National Repository of Grey Literature 126 records found  beginprevious91 - 100nextend  jump to record: Search took 0.00 seconds. 
Porting of RedirFS on Other OS
Zelený, Miroslav ; Čejka, Rudolf (referee) ; Kašpárek, Tomáš (advisor)
This thesis describes process of RedirFS portation to FreeBSD operating system. Source operating system is Linux. Those two operating systems are described from VFS view to determine differences and needed modifications. Then follows implementation of port.
Analysis of Real-Time Operating System Kernels Running on FITkit
Rajnoha, Peter ; Šimek, Václav (referee) ; Strnadel, Josef (advisor)
The project is dedicated to the identification of the problems found while building RT operating systems for use in embedded devices. The project's main topic is the possibility of using RT system in the FITkit platform and it also discusses individual problems and their possible solutions. One of the problems is the way of acquiring the timing information for tasks to ensure their RT properties. We have extended existing simulator for given microcontroller that is also part of the FITkit. The simulator can be used for detailed monitoring of the execution of individual tasks in the system based on dynamic analysis, collecting timing statistics for given blocks of the program or it can be extended by new modules. The RM scheduling mechanism has been integrated into the FreeRTOS system as an example by considering the knowledge of the concrete operating system and acquired timing information.
Message Logging System
Vrzal, Miroslav ; Křivka, Zbyněk (referee) ; Zendulka, Jaroslav (advisor)
This master's thesis in the first part describes the AS/400 and its message system and concentrates especially on the following areas: predefinition of messages and their storing, types of messages and levels of their importance, work with variables included in message text and ways of sending messages. On the basis of AS/400 message system is designed and implemented message log system for the application loggin for Aegis. s.r.o. The analysis of the message log systems is also a part of the work. The syslog and syslog-ngused in UNIX systems are described, concerning types of messages, importance of messages and filtering and storing of messages. It further describes possibilities of application logging based on Java in the specific case of the Log4jutility. In the second part thesis describes own log message systems design and implementation.
Issue of Migrating from Single-Core to Multi-Core Implementation of Operating System
Matyáš, Jan ; Šimek, Václav (referee) ; Strnadel, Josef (advisor)
This thesis discuss necessary changes needed in order to run MicroC/OS-II on multicore processor, mainly Zynq 7000 All Programmable SoC which uses two ARM Cortex-A9 cores. Problems that arise during this transition are also discussed.
Rootkit for MS Windows
Trutman, Michal ; Tomec, Martin (referee) ; Procházka, Boris (advisor)
This bachelor's thesis deals with methods of attack on MS Windows operating system and maps techniques of resources hiding used by existing rootkits. The thesis consists of a theoretical and a practical part. The first part covers classification of the rootkits, introduces the structure of the system kernel and then describes various techniques of attacking the system. In the practical part is described implementation and testing of my own rootkit.
Towards 40GbE GNU/Linux Router
Luštický, Josef ; Podermański, Tomáš (referee) ; Grégr, Matěj (advisor)
Účelem této práce je popis protokolu 40Gb Ethernet, popis směrovacího procesu v jádře Linux a navrhnout a provést testování výkonnosti směrování se síťovým adaptérem pro 40Gb Ethernet. Výsledky a nastavení pro získání maximální výkonnosti směrování jsou dále popsány v této práci.
Application for secure data storage for mobile devices
Kocáb, Marek ; Martinásek, Zdeněk (referee) ; Mácha, Tomáš (advisor)
This bachelor’s thesis is focused on the creation of application for secure data storage for mobile devices. The paper theoretically describes operating system according to users popularity and programming languages. The following section explains AES encryption standard and its principle of data encryption and decryption. In the practical part is created a PINapplication programm. The application allows user to store sensitive data using chosen password. It is possible to save new data or erase current data. These data are encrypted by mentioned AES standard. The application is programmed in Java language with the version for mobile devices (J2ME).
Technology of product machining on CNC machines
Brázda, Jiří ; Kalivoda, Milan (referee) ; Osička, Karel (advisor)
This diploma thesis deals with a technology of production milling of sample component “ending of generator shaft” by CNC milling in environment of small company. At first common aspects of CNC machines, technology of CNC milling and technology of construction are introduced. Possible problems with milling of sample component are analyzed and their possible solutions are presented. Next technology of CNC milling with operating program for CNC lathe (HAAS SL20) and CNC milling machine (HAAS VF3), production of component in small company with necessary documentation in technology procedure are projected. Using of operating systems HAAS, Fanuc and HEIDEHAIN are compared. Using of cutting tools and cutting condition for component milling is projected. Finally timing of operations and financial calculations necessary for small production of sample component is proposed.
Lighting control system using a wireless communication network
Levek, Vladimír ; Kadlec, Jaroslav (referee) ; Kuchta, Radek (advisor)
The aim of this thesis is to create and describe the wireless system for lighting control. A part of the work is the creation of modules for switching lighting and the creation of their operating programs. The first chapter briefly describes the way how the lighting control works and contains general requirements for the intelligent home. Further, there is a description of IQRF system, which serves as a wireless platform for the system. Next part of the thesis describes individual modules in terms of hardware and software. One part of the work covers the description of the transmission protocol. The attachment includes a listing of all operating programs for this wireless control system.
Network attacks of Linux operating system
Valčák, Richard ; Janovič, Filip (referee) ; Pelka, Tomáš (advisor)
Main objective of this bachelor thesis is to inform with the most famous security attacks, describe their characteristics, evaluate risk degree and suggest security against of these attacks. The bachelor work presents theoretical and practical part focused on security attacks of Linux operational system. First chapters describe operational system security shell theory. Followed by the most frequent attacks like Buffer overflow, ARP Cache poisoning, SYN flood , Denial of Service, DHCP, which are described theoretically, demonstrated by these examples and possible security assignment against this attacks registered. Basic theoretical system Linux knowledge is necessary for the practical part of the bachelor thesis.

National Repository of Grey Literature : 126 records found   beginprevious91 - 100nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.