toolset: Documentation and User’s Guides 2007

    SciTech Connect (OSTI)

    Judd, Chaeli; Woodruff, Dana L.; Thom, Ronald M.; Anderson, Michael G.; Borde, Amy B.

    2007-10-26

    This user’s guide provides technical background and details on the Restoration Prioritization Toolset developed for GoMRC as well as instructions for use.

  20. Defining the questions: a research agenda for nontraditional authentication in arms control

    SciTech Connect (OSTI)

    Hauck, Danielle K; Mac Arthur, Duncan W; Smith, Morag K; Thron, Jonathan L; Budlong - Sylvester, Kory

    2010-01-01

    Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidences in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.

  1. Hardware device to physical structure binding and authentication

    DOE Patents [OSTI]

    Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

    2013-08-20

    Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

  2. 2011 NERSC User Survey (Read Only)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2010/2011 User Survey Results Survey Text 2009/2010 User Survey Results 2008/2009 User Survey Results 2007/2008 User Survey Results 2006 User Survey Results 2005 User Survey Results 2004 User Survey Results 2003 User Survey Results 2002 User Survey Results 2001 User Survey Results 2000 User Survey Results 1999 User Survey Results 1998 User Survey Results HPC Requirements for Science HPC Workshop Reports NERSC Staff Publications & Presentations Journal Cover Stories Galleries facebook icon

  3. Simultaneous Authentication and Certification of Arms-Control Measurement Systems

    SciTech Connect (OSTI)

    MacArthur, Duncan W. [Los Alamos National Laboratory; Hauck, Danielle K. [Los Alamos National Laboratory; Thron, Jonathan L. [Los Alamos National Laboratory

    2012-07-09

    Most arms-control-treaty-monitoring scenarios involve a host party that makes a declaration regarding its nuclear material or items and a monitoring party that verifies that declaration. A verification system developed for such a use needs to be trusted by both parties. The first concern, primarily from the host party's point of view, is that any sensitive information that is collected must be protected without interfering in the efficient operation of the facility being monitored. This concern is addressed in what can be termed a 'certification' process. The second concern, of particular interest to the monitoring party, is that it must be possible to confirm the veracity of both the measurement system and the data produced by this measurement system. The monitoring party addresses these issues during an 'authentication' process. Addressing either one of these concerns independently is relatively straightforward. However, it is more difficult to simultaneously satisfy host party certification concerns and monitoring party authentication concerns. Typically, both parties will want the final access to the measurement system. We will describe an alternative approach that allows both parties to gain confidence simultaneously. This approach starts with (1) joint development of the measurement system followed by (2) host certification of several copies of the system and (3) random selection by the inspecting party of one copy to be use during the monitoring visit and one (or more) copy(s) to be returned to the inspecting party's facilities for (4) further hardware authentication; any remaining copies are stored under joint seal for use as spares. Following this process, the parties will jointly (5) perform functional testing on the selected measurement system and then (6) use this system during the monitoring visit. Steps (1) and (2) assure the host party as to the certification of whichever system is eventually used in the monitoring visit. Steps (1), (3), (4), and (5) increase the monitoring party's confidence in the authentication of the measurement system.

  4. Authenticated group Diffie-Hellman key exchange: theory and practice

    SciTech Connect (OSTI)

    Chevassut, Olivier

    2002-10-03

    Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

  5. NERSC User Announcements RSS Feed

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Announcements RSS Feed NERSC User Announcements RSS Feed June 30, 2014 by Richard Gerber NERSC's User Announcements (not these "Featured Announcements") are now available as an RSS...

  6. User account | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User account User account Primary tabs Log in Request new password(active tab) Username or e-mail address * E-mail new password

  7. 2014 ALCF User Survey Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    survey, improved questions, and a representative user response to the survey. Demographics ALCF users are located around the world and are representative across different...

  8. Remote I/O : fast access to distant storage.

    SciTech Connect (OSTI)

    Foster, I.; Kohr, D., Jr.; Krishnaiyer, R.; Mogill, J.

    1997-12-17

    As high-speed networks make it easier to use distributed resources, it becomes increasingly common that applications and their data are not colocated. Users have traditionally addressed this problem by manually staging data to and from remote computers. We argue instead for a new remote I/O paradigm in which programs use familiar parallel I/O interfaces to access remote file systems. In addition to simplifying remote execution, remote I/O can improve performance relative to staging by overlapping computation and data transfer or by reducing communication requirements. However, remote I/O also introduces new technical challenges in the areas of portability, performance, and integration with distributed computing systems. We propose techniques designed to address these challenges and describe a remote I/O library called RIO that we have developed to evaluate the effectiveness of these techniques. RIO addresses issues of portability by adopting the quasi-standard MPI-IO interface and by defining a RIO device and RIO server within the ADIO abstract I/O device architecture. It addresses performance issues by providing traditional I/O optimizations such as asynchronous operations and through implementation techniques such as buffering and message forwarding to off load communication overheads. RIO uses the Nexus communication library to obtain access to configuration and security mechanisms provided by the Globus wide area computing tool kit. Microbenchmarks and application experiments demonstrate that our techniques achieve acceptable performance in most situations and can improve turnaround time relative to staging.

  9. Remote radiation dosimetry

    DOE Patents [OSTI]

    Braunlich, Peter F.; Tetzlaff, Wolfgang; Hegland, Joel E.; Jones, Scott C.

    1991-01-01

    Disclosed are methods and apparatus for remotely measuring radiation levels. Such are particularly useful for measuring relatively high levels or dosages of radiation being administered in radiation therapy. They are also useful for more general radiation level measurements where remote sensing from the remaining portions of the apparatus is desirable. The apparatus uses a beam generator, such as a laser beam, to provide a stimulating beam. The stimulating beam is preferably of wavelengths shorter than 6 microns, or more advantageously less than 2 microns. The stimulating beam is used to stimulate a remote luminescent sensor mounted in a probe which emits stored luminescent energy resulting from exposure of the sensor to ionizing radiation. The stimulating beam is communicated to the remote luminescent sensor via transmissive fiber which also preferably serves to return the emission from the luminescent sensor. The stimulating beam is advantageously split by a beam splitter to create a detector beam which is measured for power during a reading period during which the luminescent phosphor is read. The detected power is preferably used to control the beam generator to thus produce desired beam power during the reading period. The luminescent emission from the remote sensor is communicated to a suitable emission detector, preferably after filtering or other selective treatment to better isolate the luminescent emission.

