Spelling suggestions: "subject:"verver"" "subject:"cerver""
661 |
Pokročilé nasazení OS xBSD v síti pro střední školu / Using Advanced xBSD Based Servers for High SchoolZadina, Martin January 2007 (has links)
This work is about setting up Samba software on server with operating system from BSD family to primary domain controller rule in the high school computer network environment with Microsoft Windows stations. After introduction to Samba software there is examined problem of Windows network based on SMB protocol. There are described steps that are necessary to setup Samba software, disk sharing services, creation of user accounts and adding client stations to domain trust. At the next there is described problematic of network printing in the Windows environment, print servers and the solution with classical printing support in FreeBSD and CUPS printing support. In the next part there is described mass installation procedure of Windows stations with same hardware configuration. At the finish, there are noticed some tasks that are necessary for next operation of installed system.
|
662 |
Web-based prototype for protecting controllers from existing cyber-attacks in an industrial control system / Webbaserad prototyp för att skydda styrsystem från förekommande cyberattacker i ett industriellt kontrollsystemSanyang, Pa January 2020 (has links)
Industrial control system or ICS is a critical part of the infrastructure in society. An example of ICS is the rail networks or energy plants like the nuclear plant. SCADA is an ICS system following a hierarchical structure. Due to the fact that a control system can be very large, monitoring remote through networks is an effective way to do so. But because of digitalization ICS or SCADA systems are vulnerable to cyber attacks that can hijack or intercept network traffic or deny legitimate user services. SCADA protocols (e.g. Modbus, DNP3) that are prone to get attacks due to not being a secure protocol make a SCADA system even more vulnerable to attacks. The paper focuses on how to best protect the network traffic between an HMI as the client and a different controller as the server from attacks. The proposed solution, the prototype, is based on the reverse proxy server setup to protect controllers from the external network traffic. Only the reverse proxy server, or gateway server, can forward a client request to the intended controller. The gateway server, a web-based solution, will be the additional security layer that encrypts the payload in the application layer using TLS version 1.2 by using HTTPS protocol, thereby protect from usual security threats. The prototype went through a penetration testing of MITM (Based on ARP-poisoning), SYN flooding, slow HTTP POST attacks. And the result indicated that the prototype was vulnerable to SYN flooding and the network traffic was intercepted by the MITM. But from the Confidentiality-Integrity-Availability (C.I.A) criteria, the prototype did uphold the integrity and confidentiality due to the TLS security and successful mitigation of certain attacks. The results and suggestions on how to improve the gateway server security were discussed, including that the testing was not comprehensive but that the result is still valuable. In conclusion, more testing in the future would most likely showcase different results, but that will only mean to better the security of the gateway server, the network that the client and gateway server runs in and the physical security of the location where the client and gateway server is located. / Industrial Control System (ICS, sve. Industriella Kontrollsystem) är en kritisk del av infrastrukturen i samhället. Ett exempel på ICS är järnvägsnät eller energianläggningar som kärnkraftverket. SCADA är ett ICS-system som följer en hierarkisk struktur. Eftersom ett kontrollsystem kan täcka stora ytor är fjärrövervakning och fjärrstyrning via nätverk ett effektivt sätt att göra det på. Men på grund av digitalisering är ICS- eller SCADA-system sårbara för cyberattacker som kan kapa nätverkstrafik eller förneka legitima användare från att nå vissa tjänster. SCADA-protokoll (t.ex. Modbus, DNP3) som är benägna att få attacker på grund av att de inte är ett säkert protokoll gör SCADA-system ännu mer sårbart för attacker. Uppsatsen fokuserar huvudsakligen på hur man bäst skyddar nätverkstrafiken mellan en HMI som klient och en annan controller som servern från attacker. Den föreslagna lösningen, prototypen, är baserad på hur en reverse proxy server är uppsatt för att skydda styrenheter från den externa nätverkstrafiken. Endast reverse proxy servern eller gateway-servern kan vidarebefordra en begäran från en klient till den avsedda styrenheten. Gateway-servern, en webbaserad lösning, kommer att vara det extra säkerhetslagret som krypterar nyttolasten (eng. payload) i applikationslagret med TLS version 1.2 med hjä lp av protokollet HTTPS, och därmed skyddar mot de mest förekommande säkerhetshot som vill se och påverka skyddad information. Prototypen genomgick en penetrationstestning