National Repository of Grey Literature 4 records found  Search took 0.01 seconds. 
The analysis of TOR’s hidden service
Mesík, Vladimír ; Burda, Karel (referee) ; Rosenberg, Martin (advisor)
This work deals with problems concerning anonymity in the internet age, the principle of onion routing, Tor network, Tor’s Hidden Service protocol. Analyzing security, anonymity and the possibility of Hidden Services deanonymisation, revealing the actual IP address of hidden service server. It describes selected types of attacks against Tor network in order to deanonymisation of nodes and hidden services. The practical part describes the process of installing and configuring hidden services under Linux. The final part of the practical part is operational and running .onion hidden service with anonymous service for file storing and sharing. Part of the work is the development of two laboratory tasks aimed at the server configuration and its security.
The Analysis of the Affiliate System in a Chosen Company and Proposals for its Improvements
Mesík, Vladimír ; Blažek, Ľubomír (referee) ; Chlebovský, Vít (advisor)
Diplomová práca sa zaoberá províznym marketingom vo vybranej spoločnosti. Poukazuje na špecifiká a fungovanie Českého affiliate trhu a porovnáva teoretické poznatky so skutočnosťou. Hlavným prínosom práce je komplexný návrh provízneho programu za účelom zvýšenia efektívnosti.
The Analysis of the Affiliate System in a Chosen Company and Proposals for its Improvements
Mesík, Vladimír ; Blažek, Ľubomír (referee) ; Chlebovský, Vít (advisor)
Diplomová práca sa zaoberá províznym marketingom vo vybranej spoločnosti. Poukazuje na špecifiká a fungovanie Českého affiliate trhu a porovnáva teoretické poznatky so skutočnosťou. Hlavným prínosom práce je komplexný návrh provízneho programu za účelom zvýšenia efektívnosti.
The analysis of TOR’s hidden service
Mesík, Vladimír ; Burda, Karel (referee) ; Rosenberg, Martin (advisor)
This work deals with problems concerning anonymity in the internet age, the principle of onion routing, Tor network, Tor’s Hidden Service protocol. Analyzing security, anonymity and the possibility of Hidden Services deanonymisation, revealing the actual IP address of hidden service server. It describes selected types of attacks against Tor network in order to deanonymisation of nodes and hidden services. The practical part describes the process of installing and configuring hidden services under Linux. The final part of the practical part is operational and running .onion hidden service with anonymous service for file storing and sharing. Part of the work is the development of two laboratory tasks aimed at the server configuration and its security.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.