going to my CSDN blog ---> https://blog.csdn.net/qq_37746801/article/details/89708103…
Access text files using SQL statements by DB Query Analyzer Ma Gen feng (Guangdong Unitoll Services incorporated, Guangzhou510300) Abstract   Is it a dream that you can access text files using SQL statements? But now, it is true that DB Query Analyze…
if we want copy file from VM(Remote VM) to local computer. Always can not easy copy file so easy. now U can copy file easy by this steps. Step 1: use command run mstsc to open the remote desk connection and fill in the right IP. step 2: click the bot…
    1 About DB Query Analyzer DB Query Analyzer is presented by Master Genfeng,Ma from Chinese Mainland. It has English version named 'DB Query Analyzer'and Simplified Chinese version named   . DB Query Analyzer is one of the few excellent Client Too…
A computing system is operable to contain a security module within an operating system. This security module may then act to monitor access requests by a web browser and apply mandatory access control security policies to such requests. It will be ap…
1. INTRODUCTION   The main goal of the National Computer Security Center is to encourage the widespread availability of trusted computer systems. In support of that goal a metric was created, the Department of Defense Trusted Computer System Evaluati…
A method is provided for implementing a mandatory access control model in operating systems which natively use a discretionary access control scheme. A method for implementing mandatory access control in a system comprising a plurality of computers,…
A system switches between non-secure and secure modes by making processes, applications, and data for the non-secure mode unavailable to the secure mode and vice versa. The process thread run queue is modified to include a state flag for each process…
Methods, systems, and products for governing access to objects on a filesystem. In one general embodiment, the method includes providing a framework in an operating system environment for support of a plurality of access control list (ACL) types, the…
The scenario is about Business Secret and our client do worry about data leakage. They want to know whether Suspect copy those data to external hard drive or not. In fact it is not easy for Forensic guys to answer this question. Of course if you copy…