av MITM (Baserat på ARP-poisoning), SYN-flooding, slow HTTP POST-attacker. Och resultatet indikerade att prototypen var sårbar för SYN-flooding och nätverkstrafiken avlyssnades genom MITM. Men baserad på kriterierna för C.I.A (sve. Konfidentialitet, Integritet och Tillgänglighet) upprätthöllprototypen integriteten och konfidentialiteten på grund av säkerhetsprotokollen TLSv1.2 och framgångsrika minskningar av vissa attacker. Resultaten och förslag på hur man kan förbättra prototypen diskuterades, inklusive att testningen inte var omfattande men att resultatet fortfarande är värdefullt. Sammanfattningsvis skulle fler tester i framtiden sannolikt visa ett helt annat resultat, men det kommer bara att innebära att förbättra säkerheten för gateway-servern, nätverket som klienten och gateway-servern kör i och den fysiska säkerheten för platsen där klienten och gateway-servern befinner sig inom.
|
663 |
Utveckling av en webbapplikation för bokning av testresurser : Applikationsutveckling i React och Node.js / Development of a web application for booking test resources : Application development in React and Node.jsAl Sabbagh, Madian, Al Sabbagh, Luay January 2023 (has links)
The web application Testpersonbokaren is used by Nordic Medtest to book fake test persons for various actors in healthcare so that they can test and validate their environments without being dependent on real personal data. The purpose of this project is to develop a new version of Testpersonbokaren with new technologies and frameworks as the existing version has several problems and limitations. This was achieved by creating a Node.js server and developing two new web interfaces for Testpersonbokaren, where one is only used by Nordic Medtest and the other is used by Sweden's regions, municipalities and private actors. Both web interfaces are developed with the React framework. The new Testpersonbokaren has a more modern look and more functionality than the old one. Unlike the old version, the new one has good documentation, which makes the further development of the web application easier. The new Testpersonbokaren is ready to be put into operation at Nordic Medtest. / Webbapplikationen Testpersonbokaren används av Nordic Medtest för att boka påhittade testpersoner åt olika aktörer inom hälso- och sjukvården så att de kan testa och validera sina miljöer utan att vara beroende av riktiga personuppgifter. Syftet med detta projekt är att utveckla en ny version av Testpersonbokaren med nya tekniker och ramverk då den befintliga versionen har flera problem och begränsningar. Detta uppnåddes genom att skapa en Node.js-server och utveckla två nya webbgränssnitt för Testpersonbokaren, där det ena endast används av Nordic Medtest och det andra används av Sveriges regioner, kommuner och privata aktörer. Båda webbgränssnitten är framtagna med React-ramverket. Den nya Testpersonbokaren har ett modernare utseende och mer funktionalitet än den gamla. Till skillnad från den gamla versionen har den nya bra dokumentation vilket underlättar vidareutvecklingen av webbapplikationen. Den nya Testpersonbokaren är redo att sättas i drift hos Nordic Medtest.
|
664 |
Разработка информационной системы для управления рисками деятельности организации Электро+ : магистерская диссертация / Development of an information system for risk management of the Electro+ organizationБабушкина, В. В., Babushkina, V. V. January 2022 (has links)
Исходя из актуальности, что управленческая деятельность всегда связана с риском, целью выпускной квалификационной работы была выбрана разработка информационной системы для управления рисками в организации Электро+. В соответствии с целью и темой работы, были поставлены следующие задачи: провести анализ тематической научно-методической литературы; описать деятельность организации Электро+; провести квалификацию возможных рисков; создать системы учета событий реализации рисков; спроектировать базу данных учета рисков; установить предложения по дальнейшему использованию базы данных для управления рисками. Как результат были выдвинуты предложения по дальнейшему использованию базы данных для противодействия рискам. А также представлены предложения по дальнейшей интеграции в информационную систему компании OZON. / Based on the relevance that managerial activity is always associated with risk, the purpose of the final qualification work was chosen to develop an information system for risk management in the Electro+ organization. In accordance with the purpose and topic of the work, the following tasks were set: to analyze the thematic scientific and methodological literature; to describe the activities of the Electro+ organization; to qualify possible risks; to create systems for recording events of risk realization; to design a database of risk accounting; establish proposals for further use of the database for risk management. As a result, proposals were put forward for the further use of the database to counteract risks. Proposals for further integration into the OZON information system are also presented.
