Спутник ДЗЗ. Intruder 5A. [Редактировать]

Космический аппарат серии NOSS (Naval Ocean Surveillance System). В открытых источниках военное ведомство США никогда не публиковало данные об этом аппарате, однако, на основании орбиты аппарата можно сделать вывод о том, что данный спутник является часть космического сегмента военно-морской системы океанических наблюдений США. На борту аппарата скорее всего установлена аппаратура для отслеживания как самолетов так и водных судов. Эти спутники всегда запускаются попарно на одну и ту же орбиту.

Дополнительные наименования

#НаименованияПоиск в новостяхПоиск в документах
137386НайтиНайти

Дополнительная классификация

#Наименования
1Страна оператор(владелец) - США
2Тип оператора(владельца) - военные
3Тип орбиты - НОО
4Страна производитель - США
5Все спутники ДЗЗ

Технические характеристики

#ХарактеристикаЗначение
1Масса, кг3250

Пусковые характеристики

#ХарактеристикаЗначение
1Код NSSDC2011-014A

Информация об удачном запуске

#ХарактеристикаЗначение
1Космодром База Ванденберг
2Дата пуска2011-04-15 at 04:24:00 UTC
3Полезная нагрузка 1xIntruder 5A
4Полезная нагрузка 1xIntruder 5B
5Ракета-носитель 1xАтлас 5 501

Найдено 244 документов по запросу «Intruder 5A». [Перейти к поиску]


Дата загрузки: 2017-03-09
Скачать документ
0.04/5
...-3 X-3 F-111 XF-108 X-15 N-156/F-5A F3H B-52 A3D F-111B A-6 F-8 A4D...-8B MD-80 DC-10 F-5A/B F-5E YA-9A Merlin & Metro... aircraft, such as the Northrop F-5A, for the ground support mission... of its T-38 trainer and F-5A export fighter. In 1970, the... F-14 and modifications of the A-6 Intruder naval attack aircraft. Northrop, long... experienced on the TFX and C-X (C-5A) R&D programs, Period 2 witnessed major new... from the Northrop F-5. Shipped in a C-5A transport from the Burbank Skunk... to replace the aging Grumman A-6 Intruder. Later, officials decided that a modified... (Civilian) Sub — 06-94 A-6 F Boeing Intruder Fighter Sub Navy 08-87... 05-46 Type A-6 A Grumman A2F Intruder Fighter Sub Navy 04-60...-68 A-6 C Grumman Intruder Fighter Sub Navy 12-68 A-6 E Grumman Intruder Fighter Sub... A Martin Intruder Bomber Sub AF 07-53 RB-57 A Martin Intruder Reconnaissance Sub AF 10-53 B-57 B Martin Intruder Bomber Sub AF 06-54 RB-57 B Martin Intruder Bomber Sub AF 11-55 B-57 C Martin Intruder Bomber Sub AF 12-54 RB-57 D/F Martin Intruder Reconnaissance Sub AF B-57 E Martin Intruder Bomber Sub AF..., Anthony M., and Peter E. Davies, Grumman A-6 Intruder Prowler, London: Ian Allen Ltd... fighter development in Period 1, 84f F-5A, 104 F-89J Scorpion, 36p, 41...



Дата загрузки: 2017-02-23
Скачать документ
0.01/5
... or client stations, the wireless intruder may target the RF spectrum... this alarm to indicate a potential intruder's attempt to breach security. Note... this alarm to indicate a potential intruder's attempt to breach security. Note... against an access point. The intruder can also attack the wireless... point. This attack allows the intruder to gain network access to... into its file system. The intruder can then use the station... against an access point. The intruder can also attack the wireless... point. This attack allows the intruder to gain network access to... into its file system. The intruder can then use the station... against an access point. The intruder can also attack the wireless... point. This attack allows the intruder to gain network access to... into its file system. The intruder can then use the station... can be accessed by an intruder leading to a major security breach... the exact EAP-type. The intruder tries different EAP-types such... of EAP-types for the intruder to try and manage to... detects an attempt by an intruder to gain access to the... has been cracked by any intruder results in no encryption protection.... Using the Hotspotter tool, the intruder can passively monitor the wireless... the preferred network information, the intruder compares the network name (SSID... from being hacked by a wireless intruder. PSPF is effective in protecting... a honey pot access point. An intruder uses tools such as NetStumbler... corporate access point. Then the intruder sets up an access point... signal strength. When associated, the intruder performs attacks against the client... Description and Possible Causes A wireless intruder can disrupt a wireless network using...:a0:e5:15:eb:f8: 5a:72:97:f9:09:65...:ab:a9:9e:61: 07:5a:8d:b1:af:93:3b...:a5:27:16:cd:75:5a:6e:f1: c1:5b:6b...:7a:9a:46:5e:ee:5a:e8:6a: 4b:75:97...:03:8e:db:1a:3e:5a:6f:a6:6d:3e:5b...