  10. Remote radiation dosimetry

    DOE Patents [OSTI]

    Braunlich, P.F.; Tetzlaff, W.; Hegland, J.E.; Jones, S.C.

    1991-03-12

    Disclosed are methods and apparatus for remotely measuring radiation levels. Such are particularly useful for measuring relatively high levels or dosages of radiation being administered in radiation therapy. They are also useful for more general radiation level measurements where remote sensing from the remaining portions of the apparatus is desirable. The apparatus uses a beam generator, such as a laser beam, to provide a stimulating beam. The stimulating beam is preferably of wavelengths shorter than 6 microns, or more advantageously less than 2 microns. The stimulating beam is used to stimulate a remote luminescent sensor mounted in a probe which emits stored luminescent energy resulting from exposure of the sensor to ionizing radiation. The stimulating beam is communicated to the remote luminescent sensor via a transmissive fiber which also preferably serves to return the emission from the luminescent sensor. The stimulating beam is advantageously split by a beam splitter to create a detector beam which is measured for power during a reading period during which the luminescent phosphor is read. The detected power is preferably used to control the beam generator to thus produce desired beam power during the reading period. The luminescent emission from the remote sensor is communicated to a suitable emission detector, preferably after filtering or other selective treatment to better isolate the luminescent emission. 8 figures.

  11. GRSAC Users Manual

    SciTech Connect (OSTI)

    Ball, S.J.; Nypaver, D.J.

    1999-02-01

    An interactive workstation-based simulation code (GRSAC) for studying postulated severe accidents in gas-cooled reactors has been developed to accommodate user-generated input with ''smart front-end'' checking. Code features includes on- and off-line plotting, on-line help and documentation, and an automated sensitivity study option. The code and its predecessors have been validated using comparisons with a variety of experimental data and similar codes. GRSAC model features include a three-dimensional representation of the core thermal hydraulics, and optional ATWS (anticipated transients without scram) capabilities. The user manual includes a detailed description of the code features, and includes four case studies which guide the user through four different examples of the major uses of GRSAC: an accident case; an initial conditions setup and run; a sensitivity study; and the setup of a new reactor model.

  12. User Accounts (Logins)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Accounts User Accounts (Logins) Acknowledge NERSC Please acknowledge in your pubications the role NERSC facilities played in your research. Read More » How to get a NERSC account In order to use the NERSC facilities you need your own NERSC username and you also must be a member of a project that has a NERSC award. Read More » Passwords A user is given a username (also known as a login name) and associated password that permits them to access NERSC resources. This username/password pair may be

  13. User Submitted Research Citations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Submitted Research Citations User Submitted Research Citations Sort by: Default | Name | Date (low-high) | Date (high-low) | Source | Category Darmon Cover 02 02 2016 Chem Science 2015 cover page Increasing the rate of hydrogen oxidation without increasing the overpotential: a bio-inspired iron molecular electrocatalyst with an outer coordination sphere proton relay February 2, 2016 | Author(s): Jonathan M. Darmon,a Neeraj Kumar,a Elliott B. Hulley,a Charles J. Weiss,a Simone Raugei,a R.

  14. 2016 CAMD User Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CAMD 2016 User Meeting Friday, April 29th, 2016 CAMD, 6980 Jefferson Highway, Baton Rouge, LA 70806 The CAMD 2016 User Meeting will be held on Friday, April 29th at CAMD, 6980 Jefferson Highway, Baton Rouge, LA 70806. There will be a "Celebration of MPW" in the morning, coinciding with a poster session in the Experimental Hall starting at 10:30 AM. Beamline scientists will be on hand to explain the new features of the multi-pole wiggler beamlines. Lunch will be provided before the

  15. Remote electrochemical sensor

    DOE Patents [OSTI]

    Wang, J.; Olsen, K.; Larson, D.

    1997-10-14

    An electrochemical sensor is described for remote detection, particularly useful for metal contaminants and organic or other compounds. The sensor circumvents technical difficulties that previously prevented in-situ remote operations. The microelectrode, connected to a long communications cable, allows convenient measurements of the element or compound at timed and frequent intervals and instrument/sample distances of ten feet to more than 100 feet. The sensor is useful for both downhole groundwater monitoring and in-situ water (e.g., shipboard seawater) analysis. 21 figs.

  16. DOE Designated User Facilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Designated User Facilities DOE Designated User Facilities DOE Designated User Facilities Sept 30 2015 More Documents & Publications Microsoft Word - DesignatedUserFacilitiesApri...

  17. STEM Mentoring Café- Engaging Young Women in an Authentic Mentoring...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    STEM Mentoring Caf- Engaging Young Women in an Authentic Mentoring Experience Melinda Higgins Albert Einstein Distinguished Educator Fellow, NASA Office of Education, ...

  18. V-236: MediaWiki CentralAuth Extension Authentication Bypass...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, ... - Using Technology to Increase Transparency V-057: eXtplorer "extfinduser()" ...

  19. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael; Klatt, Leon N.

    2000-01-01

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

  20. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael; Klatt, Leon N.

    2001-01-01

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

  1. INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7/2013 Page 1 INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA) Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. HSPD-12 OWA REQUIREMENTS: ď‚· An EITS provided Exchange email account ď‚· A DOE issued HSPD-12 badge ď‚· DOEnet or Internet access and a supported web browser ď‚· A smart card reader installed* on your computer (*Windows Vista, Windows XP, MAC OS X 10.7 & 10.8, will also require smart card software to be

  2. RELAP-7 User's Guide

    SciTech Connect (OSTI)

    Zhang, Hongbin; Zhao, Haihua; Zou, Ling; Andrs, David; Berry, Ray Alden; Martineau, Richard Charles

    2014-12-01

    The document contains a user's guide on how to run the RELAP-7 code. The RELAP-7 code is the next generation nuclear reactor system safety analysis code being developed at the Idaho National Laboratory. RELAP-7 will become the main reactor systems simulation toolkit for the LWRS (Light Water Reactor Sustainability) program’s RISMC (Risk Informed Safety Margin Characterization) effort and the next generation tool in the RELAP reactor safety/systems analysis application series. RELAP-7 is written with object oriented programming language C++. A number of example problems and their associated input files are presented in this document to guide users to run the RELAP-7 code starting with simple pipe problems to problems with increasing complexity.

