National Repository of Grey Literature 24 records found  beginprevious15 - 24  jump to record: Search took 0.01 seconds. 
Darknet networks as a way of protecting internet users' privacy
Plevný, Marek ; Sigmund, Tomáš (advisor) ; Čermák, Radim (referee)
In this age when information technologies became inseparable parts of our lives we can hardly imagine for example living without internet. There is a phenomenon connected with internet and that is large scale collection of data about internet users and their activities. Because of this fact, it is important to protect our internet privacy as a very important aspect of our lives. This work examines large scale collection of data about users internet activities. During this work, different methods and reasons for this largescale data collection are examined. Later, different ways how internet users are protected by law or how they can protect themselves are examined. One of the ways how internet users can protect their internet privacy is by using so-called anonymizing networks connected with a phenomenon called Darknet. This work examines if it is possible by ordinary internet users to adapt this method of internet privacy protection.
TOR signalling in yeast
Šimek, Jan ; Palková, Zdena (advisor) ; Španielová, Hana (referee)
TOR ("Target of rapamycin") protein, a highly conserved Ser/Thr protein kinase, is a central component of signalling network that controls cell growth in diverse eukaryotic organism, ranging from yeast to man. TOR proteins were first identified in yeast Saccharomyces cerevisiae in 1991 as the targets of the antifungal and immunosupressive agent rapamycine. In contrast to most eukaryotes, yeast contains two TOR homologues , Tor1p and Tor2p. These proteins are components of multiprotein complexes TORC1 and TORC2. TORC1 is specifically inhibited by rapamycine and controls cell growth in response to quality of the available nutrients. TORC2, which is insensite to rapamycine, regulates actin polymerization, sphingolipid biosynthesis and endocytosis. This work is focused on description of both TOR complexes, especially on downstream and upstream regulation of TORC1. Powered by TCPDF (www.tcpdf.org)
Correlation of Inbound and Outbound Traffic of Tor Network
Coufal, Zdeněk ; Veselý, Vladimír (referee) ; Polčák, Libor (advisor)
Communication in public networks based on the IP protocol is not really anonymous because it is possible to determine the source and destination IP address of each packet. Users who want to be anonymous are forced to use anonymization networks, such as Tor. In case such a user is target of lawful interception, it presents a problem for those systems because they only see that the user communicated with anonymization network and have a suspicion that the data stream at the output of anonymization network belong to the same user. The aim of this master thesis was to design a correlation method to determine the dependence of the data stream at the input and the output of the Tor network. The proposed method analysis network traffic and compares characteristics of data streams extracted from metadata, such as time of occurence and the size of packets. This method specializes in correlating data flows of protocol HTTP, specifically web server responses. It was tested on real data from the Tor network and successfully recognized dependency of data flows.
Anonymous communication on the internet
Hořejš, Jan ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
The objective of this master’s thesis was to describe current capabilities of anonymous browsing over the Internet. The theoretical part focuses on three main methods of anonymization with main focus on Tor network. The master‘s thesis describes advantages and disadvantages of different solutions and possible attacks on them. In the next part is demonstrated Tor network, implementation of Hidden service and secured access to the server for clients and possible attacks against this proposal. The work also includes the results of measurements of all three anonymizers and the effects on their speed.
Anonymous communication in Internet environment
Pajtinová, Mária ; Malina, Lukáš (referee) ; Hajný, Jan (advisor)
Master´s thesis focuses on certain possibilities of how user can anonymously commununicate through the Internet. There are described following anonymous programs: TOR, JAP, I2P and CyberGhost, which allow user to hide his own identity to other IP address. Subsequently, measurements from different technologies are made by anonymous program TOR for calculate transmission speed.
Sharing informations in anonymous networks
Jonák, Martin ; Zumr, Jiří (advisor) ; Klíma, Tomáš (referee)
This work aims to introduce possibilities of sharing informations in envinroment of anonymous and P2P networks. The first part describes the principles of selected tools that allow access to an environment of anonymous networks. At second part is reader acquainted with processes of publishing informations in the form of webpage in that environment. The end compares advantages and disadvantages of each solutions.
Business models on deep web
Soukup, Jan ; Šebesta, Michal (advisor) ; Bruckner, Tomáš (referee)
This diploma thesis analyzes the deep web environment with the use of business models from the surface web. In the indroduction part of the thesis summarize terms web, deep web and dark web, these terms are intermingle the entire thesis, also brings the concept on Onion routing with use of Tor software. An inseparable part is the comparsion of tools which can be used for access to the dark web. The main part of the thesis analyzes most used business models on the surface web including their methods of monetization and after that author tries to apply these models in the dark web environment. An importat part of this work is the analysis a type of services occuring on the dark web and mutual comparison of several sub-criteria of each service. In the final part the thesis presents project Turris on which is applied to create a relay node for the Tor network.
Comparison of selected software tools in an environment Darknet
Bušta, Jan ; Klíma, Tomáš (advisor) ; Sova, Martin (referee)
This thesis focuses on issues related to a Darknet. The main goal of this thesis is to describe the Darknet network, characterize selected software that allows connections to the Darknet, compare these software and recommend potential users the software, that best suits the given criteria. The first part is devoted to the theory of the Darknet and describes the Darknet from a historical and content perspective. It further describes the software by which you can get into the Darknet. In the second part are compared these software by using pre-defined criteria. In the conclusion is evaluated software I2P as the best solution for potential users.
Anonymization tools on the Internet
Techlovský, Stanislav ; Klíma, Tomáš (advisor) ; Veber, Jaromír (referee)
The Bachelor thesis deals with anonymizing user on the Internet and with the use of different anonymization tools. The first part describes the causes and threats in the event of disturbance anonymous users on the Internet. It also acquaints the reader with the environment that allows anonymous and main anonymization tools. The second part is focused on the Raspberry Pi minicomputer and its configuration and usage as TOR anonymizing tool. The conclusion is devoted to comparing the main anonymization tools with modifications Raspberry Pi Onion Routing and evaluation.
Aplikace pro vyhledávání a ukládání proxy serverů
Záklasník, Martin
This Bachelor thesis describes the types of anonymous access to web pages and solves how to effectively defend against them. The work is divided into four main parts. The first part describes the company which the application is created for. The second part deals with the theory of how the anonymity on the Internet works, what is it and what the proxy types exists. The third section solves the methodology for the proxy detection. The fourth part deals where you can get proxy servers and the fifth part solves the application itself to catch proxy servers.

National Repository of Grey Literature : 24 records found   beginprevious15 - 24  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.