|
665 |
Prototyping and manufacturing of air-controlled damper unit to improve cooling system operating efficiency for data centersNilsson, Peter January 2023 (has links)
More and more people are using the internet for data processing, transfer, and storage. With it comes a higher demand for computational power from data servers. Unsurprisingly, the data center industry is becoming an increasingly large industry that is important for people’s daily lives. Data centers cover 2 % of the world’s total electrical consumption and this number is expected to become higher. Running data centers with optimal performance while operating efficiently and as sustainably as possible is a task that is of utmost importance.The way data centers are cooled today is through a CRAH unit that features cooling coils and a fan, the fan blows air over cold coils to prevent damage to server components. Another task for this fan is to create a high differential pressure over the servers using this air, to ensure the air flows in the right direction. The air is uniformly distributed over the servers. With dynamic air-handling measures, it is possible to match the cooling for individual servers, because all servers have different workloads. They generate different amounts of heat. This thesis investigates manual redistribution between servers and how an air-handling damper unit, that sits on the server, is designed to investigate how it can reduce total power draw. Different tests are run in a wind tunnel which houses room for six servers whereas three prototypes are mounted on three of the servers. The main idea to test is that instead of running an even amount of stress on six servers, the same amount of stress is redistributed on only three servers. The ones now running idle have a damper unit blocking the server's rear side. That way the CRAH fan is using less power to create the same differential pressure. Also, the total power draw to all servers is reduced as well. One of the tests was the conventional way of cooling servers today and it had a total power draw of 1362 watts. The test with both redistribution, dampers closed at the rear and turned off servers had a power draw of 951 watts. That is a 30% decrease.
|
666 |
Pathways to servers of the futureLehner, Wolfgang, Nagel, Wolfgang, Fettweis, Gerhard 11 January 2023 (has links)
The Special Session on “Pathways to Servers of the Future” outlines a new research program set up at Technische Universität Dresden addressing the increasing energy demand of global internet usage and the resulting ecological impact of it. The program pursues a novel holistic approach that considers hardware as well as software adaptivity to significantly increase energy efficiency, while suitably addressing application demands. The session presents the research challenges and industry perspective.
|
667 |
Utveckling av webbaserat blixtdetekteringssystem / Development of a web-based lightning detection systemAl Sayfi, Anhar, Kufa, Max January 2016 (has links)
In this paper we suggest a lightning detection system capable of warning a local populous of incoming lightning weather using a combination of the AS3935 sensor and the one-board-computer Raspberry Pi, in an attempt to design a product that is cheap, mobile and easy to use. The product is composed of a sensor net that registers and reports lightnings on a webserver. The server is reachable as a normal website based on the LAMP method. The project reached a stadium which should satisfy a “proof of concept”, however, the product is far from complete, as it lacks the necessary algorithms needed for proper data computation. The current system only uses Raspberry pi, but it is theoretically possible to introduce other hardware to the system, but the current developed product does not support such functionality. / I den här rapporten föreslår vi ett blixtlokaliseringssystem kapabelt att varna lokal befolkningen om inkommande blixtväder med hjälp av en kombination av sensorn AS3935 och enchipsdatorn Raspberry Pi, i ett försök att skapa en produkt som är billig, mobil och användarvänlig. Systemet består av ett nät av sensorer som registrerar och rapporterar blixtaktivitet på en webbserver. Servern är nåbar som en vanlig hemsida som är byggd enligt LAMP metoden. Projektet har nått ett stadium som borde uppnå kraven för ett ”bevis av ett koncept”, men produkten är långt ifrån färdig, då den saknar de nödvändiga algoritmerna som krävs för ordentlig databehandling. Det nuvarande systemet använder sig enbart av Rasberry Pi:s, men i teorin vore det fullt möjligt att introducera ny hårdvara i nätet, men den nuvarande produkten stöder inte sådan funktionalitet.
