Appearance
🎉 your wikitable 🥳
"PLE may refer to: * Photoluminescence excitation * Pittsburgh and Lake Erie Railroad, P≤ * Polymorphous light eruption, a skin condition caused by sunlight * Public legal education * Protein losing enteropathy * Primary Leaving Examinations (PLE), for Uganda See also * Plé, the surname "
"Map of European Neolithic at the apogee of Danubian expansion, c. 3500 BC. The Lengyel culture is an archaeological culture of the European Neolithic, centered on the Middle Danube in Central Europe. It flourished during 5000-3400 BC. The eponymous type site is at Lengyel in Tolna county, Hungary. It was preceded by the Linear Pottery culture and succeeded by the Corded Ware culture. In its northern extent, overlapped the somewhat later but otherwise approximately contemporaneous Funnelbeaker culture. Also closely related are the Stroke-ornamented ware and Rössen cultures, adjacent to the north and west, respectively. Subgroups of the Lengyel horizon include the Austrian/Moravian Painted Ware I and II, Aichbühl, Jordanów/Jordanov/Jordansmühl, Schussenried, Gatersleben, etc. It is a wide interaction sphere or cultural horizon rather than an archaeological culture in the narrow sense. Its distribution overlaps with the Tisza culture and with Stroke-Ornamented Pottery (STK) as far north as Osłonki, central Poland. Lengyel pottery was found in western Hungary, the Czech and Slovak Republics, Austria, Poland, and in the Sopot culture of the northern parts of Former Yugoslavia. Influence in pottery styles is found even further afield, in parts of Germany and Switzerland. Agriculture and stock raising (mainly cattle, but also pigs, and to a lesser extent, ovicaprids) was practiced, though many wild faunal remains have also been recovered. Settlements consisted of small houses as well as trapezoid longhouses. These settlements were sometimes open, sometimes surrounded by a defensive ditch. Inhumation was in separate cemeteries, in the flexed position with apparently no preference for which side the deceased was laid out in. Lengyel sites of the later period show signs of the use of copper in form of beads and hammered ribbons, marking the dawn of the Chalcholithic period in Central Europe. It was associated with the cover-term Old Europe by Marija Gimbutas, though may have been undergone "kurganization" by the Proto-Indo-Europeans and become integrated into the successor Globular Amphora culture. Genetics In a 2017 genetic study published in Nature, the remains of nine individuals ascribed to the Lengyel culture was analyzed. Of the nine samples of Y-DNA extracted, two belonged to H, one belonged to H1b1, one belonged to I, one belonged to I2, one belonged to G2a2a1, one belonged to J2a, one belonged to C, and one belonged to E1b1b1a1b1. mtDNA extracted were various subclades of U, N, T, H, J, W. See also * Circular Enclosures * Cucuteni culture * Vinca culture * Yamna culture References * Sources * * External links * The Lengyel Culture Sphere by Maximilian O. Baldia Category:Neolithic cultures of Europe Category:Archaeological cultures of Central Europe Category:Archaeological cultures of Southeastern Europe Category:Archaeological cultures in Austria Category:Archaeological cultures in Croatia Category:Archaeological cultures in the Czech Republic Category:Archaeological cultures in Germany Category:Archaeological cultures in Hungary Category:Archaeological cultures in Poland Category:Archaeological cultures in Slovakia Category:Archaeological cultures in Slovenia Category:Stone Age of Slovenia "
"In computer networking, a media access control attack or MAC flooding is a technique employed to compromise the security of network switches. The attack works by forcing legitimate MAC table contents out of the switch and forcing a unicast flooding behavior potentially sending sensitive information to portions of the network where it is not normally intended to go. Attack method Switches maintain a MAC table that maps individual MAC addresses on the network to the physical ports on the switch. This allows the switch to direct data out of the physical port where the recipient is located, as opposed to indiscriminately broadcasting the data out of all ports as an Ethernet hub does. The advantage of this method is that data is bridged exclusively to the network segment containing the computer that the data is specifically destined for. In a typical MAC flooding attack, a switch is fed many Ethernet frames, each containing different source MAC addresses, by the attacker. The intention is to consume the limited memory set aside in the switch to store the MAC address table. The effect of this attack may vary across implementations, however the desired effect (by the attacker) is to force legitimate MAC addresses out of the MAC address table, causing significant quantities of incoming frames to be flooded out on all ports. It is from this flooding behavior that the MAC flooding attack gets its name. After launching a successful MAC flooding attack, a malicious user can use a packet analyzer to capture sensitive data being transmitted between other computers, which would not be accessible were the switch operating normally. The attacker may also follow up with an ARP spoofing attack which will allow them to retain access to privileged data after switches recover from the initial MAC flooding attack. MAC flooding can also be used as a rudimentary VLAN hopping attack. Counter measures To prevent MAC flooding attacks, network operators usually rely on the presence of one or more features in their network equipment: * With a feature often called "port security" by vendors, many advanced switches can be configured to limit the number of MAC addresses that can be learned on ports connected to end stations. A smaller table of secure MAC addresses is maintained in addition to (and as a subset to) the traditional MAC address table. * Many vendors allow discovered MAC addresses to be authenticated against an authentication, authorization and accounting (AAA) server and subsequently filtered. * Implementations of IEEE 802.1X suites often allow packet filtering rules to be installed explicitly by an AAA server based on dynamically learned information about clients, including the MAC address. * Security features to prevent ARP spoofing or IP address spoofing in some cases may also perform additional MAC address filtering on unicast packets, however this is an implementation-dependent side-effect. * Additional security measures are sometimes applied along with the above to prevent normal unicast flooding for unknown MAC addresses. This feature usually relies on the "port security" feature to retain all secure MAC addresses for at least as long as they remain in the ARP table of layer 3 devices. Hence, the aging time of learned secure MAC addresses is separately adjustable. This feature prevents packets from flooding under normal operational circumstances, as well as mitigating the effects of a MAC flood attack. References Category:Ethernet Category:Computer network security "