- Download Nvd Drivers
- Download Nvidia Drivers 210
- Download Nvd Driver Printer
- Download Nvd Database
- Download Nvidia Driver Ubuntu
It is time for a change!
Windows 7/Vista/XP Server 2008/2003 32-bit PCL6 driver. This driver uses the Add Printer Wizard and offers full support of the printer specific features for the Xerox WorkCentre 6505. For all movements requiring a NVD/waybill, call the LPA program on 1800 683 111 or visit www.mla.com.au for information on how to become accredited with LPA to access NVD waybills. Pig movements A PigPass NVD is the commercially required waybill for the movement of pigs to a saleyard, abattoir or export depot, for sales to other producers. Click Download File to download the file. When the File Download window appears, click Save to save the file to your hard drive. Browse to the location where you downloaded the file and double-click the new file. Read over the release information presented in the dialog window.
The amount of data breaches with massive impact is continously growing. Breaches at enterprises like Facebook, Twitter or Marriott alone did lead to hundreds of millions of data records compromised.
Harness the technology of the future today
Raise safety awareness
Protect your investment
Open up new business opportunities
All involved parties agreed that it must be possible to find a truly safe – and therefore, completely novel – way to secure our data.
In 5 years of painstaking programming, development and testing, the team successfully formulated, created, and patented a whole new technology (NVD). It is no longer based on ‘locking’ data into secure systems, but rather integrating the protection into the data itself. This allows for entirely new dimensions in data protection, in the way we handle, distribute, control and store our data.This technology is considered a secure solution for our networked future.
No matter which industry or IT-related field, whether it is the Cloud, IoT (Internet of Things), smart devices or autonomous driving – data has never been so valuable and yet as vulnerable as today.
NVD Technology
You cannot touch NVD technology, you cannot put it into simple words and you cannot see it, but: NVD is an essential factor to solve the problems we described to the left!
We will take the time to explain this technology of the future to you.Don’t miss out on the eye-opening experience of discovering the game changer in data security technology!
The solution to reach your information protection goals
(authenticity, integrity, privacy and resiliency)
Cyberattacks!!
Digitization is the future without any doubt.
However, the increasing complexity (networking, billions of devices) has pushed current protection technologies to their limits, and as a result the number of cyberattacks have increased dramatically!
NVD leads to the necessary
quantum leap in data security
to prevent those!
NVD lifts products and applications to a new quality level, generates confidence and fulfils legal requirements – with reduced complexity and OPEX.
While debating the future …
The digital world is living in the middle ages!
Current technologies build protections AROUND data!
1
Loss of control
As soon as you share data, you lose control over what happens to it next. There is no way to actively withdraw data privileges afterwards.
2
Insufficient protection
Building protection around data using encryption or encapsulation is the wrong strategy, because data needs to be unencrypted to be processed – which means protection must be removed beforehand.
3
Non-compliant
Not only your data, but in particular, additional information (meta data) is critical, since analytical systems can process this info, potentially identifying personal info associated with this data.
4
Complexity
An increasing number of devices and the need to securely connect them escalates complexity (key management), weakening security. Current technologies are doomed to lead into an impasse!
You can’t attack data you can’t see.
This is what the future looks like!
NVD integrates protection INTO the data as it is created!
1
Control
2
Digital immunity
We integrate protection and privacy directly into your data, making them immune to attacks and manipulation. Even insider attacks or compromised systems cannot harm them.
3
Compliance
We remove all personally identifiable information, which eases to comply with today’s and tomorrow’s legal requirements.
NVD does not contain any metadata and no personally identifiable information. Therefore NVD protected data ensures privacy, for what you can’t see can’t be stolen or manipulated.
4
Scalability
Efficient protection is applied right as the data is generated, providing uniform protection for anything, whether it is a smart electricity meter or a full-fledged industrial plant.
You alone decide who will have access to your data and you will never surrender control over it! You will always have the option of withdrawing access information retroactively.
Classical protection- and access control systems are outdated. We created solutions which integrate the protection into the data and make todays log in procedures obsolete. Known attack vectors become unusable and data authenticity, integrity, privacy and resiliency are provided by design.
Remaining in control is very costly or almost impossible – or do you know what happend with your shared data?
Your advantage with NVD
Re-gain control of your data! You retain exclusive control over your own data! You decide about access and viewing privileges!
Disadvantage without NVD
No control over your data whatsoever! Others are in charge!
