National Repository of Grey Literature 13 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
Mozilla as a Development Platform
Vídeňský, Martin ; Schäfer, Jiří (referee) ; Samek, Jan (advisor)
This thesis deals with introduction of Mozilla as a development platform. Thesis is divided into four parts. The first one consists of a theoretical introduction, which describes architecture, the most important technologies and motivation for usage of Mozilla as a development platform. The second part leads step by step threw making own project. The third part is dedicated to description of the example application Tester. Tester is an e-learning project designed for easier learning process with scope on vocabulary practise. In the conclusion of thesis, there is the evaluation of Mozilla platform based on practical experience.
Cryptovirology
Kubík, Pavel ; Schäfer, Jiří (referee) ; Pecho, Peter (advisor)
This thesis is focused on a relatively new branch of computer security called Cryptovirology. It uses cryptography and its principles in conjunction with designing and writing malicious codes (e.g. computer viruses, trojan horses, worms). Techniques such as viral propagation through computer networks, capabilities of current viruses and similar threats are described. Beside cryptography and computer viruses, design of the cryptovirus and methods of a cryptoviral extortion attack along with their related potential are also analyzed below in this paper. As a proof of the concept in the given area of cryptovirology, a demonstrational computer program was written. The program was implemented with the respect to the satisfaction of the essentials set to the cryptovirus.
Analysis and Implementation of Virus Pattern Rules
Janeček, Jiří ; Schäfer, Jiří (referee) ; Janoušek, Vladimír (advisor)
This bachelor's thesis deals with analysis and implementation of rules for program, which routes virus samples for their later processing. The expert system is integrated in this program. It was created by using tool called CLIPS. This thesis also describes environment, where program is situated, and importance of component like this in system for virus sample processing. Analyzer has been implemented in C/C++ language.
Transfer of Security Email Proxy into Embedded Device
Richter, Jan ; Pecho, Peter (referee) ; Schäfer, Jiří (advisor)
This bachelor's thesis deals with embedded devices and their operating systems analysis for transfer of security email proxy into one of these devices. It also describes already existing project Mailproxy and techniques of email securing.
Safe Cryptography Algorithms
Zbránek, Lukáš ; Schäfer, Jiří (referee) ; Chmelař, Petr (advisor)
In this thesis there is description of cryptographic algorithms. Their properties are being compared, weak and strong points and right usage of particular algorithms. The main topics are safeness of algorithms, their bugs and improvements and difficulty of breaching. As a complement to ciphers there are also hash functions taken in consideration. There are also showed the most common methods of cryptanalysis. As a practical application of described algorithms I analyze systems for secure data transfer SSH and SSL/TLS and demonstrate an attack on SSL connection. In conclusion there is recommendation of safe algorithms for further usage and safe parameters of SSH and SSL/TLS connections.
Robot for P2P Network Scanning
Holub, Michal ; Schäfer, Jiří (referee) ; Janoušek, Vladimír (advisor)
Bachelor's thesis describes the types of P2P networks, their most common mutations and protocols, and design and implementation of the system for browsing P2P networks. The purpose of the system for browsing P2P network is to search for files with unrecognized malicious code. This system is capable to search files on P2P network based on given set of keywords, download them to local disk and to determine whether they are executable or not.
Transfer of Security Email Proxy into Embedded Device
Richter, Jan ; Pecho, Peter (referee) ; Schäfer, Jiří (advisor)
This bachelor's thesis deals with embedded devices and their operating systems analysis for transfer of security email proxy into one of these devices. It also describes already existing project Mailproxy and techniques of email securing.
Analysis and Implementation of Virus Pattern Rules
Janeček, Jiří ; Schäfer, Jiří (referee) ; Janoušek, Vladimír (advisor)
This bachelor's thesis deals with analysis and implementation of rules for program, which routes virus samples for their later processing. The expert system is integrated in this program. It was created by using tool called CLIPS. This thesis also describes environment, where program is situated, and importance of component like this in system for virus sample processing. Analyzer has been implemented in C/C++ language.
Robot for P2P Network Scanning
Holub, Michal ; Schäfer, Jiří (referee) ; Janoušek, Vladimír (advisor)
Bachelor's thesis describes the types of P2P networks, their most common mutations and protocols, and design and implementation of the system for browsing P2P networks. The purpose of the system for browsing P2P network is to search for files with unrecognized malicious code. This system is capable to search files on P2P network based on given set of keywords, download them to local disk and to determine whether they are executable or not.
Cryptovirology
Kubík, Pavel ; Schäfer, Jiří (referee) ; Pecho, Peter (advisor)
This thesis is focused on a relatively new branch of computer security called Cryptovirology. It uses cryptography and its principles in conjunction with designing and writing malicious codes (e.g. computer viruses, trojan horses, worms). Techniques such as viral propagation through computer networks, capabilities of current viruses and similar threats are described. Beside cryptography and computer viruses, design of the cryptovirus and methods of a cryptoviral extortion attack along with their related potential are also analyzed below in this paper. As a proof of the concept in the given area of cryptovirology, a demonstrational computer program was written. The program was implemented with the respect to the satisfaction of the essentials set to the cryptovirus.

National Repository of Grey Literature : 13 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.