  3. NERSC User Environment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Environment NERSC User Environment Home Directories, Shells and Dotfiles All NERSC systems use global home directories, which are are pre-populated with shell initialization files (also known as dotfiles) for all available shells. NERSC fully supports bash, csh, and tcsh as login shells. Other shells (ksh, sh, and zsh) are also available. The default shell at NERSC is csh. Dotfiles The "standard" dotfiles are symbolic links to read-only files that NERSC controls. For each standard

  4. NERSC User Group Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NERSC User Group Meeting Oct 18, 2010 Outline * About OpenMP * Parallel Regions * Worksharing Constructs * Synchronization * Data Scope * Tasks * Using OpenMP at NERSC 2 3 Common Architectures * Shared Memory Architecture - Multiple CPUs share global memory, could have local cache - Uniform Memory Access (UMA) - Typical Shared Memory Programming Model: OpenMP, Pthreads, ... * Distributed Memory Architecture - Each CPU has own memory - Non-Uniform Memory Access (NUMA) - Typical Message Passing

  5. Weekly User Schedule

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Scientific and Technical Information Website Policies and Important Links This page provides a comprehensive overview of the policies of this federally sponsored website, consistent with guidance established by the U.S. Office of Management and Budget (OMB) as implemented by the U.S. Department of Energy. Disclaimer Acceptable Use Policy User Privacy Copyright Attribution Accessibility/Section 508 Website Security Linking to OSTI Website Linking to Outside Websites Freedom of Information

  6. LANSCE | Users | Rosen Scholar

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    About Past Scholars Call for Nominations Rosen Prize Users dotline Rosen Scholar | Dr. Edwin Fohtung Edwin Fohtung Dr. Edwin Fohtung has been named the 2015 Rosen Scholar at the Los Alamos Neutron Science Center (LANSCE) of Los Alamos National Laboratory (LANL) and is the current LANSCE Professor in conjunction with the Department of Physics at New Mexico State University. A materials physicist, Edwin obtained his PhD from the University of Freiburg in Germany and performed research at ANKA

  7. General User Proposals (GUPs)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Proposals (GUPs) Print General Users are granted beam time through a peer review proposal process. They may use beamlines and endstations provided by the ALS or the Participating Research Team (PRT) that operates the beamline. Before Submitting a Proposal Review the ALS Beamlines Directory to learn about the research capabilities of individual beamlines at the ALS. Contact the beamline scientist or the local contact listed in the tables, for additional information about the beamline. You can

  8. AVRAM user's manual

    SciTech Connect (OSTI)

    McGrady, P.W.

    1988-02-01

    This document details the use of the reliability code for the Atomic Vapor Laser Isotope Separation (AVLIS) project. This code was designed by Tom Anklam and John Harris. In late 1984 Patrick McGrady and Elena Koontz of C and TD/TA were assigned the task of improving the code and converting it for use on the DEC-10 system. In early 1986, Patric McGrady converted it to the CRAY. The AVRAM code is divided into distinct parts (often referred to as programs in this document). There is a COSMOS file that controls the execution of the FORTRAN code and controls the naming of output datasets and the deletion of temporary datasets created by the code. The FORTRAN code consists of a main program as a driver and of three main subroutines: EDIT, PARAM, and AVRAM. The EDIT program allows the user to create a new user defined system or add to an existing system or to change certain parameters. The PARAM program allows the user to alter system parameters and to select options such as economics run, criticality analysis or sensitivity studies. The AVRAM program does a reliability analysis of the system.

  9. Remote Sensing Laboratory - RSL

    SciTech Connect (OSTI)

    2014-11-06

    One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip, maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.

  10. Remote Sensing Laboratory - RSL

    ScienceCinema (OSTI)

    None

    2015-01-09

    One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip, maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.

  11. Advanced laser remote sensing

    SciTech Connect (OSTI)

    Schultz, J.; Czuchlewski, S.; Karl, R.

    1996-11-01

    This is the final report of a three-year, Laboratory-Directed Research and Development (LDRD) project at the Los Alamos National Laboratory. Remote measurement of wind velocities is critical to a wide variety of applications such as environmental studies, weather prediction, aircraft safety, the accuracy of projectiles, bombs, parachute drops, prediction of the dispersal of chemical and biological warfare agents, and the debris from nuclear explosions. Major programs to develop remote sensors for these applications currently exist in the DoD and NASA. At present, however, there are no real-time, three-dimensional wind measurement techniques that are practical for many of these applications and we report on two new promising techniques. The first new technique uses an elastic backscatter lidar to track aerosol patterns in the atmosphere and to calculate three dimensional wind velocities from changes in the positions of the aerosol patterns. This was first done by Professor Ed Eloranta of the University of Wisconsin using post processing techniques and we are adapting Professor Eloranta`s algorithms to a real-time data processor and installing it in an existing elastic backscatter lidar system at Los Alamos (the XM94 helicopter lidar), which has a compatible data processing and control system. The second novel wind sensing technique is based on radio-frequency (RF) modulation and spatial filtering of elastic backscatter lidars. Because of their compactness and reliability, solid state lasers are the lasers of choice for many remote sensing applications, including wind sensing.

  12. Remote repair appliance

    DOE Patents [OSTI]

    Heumann, Frederick K.; Wilkinson, Jay C.; Wooding, David R.

    1997-01-01

    A remote appliance for supporting a tool for performing work at a worksite on a substantially circular bore of a workpiece and for providing video signals of the worksite to a remote monitor comprising: a baseplate having an inner face and an outer face; a plurality of rollers, wherein each roller is rotatably and adjustably attached to the inner face of the baseplate and positioned to roll against the bore of the workpiece when the baseplate is positioned against the mouth of the bore such that the appliance may be rotated about the bore in a plane substantially parallel to the baseplate; a tool holding means for supporting the tool, the tool holding means being adjustably attached to the outer face of the baseplate such that the working end of the tool is positioned on the inner face side of the baseplate; a camera for providing video signals of the worksite to the remote monitor; and a camera holding means for supporting the camera on the inner face side of the baseplate, the camera holding means being adjustably attached to the outer face of the baseplate. In a preferred embodiment, roller guards are provided to protect the rollers from debris and a bore guard is provided to protect the bore from wear by the rollers and damage from debris.

  13. Remote repair appliance

    DOE Patents [OSTI]

    Heumann, F.K.; Wilkinson, J.C.; Wooding, D.R.