Дата загрузки: 2016-12-29
Скачать документ
0.08/5
Security & Custom Electronics Intruder products catalogue 2006 HONEYWELL SECURITY & ... www.honeywell.com/security/uk/intruder HONEYWELL SECURITY & CUSTOM ELECTRONICS Your... www.honeywell.com/security/uk/intruder HONEYWELL SECURITY & CUSTOM ELECTRONICS Control... www.honeywell.com/security/uk/intruder Domonial Omni Control Panels | Galaxy.... www.honeywell.com/security/uk/intruder Control Panels | Galaxy 2 12-way... 256 Integrated PSU 1.5A (0.75A @ grade 3) 2.5A (1.25A @ grade 3) 2.5A (1.25A @ grade 3) Printer... www.honeywell.com/security/uk/intruder Control Panels | Galaxy 3 Panels and... G3-48 key features: l Integral 1.5A (0.75A @ grade 3) Power Supply & Communicator... G3-48 key features: l Integral 1.5A (0.75A @ grade 3) Power Supply & Communicator... PSTN Communicator) Key features: l Integral 2.5A (1.25A @ grade 3) Power Supply & Communicator... G3-48 key features: l Integral 1.5A (0.75A @ grade 3) Power Supply & Communicator... PSTN Communicator) Key features: l Integral 2.5A (1.25A @ grade 3) Power Supply l 16... PSTN Communicator) Key features: l Integral 2.5A (1.25A @ grade 3) Power Supply & Communicator... PSTN Communicator) Key features: l Integral 2.5A (1.25A @ grade 3) Power Supply l 16... www.honeywell.com/security/uk/intruder 16 zones on board PSTN... l Galaxy – a superbly designed, high quality intruder alarm system l Suitable for commercial... www.honeywell.com/security/uk/intruder Control Panels | Galaxy keypads CP027... www.honeywell.com/security/uk/intruder Control Panels | Galaxy Modules A211... www.honeywell.com/security/uk/intruder Wireless control panel with built... www.honeywell.com/security/uk/intruder Security Panels | Domonial Accessories DOM... www.honeywell.com/security/uk/intruder Security Panels | Accenta & optima Keypads... www.honeywell.com/security/uk/intruder Accessories CAB=6/1 Cable – 6 Core CAB...” each other and detect an intruder within the defined protection area... www.honeywell.com/security/uk/intruder Sensors | Motion Detectors Dual-TEC... www.honeywell.com/security/uk/intruder Sensors | Access Control Honeywell’s family... www.honeywell.com/security/uk/intruder Sensors | Glass break and shock... www.honeywell.com/security/uk/intruder Viper GLX with integral Door... www.security.honeywell.com/uk/intruder or call +44 (0)1698 738200...) www.honeywell.com/security/uk/intruder Wireless products | Keyfobs and detectors... www.honeywell.com/security/uk/intruder Wireless products | Receiver modules Receiver... www.honeywell.com/security/uk/intruder Alarm Communications | Sirens and sounders...(11/05)SB-C Honeywell Domestic Intruder Panels CAPTIV8-20/1 Honeywell Captiv8... www.honeywell.com/security/uk/intruder Index | Alphabetical 8EP332................................ 23 8EP395... www.honeywell.com/security/uk/intruder HSCE-INTRUDERCAT-01-EN(0506...



