National Repository of Grey Literature 91 records found  beginprevious31 - 40nextend  jump to record: Search took 0.00 seconds. 
Continual helicoidal mixer
Pelka, Tomáš ; Malach, František (referee) ; Malášek, Jiří (advisor)
This diploma project works out and is focused on the continual mixing process of the particular matters. The project is divided into following chapters. Chapter 1 includes mixing theory and information of the experimental work of the particular matters for blade using. In chapter 2 there is Evaluation and calculation of the technical parameters for the mixer. Chapter 3 deals with the engine proposal and chapter 4 includes calculation and design work of the gear transmission. Chapter 5 includes the stress analysis of the shaft and blade with the I-deas software. In attachment there are also the mixer arrangement drawing and detailed drawings of the key parts and groups for the mixer.
Advanced filtering operation in the Linux operating system
Janura, Dominik ; Pelka, Tomáš (referee) ; Szőcs, Juraj (advisor)
This thesis is oriented on the subject of advanced filtering operations and network security under Linux operating system. It explains the procedure of creating a simple packet filtering firewall using the netfilter framework and verifies its efectivity. It further examines the options of user identification in peer-to-peer networks using L7-filtering. It contains design of a system that detects traffic in the most used P2P networks. This system’s function is attested by simulating a P2P traffic inside the local network.
Network security monitor
Morský, Ondřej ; Hošek, Jiří (referee) ; Pelka, Tomáš (advisor)
This document describes software for network traffic analysis a network security monitoring. The way of processing captured frames in network cards and in protocol drivers is also described here. Second part attends to function of packet capture and network communication analysis software which can also generate traffic. This application is designed for Windows operating systems and is created as modular and easily extensible using DLL libraries. Source code of this application can be found on appended CD.
Time Measurement System for Firesport Competitions
Pelka, Tomáš ; Bidlo, Michal (referee) ; Vašíček, Zdeněk (advisor)
This work deals with the design of universal wireless timer for fire sport disciplines. Fire sport is a group of more than 15 disciplines. There are different ways of time measurement for each discipline. Important part of this work is detailed research of individual disciplines and their requirements at time measurement system and it's accessories. Another part of this work deals with the specification of wireless timekeeping system, which involves suitable partitioning of time measurement system into wirelessly communication modules. The interface for connecting sensors and accessories is also specified. Designed system is suitable for racing and training purposes, it has short installation time. This work also deals with the design of electronics (power and digital circuits) for each module and also with building of prototype, which is tested using prepared scenarios. New findings are evaluated and lead to design of next generation of time measurement system.
Uncovering of rootkits and detection of spyware
Juras, Stanislav ; Pelka, Tomáš (referee) ; Polívka, Michal (advisor)
Bachelor’s thesis is about uncovering of rootkit and detection of spyware. It describes the basic types of known spyware and rootkits. Section dealing with spyware is especially about a description of each species. In case of rootkit the thesis is mainly about description of modes and the manner of their infection. There are also outlined attempts to use legal rootkit. In other case there are summarized the basic methods of rootkit and spyware detection, which are commonly used in various detection programs. The second part of thesis is practical implementation (the program) of one of the methods of spyware detection. The program is designed to be able to detect a simple pattern of spyware, which is stored in its database. The program uses the file signature detection. It contains also the graphical user interface, where is possible to choose a unit that user want to test.
Network attacks of Linux operating system
Valčák, Richard ; Janovič, Filip (referee) ; Pelka, Tomáš (advisor)
Main objective of this bachelor thesis is to inform with the most famous security attacks, describe their characteristics, evaluate risk degree and suggest security against of these attacks. The bachelor work presents theoretical and practical part focused on security attacks of Linux operational system. First chapters describe operational system security shell theory. Followed by the most frequent attacks like Buffer overflow, ARP Cache poisoning, SYN flood , Denial of Service, DHCP, which are described theoretically, demonstrated by these examples and possible security assignment against this attacks registered. Basic theoretical system Linux knowledge is necessary for the practical part of the bachelor thesis.