    1997-12-16

    A remote appliance for supporting a tool for performing work at a work site on a substantially circular bore of a work piece and for providing video signals of the work site to a remote monitor comprises: a base plate having an inner face and an outer face; a plurality of rollers, wherein each roller is rotatably and adjustably attached to the inner face of the base plate and positioned to roll against the bore of the work piece when the base plate is positioned against the mouth of the bore such that the appliance may be rotated about the bore in a plane substantially parallel to the base plate; a tool holding means for supporting the tool, the tool holding means being adjustably attached to the outer face of the base plate such that the working end of the tool is positioned on the inner face side of the base plate; a camera for providing video signals of the work site to the remote monitor; and a camera holding means for supporting the camera on the inner face side of the base plate, the camera holding means being adjustably attached to the outer face of the base plate. In a preferred embodiment, roller guards are provided to protect the rollers from debris and a bore guard is provided to protect the bore from wear by the rollers and damage from debris. 5 figs.

  14. 2011 CNM Users Meeting | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Argonne Press Releases Feature Stories In the News Users Meetings 2015 Users Meeting 2014 Users Meeting 2013 Users Meeting 2012 Users Meeting 2011 Users Meeting 2009 Users Meeting 2008 Users Meeting 2007 Users Meeting Workshops Photos Videos Career Opportunities CNM Intranet CNM on Facebook Career Opportunities CNM Intranet CNM on Facebook Argonne National Laboratory Center for Nanoscale Materials About Research Capabilities For Users People Publications News & Events News & Events

  15. 2012 CNM Users Meeting | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Argonne Press Releases Feature Stories In the News Users Meetings 2015 Users Meeting 2014 Users Meeting 2013 Users Meeting 2012 Users Meeting 2011 Users Meeting 2009 Users Meeting 2008 Users Meeting 2007 Users Meeting Workshops Photos Videos Career Opportunities CNM Intranet CNM on Facebook Career Opportunities CNM Intranet CNM on Facebook Argonne National Laboratory Center for Nanoscale Materials About Research Capabilities For Users People Publications News & Events News & Events

  16. Usibelli Coal Mine - Cleaner Energy, Brighter Future

    Energy Savers [EERE]

    Department of Energy User guide for remote access to VDI and Workplace using RSA token User guide for remote access to VDI and Workplace using RSA token User guide for remote access to VDI and Workplace using RSA token PDF icon VDI_WP_RSA_Remote_Guide_Final.pdf More Documents & Publications User Guide for Remote Access to VDI/Workplace Using PIV Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc Citrix_2FA_Authentication_09.09

    Bureau of Indian Affairs Providers Conference The

  17. Remote vacuum or pressure sealing device and method for critical isolated systems

    DOE Patents [OSTI]

    Brock, James David (Newport News, VA); Keith, Christopher D. (Newport News, VA)

    2012-07-10

    A remote vacuum or pressure sealing apparatus and method for making a radiation tolerant, remotely prepared seal that maintains a vacuum or pressure tight seal throughout a wide temperature range. The remote sealing apparatus includes a fixed threaded sealing surface on an isolated system, a gasket, and an insert consisting of a plug with a protruding sample holder. An insert coupling device, provided for inserting samples within the isolated system, includes a threaded fastener for cooperating with the fixed threaded sealing surface on the isolated system. The insert coupling device includes a locating pin for azimuthal orientation, coupling pins, a tooted coaxial socket wrench, and an insert coupling actuator for actuating the coupling pins. The remote aspect of the sealing apparatus maintains the isolation of the system from the user's environment, safely preserving the user and the system from detrimental effect from each respectively.

  18. User Data Forum Presentations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Presentations User Data Forum Presentations Sort by: Default | Name | Date (low-high) | Date (high-low) | Source | Category M01: Perspectives from DOE June 16, 2014 | Author(s): Laura Biven, Ph.D. Senior Science and Technology Advisor, DOE Office of the Deputy Director for Science Programs | Download File: M01-2014JuneNERSCBIVEN.pdf | pdf | 2.6 MB M02: The Future of Data and Scientific Workflow June 16, 2014 | Author(s): Michael Wilde, University of Chicago and Argonne National Laboratory |

  19. Weekly User Schedule

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Weekly User Schedule Print Requests for special operations use of the "scrubbing" shift should be sent directly to Warren Byrne (486-7517) by 1:00 p.m. Friday. Any requests for changes in beam energy, bucket fill pattern, scrubbing shifts, or machine setup must be submitted to This e-mail address is being protected from spambots. You need JavaScript enabled to view it by 4:00 pm on Wednesday, the week before the scheduled run, for consideration during Thursday's Physics meeting. These

  20. Weekly User Schedule

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Weekly User Schedule Print Requests for special operations use of the "scrubbing" shift should be sent directly to Warren Byrne (486-7517) by 1:00 p.m. Friday. Any requests for changes in beam energy, bucket fill pattern, scrubbing shifts, or machine setup must be submitted to This e-mail address is being protected from spambots. You need JavaScript enabled to view it by 4:00 pm on Wednesday, the week before the scheduled run, for consideration during Thursday's Physics meeting. These

  1. SHAFT79 user's manual

    SciTech Connect (OSTI)

    Pruess, K.; Schroeder, R.C.

    1980-03-01

    SHAFT79 (Simultaneous Heat And Fluid Transport) is an integrated finite difference program for computing two-phase non-isothermal flow in porous media. The principal application for which SHAFT79 is designed is in geothermal reservoir simulation. SHAFT79 solves the same equations as an earlier version, called SHAFT78, but uses much more efficient mathematical and numerical methods. The present SHAFT79 user's manual gives a brief account of equations and numerical methods and then describes in detail how to set up input decks for running the program. The application of SHAFT79 is illustrated by means of a few sample problems. (MHR)

  2. User Program Performance Monitor

    Energy Science and Technology Software Center (OSTI)

    1983-09-30

    PROGLOOK makes it possible to monitor the execution of virtually any OS/MVT or OS/VS2 Release 1.6 load module. The main reason for using PROGLOOK is to find out which portions of a code use most of the CPU time so that those parts of the program can be rewritten to reduce CPU time. For large production programs, users have typically found it possible to reduce CPU time by 10 to 30 percent without changing themore » program''s function.« less

  3. NERSC User Services Group!

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Zhenjgi Zhao ! NERSC User Services Group! ! NUG 2014 ! Feb 6, 2014 Best Practices for Best Performance on Edison Agenda * System Overview * Compile 1 me o p1miza1on * Run 1 me t uning o p1ons * Node placements on Edison * A c ouple o f 1 ps f or L ustre I /O * Python a pplica1ons a t s cale * CCM u sage * Will n ot c over l ibraries, p rofiling t ools. * Interconnect w ill b e c overed b y n ext t alk --- 2 --- System Overview --- 3 --- Edison at Glance * First C ray X C30 * Intel I vy B ridge 1

  4. REMOTE CONTROLLED SWITCHING DEVICE

    DOE Patents [OSTI]

    Hobbs, J.C.

