>>I will greatly appreciate if somebody can give me a summary of what have 
>>been done before I sign up to this group
>
>There is a very nice summary prepared by Lachlan Cranswick on 
>http://crystsun1.unige.ch/stxnews/riet/welcome.htm
>
>It contains among many other things a pointer to the mail archives set up 
>by Armel le Bail, and everyone would profit from book marking it.

The above website really needs an update.
Hope to interlink the following with Rietveld List Homepage 
when free time permits.


There are various question and "discussion pages" - many based
on using Rietveld Mailing list posts at:

        http://www.ccp14.ac.uk/solution/

(Plus tutorials for many Rietveld packages via:
    http://www.ccp14.ac.uk/tutorial/   )

e.g.:

Automatic Divergence Slits (ADS) and Rietveld Analysis
  http://www.ccp14.ac.uk/solution/automatic_divergence_slits_rietveld.htm

Calibration standards for Powder Diffraction
  http://www.ccp14.ac.uk/solution/calibration/index.html

Combined X-ray / Neutron Rietveld Refinement
  http://www.ccp14.ac.uk/solution/calibration/index.html
 
LeBail Method for Intensity Extraction
  http://www.ccp14.ac.uk/solution/lebail/index.html

Mass absorption coefficients : Resources for estimating them.
  http://www.ccp14.ac.uk/solution/absorption_coefficients.htm

Neutron Scattering Lengths
  http://www.ccp14.ac.uk/solution/neutron_scat_lenghts.html

Pawley Method
  http://www.ccp14.ac.uk/solution/pawley/index.html

PDF, High Q Powder diffraction Analysis Software
  http://www.ccp14.ac.uk/solution/high_q_pdf/index.html

Powder Diffraction: Mounting Samples in Powder X-ray Diffraction
  http://www.ccp14.ac.uk/solution/powdermounts.htm

Powder Diffraction Structure Solution Pathways
  http://www.ccp14.ac.uk/solution/powder_structure_solution_pathways/index.html

Restrained Rietveld Refinement of Organics
  http://www.ccp14.ac.uk/solution/restrained_rietveld/index.html

Rietveld and Rietveld ESD Literature
  http://www.ccp14.ac.uk/solution/rietveld_and_esds/index.html

R and fit factors for Rietveld Analysis, Refining on R-Bragg, 
and Powder Calibration Standards for INEL PSD (Position Sensitive
 Detector)
  http://www.ccp14.ac.uk/solution/rietveld_r_factors/index.html

Rietveld programs that have the ability to generate and view 
electron density Fourier Contour  maps
  http://www.ccp14.ac.uk/solution/rietveld_fourier_maps/index.html

Spray Drying and Preferred Orientation
  http://www.ccp14.ac.uk/solution/spraydry.htm

TOF (Time of Flight) Neutron Diffraction Resources and Code
  http://www.ccp14.ac.uk/solution/tofneutron/index.html

Zero shift vs sample offset
  http://www.ccp14.ac.uk/solution/zero-off.htm

----

Any corrections - additions, comments to the above discussion pages 
appreciated.  Is easy to add them in.

Lachlan.

PS:  Have been boring everyone and their dog about the following
as it has caused known damage already:

If you have a Linux PC or UNIX machines for crystallographic
applications that are visible to the internet - you may 
like to make sure it is properly patched with security fixes - 
especially with the latest version of the BIND deamon - which
on many Linux installations, is enabled by default
  (in Redhat, check as root using the Redhat "setup" program)

Refer:
  
"Lion Internet Worm" for Linux - "virtually idiot proof,
                            fire-and-forget [hacker] tool"

Automatically finds explotable UNIX server, cracks them via
BIND exploit, installs itself on the server - continues 
on ad. infinitum.

Time wasting web-references given below.

Lachlan.

"Lion Internet Worm" DDOS Targeting Unix Systems 
  (includes a link to a detection program)
 http://www.nipc.gov/warnings/advisories/2001/01-005.htm 

Highly destructive Linux worm mutating:
    http://www.theregister.co.uk/content/8/17929.html 

Extracts:

"This one includes a feature similar to one in the Ramen
worm, which altered the Web pages of hacked HTTP
servers with the message "Hackers looooooooooooove
noodles," signed by the "RameN Crew." 
The new Lion worm sets up an HTTP server on port
27374 and erects a page bearing greetz from the Lion
crew, Fearnow told us. 

All versions (there are three now) are virtually idiot proof,
fire-and-forget tools. Each package contains a scanner
which generates random class B addresses searching for an
opening on port 53. It then queries the version, and if it
finds it's vulnerable, runs a well-known BIND 8 transaction
signature (TSIG) handling code exploit, and installs the t0rn
rootkit." 

"We were hasty this week in our initial coverage, where we
took a swipe at the FBI's National Infrastructure Protection
Center (NIPC) over a Lion advisory bulletin of theirs which
we deemed alarmist." 

"So the NIPC bulletin is a bit gaseous, but not as grossly
flatulent as we'd thought." 


Redhat worm touts instant noodles ('Ramen' worm):
  http://www.theregister.co.uk/content/archive/16168.html 
 
Hacking Linux BIND servers becomes child's play:
  http://www.theregister.co.uk/content/8/17864.html 

BIND holes mean big trouble on the Net:
  http://www.theregister.co.uk/content/6/16454.html 
Lachlan M. D. Cranswick
Geochemistry - Lamont-Doherty Earth Observatory, Columbia University
PO Box 1000, 61 Route 9W Palisades, New York 10964-1000 USA
Tel:  (845) 365-8662   Fax:  (845) 365-8155 
E-mail: [EMAIL PROTECTED]  WWW: http://www.ldeo.columbia.edu
       CCP14 Xtal Software Website: http://www.ccp14.ac.uk


Reply via email to