User:Inferno986return/sandbox

From Wikipedia, the free encyclopedia

Optician Sans[edit]

Optician Sans
LicenseSIL Open Font License (SIL OFL)
Websiteoptician-sans.com

Optician Sans is an uppercase geometric sans-serif typeface that is based on eye chart lettering by Herman Snellen and Louise L. Sloan, which are used by Snellen charts and LogMAR charts respectively. The typeface was created as a collaboration between design agency ANTI Hamar and typographer Fábio Duarte Martins for Optiker-K, a Norwegian optician and ophthalmologist.

Background[edit]

The eye charts used only 10 Latin uppercase letters: C D H K N O R S V K that were designed using a 5x5 grid.[1]

Unicode coverage[edit]

References[edit]

  1. ^ ANTI HAMAR. "Optician Sans - new free font". YouTube.

Struwen[edit]

Struwen
Struwen from Westphalia
CourseBreakfast, dessert
Place of originGermany
Serving temperatureHot or cold
Main ingredientsFlour, milk, eggs, yeast, sultanas or raisins

Struwen are a type of yeast pancake native to Germany that are traditionally eaten on Good Friday. They are commonly prepared in Münsterland, but also in areas of the Lower Rhine.

The word struwen derives from the Old Saxon word "struva". It means something like "something curly", "something freaky". Linguistically related are words like "Strubbel", "Struwwel" and "strubbelig" (as in "Struwwel-" or "Strubbelpeter") or "resist".

References to struwen date back to a charter written in Latin from 1090. Bishop Erpho of Münster declared on the occasion of a dispute between the abbess and the convent ladies of a monastery in Freckenhorst, that the nuns on various holidays such as Christmas, Easter and Pentecost serve a dish at dinner which is generally called "struva" by the people. Since a struwen was defined as type of a pancake after the charter was written, this can also be assumed for the time of writing the charter.[1]

Today struwen are usually fried or baked on Good Friday. However in the original charter of the 11th century, Good Friday had not been named.[2]

Usually struwen consists of a yeast dough with raisins or sultanas. From the dough flat patties are formed, which are fried in the pan from both sides. Sugar and cinnamon are often sprinkled before eating, as well as being served with apple sauce or fruit compote on the side.

References[edit]

  1. ^ Nagel, Norbert (8 April 2009). "Stiftsdamen aßen Struwen schon vor 920 Jahren" (in German). Westfälische Nachrichten. Archived from the original on 18 April 2014.
  2. ^ "Karfreitagsgericht hat eine lange Tradition" (in German). Westfälische Nachrichten. 18 April 2014. Archived from the original on 18 August 2019.

External links[edit]


Vulnerability infobox[edit]

Heartbleed
Logo representing Heartbleed. Security company Codenomicon gave Heartbleed both a name and a logo, contrbuting to public awareness of the issue.[1][2]
CVE identifier(s)CVE-2014-0160
Date discovered1 April 2014; 10 years ago (2014-04-01)
Date patched7 April 2014; 10 years ago (2014-04-07)
DiscovererNeel Mehta
Affected softwareOpenSSL (1.0.1)
Websiteheartbleed.com
Shellshock
A simple Shellshock logo, similar to the Heartbleed bug logo
CVE identifier(s)CVE-2014-6271 (initial), CVE-2014-6277, CVE-2014-6278, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187
Date discovered12 September 2014; 9 years ago (2014-09-12)
Date patched24 September 2014; 9 years ago (2014-09-24)
DiscovererStéphane Chazelas
Affected softwareGNU Bash (1.0.3–2.05b)
Foreshadow
A logo created for the vulnerability, featuring a lock with a shadow
CVE identifier(s)CVE-2018-3615 (Foreshadow), CVE-2018-3620 and CVE-2018-3646 (Foreshadow-NG)
Date discoveredJanuary 2018; 6 years ago (2018-01)
Affected hardwareModern Intel processors
Spectre
A logo created for the vulnerability, featuring a ghost with a branch
CVE identifier(s)CVE-2017-5753 (Spectre-V1), CVE-2017-5715 (Spectre-V2)
Date discovered2013; 11 years ago (2013)
Affected hardwareAny processor that uses branch prediction
Websitemeltdownattack.com
Meltdown
The logo used by the team that discovered the vulnerability
CVE identifier(s)CVE-2017-5754
Date discoveredJanuary 2018; 6 years ago (2018-01)
Affected hardwareIntel x86 microprocessors, IBM POWER processors, and some ARM-based microprocessors.
Websitemeltdownattack.com
Stagefright
CVE identifier(s)CVE-2015-1538, CVE-2015-1539, , CVE-2015-3824, CVE-2015-3826, CVE-2015-3827, CVE-2015-3828, CVE-2015-3829 and CVE-2015-3864 (Stagefright 1.0), CVE-2015-6602 (Stagefright 2.0)
Date discovered27 July 2015; 8 years ago (2015-07-27)
Date patched3 August 2015; 8 years ago (2015-08-03)
DiscovererJoshua Drake (Zimperium)
Affected softwareAndroid 2.2 (Froyo) and later (Stagefright 1.0), Android 1.5 (Cupcake) to Android 5.1 (Lollipop) (Stagefright 2.0)

Attempting to make an infobox template for computer vulnerabilities and software bugs such as Heartbleed and Shellshock.

These templates are based off the Heartbleed, Shellshock, Spectre and Meltdown pages.

  1. ^ McKenzie, Patrick (April 9, 2014). "What Heartbleed Can Teach The OSS Community About Marketing". Kalzumeus. Retrieved February 8, 2018.
  2. ^ Biggs, John (April 9, 2014). "Heartbleed, The First Security Bug With A Cool Logo". TechCrunch. Retrieved February 8, 2018.