    1959-02-01

    An electrical switching device which can be remotely controlled and in which one or more switches may be accurately operated at predetermined times or with predetermined intervening time intervals is described. The switching device consists essentially of a deck, a post projecting from the deck at right angles thereto, cam means mounted for rotation around said posts and a switch connected to said deck and actuated by said cam means. Means is provided for rotating the cam means at a constant speed and the switching apparatus is enclosed in a sealed container with external adjusting means and electrical connection elements.

  5. User Survey | Argonne Leadership Computing Facility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Survey User Survey Results The ALCF conducts yearly surveys to gain a better understanding of how we can improve the user experience at ALCF. Below are the numeric results of these surveys. 2014 ALCF User Survey Results 2013 ALCF User Survey Results 2012 ALCF User Survey Results 2011 ALCF User Survey Results 2010 ALCF User Survey Results 2009 ALCF User Survey Results 2008 ALCF User Survey Results

  6. Holographic Labeling And Reading Machine For Authentication And Security Appications

    DOE Patents [OSTI]

    Weber, David C.; Trolinger, James D.

    1999-07-06

    A holographic security label and automated reading machine for marking and subsequently authenticating any object such as an identification badge, a pass, a ticket, a manufactured part, or a package is described. The security label is extremely difficult to copy or even to read by unauthorized persons. The system comprises a holographic security label that has been created with a coded reference wave, whose specification can be kept secret. The label contains information that can be extracted only with the coded reference wave, which is derived from a holographic key, which restricts access of the information to only the possessor of the key. A reading machine accesses the information contained in the label and compares it with data stored in the machine through the application of a joint transform correlator, which is also equipped with a reference hologram that adds additional security to the procedure.

  7. Remote Desktop | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Desktop Use a remote desktop connection to access your work computer from home. Using Remote Desktop to Connect to Your Work Computer With Remote Desktop, you can have access to a computer at the Laboratory through another computer. For example, you can connect to your work computer from home and have access to all of your programs, files, and network resources as though you were sitting at your computer at work. You can leave programs running at work and see your work desktop displayed

  8. APS User News | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    News & Calendars Users Home APS User News User Announcements Proposal Deadlines and Related Meetings Conferences and Workshops APS Seminars and Meetings APS Committees and Reviews...

  9. Remotely operated pipe connector

    DOE Patents [OSTI]

    Josefiak, Leonard J.; Cramer, Charles E.

    1988-01-01

    An apparatus for remotely assembling and disassembling a Graylock type coctor between a pipe and a closure for the pipe includes a base and a receptacle on the base for the closure. The pipe is moved into position vertically above the closure by a suitable positioning device such that the flange on the pipe is immediately adjacent and concentric with the flange on the closure. A moving device then moves two semicircular collars from a position free of the closure to a position such that the interior cam groove of each collar contacts the two flanges. Finally, a tensioning device automatically allows remote tightening and loosening of a nut and bolt assembly on each side of the collar to cause a seal ring located between the flanges to be compressed and to seal the closure. Release of the pipe and the connector is accomplished in the reverse order. Preferably, the nut and bolt assembly includes an elongate shaft portion on which a removable sleeve is located.

  10. Monthly PDSF User Meeting Minutes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PDSF Selected Announcements Email Announcements Archive PDSF Mailing Lists In Case of Difficulty Accessing PDSF or HPSS Cluster Statistics Getting help Group Pages Using Carver for PDSF jobs PDSF Completed Jobs Genepool Testbeds Retired Systems Storage & File Systems Data & Analytics Connecting to NERSC Queues and Scheduling Job Logs & Statistics Application Performance Training & Tutorials Software Policies User Surveys NERSC Users Group User Announcements Help Staff Blogs

  11. User Facilities Expert Team - JCAP

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    IMG_2298.JPG User Facilities Expert Team Research Why Solar Fuels Goals & Objectives Thrust 1 Thrust 2 Thrust 3 Thrust 4 Publications Research Highlights Videos Innovations User Facilities Expert Team Benchmarking Database Device Simulation Tool XPS Spectral Database Research Introduction Why Solar Fuels? Goals & Objectives Thrusts Thrust 1 Thrust 2 Thrust 3 Thrust 4 Library Publications Research Highlights Videos Resources User Facilities Expert Team Benchmarking Database Device

  12. User Information | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Related Links DOE Nanoscale Science Research Center DOE NSRC Community Portal User Information The CNM user program provides access to equipment and technical expertise and is open to academia, industry, government agencies, and research institutes worldwide that have questions in nanoscience or nanotechnology that they wish to address. Access is obtained via brief peer-reviewed proposals with no charge for users who intend to publish their results. Access is also available on a cost-recovery

  13. 2012 ALS User Meeting Awards

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 ALS User Meeting Awards Recipients of the 2012 Users' Executive Committee awards and Student Poster Competition were announced Tuesday, October 9, at the ALS User Meeting. David A. Shirley Award for Outstanding Scientific Achievement at the ALS shirley award The David A. Shirley Award for Scientific Achievement went to, from left, Carl Percival (University of Manchester), Dudley Shallcross [(University of Bristol) not pictured], and Craig Taatjes and David Osborn (Sandia), for making the first

  14. 2011 User Meeting Award Recipients

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2011 User Meeting Award Recipients Print Recipients of the 2011 Users' Executive Committee awards, Student Poster Competition awards, and Photography Contest awards were announced Tuesday, October 4th at the ALS User Meeting. Winners are pictured below with UEC Chair David Obsorn. David A. Shirley Award for Outstanding Scientific Achievement at the ALS Dr. Subrata Chakraborty, for "the design and execution of the most important and difficult experiment relevant to understanding the origin

  15. April 2013 CNMS User Newsletter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    our understanding of nanoscale phenomena and develop functional nanomaterials systems. Access is provided at no cost to users for research that is in the public do- main and...

  16. Biomass Feedstock National User Facility

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Biomass Feedstock National User Facility Kevin L. Kenney July 29, 2014 Mission: Engage ... risk and guide industrial technologies Biomass Feedstock Process Demonstration Unit (aka ...

