National Repository of Grey Literature 4 records found  Search took 0.00 seconds. 
Virtual environment by Xen software
Kulíř, Tomáš ; Kouřil, Jiří (referee) ; Jelínek, Mojmír (advisor)
This bachelor thesis, which is called the virtual environment by Xen software, deals with the operating system GNU / Linux and its distributions. It also deals with the virtualization on the server or desktop computer, in particular, describes in detail the Xen environment, including all of its options and the most forgotten server services. In the first chapter is analyzed the concept of GNU / Linux. First, there is documented history. Another section deals with a brief overview of the most commonly occurring distributions. The main part of this chapter is primarily devoted to a specific distribution Debian. There is described not only the history and development of this distribution, but also more packaging system is analyzed there. The last part of this chapter is devoted to the installation options with a detailed description of the whole process step by step. Second and the most important chapter is devoted to virtual environments. Once again, there is first described their history, the possibility of practical use and the types of virtualization are also indicated there. Reader will find there a brief analysis of the most commonly used virtualization systems. The third chapter detailed deals with the Xen technology. There is not only explained the principle on which the virtualization is built, but the main part of this chapter focuses on the practical use and a summary of basic functions. The next section describes the installation and administration of hypervisor including previous preparation. A very important point is also creation of the virtual machines and their control, their migration to another physical hardware or a description of the installation of other operating systems than Linux. Fourth, shorter chapter deals with a listing and a brief description of server services. The final chapter consists of a summary of problems or complications, which in the course of this work occurred.
Analysis of security and authentication of wireless networks
Kulíř, Tomáš ; Jeřábek, Jan (referee) ; Szőcs, Juraj (advisor)
This master's thesis deals with wireless networks, mainly about the WiFi. It deals with summary of individual security mechanism both theoretically and using them in real hardware. Mainly it is interested in the security of the individual mechanisms and their weaknesses, which cause rupture of security. At each chapter the ideas and methods, that the attackers are trying for infiltration of wireless networks and decrypt encryption WEP, WPA or WPA2, are outlined. The principle of the authentication of the WiFi by the authentication server and its options, which is connected with directory service LDAP, is also explained in this thesis. The penultimate chapter deals with the summary of security mechanisms and references that should be adhered by design of the WiFi for the provision of the high security. The ending of the master's thesis is devoted to social engineering and its most famous representatives.
Virtual environment by Xen software
Kulíř, Tomáš ; Kouřil, Jiří (referee) ; Jelínek, Mojmír (advisor)
This bachelor thesis, which is called the virtual environment by Xen software, deals with the operating system GNU / Linux and its distributions. It also deals with the virtualization on the server or desktop computer, in particular, describes in detail the Xen environment, including all of its options and the most forgotten server services. In the first chapter is analyzed the concept of GNU / Linux. First, there is documented history. Another section deals with a brief overview of the most commonly occurring distributions. The main part of this chapter is primarily devoted to a specific distribution Debian. There is described not only the history and development of this distribution, but also more packaging system is analyzed there. The last part of this chapter is devoted to the installation options with a detailed description of the whole process step by step. Second and the most important chapter is devoted to virtual environments. Once again, there is first described their history, the possibility of practical use and the types of virtualization are also indicated there. Reader will find there a brief analysis of the most commonly used virtualization systems. The third chapter detailed deals with the Xen technology. There is not only explained the principle on which the virtualization is built, but the main part of this chapter focuses on the practical use and a summary of basic functions. The next section describes the installation and administration of hypervisor including previous preparation. A very important point is also creation of the virtual machines and their control, their migration to another physical hardware or a description of the installation of other operating systems than Linux. Fourth, shorter chapter deals with a listing and a brief description of server services. The final chapter consists of a summary of problems or complications, which in the course of this work occurred.
Analysis of security and authentication of wireless networks
Kulíř, Tomáš ; Jeřábek, Jan (referee) ; Szőcs, Juraj (advisor)
This master's thesis deals with wireless networks, mainly about the WiFi. It deals with summary of individual security mechanism both theoretically and using them in real hardware. Mainly it is interested in the security of the individual mechanisms and their weaknesses, which cause rupture of security. At each chapter the ideas and methods, that the attackers are trying for infiltration of wireless networks and decrypt encryption WEP, WPA or WPA2, are outlined. The principle of the authentication of the WiFi by the authentication server and its options, which is connected with directory service LDAP, is also explained in this thesis. The penultimate chapter deals with the summary of security mechanisms and references that should be adhered by design of the WiFi for the provision of the high security. The ending of the master's thesis is devoted to social engineering and its most famous representatives.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.