Дата загрузки: 2017-02-23
Скачать документ
0.06/5
... 5.5 60 138 61 131 2.5 0.4 0.6 – 12N5.5A-3B 5.5 58 104 91 115...-A YB3L-A YB10L-B YB12AL-A YB16L-B 12N5.5A-3B 12N7B-3A 12N12A-4A...-2 6N2-2A-7 YB2.5L-C-4 12N5.5A-3B 6N4-2A-5 6N4-2A... Van Van VL 125 LC Intruder AN 150 AN 150 GT.../ET/EX GZ 250 Marauder Intruder LC 250 Model T 20 250... GL Madura VS 700 GL Intruder DR 750 S, SU Big GS... GL Intruder DR 800 S, SU Big DR 800 ST VL800 Intruder Volusia VS 800 GL Intruder VX 800 U VZ... VS 1400 GLF / GLP / Intruder VL 1500 Intruder Marauder 1600 VZR 1800...-5 6N4B-2A-3 12N7-3B 12N5,5A-3B 6N4A-4D 6N4A-4D...-A2 YB10L-A2 YTZ7S 12N5,5A-3B YB5L-B YB7L-B2 YB7... YB5L-B YB10L-A2 YB5L-B 12N5,5A-3B 6N4B-2A-3 6N6-3B...-3 6N6-3B-1 6N4-2A-5 12N5,5A-3B 12N5,5-3B YB12A-A YTX7A... YB12B-B2 YB7C-A 12N5,5A-3B 12N5,5A-3B 12N5,5-3B YB5L...-1 YB12AL-A2 YTX9-BS 12N5,5A-3B YT4B-BS YB12A-A 1978... El. Starter 440 ST 440 -A Intruder ST 440 -A Invader El. Starter...



Дата загрузки: 2017-01-10
Скачать документ
0.02/5
...) Maximum dimensions (mm) L W H MB 12N5,5A-3B 12 5,5 104 91 MB...-5 MB 12N5,5-3B MB 12N5,5A-3B MB 12N5,5-4B MB...-3D II 125 JL 125-5A 125 LX 125-10 125...-B YB9L-A2 B38-6A 12N5,5A-3B YB14-B2 JIA LING... 125 HN 125T 150 150 J-5A, 8A 150 150-2 150 150...-C2 YB2,5L-C2 12N5,5A-3B 6N4-2A-3 6N4-2A... Sixteen 08 125 VL 125 Intruder LC 00-07 150 AN... 250 Inazuma 250 12 250 Intruder C250 02- 250 Model T20... Z GSX-R 400 R, RF 91-95 Intruder Classic 400 08- LS 400... VS 750 88 800 C 800 Intruder 800 DR 800 BIG -90... 92 800 M 800 Intruder 800 VL 800 Intruder Volusio, 01-10 Boulevard... 08-13 GSX 1400 GV Intruder 93- GV 1400 GC, D, T Cavalcade... GL Intruder, 87-11 GLP, S83 C 1500 Intruder VL 1500 Intruder 98-08 Intruder...-05 VZ Intruder M1600 04-05 VLR 1800 VZR Intruder M1800 06... 6N4A-4D YTX4L-BS 12N5,5A-3B 6N4A-4D 6N4-2A...-S YTX5L-BS YTZ7S-BS 12N5,5A-3B YB10L-B YB5L-B YB14L-B2... YTZ7-S YTZ10-S YB5L-B YB5L-B 12N5,5A-3B 6N2-2A-3 6N4-2A...-S YTZ10-S YB7C-A 12N5,5-3B 12N5,5A-3B YTZ7-S YB12A-A YTX7A-BS...,5-3B YB5L-B 12N5,5A-3B YTZ10-S 12N5,5A-3B YB5L-B 12N5,5-3B... YTX9-BS YTX9-BS 12N5,5A-3B YT4B-BS YB5L-B YB12A...



