Spelling suggestions: "subject:"femail"" "subject:"esmail""
471 |
Ovládání přístroje A2000 přes webové rozhraní / Control of the A2000 device via WEBŁabudek, Daniel January 2014 (has links)
The work is solving the design and implementation of application for presentation measured data and control of A2000 device trought web interface. For connecting to internet is used a module LanReach by company Connectone. Measured values are displayed on the website or send via e-mail messages and saved on FTP server.
|
472 |
Návrh marketingové strategie v průmyslové sféře / Designing a Marketing Strategy in the Segment of IndustryNeuwirth, David January 2011 (has links)
In today’s competitive environment, the survival of a company greatly depends on its ability to win over customers. Competition is constantly evolving and improving the marketing strategies and tools adopted by firms. In order to succeed in such an environment, it is vital to maintain a competitive advantage and always be a step ahead of the rest. The first part of this dissertation will examine several marketing tools and methods, which will enable a company to maintain and expand its customer base. The second part will apply these methods to a real life company Temex Ltd. and evaluate the success of the adopted changes.
|
473 |
Umělé imunitní systémy pro detekci spamů / Artificial Immune Systems for Spam DetectionHohn, Michal January 2011 (has links)
This work deals with creating a hybrid system based on the aggregation of artificial immune system with appropriate heuristics to make the most effective spam detection. This work describes the main principles of biological and artificial immune system and conventional techniques to detect spam including several classifiers. The developed system is tested using well known database corpuses and a comparison of the final experiments is made.
|
474 |
Linux - aktiv im NetzSchreiber, Alexander 14 June 2000 (has links)
Dieser Vortrag gibt eine kleine Uebersicht
ueber die Einsatzmoeglichkeiten von Linux im
Netz - sowohl als Client als auch als Server.
|
475 |
Netz- und Service-InfrastrukturenHübner, Uwe 21 May 2004 (has links)
Workshop "Netz- und Service-Infrastrukturen"
vom 19.-22. April 2004 in Löbsal (bei Meißen)
|
476 |
Distanshandel och industrialisering : En studie i den svenska tidiga postorderhandelns framväxt och expansion 1866-1895Forsgren, Petrus January 2021 (has links)
Distance trading and industrialization. A study in the swedish early mail order emergence and expansion 1866-1895. Petrus Forsgren, Economic History, Magister Degree, Umeå University Spring 2021. The meaning, preconditions, actors with their background, in the early swedish mail order growth and expansion have been studied between the period 1866-1895. Entrepreneurship and structural change have been the underlying theme. The meaning of mail order pointed to a focus on especially the swedish postal service as an important factor. It was found that important preconditions such as railways, consumer markets, the spread of newspapers along with institutional changes in payments started to change 1866 and was fully developed 1875. Before this period, there were obstacles that made mail order only possible in a small more local scale. As a text analysis advertisements were explored in the early period 1866-1874 in regards to the term ”cash on delivery” where it was found that early advertsements came from Denmark and Germany. But results were also found that gave tendencies for a internally domestic origin for mail order in regards to the actors. It was further explored 1875-1895 where the sold items went from light to heavy which indicated that the prerequisitions for mail order were transformed. A total of 15 actors in which the background was studied. They had all similar procedure of selling nationally via advertisments and through the swedish postal service. The actors were in average born 1833, started their business 1861 at 29,5 years of age and expanded with mail order 1876. All the studied actors had previous business experience and none of them had previously been involved in pedlary. Later actors required less previous experience. It further confirms that mail order were a new fenomena that differed from previous types of retail and might have more in common with wholesale, retailing or e-commerce than earlier assumed predecessors.
|
477 |
Using Spammers' Computing Resources for Volunteer ComputingBui, Thai Le Quy 13 March 2014 (has links)
Spammers are continually looking to circumvent counter-measures seeking to slow them down. An immense amount of time and money is currently devoted to hiding spam, but not enough is devoted to effectively preventing it. One approach for preventing spam is to force the spammer's machine to solve a computational problem of varying difficulty before granting access. The idea is that suspicious or problematic requests are given difficult problems to solve while legitimate requests are allowed through with minimal computation. Unfortunately, most systems that employ this model waste the computing resources being used, as they are directed towards solving cryptographic problems that provide no societal benefit. While systems such as reCAPTCHA and FoldIt have allowed users to contribute solutions to useful problems interactively, an analogous solution for non-interactive proof-of-work does not exist. Towards this end, this paper describes MetaCAPTCHA and reBOINC, an infrastructure for supporting useful proof-of-work that is integrated into a web spam throttling service. The infrastructure dynamically issues CAPTCHAs and proof-of-work puzzles while ensuring that malicious users solve challenging puzzles. Additionally, it provides a framework that enables the computational resources of spammers to be redirected towards meaningful research. To validate the efficacy of our approach, prototype implementations based on OpenCV and BOINC are described that demonstrate the ability to harvest spammer's resources for beneficial purposes.