  17. Office of Science User Facilities

    Broader source: Energy.gov [DOE]

    This presentation summarizes the information on the Office of Science User Facilities, which was given during the webinar on the DOE BRIDGE funding opportunity.

  18. LANSCE | Users | LUG | LUG EC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Committee Message from the LUG EC Regarding 2015 Elections Dear Users, Thank you very much for participating in the recent email vote regarding the formation of an...

  19. APS User News, Issue 88

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    -- John Rogers to be Keynote at Users Meeting -- 2015 APS Compton Award goes to Ice, Larson, and Sparks BRIEFLY NOTED -- Congratulations to Daniel Haskel, Winner of the 2015...

  20. Jefferson Lab Users Group News

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User InformationRegistration print version UG Resources Background & Purpose By Laws Board of Directors Board of Directors Meetings Directory of Members Events At-A-Glance Member...

  1. Setting Up Your User Environment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Setting Up Your User Environment Setting Up Your User Environment PDSF Defined Environment When new users are added to the PDSF machines, the login shell is set according to the user's request. You can choose between csh, tcsh, or bash. You can change your startup shell by logging into NIM. Paths and environment variables are controlled by startup files (also known as dot files). On PDSF the startup files are symbolic links to read-only files that NERSC controls (if they are not, see the

  2. 2009 PDSF Users Meeting Minutes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    122209 Attending: Eric and Jay from PDSF and users Andrei, Marjorie, and Jeff P. Cluster status: Utilization has been relatively light, mostly STAR and some ATLASUCI jobs....

  3. User Facility | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Laboratory is a premier user facility providing world-class expertise, instrumentation and infrastructure for interdisciplinary nanoscience and nanotechnology research....

  4. National Library of Energy : User Account

    Office of Scientific and Technical Information (OSTI)

    Reset your password Enter either your User Name or Email Address to reset your password. User Name: Email Address: Go...

  5. AMBER User's Manual

    SciTech Connect (OSTI)

    Vay, J.L.; Fawley, W.

    2000-11-08

    AMBER is a Particle-In-Cell (PIC) code which models the evolution of a representative slice of a relativistic electron beam in a linear accelerator. The beam is modeled as a steady flow and therefore no electromagnetic waves: all the fields (external and self-fields) are electrostatic and magnetostatic fields (for a complete description, see chapter 5). The possible elements describing the accelerator lattice are solenoids, accelerating gaps, pipes and apertures. Several kinds of beam distribution can be loaded: KV, gaussian, semi-gaussian, etc. Alternatively, the user can reconstruct (or load) a distribution from the output of another codefile, for example, an interface generating the beam distribution from output produced from EGUN or LSP codes is available as an option. This documentation first describes in detail the input files needed to run AMBER and the procedure to start the executable. The possible data files and graphical output are explained in the two following chapters. The last chapter describes the physics model and numerical techniques used. An example of input files and the result obtained with these inputs are also given in the Appendix.

  6. SOLDESIGN user's manual copyright

    SciTech Connect (OSTI)

    Pillsbury, R.D. Jr.

    1991-02-01

    SOLDESIGN is a general purpose program for calculating and plotting magnetic fields, Lorentz body forces, resistances and inductances for a system of coaxial uniform current density solenoidal elements. The program was originally written in 1980 and has been evolving ever since. SOLDESIGN can be used with either interactive (terminal) or file input. Output can be to the terminal or to a file. All input is free-field with comma or space separators. SOLDESIGN contains an interactive help feature that allows the user to examine documentation while executing the program. Input to the program consists of a sequence of word commands and numeric data. Initially, the geometry of the elements or coils is defined by specifying either the coordinates of one corner of the coil or the coil centroid, a symmetry parameter to allow certain reflections of the coil (e.g., a split pair), the radial and axial builds, and either the overall current density or the total ampere-turns (NI). A more general quadrilateral element is also available. If inductances or resistances are desired, the number of turns must be specified. Field, force, and inductance calculations also require the number of radial current sheets (or integration points). Work is underway to extend the field, force, and, possibly, inductances to non-coaxial solenoidal elements.

  7. Sandia National Laboratories: Employee & Retiree Resources: Remote...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Announcements & Other Alerts Corporate Forms Technical Library Sandia Anywhere: Remote Access Sandia Anywhere: Remote Access Resources you can access directly with a CryptoCard...

  8. Hyperspectral Remote Sensing Techniques For Locating Geothermal...

    Open Energy Info (EERE)

    Remote Sensing Techniques For Locating Geothermal Resources Jump to: navigation, search OpenEI Reference LibraryAdd to library Poster: Hyperspectral Remote Sensing Techniques For...

  9. Remote Alaskan Communities Energy Efficiency Competition Social...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Alaskan Communities Energy Efficiency Competition Social Media Kit Remote Alaskan Communities Energy Efficiency Competition Social Media Kit Alaska Stakeholders-Below you ...

  10. Annual Users Training Meeting Archives | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Annual Users Training Meeting Archives 2011 Users Training Meeting 2010 Users Training Meeting 2009 Users Training Meeting 2008 Users Training Meeting 2007 Users Training Meeting 2006 Users Training Meeting 2005 Users Training Meeting Learn More 2005 NMMSS Users Training Meeting 2006 NMMSS Users Training Meeting 2007 NMMSS Users Training Meeting 2008 NMMSS Users Training Meeting 2009 NMMSS Users Training Meeting 2010 NMMSS Users Training Meeting 2011 NMMSS Users Training

  11. User Facilities | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Advanced Photon Source Argonne Leadership Computing Facility Argonne Tandem Linear Accelerator System Center for Nanoscale Materials Transportation Research and Analysis Computing Center Science Work with Argonne About Safety News Careers Education Community Diversity Directory Argonne National Laboratory About Safety News Careers Education Community Diversity Directory Energy Environment Security User Facilities Science Work with Argonne User Facilities Advanced Photon Source Argonne

  12. Perm Web: remote parallel and distributed volume visualization

    SciTech Connect (OSTI)

    Wittenbrink, C.M.; Kim, K.; Story, J.; Pang, A.; Hollerbach, K.; Max, N.

