1 |
Implementace IMAP v C++ / IMAP Implementation in C++Pohl, Marek January 2010 (has links)
This thesis has focused on development of library of IMAP network protocol in C++ programming language. This work has focused on design and on interface of the library. Object design of this library is based on analysis of the IMAP protocol. Developed library contains implementation of a client and server part of the IMAP protocol. This work shows also the another IMAP libraries and evaluates pros and cons of the different solutions. Security of a network transfer is explained here in this thesis. This work deals with authentication methods, which are used to protect user credentials during authentication process. Created library can be easily used by software developers to develop an applications like an email client program and IMAP mail server. Part of this work has focused on testing of this developed library.
|
2 |
Detekce slovníkových útoků na síťové služby analýzou IP toků / Detection of Dictionary Attacks on Network Services Using IP Flow AnalysisČinčala, Martin January 2015 (has links)
Existing research suggests that it is possible to detect dictionary attacks using IP flows. This type of detection was successfully implemented for SSH, LDAP and RDP protocols. To determine whether it is possible to use the same methods of detection for e-mail protocols virtual test environment was created. I deduced the characteristics of attacks in flows from the data, which I gained from this virtual environment. Than I chose the statistical value that separates the attacks from legitimate traffic. Variance of specific flow parameters was chosen as main characteristic of attacks. IP addresses with flows that have small variance of chosen parameters and high frequency of packet arrival are considered untrustworthy. Variance is calculated from IP history to rule out false positives. The IP history of legitimate user contains variation of flows which prevents marking this IP address as dangerous. On the basis of this principal the script, which detects the attacks from the nfdump output, was created. The success of detection of the attacks was tested on classificated data from the real environment. The results of tests showed, that with good configuration of marginal values the percentage of detected attacks is high and there are no false positives. Detection is not limited only on mail protocols. With regard to universal design, the script is able to detect dictionary attacks on SSH, LDAP, SIP, RDP, SQL, telnet and some other attacks.
|
3 |
Detekce a analýza přenosů využívajících protokoly SSL/TLS / Traffic detection and analysis using SSL/TLSHutar, Jan January 2017 (has links)
This diploma thesis deals with a detection and analysis of secure connections of electro- nic communication through SSL/TLS protocols. The thesis begins with introduction to SSL/TLS protocols. Thereafter, an analysis of messages used to establish secure con- nections using STARTTLS and postal protocols SMTP, POP3, and IMAP was made. Metadata detection and extraction of secured simplex and duplex connections take place using deep packet inspection tools. The tool of choice is the nDPI library from the Ntop project. The library was extended to detect the connections and extract the metadata based on studies and analysis of transmitted messages. Finally, testing is performed on a training data set and a basic analysis of acquired metadata is made.
|
4 |
IMAP extension for mobile devices / IMAP extension for mobile devicesKundrát, Jan January 2012 (has links)
With the mass availability of smartphones, mobile access to e-mail is gaining importance. Over the years, the IMAP protocol has been extended with many features ranging from extensions adding new functionality to those improving efficiency over an unreliable network. This thesis evaluates the available extensions based on their suitability for use in the context of a mobile client. Three new extensions have been developed, each improving the protocol in a distinct way. The thesis also discusses how most of these extensions were implemented in Trojitá, the author's free software open source IMAP e-mail client.
|
5 |
Storied beliefs : looking at novice elementary teachers' beliefs about teaching and learning mathematics through two different sources, math stories and the IMAP surveyLoPresto, Kevin Daniel 28 April 2015 (has links)
This study examined the relationship between beliefs found using the Integrated Mathematics and Pedagogy (IMAP) project beliefs survey and the beliefs found in math stories of eight novice (less than two years teaching) elementary school teachers. The stories were coded for the same beliefs used in the IMAP survey. As in the IMAP survey, the strength of evidence of the belief was assigned numerical values, zero through three, indicating virtually no evidence to very strong evidence respectively. Results showed that specific beliefs could be found in math stories, yet not always at the same level of strength as the IMAP survey. This indicates that each conveys differing views on the teachers' beliefs, and thus provides more detailed pictures of the teachers' beliefs. The details include a sense of the trajectory of development of teachers' beliefs from student to teacher that the IMAP survey does not. The math stories also provide evidence of the role of emotion in the formation and entrenchment of beliefs. / text
|
6 |
Systém pro automatické vyhodnocení e-mailových zpráv / System for automatic evaluation of email messagesFrkal, Jan January 2014 (has links)
This diploma thesis deals with the design and realisation of system for automatic evaluation of e-mail messages. The system works with PHP language and MySQL database. It also allows automatic synchronisation. During the synchronisation e-mail messages are downloaded and saved using IMAP or POP3 protocol. Subsequently, the messages are analysed. During the analysis the reports are classified into types, according to pre-defined keywords. The system also works with black lists and white lists. If the sender of an e-mail is during the synchronisation found in the blacklist, that e-mail will be skipped. On the contrary, if the sender of an e-mail is found within the white list, that e-mail will be excluded from keyword matching and from the list is type and category loaded. Most of the values from the carried out evaluation of the e-mails can be clearly seen in advanced statistics. Pie charts and numerical statistics are available. Access to the system is protected by a login. Therefore, login can only registered users.