|
668 |
OPERATOR INTERFACES FOR CONTROLLING THE SERIAL STREAMING TELEMETRY CHANNEL VIA A COMMAND AND CONTROL LINKLaird, Daniel T. 10 1900 (has links)
ITC/USA 2007 Conference Proceedings / The Forty-Third Annual International Telemetering Conference and Technical Exhibition / October 22-25, 2007 / Riviera Hotel & Convention Center, Las Vegas, Nevada / The Central Test and Evaluation Incentive Program, (CTEIP) is developing Integrated Network Enhanced Telemetry (iNET) to extend serial streaming telemetry (SST) with a command and control link. Command link interfaces link remote Advanced Range Telemetry (ARTM) transmitters (Tx) and receivers (Rx), developed under the ARTM CTEIP project, via graphical user interfaces (GUI). The communication channel links the iNET Tx on a vehicle network (vNET) and the iNET Rx on a ground station network (gNET) via a single GUI. The command link is an essential part of the pending iNET Technology Demonstration.
|
669 |
Developing a concept for handling IT security with secured and trusted electronic connectionsHockmann, Volker January 2014 (has links)
In this day and age, the Internet provides the biggest linkage of information, personal data and information, social contact facilities, entertainment and electronic repository for all things including software downloads and tools, online books and technical descriptions, music and movies - both legal and illegal [Clarke, 1994]. With the increasing bandwidth in the last few years worldwide, it is possible to access the so-called "Triple-Play-Solutions" - Voice over lP, High-Speed-Internet and Video on Demand. More than 100 million subscribers have signed on across Asia, Europe, and the Americas in 2007, and growth is likely to continue steadily in all three. As broadband moves into the mainstream, it is reshaping the telecommunications, cable and Internet access industrie [Beardsley, Scott and Doman, Andrew, and EdinMC Kinsey, Par, 2003]. Cisco [Cisco, 2012], one of the biggest network companies, will expect more than 966 exabytes (nearly 1 zettabyte) per year or 80.5 exabytes per month in 2015 and the "Global IP traffic has increased eightfold over the past 5 years, and will increase fourfold over the next 5 years. Overall, IP traffic will grow at a compound annual growth rate (CAGR) of 32 percent from 2010 to 2015" . More and more types of sensible data flow between different recipients. News from around the world are transferred within seconds from the one end to the other end of the world, and affect the financial market, stock exchange [Reuters, 2012] and also bring down whole governments. For instance, worldwide humoil might ensue if a hacker broke into the web-server of an international newspaper or news channel like N-TV in Germany or BBC in England and displayed messages of a political revolution in Dubai or the death of the CEO from Microsoft or IBM.
|
670 |
XML-Based Agent Scripts and Inference MechanismsSun, Guili 08 1900 (has links)
Natural language understanding has been a persistent challenge to researchers in various computer science fields, in a number of applications ranging from user support systems to entertainment and online teaching. A long term goal of the Artificial Intelligence field is to implement mechanisms that enable computers to emulate human dialogue. The recently developed ALICEbots, virtual agents with underlying AIML scripts, by A.L.I.C.E. foundation, use AIML scripts - a subset of XML - as the underlying pattern database for question answering. Their goal is to enable pattern-based, stimulus-response knowledge content to be served, received and processed over the Web, or offline, in the manner similar to HTML and XML. In this thesis, we describe a system that converts the AIML scripts to Prolog clauses and reuses them as part of a knowledge processor. The inference mechanism developed in this thesis is able to successfully match the input pattern with our clauses database even if words are missing. We also emulate the pattern deduction algorithm of the original logic deduction mechanism. Our rules, compatible with Semantic Web standards, bring structure to the meaningful content of Web pages and support interactive content retrieval using natural language.
|
Page generated in 0.0495 seconds