Integrated protection inside the data, eliminated weak points: This is digital immunity.
Data manipulation and data theft are no longer possible, not even with quantum computers. Your data content is immune to cyberattacks, right away, and more importantly, in the future.
Keys, locks, and gates have been common points of attack for centuries. As our computer systems become more powerful, these obstacles are ever easier to overcome. Integrated protection and privacy inside the data ensure your immunity.
Your advantage with NVD
Disadvantage without NVD
We remove all personally identifiable information, which makes us compliant with today’s and tomorrow’s legal requirements.
NVD does not contain any metadata and no personally identifiable information. You don’t have to worry about any legal restrictions in terms of privacy, for what you can’t see can’t be stolen or manipulated.
Metadata and especially personal information provide excellent cues for attackers to find weak spots. NVD does not use any meta data at all and ensures compliance.
Your advantage with NVD
Disadvantage without NVD
We don’t have a weak link. Seamless data protection from the very start.
Plug-and-play, easy-to-use privacy for any device. For us, security and performance are both must-haves to give IoT solutions the security and performance they need to boost innovative business models.
Billions of devices will be communicating and sharing data in the IoT, without sufficient protection. We establish perfect end-to-end protection, without increasing the effort, regardless of application or device.
Your advantage with NVD
Download Nvd Drivers
Disadvantage without NVD
Not only secure, but truly unique.000bVarious experts confirmed the innovations of NVD technology, also reflected in our awards and patents.
Today’s data security technologies are already reaching their limits and in no way meet the requirements of autonomous driving, the IoT or the healthcare sector!
Your advantage with NVD
Disadvantage without NVD
The Decision-Makers’ Top Concerns
according to Gartner’s CIO agenda
4 exemplary fields of application
Internet of Things
Industrial Cloud, SmartGrid, Connected-/Autonomous Cars
Issues
Rising complexity makes it virtually impossible to control and secure all connected devices.
Wie kann man die Flut dieser wertvollen Daten/Informationen kontrollieren?
Und wie kann man ausschließen, dass Informationen manipuliert werden?
Mit heutigen Sicherheitslösungen sind diese Herausforderungen nicht zu lösen!
Solutions
Example CarSharing
Healthcare
Legally compliant, Electronic patient files
Issues
It is currently virtually impossible to ensure legally compliant long-term storage of complete data and conduct a targeted analysis of this data at a later point in time.
Eine rechtskonforme langfristige Speicherung der kompletten Daten und zielgerichtete Auswertung auch zu späteren Zeitpunkten ist derzeit rechtlich nahezu unmöglich.
Solutions
NVD gives patients full control over their data as well as the flexibility to decide if, when, what, and how long they want to release their data (e.g. providing certain information to a doctor for specific treatments). NVD access control prevents data from being used outside of the defined scope or beyond the duration of use – the data simply won’t be retrievable.Of course, additional protections such as (partial) anonymization can be implemented as well, but they do not affect the original raw data – and thanks to NVD, even this newly generated anonymized data can only be used in a targeted fashion.
abgestimmten Nutzungsbereiches oder nach der Nutzungsdauer wird durch das NVD Zugriffsverfahren verhindert, da die Daten nicht auffindbar wären.
Natürlich können zusätzliche Schutzmechanismen, wie beispielsweise eine (Teil-)Anonymisierung genutzt werden, davon sind aber die ursprünglichen Roh-Daten nicht betroffen – und selbst diese neu generierten anonymisierten Daten könnten durch NVD wieder nur zielgerichtet genutzt werden.
Example Electronic patient files
Financial services providers / FinTechs
Data control and new, data-based business models
Issues
In addition, new regulations such as PSD2 require these old systems to open up so financial institutions can share customer information. This leads to the aforementioned loss of control over a precious banking asset – their data.
Solutions
Legal requirements are met without the dreaded loss of control. This raises whole new cost-saving potentials and opportunities for new business models in the area of data trade – as Amazon, Facebook and Google are already doing with great success.
Es werden also die gesetzlichen Verpflichtungen erfüllt, ohne den gefürchteten Kontrollverlust, und es ergeben sich vollkommen neue Einsparpotentiale und Geschäftsmodelle im Bereich des Datenhandels, wie es heute schon Amazon, Facebook und Google mit großem Erfolg praktizieren.
