National Repository of Grey Literature 31 records found  beginprevious22 - 31  jump to record: Search took 0.00 seconds. 
Dispatcher for Workflow Management System
Kozina, Stanislav ; Tomášek, Jiří (referee) ; Lukeš, Dan (advisor)
Present work considers processing and identification of the messages under UN/EDIFACT, Inhouse or ebXML standard. There are two main goals of this work. The first goal is to design a template format describing the structure of the messages and the location of identification information in the message. The second goal is to design and implement system for processing and information extraction from the message according to the template. Templates itself should be very similar for all three standards, should be easily read and written by human and must be able to describe any structure of the message. Information which where picked up from the message are subsequently written in the message sticker, which serves for easier identification in later processing.
STalk - zabezpečená aplikace pro komunikaci
Gróf, Szabolcs ; Lukeš, Dan (referee) ; Forst, Libor (advisor)
In the present work we study the methods of using cryptographic algorithms to ensure the security of communication over computer networks and give a new perspective on the classic UNIX console chat program called talk. The thesis starts by describing the various protocols of the TCP/IP protocol suite, and a brief cryptographic overview. The following part describes the architecture of stalk. Finally, the program's implementation and usage is described.
STalk - zabezpečená aplikace pro komunikaci
Gróf, Szabolcs ; Forst, Libor (advisor) ; Lukeš, Dan (referee)
In the present work we study the methods of using cryptographic algorithms to ensure the security of communication over computer networks and give a new perspective on the classic UNIX console chat program called talk. The thesis starts by describing the various protocols of the TCP/IP protocol suite, and also gives a brief description of how these protocols are used from the viewpoint of a UNIX programmer. It is followed by a cryptographic overview, mainly the description of the RSA and DES algorithms. Finally, the program's implementation and usage is described.
Red Dragon
Urza, Martin ; Jákl, Vojtěch (referee) ; Lukeš, Dan (advisor)
RDX2 Server is a program which allows operation of Red Dragon NeXt Generation game. This game is turn based online strategy with fantasy background and it can be simultaneously played by hundreds of thousands players. Red Dragon NeXt Generation is a continuation of Red Dragon 2 which in many aspects exceeds and enhances (in terms of game system and also in terms of performance i.e. possibility of server to seat much more players). Communication with server can be done e.g. via client, which is appended to this bachelor thesis, however is not part of it.
Adaptive e-mail classifier for IMAP servers
Rajčan, Šimon ; Lukeš, Dan (referee) ; Bednárek, David (advisor)
The subject of this work is to project and implement a system for classification of certified electronic mail, based on rule acquired in certain mode of application. The main aim is classification of positive mail, not abstraction of ineligible mail. System will be implemented as interactive application worked with protokol IMAP4 with mail stored on server.
Cyclop - Network administrator utility for detecting rule-breaking users
Choma, Martin ; Calda, Jiří (referee) ; Lukeš, Dan (advisor)
Cyclop is intrusion detection system. This tool provide for network administrator way to easily monitor unwanted or potentially unsecure network traffic. Cyclop is able to detect portscans, can perform pattern matching against regular expression and filter traffic with pcap filter (as known from tools like tcpdump or ethereal). All this rules are configurable through smart configuration file.
Cipher framework
Bureš, Filip ; Beneš, Antonín (referee) ; Lukeš, Dan (advisor)
The aim of this bachelor thesis is to create a scripting language and a program (language interpreter), which on basis of these scripts encrypts and decrypts texts. The program is as independent on a concrete operating system as possible. The programming language used to create this program is C (C++ if necessary). The thesis is primarily aimed to substitution and transposition ciphers, the computational difficulty of which does not eliminate practical use of the interpreter for their implementation. Part of the program is the possibility, that users can create their own libraries of functions, which could be used for writing scripts. One of the assumed uses of this system is its use as a basic instructional material for elementary and/or popularizing seminars about encrypting. The interpreter makes it possible to observe the processing of the chosen script and the values of variables (debugging tool). User and programmer documentation (incl. formal language syntax description) is included.
Remote services control systems
Knop, Dušan ; Lukeš, Dan (advisor) ; Forst, Libor (referee)
In the present work we study possibilities of network monitoring system creation. We will audit computers in networks and services running on them. System must allow adding new kinds of tests into it. So if some test is not yet implemented it should be possible to add it into the system. As a result there is a implementation of such a system (modular with coordinator) written in C languague for FreeBSD operating system. Concrete testing methods are implemented as standalone modules which comunicate with coordinator by network protocol. In the case of error location the coordinator will send information by given way to set persons. Concrete methods for sending information are also implemented as modules.
FlowIDS
Sabolčák, Peter ; Trčka, Martin (referee) ; Lukeš, Dan (advisor)
FlowIDS is system which can detect some of the undesirable traffi c in computer networks (undesirable traffic could be also ie. virus activity or overloading of network) and mostly doing counteraction which are set by administrator. Information about data ows are provided by hardware of network infrastructure, eliminitaion of undesirable activity is done through changes in network hardware settings. Regarding the quantity of solution which are provided on market, I decided to focus on Cisco network hardware, which is now popular and mostly spread. FlowIDS also bene t from NetFlow protocol (introduced by Cisco) to gather easily necessary data. NetFlow is not the only source of gathering data. FlowIDS can also operate with local interface to gather data directly from network.
Trusted proxy in SSL/TLS connection
Smolík, Jiří ; Forst, Libor (advisor) ; Lukeš, Dan (referee)
The problem of SSL/TLS interception ("trusted proxy in SSL/TLS connection") has been known for years and many implementations exist. However, all of them share a single technical solution which is based solely on the PKI authentication mechanism and suffers from multiple serious disadvantages. Most importantly, it is not compatible with several aspects or future trends of SSL/TLS and PKI, there's almost no space for improvement and its real use may spawn legal issues. After we analyze technical background and the current solution, we will propose another one, based not only on PKI but SSL/TLS too. Both solutions will be compared and general superiority of the new one will be shown. Basic implementation and analysis will follow, along with deployment requirements and ideas for future development. Powered by TCPDF (www.tcpdf.org)

National Repository of Grey Literature : 31 records found   beginprevious22 - 31  jump to record:
See also: similar author names
5 Lukeš, David
Interested in being notified about new results for this query?
Subscribe to the RSS feed.