Дата загрузки: 2017-01-16
Скачать документ
0.21/5
... experience, one involved in UK's Intruder Watch, knowing only that the... mentioned by the Ham Radio Intruder Watchers, also a couple of unknowns... unhrd a/c D-??UY 03-Feb00 (MB3) C-5A: 70-0465 # 436 AW and.../FEB/00) (JK) Bosco 70: (C-5A, 60th AMW Travis AFB) at..., h+55 sked. 8/Feb (ALF) 11300.0 5A-DDB: 1640 USB wkg Tripoli...-Call or short-cut for 5A-DCX (DHC-6 of Light Air... five squadrons by North American A-5A/RA-5C Vigilantes. Longer lived... tanker versions of the Grumman Intruder (EA-6A, EA-6B and... derived from the two-seater A-6 Intruder attack aircraft. The basic airframe... amateur or was it an intruder? I asked Charles Brain if radio... commented "I think it is an intruder. I often hear non Amateur stuff... CW pseudo-time-marker: =99T0219??T????. Intruder in HAM-Band! 1/July (ALF... Either a short 5LG or a short 5A/NG msg, with numerous rpts.../Oct/00) (MADX) 20631 100455: C-5A #70-0455 1330 MIL-STD.../Oct/00) (MADX) 20631 100455: C-5A #70-0455 1330 MIL-STD... has identified a mysterious "tick-tick" intruder signal as the third harmonic...



Дата загрузки: 2017-01-23
Скачать документ
0.07/5
... Lockup ................................................. 192 5.14.1.2 Handling an Intruder .......................................................... 193 5.14.1.3 Detecting Improper Flash... functions. • Intruder Detect. The PCH provides an input signal (INTRUDER#) that can... interrupt due to an active INTRUDER# signal. System Management Bus (SMBus...; SMBCLK SMBALERT#/GPIO11 System Mgnt. INTRUDER#; SML[1:0]DATA;SML[1:0]CLK SML0ALERT... 1 of 2) Datasheet Name Type Description INTRUDER# I Intruder Detect: This signal can be... used like a GPI if the Intruder Detection is not needed. SML0DATA... Pull-up Driven Driven Driven INTRUDER# RTC External Switch Driven Driven...-up Driven Driven Driven Driven INTRUDER# RTC External Switch Driven Driven... Status Register (TCO1_STS) TCOBase + 04h 7 0 Intruder Detect (INTRD_DET) TCO2 Status Register... Yes NMI2SMI_EN=1 NMI2SMI_STS TCO SMI – INTRUDER# signal goes active No Yes..., SERR, NMI, or TCO interrupt • Intruder Detect input — Can generate TCO... the system cover is removed — INTRUDER# allowed to go active in....1.2 Handling an Intruder The PCH has an input signal, INTRUDER#, that can... a two RTC clock debounce. If INTRUDER# goes active (after the debouncer... read the status of the INTRUDER# signal (high or low) by... if the intruder function is not required. If the INTRUDER# signal goes... bit will go to a 0 when INTRUDER# input signal goes inactive. Note... is actually cleared. Also, the INTRUDER# signal should be asserted for... be set. Note: If the INTRUDER# signal is still active when... further SMIs. However, if the INTRUDER# signal goes inactive and then... Messages Event Assertion? deassertion? Comments INTRUDER# pin yes no Must be... D 8-bit sync field (1111_1110) 5.16 5A data byte 2 clk idle SATA... = Reserved 011 = S3 Reserved 0 1 = The Intruder Detect (INTRD_DET) bit is set... VccASW VccASW VccASW Vss Vss INTRUDER # RSMRST# PWROK Vss CLKIN_DO T_96P...# BN56 Reserved M49 FDI_RXN1 F45 INTRUDER# BM38 Reserved U43 FDI_RXN2 H41... / GPIO37 CL_CLK1 PWROK Vss TP17 INTRUDER# OC1# / GPIO40 Vss SUSWARN# / SUSPWRDN...# T14 TS_VSS3 AH10 FDI_RXN7 BG9 INTRUDER# K22 TS_VSS4 AK10 FDI_RXP0 BG14... VIH14/VIL14 System Management Signals: INTRUDER# Miscellaneous Signals: INTVRMEN, SRTCRST# VIH15... is done by asserting PLTRST#. Intruder Detect (INTRD_DET) — R/WC. 0 = Software clears... after clearing it. 2. If the INTRUDER# signal is active when the... further SMIs. However, if the INTRUDER# signals goes inactive and then... SMI# be generated). 3. If the INTRUDER# signal goes inactive some point... signal will go to a 0 when INTRUDER# input signal goes inactive. Note... action to take if the INTRUDER# signal goes active. 2:1 00 = No.../F3/F4/F5/F6/F7:5A, bit 8) transitioned from 0-to-1, and.../F3/F4/F5/F6/F7:5A, bit 3) transitioned from 0-to-1, and...