Example Banking Cloud
Cloud providers
Creating goodwill for Cloud providers
Issues
Today’s Cloud providers often circumvent encryption in order to be able to offer cheap B2C and B2B storage solutions. This is what makes space-saving deduplication possible in the first place.
Heutige Cloud-Anbieter umgehen häufig die Verschlüsselung, um kostengünstige Speicherlösungen dem B2C und B2B Markt anbieten zu können. Nur so ist heute die platzsparende Deduplizierung möglich.
Solutions
NVD protects your data seamlessly, no matter where it is stored. Selective access to partial information allows for anonymized processing without the need to remove any data protections (as is the case with encryption).Also, NVD-protected data is stored de-duplicated on any server, globally and with high performance, fortifying your level of protection and greatly accelerating access speed.
Desweiteren werden die NVD-geschützten Daten von Anfang an dedupliziert auf beliebigen Servern, weltweit und performant abgelegt.
So steigern Sie Ihren Schutz, und die Zugriffsgeschwindigkeit wird extrem erhöht.
Beispiel Public wird zur Private Cloud
1
Immediate, automatic protection
As the data is generated, it is analyzed and, based on the results, converted into binary fragments without any visible information (distorted, encrypted, disjointed etc.). Data is thus immune to any attack or manipulation. It can now be transferred or stored at will, no further protection necessary.
2
Dynamic address calculation
Instead of verifying users and passwords based on existing information, as we do today, a number (address) is calculated based on various entry values that depend on the application, i.e. timeframe, purpose. Based on this address, the method can retrieve the data fragments generated in the first step and reconstruct the data.
3
Quantum-cryptographic access
The addresses generated in the second step are valid only one single time. Each access involves calculating a new address, which is completely different from the previous one. This makes any information that attackers may intercept utterly useless. This means even future attacks using quantum computers stand no chance of calculating NVD-protected data.
We are building the foundation for solutions of the future!
Mentioned enterprises benefit from NVD!
Safe
(autonomous) driving
Apple, BMW, Bosch, Continental, Daimler, Ford, GM, Google, Honda, Infineon, Tesla, Toyota, Uber, VW
Tamper-proof
Smart Grids
ABB, Deutsche Telekom, EON, Gazprom, GDF, Landis+Gyr, KEPCO, Schneider El., SGCC, SMA Solar, S&T
Burglary-proof
Smart Homes
Amazon, Apple, AT&T, GE, Deutsche Telekom, Google, Samsung, Siemens
Data
at your fingertips
AT&T, AWS, BT, China Mobile, EMC, Hitachi, IBM, Microsoft, NetApp, Telefonica, Telekom, Verizon, Vodafone
Replacing asymmetrical encryption
AMD, Apple, Broadcom, EMC, Foxconn, Google, IBM, Intel, Microsoft, Oracle, Qualcom, SAP
High-security
smartphones
Apple, BBK Electronics, China Mobile, Huawei, Lenovo, LG, Samsung, TCL/Alcatel, Xiaomi, ZTE
Anonymous
digital lockers
BNP Paribas, Credit Suisse, Deutsche Bank, HSBC, ICBC, JP Morgan Chase, Mitsubishi, Financial Group, UBS
Controlled data
trade/-rental
BNP Paribas, Credit Suisse, Deutsche Bank, HSBC, ICBC, JP Morgan Chase, Mitsubishi. Financial Group, UBS
Blockchain
Optimization
Google, IBM, Microsoft, Unilever, Visa, Walmart
Anonymous,
highsecurity collaboration
Government: Department of Defence, Homeland Security, Army
Tamper-proof and
anonymous voting systems
Governments
Cost-reduced
cyber insurance
Allianz, Axa, MetLife, Nippon Life Insurance, Ping an Insurance, Prudential
Safe (autonomous) driving
Tamper-proof Smart Grids
Burglary-proof Smart Homes
Data at your fingertips
Replacing asymmetrical encryption
High-security smartphones
Anonymous digital lockers
Controlled data trade/-rental
Blockchain Optimization
Anonymous, highsecurity collaboration
Tamper-proof and anonymous voting systems
Cost-reduced cyber insurance
Think like us
outside of the box!
Think BIG! Think NVD!
NVD Data Feeds
NOTICEIt is assumed that users of the data feeds provided on this page have a moderate level of understanding of the XML and/or JSON standard and XML or JSON related technologies as defined by www.w3.org. Currently, the NVD provides no other specific tools or services for processing vulnerability data.
