National Repository of Grey Literature 91 records found  beginprevious27 - 36nextend  jump to record: Search took 0.00 seconds. 
Network design support
Zemánek, Martin ; Fojtová, Lucie (referee) ; Pelka, Tomáš (advisor)
The work is focused on support of computer networks. It contains basic information about the network elements and possibilities of their involvement. The steps are described so that all procedures were intelligible. The work contains various thoughts on various options for integration of network and end elements to be as effective as possible. Shown are various examples of design documentation, which should serve primarily as a good springboard. We can see the lists of VLANs, IP addresses, calculations of energy consumption and cooling requirements. The introductory section also presents a variety of topology and characteristics of networks and network elements. We deal with various technologies such as QoS, PoE, EteherChannel, Trunking, and more. We are also stacking switches and effective involvement of network elements. All these information was collected and on the basis of these applications have been developed, which should serve as online network documentation. The application is writing with Nette Framework, which also has support for Czech, so it is much material available, which relieved the work in an environment of PHP, MySQL, HTML and CSS. The result is a basic version that is ready to further develop and to be as user friendly as possible and ease the job of designing the network.
Mandatory access control policies of operating system
Novotný, Filip ; Lattenberg, Ivo (referee) ; Pelka, Tomáš (advisor)
The subject of this paper is data protection by means access control. It compares the difference between DAC and MAC access control and describes the progress of MAC due to user requierements. Next part is dedicated to SELinux, what offers more system safeness. SELinux is based on mandatory access control. Making own policy is dedicated to SELinux editor, which is composed of Simplified Policy and is easy to use for ordinary user.
Identity management
Kefer, Daniel ; Polívka, Michal (referee) ; Pelka, Tomáš (advisor)
The master thesis is divided into two parts. In the first part, identity management is described on theoretical basis. Particular domains of identity management including authentication, authorization and audit are explained as well as Single Sign-On concept, i.e. using single credentials and entering them just once for access to multiple independent systems or services. In the second part, which forms the main part of this thesis, a practical project was implemented on the infrastructure of the Department of Telecommunications within the Faculty of Electrical Engineering and Communication, Brno University of Technology. The goal of this project was to create an environment for central 4 authentication and Single Sign-On using only open source technologies within a computer laboratory used for teaching OS Linux. The project is based on OS Linux Debian, Kerberos as a protocol for secure authentication and LDAP server OpenLDAP. For the Single Sign-On demonstration, NFS services for accessing data on the network were chosen. Using NFS services, users can sign-on to any workstation and access all their data. Administration of users and their import from central FEEC databases was implemented using scripts developed in Python. Next, using Apache, PHP and MySQL, a front-end audit interface for the network administrator was developed in order to inspect and evaluate security events in the network. Messages about suspicious events are delivered to administrator’s mailbox in real time. The project is intended as a security platform which means that other services can be implemented for Single Sign-On as well as new mechanisms for evaluation of suspicious events.
Laboratories with CCENT Network Visualiser
Kadlčík, Michal ; Pelka, Tomáš (referee) ; Burda, Karel (advisor)
This work describes design and practical realization of three laboratory works for students of MNSB. These works are aimed to practice basics of computer networks, especially the configuration of LAN, IP addressing and routing. Local desktop simulator of computer networks CCENT Network Visualizer is used as a training program. Networks are created with the help of several graphical objects, which are configured and diagnosed as a part of this lab work. Additionally there is software that supports studying in the form of web pages, where the lab tasks are mentioned with correct results and some examples. Also the possibility of taking included tests and evaluation of answers. The simulator combined with the software is run by students on VMware virtual machine, so the work deals as well with the implementation on computer workstations.
Continual helicoidal mixer
Pelka, Tomáš ; Malach, František (referee) ; Malášek, Jiří (advisor)
This diploma project works out and is focused on the continual mixing process of the particular matters. The project is divided into following chapters. Chapter 1 includes mixing theory and information of the experimental work of the particular matters for blade using. In chapter 2 there is Evaluation and calculation of the technical parameters for the mixer. Chapter 3 deals with the engine proposal and chapter 4 includes calculation and design work of the gear transmission. Chapter 5 includes the stress analysis of the shaft and blade with the I-deas software. In attachment there are also the mixer arrangement drawing and detailed drawings of the key parts and groups for the mixer.
Advanced filtering operation in the Linux operating system
Janura, Dominik ; Pelka, Tomáš (referee) ; Szőcs, Juraj (advisor)
This thesis is oriented on the subject of advanced filtering operations and network security under Linux operating system. It explains the procedure of creating a simple packet filtering firewall using the netfilter framework and verifies its efectivity. It further examines the options of user identification in peer-to-peer networks using L7-filtering. It contains design of a system that detects traffic in the most used P2P networks. This system’s function is attested by simulating a P2P traffic inside the local network.
Network security monitor
Morský, Ondřej ; Hošek, Jiří (referee) ; Pelka, Tomáš (advisor)
This document describes software for network traffic analysis a network security monitoring. The way of processing captured frames in network cards and in protocol drivers is also described here. Second part attends to function of packet capture and network communication analysis software which can also generate traffic. This application is designed for Windows operating systems and is created as modular and easily extensible using DLL libraries. Source code of this application can be found on appended CD.
Time Measurement System for Firesport Competitions
Pelka, Tomáš ; Bidlo, Michal (referee) ; Vašíček, Zdeněk (advisor)
This work deals with the design of universal wireless timer for fire sport disciplines. Fire sport is a group of more than 15 disciplines. There are different ways of time measurement for each discipline. Important part of this work is detailed research of individual disciplines and their requirements at time measurement system and it's accessories. Another part of this work deals with the specification of wireless timekeeping system, which involves suitable partitioning of time measurement system into wirelessly communication modules. The interface for connecting sensors and accessories is also specified. Designed system is suitable for racing and training purposes, it has short installation time. This work also deals with the design of electronics (power and digital circuits) for each module and also with building of prototype, which is tested using prepared scenarios. New findings are evaluated and lead to design of next generation of time measurement system.
Uncovering of rootkits and detection of spyware
Juras, Stanislav ; Pelka, Tomáš (referee) ; Polívka, Michal (advisor)
Bachelor’s thesis is about uncovering of rootkit and detection of spyware. It describes the basic types of known spyware and rootkits. Section dealing with spyware is especially about a description of each species. In case of rootkit the thesis is mainly about description of modes and the manner of their infection. There are also outlined attempts to use legal rootkit. In other case there are summarized the basic methods of rootkit and spyware detection, which are commonly used in various detection programs. The second part of thesis is practical implementation (the program) of one of the methods of spyware detection. The program is designed to be able to detect a simple pattern of spyware, which is stored in its database. The program uses the file signature detection. It contains also the graphical user interface, where is possible to choose a unit that user want to test.
Network attacks of Linux operating system
Valčák, Richard ; Janovič, Filip (referee) ; Pelka, Tomáš (advisor)
Main objective of this bachelor thesis is to inform with the most famous security attacks, describe their characteristics, evaluate risk degree and suggest security against of these attacks. The bachelor work presents theoretical and practical part focused on security attacks of Linux operational system. First chapters describe operational system security shell theory. Followed by the most frequent attacks like Buffer overflow, ARP Cache poisoning, SYN flood , Denial of Service, DHCP, which are described theoretically, demonstrated by these examples and possible security assignment against this attacks registered. Basic theoretical system Linux knowledge is necessary for the practical part of the bachelor thesis.

National Repository of Grey Literature : 91 records found   beginprevious27 - 36nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.