Národní úložiště šedé literatury Nalezeno 4 záznamů.  Hledání trvalo 0.01 vteřin. 
Support for Dynamic Config Reload Inside Rsyslog
Lakatos, Attila ; Češka, Milan (oponent) ; Rogalewicz, Adam (vedoucí práce)
Logs are one of the most valuable assets when it comes to IT system management and mon- itoring. As they record every action that took place on a machine, logs provide the insight system administrators need to spot issues that might impact performance, compliance, and security. For this reason, the rsyslog software utility can be used as it offers the ability to accept inputs from a wide variety of sources, transform them, and output the results to diverse destinations by a set of rules. One shortcoming the software currently has is that it needs to be restarted in order to modify the rule set. The author of this master's thesis points out what types of problems a user might encounter during this period of time, such as messages entering the system are lost, TCP/UDP based connections are disturbed, even if no changes are made. The goal of this thesis is to design and implement an option, which allows users to dynamically reload configuration for core components without the need of a full restart. The improvements aim to address problems raised by the research, as well as increase performance by reusing already existing resources.
Digital Steganalysis
Lakatos, Attila ; Šimek, Václav (oponent) ; Strnadel, Josef (vedoucí práce)
The aim of this thesis is to introduce the basic theory behind digital steganography and digital steganalysis, present some recent algorithms and developments of the fields. Furthermore, it gives an insight into the ancient and recent history of the above stated scientific disciplines. This thesis elucidates the different approaches towards implementation of stegonography using image files. It also attempts to identify the requirements of a good steganographic and steganalytic algorithm and compares their performance with respect to requirements. In conclusion, the author's reflection towards the results, effectiveness of message hiding and success rate in detection are discussed.
Support for Dynamic Config Reload Inside Rsyslog
Lakatos, Attila ; Češka, Milan (oponent) ; Rogalewicz, Adam (vedoucí práce)
Logs are one of the most valuable assets when it comes to IT system management and mon- itoring. As they record every action that took place on a machine, logs provide the insight system administrators need to spot issues that might impact performance, compliance, and security. For this reason, the rsyslog software utility can be used as it offers the ability to accept inputs from a wide variety of sources, transform them, and output the results to diverse destinations by a set of rules. One shortcoming the software currently has is that it needs to be restarted in order to modify the rule set. The author of this master's thesis points out what types of problems a user might encounter during this period of time, such as messages entering the system are lost, TCP/UDP based connections are disturbed, even if no changes are made. The goal of this thesis is to design and implement an option, which allows users to dynamically reload configuration for core components without the need of a full restart. The improvements aim to address problems raised by the research, as well as increase performance by reusing already existing resources.
Digital Steganalysis
Lakatos, Attila ; Šimek, Václav (oponent) ; Strnadel, Josef (vedoucí práce)
The aim of this thesis is to introduce the basic theory behind digital steganography and digital steganalysis, present some recent algorithms and developments of the fields. Furthermore, it gives an insight into the ancient and recent history of the above stated scientific disciplines. This thesis elucidates the different approaches towards implementation of stegonography using image files. It also attempts to identify the requirements of a good steganographic and steganalytic algorithm and compares their performance with respect to requirements. In conclusion, the author's reflection towards the results, effectiveness of message hiding and success rate in detection are discussed.

Viz též: podobná jména autorů
1 LAKATOS, Alexander
Chcete být upozorněni, pokud se objeví nové záznamy odpovídající tomuto dotazu?
Přihlásit se k odběru RSS.