General Science and Philosophy

1801 Submissions

[6] viXra:1801.0383 [pdf] submitted on 2018-01-27 13:01:47

Endosymbiosis in Late Stage Stellar Evolution According to the General Theory

Authors: Jeffrey Joseph Wolynski
Comments: 2 Pages.

It is explained that endosymbiosis happened as a result of the collapse of "bioclines" in the interior of a star as it loses its thick atmosphere in later stages of evolution. This paper is meant to combine both endosymbiosis with the general theory's principles which include life evolving on stars as they evolve.
Category: General Science and Philosophy

[5] viXra:1801.0289 [pdf] submitted on 2018-01-22 22:40:08

Chronology of my Papers

Authors: John A. Gowan
Comments: 20 Pages. addressing possible issues of priority

An approximate chronology (original dates) of my papers is presented, with some biographical notes. A chronology of translation requests is also given.
Category: General Science and Philosophy

[4] viXra:1801.0178 [pdf] submitted on 2018-01-15 05:10:11

Conquering Strangeness-the Universe in us

Authors: Michael Muteru
Comments: 9 Pages.

When Beauty runs deeper than the skin, it’s a truth, if the truth adds up to simplicity that’s elegance. After all complexity is the sun total of repeated simplicity & behind every complex system lays a simple beautiful principle that makes it work. Like tortoise carries shell on its back. Do we carry the universe in our heads? I later invoke U-Duality to examine symmetries on a circle at D=11 and reveal why space-time on a Brane is tantamount to that on a brain.
Category: General Science and Philosophy

[3] viXra:1801.0111 [pdf] submitted on 2018-01-09 22:28:28

The Future Science Institute (Volume two issue 2016-2017)

Authors: Cheng Tianren
Comments: 304 Pages.

This journal is not a popular journal for public, it is a professional research level journal for scientist and artist, even for litterateur. It focus on many topics in mainstream science, especially for future science. Since this journal is very complicated and professional, so we use the “problem-proposed problem-analysis problem-solving” mode to explain our research,to make readers easier to understand. If you truly want to improve your knowledge by reading this journal, it is better for you to study the problems mentioned in this journal carefully. To write down your unusual solutions for these problems after you have read them. Any good idea about the problems appeared in this journal can be mail to author cheng.
Category: General Science and Philosophy

[2] viXra:1801.0085 [pdf] replaced on 2018-01-13 21:03:02

Fine Soccer(4)

Authors: Morio kikuchi
Comments: 296 Pages.

We modify the present rule of soccer in order to be able to get points of plural kinds referring to the point system of rugby.
Category: General Science and Philosophy

[1] viXra:1801.0016 [pdf] submitted on 2018-01-02 14:00:13

Covert Channel by Abusing X509 Extensions

Authors: Jason Reaves
Comments: 11 Pages. Malware; x509 Certificate; SSL; TLS; Botnet; Security

Malicious actors in the world are using more ingenuity than ever for both data infiltration and exfiltration purposes, also known as command and control communications. In this paper I aim to describe a system that could be used to send or receive data from both a client and a server perspective utilizing research into x509 certificates specifically in areas where you can place arbitrary binary data into the certificate or utilizing them as a covert channel. While lots of attention is given to data infiltration and exfiltration techniques they are commonly done so after they’ve been used in an incident, making this area of cyber security very retroactive in a defensive posture. The aim in presenting this material is to demonstrate that we can take some lessons from the other areas of cyber security research, namely exploitation, and look at potential use cases in how malware authors could utilize technologies outside of their intended purposes to not only accomplish their goals but also end up bypassing common security measures in the process. Doing this sort of research can lead to more advances in defensive security postures by spurring discussions in the community on how a technique either does or doesn’t bypass security measures.
Category: General Science and Philosophy