    1997-01-01

    In this paper we present a system for visualizing volume data from remote supercomputers (PermWeb). We have developed both parallel volume rendering algorithms, and the World Wide Web software for accessing the data at the remote sites. The implementation uses Hypertext Markup Language (HTML), Java, and Common Gateway Interface (CGI) scripts to connect World Wide Web (WWW) servers/clients to our volume renderers. The front ends are interactive Java classes for specification of view, shading, and classification inputs. We present performance results, and implementation details for connections to our computing resources at the University of California Santa Cruz including a MasPar MP-2, SGI Reality Engine-RE2, and SGI Challenge machines. We apply the system to the task of visualizing trabecular bone from finite element simulations. Fast volume rendering on remote compute servers through a web interface allows us to increase the accessibility of the results to more users. User interface issues, overviews of parallel algorithm developments, and overall system interfaces and protocols are presented. Access is available through Uniform Resource Locator (URL) http://www.cse.ucsc.edu/research/slvg/. 26 refs., 7 figs.

  13. User Statistics Collection Practices Archives | U.S. DOE Office...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Policies and Processes User Statistics Collection Practices User Statistics Collection Practices Archives User Facilities User Facilities Home User Facilities at a Glance...

  14. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  15. Remote direct memory access

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.

    2012-12-11

    Methods, parallel computers, and computer program products are disclosed for remote direct memory access. Embodiments include transmitting, from an origin DMA engine on an origin compute node to a plurality target DMA engines on target compute nodes, a request to send message, the request to send message specifying a data to be transferred from the origin DMA engine to data storage on each target compute node; receiving, by each target DMA engine on each target compute node, the request to send message; preparing, by each target DMA engine, to store data according to the data storage reference and the data length, including assigning a base storage address for the data storage reference; sending, by one or more of the target DMA engines, an acknowledgment message acknowledging that all the target DMA engines are prepared to receive a data transmission from the origin DMA engine; receiving, by the origin DMA engine, the acknowledgement message from the one or more of the target DMA engines; and transferring, by the origin DMA engine, data to data storage on each of the target compute nodes according to the data storage reference using a single direct put operation.

  16. REMOTE HANDLING ARRANGEMENTS

    DOE Patents [OSTI]

    Ginns, D.W.

    1958-04-01

    A means for handling remotely a sample pellet to be irradiated in a nuclear reactor is proposed. It is comprised essentially of an inlet tube extending through the outer shield of the reactor and being inclined so that its outer end is at a higher elevation than its inner end, an outlet tube extending through the outer shield being inclined so that its inner end is at a higher elevation than its outer end, the inner ends of these two tubes being interconnected, and a straight tube extending through the outer shield and into the reactor core between the inlet and outlet tubes and passing through the juncture of said inner ends. A rod-like member is rotatably and slidely operated within the central straight tube and has a receptacle on its inner end for receiving a sample pellet from the inlet tube. The rod member is operated to pick up a sample pellet from the inlet tube, carry the sample pellet into the irradiating position within the core, and return to the receiving position where it is rotated to dump the irradiated pellet into the outlet tube by which it is conveyed by gravity to the outside of the reactor. Stop members are provided in the inlet tube, and electrical operating devices are provided to control the sequence of the operation automatically.

  17. User Access Program | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Access Program Objective Submission Guidelines Proposal Review Process User Modes Multi-User Facility Proposals User Agreements Proprietary and Nonproprietary Research User Access Allocation, Scheduling, Recording, and Data Retention Public Information Notice Safety, Orientation, and Training Acknowledge CNM Support in Published Work Amendments and Renewals 1. Objective The objective of the Center for Nanoscale Materials (CNM) user program is to provide the user community with access to

  18. David Turner! NERSC User Services Group NERSC User Environment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Environment --- 1 --- September 10, 2013 Overview * Login N odes, F ile S ystems, a nd D ot F iles - David T urner * So;ware M odules - Doug J acobsen * Compilers - Mike S ...

  19. Scott French! NERSC User Services Group! New User Training!

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    login node based on: - Number o f c onnec3ons - Memory o f p revious c onnec3ons f rom s ame I P --- 4 --- Login Node Usage * Login nodes are shared by many users, all the Dme *...

  20. Robotics and remote systems applications

    SciTech Connect (OSTI)

    Rabold, D.E.

    1996-05-01

    This article is a review of numerous remote inspection techniques in use at the Savannah River (and other) facilities. These include: (1) reactor tank inspection robot, (2) californium waste removal robot, (3) fuel rod lubrication robot, (4) cesium source manipulation robot, (5) tank 13 survey and decontamination robots, (6) hot gang valve corridor decontamination and junction box removal robots, (7) lead removal from deionizer vessels robot, (8) HB line cleanup robot, (9) remote operation of a front end loader at WIPP, (10) remote overhead video extendible robot, (11) semi-intelligent mobile observing navigator, (12) remote camera systems in the SRS canyons, (13) cameras and borescope for the DWPF, (14) Hanford waste tank camera system, (15) in-tank precipitation camera system, (16) F-area retention basin pipe crawler, (17) waste tank wall crawler and annulus camera, (18) duct inspection, and (19) deionizer resin sampling.

  1. 2009 PDSF Users Meeting Minutes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2009 PDSF Users Meeting Minutes December 22 PDSF Users Meeting 12/22/09 Attending: Eric and Jay from PDSF and users Andrei, Marjorie, and Jeff P. Cluster status: Utilization has been relatively light, mostly STAR and some ATLASUCI jobs. Outages: Discussed slowness caused by atlasusi jobs and the possibility of making /common read-only but no decision on how to do that was reached. The issue of using the NERSC global homes was also discussed as a possibility in the future. Upcoming downtimes:

  2. 2010 PDSF Users Meeting Minutes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2010 PDSF Users Meeting Minutes December 21 PDSF Users Meeting 12/21/10 Attending: Eric and Jay from NERSC and users Andrei and Jeff P. Cluster status and utilization: Cluster has been loaded to capacity recently. STAR is running a lot of jobs, many of the grid-based and submitted from BNL. ALICE, ATLAS and icecube also running. Outages and Downtimes: There was an NGF downtime on the 16th, otherwise things have been stable for the most part. Procurements and New Hardware: Will get more storage

  3. David Turner! User Services Group

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Services Group Accounts and Allocations --- 1 --- September 10, 2013 Accounts There a re t wo t ypes o f a ccounts a t N ERSC. 1. Your p ersonal, p rivate a ccount * ...

  4. atlasUserMeeting14

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    GRETINA Mario Cromaz, LBNL Work supported under contract number DE-AC02-05CH11231. 2014 ATLAS User's Meeting ANL - May 15-16, 2014 The GRETINA Spectrometer 2 * first generation...