The entire NVD database can be downloaded from this web page for public use. All NIST publications are available in the public domain according to Title 17 of the United States Code, however acknowledgement of the NVD when using our information is always appreciated.
The following feeds are available:- JSON Vulnerability Feeds – Each vulnerability in the file includes a description and associated reference links from the CVE® dictionary feed, as well as CVSS base scores, vulnerable product configuration, and weakness categorization.
- CPE Match Feed – A feed that provides the product/platform applicability statement to CPE URI matching based on the CPEs in the official CPE dictionary.
- RSS Vulnerability Feeds – An eight day window of security related software flaws.
- Vulnerability Translation Feeds – Translations of vulnerability feeds.
- Vulnerability Vendor Comments – Comments provided by vendors regarding a particular flaw affecting within a product.
- CPE Dictionary – dictionary containing a list of products.
- Common Configuration Enumeration (CCE) Reference Data – Reference data for common configuration items.
- National Checklist Program (NCP) Checklists – A list of all of the checklists categorized by the NCP.
The main vulnerability feeds provide CVE® data organized by the first four digits of a CVE® identifier except for the 2002 feeds which include vulnerabilities prior to and including 'CVE-2002-'. Each feed is updated only if the content of that feed has changed. For example the 2004 feeds will be updated only if there is an addition or modification to any vulnerability with a starting CVE® identifier of 'CVE-2004-'. In addition, the 'recent' feeds are a list of recently published vulnerabilities and the 'modified' feeds are a list of recently published and modified vulnerabilities where 'recently' and 'modified' are defined as the previous eight days. These feeds are updated approximately every two hours.
If you are locally mirroring the NVD data, the data feeds should be used to stay synchronized. After performing a one-time import of the complete data set using the compressed XML/JSON vulnerability feeds, the 'modified' feeds should be used to keep up-to-date. The META file should be used to determine if a given feed has been updated since your last import. This helps prevent unnecessary downloads of the .zip or .gz files and should result in a reasonable use of less than 200 requests per day.
META FilesIn addition, each of the data feeds is described by an associated plain text file with the same name as the .xml file with a .meta extension. These files are updated approximately every two hours to reflect changes within their respective feed file. For example, if the name of the file is nvdcve-2.0-Modified.xml then the .meta file name will be nvdcve-2.0-Modified.meta. The .meta file contains information about the specific feed including the last modified date and time, the size of the file uncompressed, and a SHA256 value of the uncompressed file:
lastModifiedDate:2015-09-10T08:40:09-04:00
size:1273382
zipSize:91619
gzSize:91477
sha256:ac782e2db403e2b09ad5dd676501e8755fda3f2bef347b7503491700c6c5eaff
JSON Feeds
NVD is now offering a vulnerability data feed using the JSON format. This data feed includes both previously offered and new NVD data points. Changes made throughout the BETA phase are visible by viewing the changelog .
Version 1.1 NVD JSON 1.1 Schema | |||
Feed | Updated | Download | Size (MB) |
---|---|---|---|
CVE-Modified | 02/13/2021; 10:02:30 AM -0500 | META | |
GZ | 0.31 MB | ||
ZIP | 0.31 MB | ||
CVE-Recent | 02/13/2021; 10:00:45 AM -0500 | META | |
GZ | 0.09 MB | ||
ZIP | 0.09 MB | ||
CVE-2021 | 02/13/2021; 3:01:12 AM -0500 | META | |
GZ | 0.24 MB | ||
ZIP | 0.24 MB | ||