Дата загрузки: 2017-03-09
Скачать документ
0/5
... (SLOT4) 24 Intrusion Switch Connector (Intruder) 12 PCI-e 1x Connector (SLOT3... (SLOT4) 24 Intrusion Switch Connector (Intruder) 12 PCI-e 1x Connector (SLOT3... (SATA1) 11 Intrusion Switch Connector (Intruder) 8 DELL™ OPTIPLEX™ 390 TECHNICAL GUIDEBOOK... range/high AC range) 5.0A / 2.5A 5.0A / 2.5A 4.4A / 2.2A 4.4A / 2.2A....0A 13A 7.0 A 15A 7.0 A 15A 3.5A 11A 3.5A 11A 12VA/17A; 12VB/9A... 4.0A 0.5A 265W 4.0A 0.5A 265W 4.0 0.5A 255W 4.0 0.5A 255W 4.0A 0.5A 235W 4.0A 0.5A 235W...



Дата загрузки: 2017-01-10
Скачать документ
0.1/5
... 5.5 5.8 138 61 131 2.5 0.4 0.6 55 6 12N5.5A-3B DC/CP 5.5 5.8 103 90...-B-CX YB16L-B 12N5.5-3B 12N5.5A-3B 12N7-4B 12N7D-3B... 12N5.5-4A 12N5.5-4B 12N5.5A-3B 12N7-3B 12N7-4A... 12N5.5-4A 12N5.5-4B 12N5.5A-3B 506 012 004 12N7...-3 JL250GY LX250Y-3 JL90 JL125-4 JL125-5A - - - - - - - - - - - - - - - - - - - - YB5L-B - - YB6L-B - YTX5L-BS - - - YB5L...-7 HN125-3A 150-2 150-6, 7, 8 150J-5A, 8A CG150-3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - JIANSHE YAMAHA 90...-2 6N6-1D-2 6N6-1D-2 12N5.5A-3B 6N4-2A-3 6N4-2A... GSX400T, S, ES GSX-R400R, RF Intruder Classic 400 Skywave 400 SP400... 85 GV700GL Madura 85 VS700GL Intruder 85-87 DR750S, SU Big... Le Mans 72-77 VS750GL Intruder, GLP 86-91 DR800S, SU... VL800 Intruder Volusia, Boulevard C50, T, M50 01-08 VS800 GL, S Intruder, Boulevard..., D, T Cavalcade VS1400GL Intruder, GLP, S83 VS1400GLF, GLP VL1500 Intruder, C90, T VZ1500 Boulevard...-3 6N4-2A-5 12N7-3B 12N5.5A-3B 6N4A-4D 6N4A-4D... 6N6-3B-1 12N7-3B 12N5.5A-3B 12N10-3B 6N4B-2A... 12N5.5-4A 6N4A-4D 12N5.5A-3B - Motorcycles & Scooters YAMAHA continued... - - - - - - - - - - - - YB12B-B2 12N5-3B 12N5.5A-3B 6N2-2A-3 6N2-2A...-1 6N6-3B-1 6N4-2A-5 12N5.5A-3B 12N5.5-3B 12N12A-4A...-A2 12N5-3B 12N5.5A-3B 12N5.5A-3B 12N5.5-3B 12N5... 6N4B-2A-3 6N6-3B-1 12N5.5A-3B 12N12A-4A-1 12N7-3B...