Security protection techniques of wireless networks of internet providers
Žiško, Róbert ; Pelka, Tomáš (referee) ; Burda, Karel (advisor)
This master’s thesis can be used as the guidebook for Wi-Fi networks provider in non-licensed zones 2,4GHz and 5GHz. It is good tool to understand wireless technology area and its protection. Reader can follow network design and avoid mistakes that are mentioned in work. This text shouldn’t be a tool or a guide for possible attackers, but an impulse for small providers who provide their networks in unsecured form. In the opening chapter of my work, matters of Wi-Fi networks are thoroughly analyzed. As they are able to get internet connection in a lot of inaccessible places, they are considered to be crucial for the present times. The basic procedure describing Wi-Fi planning is written in thesis and also its legislative that has to be strictly observed. The big disadvantage is riskiness of the wireless connection that allows attackers to attack network in many ways. For mentioned reason it is very important to take utmost account of Wi-Fi network’s security and attack resistance. Unfortunately a lot of networks are either secured partially or unsecured at all. These types of networks are frequently attacked in order to get “free” Internet access or because of competitors fight. In the text below we can find possible Wi-Fi attack forms using by attackers to get Internet access or destroy network hardware what can cause big financial loss to providers. I described design and realization of little-town network using safety tools implementation based on my experience. For that purpose I implemented benchmark tests in graphics as well as practical format.
Payment card systems
Flégl, Jan ; Pelka, Tomáš (referee) ; Morský, Ondřej (advisor)
The work is about payment card systems. We’d like to describe infrastructure of credit cards, ATMs, POS terminals , focusing on the EMV standard. In theoretical part we will be introduced with the history and development of credit cards, ATMs and POS terminals. Then we focus on a detailed description of payments terminals and possibilities of payment via the Internet. The most extensive theoretical part deals width EMV standard. In practical part we will make our own program, which authenticates the user based on his credit card and it will allow the user to login in the system. Source codes of this application can be found on enclosed CD.
Software design support of burglar alarm system
Vymazal, Michal ; Pelka, Tomáš (referee) ; Burda, Karel (advisor)
This thesis deals with implementation of software support of alarm system design for security levels 1 and 2 based on web technologies. It was created intuitive and interactive graphical interface that allows to create high-quality alarm system design even for laymen. First of all the paper deals with standards and jurisdictions in the Czech Republic, according to which the alarm system design must be followed. In theoretical part there are described in detail characteristics of alarm systems and its components, proper functioning principles, installation principle, advantages and disadvantages of use, individual steps of alarm system design and proposed methodology of alarm system design for security level 1 and 2. In practical part there are described the technologies used for the implementation of this paper, structure of created webpage and detailed steps of alarm system design, as seen by user during creating. The result of this paper is a webpage, which is divided into two parts: theoretical and practical. The theoretical part provides information about the alarm system architecture, alarm system design and established methodology for the alarm system design for security level 1 and 2. In the practical part the user, on the basis of gained information and interactive help, can create high-quality alarm system design that meets all the conditions for reliable function in real traffic.
SAN data storage
Pružinský, Ján ; Pelka, Tomáš (referee) ; Pust, Radim (advisor)
The main goal of this project is a familiarization with the protocol iSCSI and with its implementation into the SAN network. Firstly, the focus is aimed towards a theoretical analysis of the SAN data storage, description of its individual parts as well as its realization within the network. In the second part, the description of the protocol iSCI includes an explanation of particular abbreviations and terms. Every possibility of securing this protocol is fully processed and, moreover, the implementation in OS Linux and OS MS Windows Server is deeply explained. The practical part is devoted to configuring iSCSI Target in OS Linux and configuring iSCSI Initiator in OS linux and OS Windows. The last part is devoted to creating a Web interface to control the iSCSI Target.

National Repository of Grey Literature : 91 records found   beginprevious31 - 40nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.