  5. Soybean (2010 JGI User Meeting)

    ScienceCinema (OSTI)

    Stacey, Gary

    2011-04-26

    Gary Stacey, associate director of the National Center for Soybean Biotechnology at the University of Missouri, gives a talk simply titled "Soybean" on March 24, 2010 at the 5th Annual DOE JGI User Meeting

  6. OpenEIS. Users Guide

    SciTech Connect (OSTI)

    Kim, Woohyun; Lutes, Robert G.; Katipamula, Srinivas; Haack, Jereme N.; Carpenter, Brandon J.; Akyol, Bora A.; Monson, Kyle E.; Allwardt, Craig H.; Kang, Timothy; Sharma, Poorva

    2015-02-28

    This document is a users guide for OpenEIS, a software code designed to provide standard methods for authoring, sharing, testing, using and improving algorithms for operational building energy efficiency.

  7. NuMAD User's Guide

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (NuMAD v2.0) for Wind Turbine Blades: User's Guide Jonathan C. Berg Brian R. Resor Wind Energy Technologies Department Sandia National Laboratories P.O. Box 5800 Albuquerque, NM...

  8. User Experience Research and Statistics

    Broader source: Energy.gov [DOE]

    To improve your website or application, especially for new projects, EERE strongly recommends, but does not require, conducting user experience (UX) research. We only require that you get the...

  9. LANSCE | User Resources | Visitor Registration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Visit Registration Users must register online at least: 4 weeks prior to experiment for U.S. citizens 2 months prior to experiment for foreign nationals. Lujan Center WNR Visit Registration Visit Registration

  10. Midwest Hydro Users Group Meeting

    Broader source: Energy.gov [DOE]

    The Midwest Hydro Users Group will be holding their annual Fall meeting on November 12th and 13th in Wausau, Wisconsin.  An Owners-only meeting on the afternoon of the 12th followed by a full...

  11. Proteus-SN user manual

    SciTech Connect (OSTI)

    Shemon, Emily R.; Smith, Micheal A.; Lee, Changho

    2015-07-31

    This user manual describes how to set up a neutron transport simulation with the PROTEUS-SN code. A companion methodology manual describes the theory and algorithms within PROTEUS-SN.

  12. Thermochemical Users Facility | Bioenergy | NREL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users Facility The Thermochemical Users Facility (TCUF) at NREL has state-of-the-art equipment for thermochemical process development and testing, ranging from catalyst and feedstock characterizations to bench-scale reactors to pilot plants. We welcome partners who wish to collaborate on research and development efforts or to use our equipment to test their materials and processes. In addition to the following testing systems, we have several other lab-scale reactor systems and the ability to

  13. User account | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User account Primary tabs Log in(active tab) Request new password ATTENTION! - This computer system is operated on a U.S. Federal Government network (unclassified information only). This system is for the use of authorized users only. Unauthorized access is prohibited and makes you liable to civil and criminal penalties. Individuals using this computer system without authority, or in excess of their authority, are subject to having all of their activities monitored and recorded by system

  14. User Facilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    About the Bioenergy Technologies Office » User Facilities User Facilities Feedstock Preprocessing at INL The Process Demonstration Unit at Idaho National Laboratory's Energy Systems Laboratory facility provides pilot- and industrial-scale testing for a variety of preprocessing techniques. Preprocessing is essential to preparing biomass feedstock for conversion, ensuring the material is high-quality and provides as much fuel as possible. The facility's Characterization Laboratory enables

  15. NERSC User Group Meeting 2014

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Meeting 2014 Planck @ NERSC Theodore Kisner Computational Cosmology Center, LBNL On behalf of the Planck collaboration NERSC User Group Meeting 2014 The Cosmic Microwave Background * Universe begins with hot Big Bang and then expands and cools. * After 370,000 years temperature drops to 3000K. * p + + e - => H : Universe becomes neutral & transparent. * Photons free-stream to observers today. They are redshifted and appear as a 3K blackbody. Source: NASA Temp = 3K Today NERSC User Group

  16. 2011 User Meeting Award Recipients

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Award Recipients Recipients of the 2011 Users' Executive Committee awards, Student Poster Competition awards, and Photography Contest awards were announced Tuesday, October 4th at the ALS User Meeting. Winners are pictured below with UEC Chair David Obsorn. David A. Shirley Award for Outstanding Scientific Achievement at the ALS Dr. Subrata Chakraborty, for "the design and execution of the most important and difficult experiment relevant to understanding the origin and evolution of the

  17. REMOTE ACCESS SERVICES | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    REMOTE ACCESS SERVICES REMOTE ACCESS SERVICES Three people holding signs that say "We Work Remotely." Three people holding signs that say "We Work Remotely." Energy IT Services (EITS) Remote Access Services: Outlook Web Access RSA Token Login RSA Token Instructions HSPD-12 Login HSPD-12 Badge Instructions Virtual Private Network As of May 1, 2014, only Government-Furnished Equipment (GFE) provisioned by EITS will be allowed to connect via EITS Virtual Private Networking (VPN)

  18. Novel Authentication of Monitoring Data Through the use of Secret and Public Cryptographic Keys

    SciTech Connect (OSTI)

    Benz, Jacob M.; Tolk, Keith; Tanner, Jennifer E.

    2014-07-21

    The Office of Nuclear Verification (ONV) is supporting the development of a piece of equipment to provide data authentication and protection for a suite of monitoring sensors as part of a larger effort to create an arms control technology toolkit. This device, currently called the Red Box, leverages the strengths of both secret and public cryptographic keys to authenticate, digitally sign, and pass along monitoring data to allow for host review, and redaction if necessary, without the loss of confidence in the authenticity of the data by the monitoring party. The design of the Red Box will allow for the addition and removal of monitoring equipment and can also verify that the data was collected by authentic monitoring equipment prior to signing the data and sending it to the host and for review. The host will then forward the data to the monitor for review and inspection. This paper will highlight the progress to date of the Red Box development, and will explain the novel method of leveraging both symmetric and asymmetric (secret and public key) cryptography to authenticate data within a warhead monitoring regime.

  19. JC3 Bulletin Archive

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    div>

    Sat, 31 Aug 2013 08:00:00 +0000 717026 at http:energy.gov V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users http:...

  20. JC3

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    div>

    Sat, 31 Aug 2013 08:00:00 +0000 717026 at http:energy.gov V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users http:...