National Repository of Grey Literature 60 records found  beginprevious41 - 50next  jump to record: Search took 0.00 seconds. 
Secure forms administration framework in PHP
Najbr, Ondřej ; Kacálek, Jan (referee) ; Malý, Jan (advisor)
Nowadays in the 21st century which is full of information technology constantly increase web servers with a number of Web applications and services for clients. In the future it is expected huge expansion of the services realized by way of the Internet. The main objective of the thesis was to design and develop an Internet application which would create the user-defined forms, and subsequently would be safely managed by using the database. In the first part of the Bachelor's thesis I deal with the theoretical introduction to the issue of security and administration forms. In the second part I describe the server configuration, structure and implementation of the programme in practice. Bachelor's thesis contains a description of the activity of the programme and a description of the used security.
Simulation of QoS models in Opnet IT Guru environment
Zapletal, Lukáš ; Molnár, Karol (referee) ; Kacálek, Jan (advisor)
The main goal of this work is description and following simulation of operating with support of QoS technology in OPNET IT Guru programme. The bachelor’s work contains a theoreticall description of providing the quality of service by force of integrated and differentiated services models and also of the MPLS protocol. The work is particularly focused on IntServ model and its reservation with assistance of the RSVP protocol. The simulation in OPNET IT Guru programme has also been included in the work. Process for constituent parameters setting-up and its characterization for both the models are described thoroughly in work’s supplement. As for the differentiated services, the simulation is performed by confrontation of a voice service in two scripts. In case of differentiated services the mechanisms for tagging of packets and the treatment method have been demonstrated on inside and border routers. Operating types are simulated in ftp, e-mail and voice applications. Verification of authenticity and validity results of objects setting-up is being performed by simulation in OPNET IT Guru environment, Academic Edition version 9.1. Grafical results have also been gained by the simulation.
Implementation and testing of MD5 hash algorithm
Legéň, Michal ; Kacálek, Jan (referee) ; Malý, Jan (advisor)
Hash functions are one of basic structural components of modern cryptography. Their task is to create unique bit order for entry information called message digests. This way the inevitable integrity of information is secured because data transferring via different transfer media may be altered during the transfer. They provide a possibility of fast and effective encryption of passwords because of one-way as well. The aim of this bachelor’s thesis is to analyse one of the most well-known hash functions MD5, to implement it in programming language, to analyse its security risks and to try to use practical exhibitions to the benefit of an attacker. The bachelor’s thesis is presenting theoretical and practical part on Implementation and testing of MD5 hash algorithm. The introduction of the work is devoted to the basics of cryptography, to explanation of the concept of hash function and its basic attributes. The chapter 3 is focussed on the analysis of algorithm MD5 itself. The following part describes its implementation in programming language C++. The last two parts are about problems of security and weak sides of hash algorithm MD5. On the basic of existance of first order collisions, there is in practical demonstration presented creating two different programmes with the same message digest. The final part belongs to description of implementations of attacks on one-way algorithm MD5 and comparisons of their time possibilities during getting original information on the basis of their message digests.
Attacks on active network elements
Ščepko, Richard ; Kacálek, Jan (referee) ; Polívka, Michal (advisor)
The bachelor thesis deals with the topic of the security of computer networks. The tasks of the bachelor thesis are the attacks on active network elements with the aim of the catching of data between two users. In the created structure with a stellate topology, the user stations have connect to the active element (switch). In the thesis, the individual ways of attacks and the significance of ARP proceedings to MAC addresses have describ. Several programmes have use in order to take control over the device. Due to a big amount of these active elements the source code of the programmes had to be alter. The work with the programmes ARPtool and ARPoison demanded the operational system Linux, in our case the distribution of Ubunt. The programme WinArpAttacker could be set off under the system Windows XP as well. The achieved results and the description of the practical part are discuss in detail in the summary of the thesis. The result is the catching communication with the help of the programme WireShark.