CVE-2020 | 02/13/2021; 3:18:47 AM -0500 | META | |
GZ | 3.85 MB | ||
ZIP | 3.85 MB | ||
CVE-2019 | 02/13/2021; 3:38:01 AM -0500 | META | |
GZ | 3.99 MB | ||
ZIP | 3.99 MB | ||
CVE-2018 | 02/13/2021; 3:51:59 AM -0500 | META | |
GZ | 3.68 MB | ||
ZIP | 3.68 MB | ||
CVE-2017 | 02/13/2021; 4:03:36 AM -0500 | META | |
GZ | 3.38 MB | ||
ZIP | 3.38 MB | ||
CVE-2016 | 02/12/2021; 4:11:09 AM -0500 | META | |
GZ | 2.42 MB | ||
ZIP | 2.42 MB | ||
CVE-2015 | 02/04/2021; 4:10:17 AM -0500 | META | |
GZ | 2.01 MB | ||
ZIP | 2.01 MB | ||
CVE-2014 | 02/09/2021; 3:53:32 AM -0500 | META | |
GZ | 2.14 MB | ||
ZIP | 2.14 MB | ||
CVE-2013 | 02/13/2021; 4:06:35 AM -0500 | META | |
GZ | 2.11 MB | ||
ZIP | 2.11 MB | ||
CVE-2012 | 02/13/2021; 4:08:50 AM -0500 | META | |
GZ | 1.80 MB | ||
ZIP | 1.80 MB | ||
CVE-2011 | 02/10/2021; 4:03:25 AM -0500 | META | |
GZ | 1.58 MB | ||
ZIP | 1.58 MB | ||
CVE-2010 | 02/06/2021; 4:16:08 AM -0500 | META | |
GZ | 1.69 MB | ||
ZIP | 1.69 MB | ||
CVE-2009 | 02/13/2021; 4:10:21 AM -0500 | META | |
GZ | 1.76 MB | ||
ZIP | 1.76 MB | ||
CVE-2008 | 02/06/2021; 4:19:12 AM -0500 | META | |
GZ | 1.99 MB | ||
ZIP | 1.99 MB | ||
CVE-2007 | 02/03/2021; 4:35:26 AM -0500 | META | |
GZ | 1.96 MB | ||
ZIP | 1.96 MB | ||
CVE-2006 | 02/03/2021; 4:36:43 AM -0500 | META | |
GZ | 2.00 MB | ||
ZIP | 2.00 MB | ||
CVE-2005 | 01/15/2021; 3:55:58 PM -0500 | META | |
GZ | 1.24 MB | ||
ZIP | 1.24 MB | ||
CVE-2004 | 02/03/2021; 4:37:18 AM -0500 | META | |
GZ | 0.78 MB | ||
ZIP | 0.78 MB | ||
CVE-2003 | 01/15/2021; 3:56:50 PM -0500 | META | |
GZ | 0.39 MB | ||
ZIP | 0.40 MB | ||
CVE-2002 | 02/03/2021; 4:38:18 AM -0500 | META | |
GZ | 1.35 MB | ||
ZIP | 1.35 MB |
XML Vulnerability Feeds
WARNINGPer XML Vulnerability Feed Retirement Update the XML vulnerability data feeds are no longer displayed on this page.
CPE Match Feed
This data feed provides a list of all CVE applicability statement match criteria (CPE match strings and CPE match ranges) and the CPE URIs from the official CPE dictionary that match. If a CPE URI expected to match a given criteria is missing, please contact cpe_dictionary@nist.gov as those CPEs may need approved to the official CPE dictionary. This feed is updated on a daily basis.
Version 1.0 NVD CPE Match Feed 1.0 Schema | |||
Feed | Updated | Download | Size (MB) |
---|---|---|---|
CPE-Match | 02/13/2021; 12:30:13 AM -0500 | META | |
GZ | 16.29 MB | ||
ZIP | 16.29 MB |
RSS Vulnerability Feeds
NVD provides two RSS 1.0 data feeds. The first feed, nvd-rss.xml ( zip or gz ), provides information on all vulnerabilities within the previous eight days. The second feed, nvd-rss-analyzed.xml ( zip or gz ), provides only vulnerabilities which have been analyzed within the previous eight days. The advantage of the second feed is that we are able to provide vulnerable product names in the title. The advantage of the former is that you learn about new vulnerabilities as soon as possible.
NVD provides a service whereby software development organizations can submit 'Official Vendor Comments' on the set of CVE vulnerabilities that apply to their products. Organizations can submit comments by contacting NVD staff at nvd@nist.gov . More information is provided on the vendor comment page.
All of the vendors comments can be downloaded from the following XML feed which is updated every 2 hours:
Feed | Updated | Download | Size (MB) |
---|---|---|---|
Vendor Comments | 02/13/2021; 12:45:08 AM -0500 | META | |
GZ | 0.07 MB | ||
ZIP | 0.07 MB |
NVD/CVE Translated XML Feed (version 1.0)
NVD provides an XML feed for translations of CVE vulnerabilities into other languages.
Download Nvidia Drivers 210
Currently, INCIBE (Spanish National Cybersecurity Institute) is translating vulnerabilities into Spanish. INCIBE is solely responsible for the Spanish translation content.
