National Repository of Grey Literature 24 records found  beginprevious15 - 24  jump to record: Search took 0.00 seconds. 
Mobile Application for DNS Vulnerabilities Testing
Béder, Michal ; Ovšonka, Daniel (referee) ; Kováčik, Michal (advisor)
The aim of this thesis is to show the way how to implement an Android application, which allows full control over DNS packets creation. This was achieved by partial implementation of the application in C++ programming language. Furthermore, in this thesis are described topics as Android security model and possibilities of combining native and Java code. Resulting application allows to generate network attacks, which are exploiting some of the known DNS vulnerabilities.
Design of new laboratory exercises for GNS3 network simulator
Bureš, František ; Červenka, Vladimír (referee) ; Jeřábek, Jan (advisor)
The goal was to create three laboratory tasks with process and help in GNS3 environment. All laboratory tasks should be used for extending practise experiences from Cisco course CCNP and illustration of GNS3 function. Whole thesis is focused on using IPv6 and coexistence with IPv4. Teoretical parts are dedicated for preparation on laboratory tasks and their main goal is explaining and use of commands in specific problematics. In GNS3 environment, there is explained instalation and basic settings. Laboratory tasks on theme MP-BGP, IPv6 tunnels and IPsec VPN with use of VTI are divided into specific parts. The parts consist of the described procedures with topology, detailed instructions and the entire configuration in Annex.
Physics Simulation for Pinball Game
Čermák, Jakub ; Polok, Lukáš (referee) ; Zachariáš, Michal (advisor)
The objective of this work is to create a library for physical simulation and using the library to create a game of pinball, on which you can test functionality of the library. Problems that appeared during the creation of the library, are described in this paper along with their solutions. In particular, tunneling, detection and results of collisions. Subsequent optimization solutions to these problems for our specific library. Of no smaller importance are principles which reduce the requirements of the final simulation. Among the most important ones are the correct choice of limits, detection of rolling and sleep of slowly moving dynamic objects.
Effective Network Anomaly Detection Using DNS Data
Fomiczew, Jiří ; Žádník, Martin (referee) ; Kováčik, Michal (advisor)
This thesis describes the design and implementation of system for effective detection of network anomaly using DNS data. Effective detection is accomplished by combination and cooperation of detectors and detection techniques. Flow data in NetFlow and IPFIX formats are used as input for detection. Also packets in pcap format can be used. Main focus is put on detection of DNS tunneling. Thesis also describes Domain Name System (DNS) and anomalies associated with DNS.
Optimization of geotechnical survey and monitoring for design and realization of underground constructions
Černý, Vít ; Pruška, Jan (referee) ; Aldorf,, Josef (referee) ; Horák, Vladislav (advisor)
The presented thesis focuses primarily on issues of geotechnical survey and geotechnical monitoring for underground line constructions. It deals with the current practice of geotechnical survey and monitoring. Based on the knowledge gained from specific buildings in the Czech Republic (Královopolské tunnels, tram tunnel Žabovřeská) and based on the author's practical local and foreign experience submits suggestions regarding their mutual optimization in order to improve outputs and reduce financial costs.
Multicast Data Tunneling
Stodůlka, Stanislav ; Skořepa, Michal (referee) ; Šimek, Milan (advisor)
This document contains introducion of terms in routing multicast data and their tunneling in network. As well developing aplication in Java to test sending unicast and multicast data through network. Aplication are based on client/server. Document describe Linux daemon mrouted and alternativ daemons with similar function of routing multicast data.
Optimization method based on TRUST for image registration
Pernicová, Lenka ; Mézl, Martin (referee) ; Harabiš, Vratislav (advisor)
The aim of the thesis is optimization for a medical images registration. The basis is to acquaint with the images registration and to peruse component global optimization methods, especially an optimization method TRUST. After theoretic knowledge it is possible to proceed to a suggestion of an optimization method based on the TRUST method and to realize in the program setting MATLAB. Created algorithms has been tested on test data and compared with other optimization methods as Simulated annealing.
Hash functions - characteristics, implementation and collisions
Karásek, Jan ; Sobotka, Jiří (referee) ; Lambertová, Petra (advisor)
Hash functions belong to elements of modern cryptography. Their task is to transfer the data expected on the entry into a unique bite sequence. Hash functions are used in many application areas, such as message integrity verification, information authentication, and are used in cryptographic protocols, to compare data and other applications. The goal of the master’s thesis is to characterize hash functions to describe their basic characteristics and use. Next task was to focus on one hash function, in particular MD5, and describe it properly. That means, to describe its construction, safety and possible attacks on this function. The last task was to implement this function and collisions. The introductory chapters describe the basic definition of hash function, the properties of the function. The chapters mention the methods preventing collisions and the areas were the hash functions are used. Further chapters are focused on the characteristics of various types of hash functions. These types include basic hash functions built on basic bit operations, perfect hash functions and cryptographic hash functions. After concluding the characteristics of hash functions, I devoted to practical matters. The thesis describes the basic appearance and control of the program and its individual functions which are explained theoretically. The following text describes the function MD5, its construction, safety risks and implementation. The last chapter refers to attacks on hash functions and describes the hash function tunneling method, brute force attack and dictionary attack.
Scanning Tunneling Microscopy STM
Michele, Ondřej ; Škoda, David (referee) ; Průša, Stanislav (advisor)
The work deals with STM microscopy. The commercial Nanosurf easyScan2 STM microscope was activated and methodology of STM tip preparation by PtIr wire cutting and W wire etching was established.
The Evaluation of the Czech way during the economy transformation (general overview)
HOVORKOVÁ, Karolína
The Bachelor's thesis deals with the denationalization and the privatization process during the period of the economy transformation in the Czech republic in 1990's which was later termed as the Czech way. The thesis mainly focuses on the politician's and economist's opinions on the correctness and legality of its implementation. The thesis is divided into three parts except introduction and conclusion. The first part pursues political, economic and juridical bases, the Czech way's main targets and alternative ways. Next chapter is concerned with the Czech way itself, denationalization and privatization, mainly the voucher privatization. In this chapter we can find the best known affairs connected with the Czech way. In the third part we can find main mistakes involved in the Czech way. The Bachelor's thesis includes tables showing the economy transition by means of fundamental economic indicators or the number of emerging entrepreneurial subjects.

National Repository of Grey Literature : 24 records found   beginprevious15 - 24  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.