Network Element with Advanced Control
Zedníček, Petr ; Kacálek, Jan (referee) ; Škorpil, Vladislav (advisor)
The diploma thesis deal with finding and testing neural networks, whose characteristics and parameters suitable for the active management of network element. Solves optimization task priority switching of data units from input to output. Work is focused largely on the use of Hopfield and Kohonen networks and their optimization. Result of this work are two models. The first theory is solved in Matlab, where each comparing the theoretical results of neural networks. The second model is a realistic model of the active element designed in Simulink
Design and implementation of authentication method for accessing web service in .NET environment
Tenora, Lukáš ; Kacálek, Jan (referee) ; Dostál, Otto (advisor)
Work deals with the authentication methods for access to Web services. The first part of the authentication methods are explained and possible safety risks. The second part describes the design and implementation of custom authentication Web service environment.. NET
Optimization of Active Network Element Control
Přecechtěl, Roman ; Kacálek, Jan (referee) ; Škorpil, Vladislav (advisor)
The thesis deals with the use of neuronal networks for the control of telecommunication network elements. The aim of the thesis is to create a simulation model of network element with switching array with memory, in which the optimization kontrol switching array is solved by means of the neural network. All source code is created in integrated environment MATLAB. To training are used feed-forward backpropagation network. Miss achieve satisfactory result mistakes. Work apposite decision procedure given to problem and it is possible on ni tie up in an effort to find optimum solving.
Neural network utilization for etwork traffic predictions
Pavela, Radek ; Mačák, Jaromír (referee) ; Kacálek, Jan (advisor)
In this master’s thesis are discussed static properties of network traffic trace. There are also addressed the possibility of a predication with a focus on neural networks. Specifically, therefore recurrent neural networks. Training data were downloaded from freely accessible on the internet link. This is the captured packej of traffic of LAN network in 2001. They are not the most actual, but it is possible to use them to achieve the objective results of the work. Input data needed to be processed into acceptable form. In the Visual Studio 2005 was created program to aggregate the intensities of these data. The best combining appeared after 100 ms. This was achieved by the input vector, which was divided according to the needs of network training and testing part. The various types of networks operate with the same input data, thereby to make more objective results. In practical terms, it was necessary to verify the two principles. Principle of training and the principle of generalization. The first of the nominated designs require stoking training and verification training by using gradient and mean square error. The second one represents unknown designs application on neural network. It was monitored the response of network to these input data. It can be said that the best model seemed the Layer recurrent neural network (LRN). So, it was a solution developed in this direction, followed by searching the appropriate option of recurrent network and optimal configuration. Found a variant of topology is 10-10-1. It was used the Matlab 7.6, with an extension of Neural Network toolbox 6. The results are processed in the form of graphs and the final appreciation. All successful models and network topologies are on the enclosed CD. However, Neural Network toolbox reported some problems when importing networks. In creating this work wasn’t import of network functions practically used. The network can be imported, but the majority appear to be non-trannin. Unsuccessful models of networks are not presented in this master’s thesis, because it would be make a deterioration of clarity and orientation.
Centralised web-based personal data management system
Mazur, Kornel ; Kacálek, Jan (referee) ; Malý, Jan (advisor)
This diploma thesis deals with a central user identification and personal data management on the Internet. The first part analyzes questions of a identification process and discusses the requirements for implementation, security and user-friendliness. Subsequently, the process is designed with respect to the defined requirements. A detailed overview of possible attacks to the system and means of protection against them is also included in the thesis. The described methods are as follows: Phishing, Man in the middle, hardware modification and acoustic keypress emissions. A practical design of a identification system is discussed in the second part of the thesis. It consists of two parts: a library implementable to individual Internet services requiring a user identification and a server centrally identificating the users and storing their personal data and passwords. An implementation in Joomla content management system is also described.
Multilayer applications in .NET environment
Palkech, Marek ; Šimek, Milan (referee) ; Kacálek, Jan (advisor)
This thesis represents the Model-View-Controller pattern. It is focused especially at the description of the particular architecture layers principle and its functionality. It deals with the reasons of the three-layer architecture invention and it also deals with the advantages and the disadvantages provided by this pattern. The most frequent implementation of the MVC – the access to the data stored in the database through the web user interface is also described in this chapter. The next part of the thesis is concentrated on .NET Framework platform created from very voluminous, language-neutral library that is basically huge collection of the source codes providing the solution for common programmer’s problems and from the interface used for running up the applications created in .NET environment. The goal of the chapter concering with .NET Framework is to describe its architecture. The thesis also describes the platform invention, various versions of the .NET, the data access technology ADO.NET and the ASP.NET member ObjectDataSource. The chapter describing languages supported by the .NET Framework is focused on the C# language and its versions. The application “Multilayer applications in .NET environment” is the practical implementation of the mentioned technologies and it is described in the last chapter. The application’s architecture with the concentration on the particular Model-View-Controller layers implementation in the form of Microsoft Visual Studio 2005 projects is also described in the thesis. Special attention is paid to each operation over the data stored in the database tables that the application enables the user to execute, as for example data inserting, updating, selecting or deleting. The common business object’s child generation process is also described deep into the details.

National Repository of Grey Literature : 60 records found   beginprevious41 - 50next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.