Version 1 NVD/CVE Translation XML Schema | |||
Feed | Updated | Download | Size (MB) |
---|---|---|---|
CVE-Modified | 02/13/2021; 12:40:03 AM -0500 | META | |
GZ | 0.07 MB | ||
ZIP | 0.07 MB | ||
CVE-2021 | 02/13/2021; 12:35:10 AM -0500 | META | |
GZ | 0.11 MB | ||
ZIP | 0.11 MB | ||
CVE-2020 | 02/13/2021; 12:36:35 AM -0500 | META | |
GZ | 1.49 MB | ||
ZIP | 1.49 MB | ||
CVE-2019 | 02/13/2021; 12:38:01 AM -0500 | META | |
GZ | 1.44 MB | ||
ZIP | 1.44 MB | ||
CVE-2018 | 02/13/2021; 12:39:24 AM -0500 | META | |
GZ | 1.32 MB | ||
ZIP | 1.32 MB | ||
CVE-2017 | 02/13/2021; 12:40:49 AM -0500 | META | |
GZ | 1.26 MB | ||
ZIP | 1.26 MB | ||
CVE-2016 | 02/13/2021; 12:41:38 AM -0500 | META | |
GZ | 0.72 MB | ||
ZIP | 0.72 MB | ||
CVE-2015 | 02/13/2021; 12:42:20 AM -0500 | META | |
GZ | 0.63 MB | ||
ZIP | 0.63 MB | ||
CVE-2014 | 02/13/2021; 12:43:03 AM -0500 | META | |
GZ | 0.65 MB | ||
ZIP | 0.65 MB | ||
CVE-2013 | 02/13/2021; 12:43:36 AM -0500 | META | |
GZ | 0.54 MB | ||
ZIP | 0.54 MB | ||
CVE-2012 | 02/13/2021; 12:44:06 AM -0500 | META | |
GZ | 0.47 MB | ||
ZIP | 0.47 MB | ||
CVE-2011 | 02/13/2021; 12:44:31 AM -0500 | META | |
GZ | 0.41 MB | ||
ZIP | 0.41 MB | ||
CVE-2010 | 02/13/2021; 12:44:58 AM -0500 | META | |
GZ | 0.45 MB | ||
ZIP | 0.45 MB | ||
CVE-2009 | 02/13/2021; 12:45:27 AM -0500 | META | |
GZ | 0.48 MB | ||
ZIP | 0.48 MB | ||
CVE-2008 | 02/13/2021; 12:46:05 AM -0500 | META | |
GZ | 0.64 MB | ||
ZIP | 0.64 MB | ||
CVE-2007 | 02/13/2021; 12:46:44 AM -0500 | META | |
GZ | 0.63 MB | ||
ZIP | 0.63 MB | ||
CVE-2006 | 02/13/2021; 12:47:09 AM -0500 | META | |
GZ | 0.39 MB | ||
ZIP | 0.39 MB | ||
CVE-2005 | 02/13/2021; 12:47:13 AM -0500 | META | |
GZ | 0.04 MB | ||
ZIP | 0.04 MB | ||
CVE-2004 | 02/13/2021; 12:47:18 AM -0500 | META | |
GZ | 0.06 MB | ||
ZIP | 0.06 MB | ||
CVE-2003 | 02/13/2021; 12:47:24 AM -0500 | META | |
GZ | 0.07 MB | ||
ZIP | 0.07 MB | ||
CVE-2002 | 02/13/2021; 12:47:30 AM -0500 | META | |
GZ | 0.07 MB | ||
ZIP | 0.07 MB |
Download Nvd Driver Printer
National Checklist Program (NCP) Checklists
Note: As of July 2017, tier has been made optional to support changes in the current draft of 800-70 Rev 4 .
Download Nvd Database
checklist-0.1-feed.xml includes all checklists contained within the NCP repository. checklist-0.1-feed-modified.xml includes all recently modified checklists within the NCP repository.
Download Nvidia Driver Ubuntu
Version 0.1 NCP/Checklist XML Schema | |||
Feed | Updated | Download | Size (MB) |
---|---|---|---|
NCP-Complete | 02/13/2021; 12:00:52 AM -0500 | META | |
GZ | 0.61 MB | ||
ZIP | 0.61 MB | ||
NCP-Modified | 02/13/2021; 12:00:53 AM -0500 | META | |
GZ | < 0.01 MB | ||
ZIP | < 0.01 MB |