11 |
Mitteilungen des URZ 4/2009Müller, Thomas, Richter, Frank, Riedel, Wolfgang, Ziegler, Christoph, Martin, Jan 01 December 2009 (has links)
Informationen des Universitätsrechenzentrums
|
12 |
Dienstbar - aber sicherSchreiber, Alexander 20 March 2000 (has links)
Der Server ist am Netz und läuft, ftp-Anfragen
werden beantwortet, http-requests sind kein
Problem, alles ist bestens - solange keine
ungebetenen Gäste kommen.
Der Vortrag behandelt die Maßnahmen, die ein
Systembetreiber ergreifen kann oder soll, um
sich gegen einige der gebräuchlichen Attacken zu
wappnen. Es wird die Gratwanderung zwischen der
Forderung nach hoher Sicherheit einerseits und
voller Funktionalität vieler Internet-Dienste
andererseits beschrieben.
|
13 |
Secure WebServerNeubert, Janek 01 July 2004 (has links)
Beschreibung und Implementierung einer Lösungsvariante für den sicheren Einsatz von OpenAFS, Apache und serverseitigen Skriptsprachen wie PHP oder PERL in Multiuserumgebungen.
|
14 |
Bezpečnostní systém pro eliminaci útoků na webové aplikace / Security System for Web Application Attacks EliminationVašek, Dominik January 2021 (has links)
Nowadays, botnet attacks that aim to overwhelm the network layer by malformed packets and other means are usually mitigated by hardware intrusion detection systems. Application layer botnet attacks, on the other hand, are still a problem. In case of web applications, these attacks contain legitimate traffic that needs to be processed. If enough bots partake in this attack, it can lead to inaccessibility of services provided and other problems, which in turn can lead to financial loss. In this thesis, we propose a detection and mitigation system that can detect botnet attacks in realtime using statistical approach. This system is divided into several modules that together cooperate on the detection and mitigation. These parts can be further expanded. During the testing phase, the system was able to capture approximately 60% of botnet attacks that often focused on spam, login attacks and also DDoS. The number of false positive addresses is below 5%.
|
15 |
Mitteilungen des URZ 2/2011Clauß, Matthias, Heik, Andreas, Richter, Frank, Riedel, Wolfgang 20 June 2011 (has links) (PDF)
Informationen für URZ-Nutzer, in dieser Ausgabe speziell zur Umstellung der Systemsoftware zentral administrierter Computer sowie zu Sicherheitsfragen für Webserver und E-Mail
|
16 |
Systém řízení akvária s WWW serverem / Microcontroller based aquarium control system with WWW serverVečeřa, Jaroslav January 2013 (has links)
This thesis is focused on design and commissioning of appliance for operating and status display in the aquarium. The first part of the thesis deals with the possibilities of solving particular problems of the system and defines the requirements which the system has to fulfil. The next section of the thesis describes design of hardware part of the system and its software.
|
17 |
Mitteilungen des URZ 4/2009Müller, Thomas, Richter, Frank, Riedel, Wolfgang, Ziegler, Christoph, Martin, Jan 01 December 2009 (has links)
Informationen des Universitätsrechenzentrums:Sicherheit der zentralen Webserver
PROWeb-Dienst erneuert
Windows 7
Versionsverwaltung mit SVN
Kurzinformationen:
Speicherdienste: Senkung der Kostenbeteiligung,
Erneuerung Drucktechnik in Campusbibliotheken,
Sehbehinderten-Arbeitsplatz in der UB,
Neue PC-Technik in den Campusbibliotheken
Software-News:
Softwarebedarf in Pools für 2010 anmelden,
KISSsoft Studentenlizenzen,
Neue Handbücher eingetroffen
|
18 |
Webserver-Techniken (eingebettete Interpreter mod_perl, mod_dtcl ...)Schmidt, Jürgen 08 May 2000 (has links)
Gemeinsamer Workshop von Universitaetsrechenzentrum und
Professur Rechnernetze und verteilte Systeme (Fakultaet fuer
Informatik) der TU Chemnitz.
Workshop-Thema: Infrastruktur der ¨Digitalen Universitaet¨
Es gibt viele Möglichkeiten, dynamische Web Inhalte zu erzeugen.