Дата загрузки: 2017-02-23
Скачать документ
0/5
... can be received by a passive intruder. While passive intruders receive transmissions... impossible to prevent an intelligent intruder from gaining access to the... retransmission. Additionally, once an active intruder is detected, additional security measures... to catch and stop the intruder from further mischief. Authentication, the... to attack by a knowledgeable, systematic intruder. Another paradigm for encrypting data... a period of time, then the intruder can begin an erroneous communication... cannot predict how a powerful, active intruder may reorder the sequence of... attack [DENN81], involves having an intruder record messages from a protocol session... divulges private information to an intruder, the message history that allows... category we consider how a powerful intruder may cause protocol steps to... the protocol designer intended. The intruder may accomplish this, for example... intercepted by a powerful intruder. Upon intercepting a message, the intruder may select any.... Possible intruder actions are modelled by sending messages to the intruder. In order to represent an all-seeing intruder, all messages may be sent to the intruder. In order to represent the benign or passive intruder, the intruder...-powerful intruder by sending messages from valid principals to the intruder for... Cryptographic Protocol Analysis Language 64 intruder, the insecure send operator is... the activity of an intruder, similarly to Kemmerer’s intruder transformations discussed in... encrypted value to principal B. The intruder intercepts the message, then forwards... principal B unchanged, representing the passive intruder in this instance. Principal B receives... to facilitate the representation of intruder actions, CPAL includes an insecure... of the intruder. For an insecure send through an intruder, there are... intended message on the intruder's input que. The intruder receives the message... space. At its discretion, the intruder may then execute a send operation...("S2;", P)) 4.4 Assert wp("assert(R):",P) = (P and R) 4.5a Gassert wp("gassert(R):",P) = (P and R) 4.5b... protocol designer to explicitly list intruder actions in the protocol specification... operator (->) goes to principal I. The intruder performs all other actions similarly... principals. We found that an intruder with these characteristics can effectively... the intruder's address space in the secure send operation of the intruder... illustration. In this case, the intruder acts as a passive listener, forwarding.... [BIRD93] showed how an active intruder can trick a principal using this..., the flaw allows an active intruder to substitute a message from a previous... attack is characterized by the intruder intervening in a communication by intercepting... a principal other than B, maybe the intruder. Other spoofs involve beliefs regarding... nature of cryptography, i.e. that the intruder cannot generate the value expected... is compromised and the intruder possesses kab, the intruder patiently waits Replay... 7, is intercepted by the intruder. The intruder then substitutes the message from... with principal B as though the intruder were A himself. 6.4.2 Parallel Session Attacks... attack, given a suitable protocol the intruder will manipulate one or more... cryptographic protocol session concurrently. The intruder then copies messages from one... In the attack sequence, the intruder intercepts A's originating message to B (action... action 5. In A's response to the intruder's request for the parallel session... an oracle for the intruder, allowing the intruder to attain encrypted values... A: =>B(k); B: <-(k); A: Na := new; A: ->B(Na); I: <-(Na); I: =>A(Na); -- Intruder initiates a parallel session with A A: <-(Na... is from a previous session. -- The intruder now initiates a second session with...]k; B: N1 := d[msg2]k; B: msg3 := e[]k; B: ->A( ); I: <-(msg3a);-- The intruder initiates a session with A using the... attack is successful because the intruder is able to substitute a response... original session. 6.4.6 CPAL-ES and Intruder Actions Evaluation of the replay... an intruder may take. Represented as routine network operations, the intruder actions... straightforward and well-defined. An intruder may receive a message into its... routinely assumed to have, the intruder can accomplish a myriad of attacks... intruder actions and quickly evaluate the results of those actions. Because intruder... session and parallel session. The intruder initiates a session with principal B using... cleartext information to allow the intruder to prompt principal A in the... and principal B into believing the intruder is actually principal A. The CPAL...-ES evaluation clearly reflects the intruder’s actions in this attack. Messages... can be used to investigate intruder actions relative to a specific protocol...-ES formalizes the notion of intruder actions in formulating a wide variety... receiving and temporarily storing messages Intruder. The intruder is a principal that may.... The intruder may be thought of as an all-powerful intruder if... insecure send operator. Otherwise, the intruder has no greater power than...