Spelling suggestions: "subject:"hescs"" "subject:"hesis""
11 |
Metody ukládání uživatelských hesel v operačních systémech / Password deposition techniques in operating systemsPavlík, Martin January 2009 (has links)
This master thesis deals with ways to store passwords in current operating systems. Specifically, this work focuses on Windows, Linux, BSD and OS X. These systems are examined for ways of hashing passwords and on resistance of resulting hashes against various attacks. First (theoretical) section describes the procedures and algorithms that are needed for user authentication. This part also describes methods of hash storing. At the end of the theoretical part are generally described some possible attacks against hash functions. In second (practical) part is described and tested tools for obtaining hashes of the investigated operating systems. Subsequently practical attacks were conducted against obtained hashes by using appropriate tools. Furthermore there are presented results of the attacks. In the conclusion of the work there is a comparison of tools and methods which were used to obtain plaintext passwords from operating systems.
|
12 |
Ochrana proti distribuovaným útokům hrubou silou / Distributed Brute Force Attacks ProtectionRichter, Jan January 2010 (has links)
This project deals with analysis of brute force attacks focused on breaking authentication of common services (especially ssh) of Linux and xBSD operating systems. It also examines real attacks, actual tools and ways of detection of theese attacks. Finaly there are designed new mechanisms of coordination and evaluation of distributed brute force attacks in distributed environment. These mechanisms are then implemented in distributed system called DBFAP.
|
13 |
Korpusová analýza adjektivních afixoidů a jejich lexikografické zpracování v dvoujazyčných německo-českých slovnících / Corpus analysis of adjectiv affixoids and their lexicographical processing in Czech-German dictionariesKoptík, Tomáš January 2014 (has links)
This thesis demonstrates the necessity of inventarisation of word-formation components in the bi-lingual dictionaries, taking adjective affixoids as an example. Describing the hands-on approach to addition of these word-formation components into the upcoming Large German-Czech Academic Dictionary, it points to the issues arising in connection with the inventarisation itself.
|
14 |
K problematice kolokability u adjektivních vstupů ve Velkém německo-českém akademickém slovníku (VNČAS) / On Collocation Problems in Adjective Entries. Problematic Cases in the Large German-Czech Academic DictionaryOliva, Jakub January 2012 (has links)
The aim of the given work was to point out the problems of the collocability of german adjectives in dictionaries and on the basis of the executed analysis to suggest possible solutions which could be exploited in the entries. The primary information sources were the german dictionary Duden and the german-czech dictionary Siebenschein, the secondary ones were the internet corpus DeReKo and the web search engine Google. The dictionary collocations should not be chosen by the criterion of their quantity, but by the criterion of their usefulness. They should exemplify the differences between both languages and they should be used as the assure instance for the dictionary user.
|
15 |
Návrh změn identity managementu v podniku / Company Identity Management Changes ProposalHruška, David January 2018 (has links)
This diploma thesis focuses on the proposal to implement changes of identity management into a particular company. In the theoretical part are the basic concepts and a detailed description of the identity management. There is also described an analysis of the current state of information security in the company, risk analysis and selection of measures to minimize the risks found. At the end of this thesis are proposed changes, their procedure and timetable for implementation of selected measures.
|
16 |
Bezpečnostní rizika sociálních sítí a jejich prevence / Security risks of social networks and their preventionNguyen, Sao Linh January 2018 (has links)
This diploma thesis deals with the issue of security risks and threats of social networks. The work includes basic information about the most popular online social networks such as Facebook, Twitter and Instagram. The work analyzes the development and use of the above mentioned networks. In addition, there are the risks and dangers of communicating on social networks and recommendations for safe use.
|
17 |
Užití techniky lámání hesel u komprimačních formátů RAR, ZIP a 7z a extrakce hesel z samorozbalovacích archivů / Analysis of the Possibility of Password Break through for RAR, ZIP and 7z FormatsPrustoměrský, Milan January 2013 (has links)
This Thesis deals with analysis of the possiblity of password breakthrough for common compression formats and password extraction from self-extraction archives used for malicious software. Structure of compression programs, ciphers and connection between cipher and archives is described. Common and specialized attacks on archives and ciphers are described. Structure of self-extracting archives and password location is used to create extractor of passwords in self-extracting archives.
|
18 |
Syntax složených adjektiv v překladovém slovníku / Syntax of Adjective Compounds in a Bilingual DictionarySchmidtová, Iva January 2013 (has links)
The aim of the given thesis is to expound the problem of syntax processing by creating adjectival compounds in dictionary entries for the Large German-Czech Academic Dictionary. Assuming that exactly these words, which belong to the complicated vocabulary items, cause difficulties for foreign speakers with text comprehension and text production. It is based on the nature of German language, which makes many compounds, as opposed to in Czech language. Not only are the meanings of these words revealed to be problematic, but also their usage. The thesis is divided into two parts. The theoretical part deals with characteristics of adjectives as word class, and because each word always has its context, attention will be primarily focused on the adjectival valency. Previously, only the valency of verbs and substantives has been discussed. When a native speaker automatically knows these syntax structures and even when, in case of foreign language, there could exist structural similarities between the source and target language, the structures ought consequently to be given in the dictionary. In some mono- or bilingual dictionary the user should find complex informations for word searched. The practical part involves analysis of ten chosen adjective compounds, which shows how the valency structures are...
|
Page generated in 0.0286 seconds