Dieser Vortrag soll einen Überblick über Erweiterungsmöglichkeiten
auf der Serverseite geben. Mit Hinblick auf Performance werden im
Vergleich zum CGI eingebettete Interpreter beleuchtet und spezielle
Scriptsprachen wie PHP,Perl oder Tcl genannnt.
|
19 |
ENHANCING SECURITY IN DOCKER WEB SERVERS USING APPARMOR AND BPFTRACEAvigyan Mukherjee (15306883) 19 April 2023 (has links)
<p>Dockerizing web servers has gained significant popularity due to its lightweight containerization approach, enabling rapid and efficient deployment of web services. However, the security of web server containers remains a critical concern. This study proposes a novel approach to enhance the security of Docker-based web servers using bpftrace to trace Nginx and Apache containers under attack, identifying abnormal syscalls, connections, shared library calls, and file accesses from normal ones. The gathered metrics are used to generate tailored AppArmor profiles for improved mandatory access control policies and enhanced container security. BPFtrace is a high-level tracing language allowing for real-time analysis of system events. This research introduces an innovative method for generating AppArmor profiles by utilizing BPFtrace to monitor system alerts, creating customized security policies tailored to the specific needs of Docker-based web servers. Once the profiles are generated, the web server container is redeployed with enhanced security measures in place. This approach increases security by providing granular control and adaptability to address potential threats. The evaluation of the proposed method is conducted using CVE’s found in the open source literature affecting nginx and apache web servers that correspond to the classification system that was created. The Apache and Nginx containers was attacked with Metasploit, and benchmark tests including ltrace evaluation in accordance with existing literature were conducted. The results demonstrate the effectiveness of the proposed approach in mitigating security risks and strengthening the overall security posture of Docker-based web servers. This is achieved by limiting memcpy and memset shared library calls identified using bpftrace and applying rlimits in 9 AppArmor to limit their rate to normal levels (as gauged during testing) and deny other harmful file accesses and syscalls. The study’s findings contribute to the growing body of knowledge on container security and offer valuable insights for practitioners aiming to develop more secure web server deployments using Docker. </p>
|
20 |
CheckMate : Remote Arduino powered chess / Trådlöst Arduino drivet schackERICSON, JOAKIM, WESTERMARK, ADAM January 2020 (has links)
Board games are on the rise and chess is no exception. However, in an increasingly digitalized world these board games lack something in comparison to digitalized games, being able to play with anyone anywhere. This project aimed to combine these two worlds by being a physical game of chess where one could play against an opponent from far away. CheckMate is a robot consisting of an acrylic frame and various electronic components, such as an electromagnet, two stepper motors, a Hall eect sensor and a WiFi module. The electromagnet and Hall eect sensor were able to move using a belt and pulley system. This allowed magnetic pieces to be identified and dragged across the board. The board then communicated the location of all the pieces on the board, using Wifi, to an website that also kept track on whose turn it was. The result of this project was a robot that was able to perform all the moves necessary on the chessboard as well as communicating to the website. When moving a piece from one location to another the piece repelled other pieces on its way. However, this was deemed to be acceptable since the pieces were not moved too large of a distance for the electromagnet to attract them when moved into its square. One move that the robot was not able to perform was castling. The results can therefore bee seen as a starting point toward further developments. / Brädspels popularitet stiger och schack är inget undantag. Dock saknar brädspel de digitala spelens möjlighet att spela med vem som helst varsomhelst. Detta projekt ville bygga över klyftorna mellan dessa två världar genom att vara ett fysiskt schackspel med de digitala spelens möjligheter. CheckMate är en robot byggd av akrylplast och diverse elektroniska komponenter sådan som en elektromagnet, två stegmotorer, en halleektsensor och en WiFi-modul. Elektromagneten och halleektsensorn förflyttades via ett system av kuggremmar drivet av stegmotorerna. Elektromagneten användes för att flytta pjäserna på brädet medan halleektsensorn användes vid kartläggning av pjäsernas position på brädet. Brädet kommunicerade, via trådlöst nätverk, till en hemsida som användes för att spara och överföra pjäsernas positioner. Projektet resulterade i en robot som kunde göra alla motsvarande drag hämtat från hemsidan. Dock så repellerade en flyttande pjäs på de stationära pjäserna när den passerade. Detta ansågs dock vara acceptabelt då elektromagneten kunde föra tillbaka pjäserna när den befann sig i dess ruta. Något som projektet ej lyckades utföra var draget rockad. Resultatet av detta projekt kan ses som en startpunkt i en vidareutveckling eller en färdig produkt vid obesvärad spelning.
|
Page generated in 0.0617 seconds