|
7 |
GreenMail: Reducing Email Service’s Carbon Emission with Minimum CostLi, Chen 23 July 2013 (has links)
No description available.
|
8 |
Mitteilungen des URZ 2000Becher,, Clauß,, Heik,, Hübsch,, Müller,, Richter,, Riedel,, Schier,, Wolf,, Ziegler, 23 November 2000 (has links)
Inhalt:
Das CLIC-Projekt;
X2X - ein Werkzeug zur Darstellung von XML-Dokumenten;
Software-Bereitstellung;
Der Backupdienst des URZ;
Betreuung von Ausbildungspools durch das URZ;
Aktueller Netzausbauzustand;
Komfortablere E-Mail-Bearbeitung mit IMAP;
MagicPoint - Präsentationen unter Linux;
10 Jahre ¨UNIX-Stammtisch in Sachsen¨
|
9 |
Does Invasion Science Encompass the Invaded Range? A Comparison of the Geographies of Invasion Science Versus Management in the U.S.Munro, Lara 18 December 2020 (has links)
Biases in invasion science lead to a taxonomic focus on plants, particularly a subset of well-studied plants, and a geographic focus on invasions in Europe and North America. Geographic biases could also cause some branches of invasion science to focus on a subset of environmental conditions in the invaded range, potentially leading to an incomplete understanding of the ecology and management of plant invasions. While broader, country-level geographic biases are well known, it is unclear whether these biases extend to a finer scale and thus affect research within the invaded range. This study assessed whether research sites for ten well-studied invasive plants in the U.S. are geographically biased relative to each species’ invaded range. We compared the distribution, climate, and land uses of research sites for 735 scientific articles to manager records from EDDMapS and iMap Invasives representing the invaded range. We attributed each study to one of five types: impact, invasive trait, mapping, management, and recipient community traits. While the number of research sites was much smaller than the number of manager records, they generally encompassed similar geographies. However, research sites tended to skew towards species’ warm range margins, indicating that researchers have knowledge on how these plants might behave in a warming climate. For all but one species, at least one study type encompassed a significantly different climate space from manager records, suggesting that some level of climatic bias is common. Impact and management studies occurred within the same climate space for all species, suggesting that these studies focus on similar areas – likely those with the greatest impacts and management needs. Manager records were more likely to be found near roads, which are both habitats and vectors for invasive plants, and on public land. Research sites were more likely to be found near a college or university. Studies on these plants largely occur across their invaded range, however, different study types occur within a narrower climate range. This clustering can create gaps in our general understanding of how these plants interact with different environments, which can have important policy and management consequences.
|
10 |
Monitorování síťového provozu s identifikátory obsahujícími národní abecedy / International Alphabets in Network Traffic MonitoringTalašová, Irena January 2018 (has links)
This work deals with the implementation of support for network identifiers containing national characters in the SProbe software project, which is designed to monitor network flows. It was necessary to test and evaluate the status of selected network applications working over SMTP, POP3, IMAP, FTP or SIP protocols. On the basis of the information obtained, an extension of the current software project SProbe was proposed - a module to support network traffic monitoring with national alphabet characters. The proposed solution was then implemented and the functionality of the entire resulting system was tested. In addition, this work proposes and implements a modification of the test environment for faster and more efficient testing of the system focusing on tests containing diacritics.
|
Page generated in 0.0229 seconds