text
stringlengths
3
233
limitation O
at O
the O
time O
, O
and O
the O
team O
created O
different O
settings O
for O
CGA B-Device
, O
EGA B-Device
, O
and O
VGA B-Protocol
monitors I-Protocol
. O
</s>
<s>
In O
Binary B-Protocol
Synchronous I-Protocol
Communications I-Protocol
, O
the O
NAK B-Protocol
is O
used O
to O
indicate O
that O
a O
transmission O
error O
was O
detected O
in O
the O
previously O
received O
block O
and O
that O
the O
receiver O
is O
ready O
to O
accept O
retransmission B-Protocol
of O
that O
block O
. O
</s>
<s>
The O
attacker O
uses O
the O
ARP O
responses O
to O
obtain O
the O
WEP B-Protocol
key I-Protocol
in O
less O
than O
6 O
minutes O
. O
</s>
<s>
AOL O
became O
aware O
that O
Trillian B-Protocol
users O
were O
able O
to O
chat O
with O
their O
AIM B-Protocol
buddies O
without O
having O
to O
download B-Application
the O
AIM B-Protocol
client O
, O