|
478 |
Realizace spamového filtru na bázi umělého imunitního systému / Spam Filter Implementation on the Basis of Artificial Immune SystemsNeuwirth, David January 2009 (has links)
Unsolicited e-mails generally present a major problem within the e-mail communication nowadays. There exist several methods that can detect spam and distinguish it from the requested messages. The theoretical part of the masters thesis introduces the ways of detecting unsolicited messages by using artificial immune systems. It presents and subsequently analyses several methods of the artificial immune systems that can assist in the fight against spam. The practical part of the masters thesis deals with the implementation of a spam filter on the basis of the artificial immune systems. The project ends with comparison of effectiveness of the newly designed spam filter and the one which uses common methods for spam detection.
|
479 |
Community, Culture, and Change: Negotiating Identities in an Appalachian NewsroomZempter, Christina M. January 2018 (has links)
No description available.
|
480 |
Social manipulation och phishing : Vilka brister finns i dagens skydd och hur kan de förbättras?Barrios, Karolina, Tudose Fuentes, Amanda January 2019 (has links)
Företag och privatpersoner i dagens samhälle måste skydda sig mot olika typer av cyberattacker. Attackerna finns i olika former där phishingattacker är ett av de vanligaste säkerhetsproblemen som både privatpersoner och företag står inför för att hålla sin information säker. Hackare använder e-post, sociala medier, telefonsamtal, SMS och andra former av kommunikation de kan för att stjäla värdefull information som lösenord, kreditkortsnummer eller annan känslig information. Företag är särskilt en måltavla och det uppskattas att cyberattacker kostar den globala ekonomin 500 miljarder dollar per år, där phishing står för 90 % av det. Idag läggs nästan allt ut på nätet och säkerheten för personlig information är ständigt i riskzonen. Phishing kan ses som ett av de äldsta och enklaste sätten att stjäla information från människor. Det har också ett enkelt tillvägagångssätt eftersom angriparen skickar ett e-postmeddelande till ett offer, och offret går in på en falsk webbplats och ger angriparen personlig information. Allt utan att inse vad man har gjort. Denna rapport försöker hitta de brister som finns i de skydd som används mot phishing och hur de kan förbättras för att förhindra en phishingattack. Man försöker också titta på om det finns något skydd eller kombination av skydd som ger bättre skydd. Rapporten delar resultatet i olika kategorier – maskininlärning, nätverkslösningar, utbildning, heuristiska lösningar samt toolbars och plugins. Slutsatsen i detta arbete är att det inte finns något enkelt svar för hur man bäst skyddar sig men att kombinationen av utbildning och tekniska lösningar är att föredra. Ett teknisk skydd i sig själv kan minska risken för att få ett phishingmeddelande, men om meddelandet kommer fram måste det finnas kunskap i att se skillnad på ett legitimt e-postmeddelande och ett falskt. Denna studie visar också att alla skydden har brister i sig och att det på så sätt finns förbättringar som kan göras. / Companies in todays society must protect themselves against different types of cyber attacks. Since the attacks come in different forms, phishing attacks are one of the most common security issues that both individuals and companies face in keeping their information secure. Hackers are using email, social media, phone calls, SMS and any form of communication they can to steal valuable data like passwords, credit card numbers, or other sensitive information. Companies are particularly a target and it is estimated that cyberattacks cost the global economy 500 billion dollars per year, where phishing stands for 90% of that number. Today, everything is put online and the safety of personal credentials is at risk. Phishing can be seen as one of the oldest and easiest ways of stealing information from people. It also has a simple approach as the attacker sends an email to a victim, and the victim enters a fake website and gives the attacker personal information. All without realizing it. This report attempts to identify the deficiencies found in the protections used against phishing and how they can be improved to prevent a phishing attack. They also try to look for any protection or combination of protection that provides better protection. The reports divides the solution in different categories - machine learning, network solutions, education, heuristic solutions and toolbars and plugins. The thesis shows the flaws and improvements in the different solutions. The conclusion in this thesis is that there is no simple answer but that the combination of education and technical solution may be the best one. Technical protection itself can reduce the risk of getting a phishing email, but if the email arrives, there must be awareness and knowledge in how to see the difference between a legitimate email and a phishing email.
|
Page generated in 0.0622 seconds