National Repository of Grey Literature 31 records found  beginprevious21 - 30next  jump to record: Search took 0.02 seconds. 
Transfer of Security Email Proxy into Embedded Device
Richter, Jan ; Pecho, Peter (referee) ; Schäfer, Jiří (advisor)
This bachelor's thesis deals with embedded devices and their operating systems analysis for transfer of security email proxy into one of these devices. It also describes already existing project Mailproxy and techniques of email securing.
Web Traffic Analysis and Reconstruction with NetMon
Weiss, Patrik ; Ryšavý, Ondřej (referee) ; Veselý, Vladimír (advisor)
This thesis discusses design and implementation of tool for reconstruction of HTTP traffic based upon HTTP proxy with Microsoft Network Monitor application interface. This thesis also solves problems with reconstruction and analysis of HTTP data such as TCP fragmentation. Output of this thesis is an application for web traffic reconstruction.
Proxy Server for Mobile Devices
Vašenka, Václav ; Chmelař, Petr (referee) ; Weiss, Petr (advisor)
This thesis should introduce principles of proxy servers. Main focus is on using proxy as a mediator between a web user, accessing the web from mobile devices and a web server. Next, this paper deals with web design and with aspects that have affect the speed and effectiveness of web page browsing via a proxy server. Moreover, the realization of such a system is described in this paper.
IMAP Implementation in C++
Pohl, Marek ; Janoušek, Vladimír (referee) ; Peringer, Petr (advisor)
This thesis has focused on development of library of IMAP network protocol in C++ programming language. This work has focused on design and on interface of the library. Object design of this library is based on analysis of the IMAP protocol. Developed library contains implementation of a client and server part of the IMAP protocol. This work shows also the another IMAP libraries and evaluates pros and cons of the different solutions. Security of a network transfer is explained here in this thesis. This work deals with authentication methods, which are used to protect user credentials during authentication process. Created library can be easily used by software developers to develop an applications like an email client program and IMAP mail server. Part of this work has focused on testing of this developed library.
Interception of Modern Encrypted Protocols
Marček, Ján ; Korček, Pavol (referee) ; Kajan, Michal (advisor)
This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic principles that are used for information transmission network. The work also describes the most common types of attacks targeting the eavesdropping of communication. The result is a design of the eavesdropping and the implementation of an attack on the secure communication of the SSL protocol..The attacker uses a false certificate and attacks based on poisoning the ARP and DNS tables for this purpose. The thesis discusses the principles of the SSL protocol and methodology of attacks on the ARP and DNS tables.
Configurable Security Email Proxy
Židek, Stanislav ; Samek, Jan (referee) ; Cvrček, Daniel (advisor)
This bachelor thesis deals with design and implementation of multiuser configurable system capable of securing communication via electronic mail. Emphasis is put especially on remote configuration. It also describes existing protocols used for this communication and some of the mechanisms that can secure this communication from different points of view.
Application for monitoring and controlling the security of large LAN and WAN computer networks
Maloušek, Zdeněk ; Polívka, Michal (referee) ; Novotný, Vít (advisor)
Computer networks are used in much wider extent than 20 years ago. People use the computer mainly for communication, entertainment and data storage. Information is often stored only in electronic devices and that is why the security of the data is so important. The objective of my thesis is to describe network security problems and their solutions. First chapter deals with the network security, security checks and attacks. It describes procedures used in practise. First part deals with traffic scanning and filtering at various layers of the TCP/IP model. Second part presents the types of proxy and its pros and cons. Network Address Translation (NAT) is a favourite technique of managing IP addresses of inside and outside network which helps to improve the security and lower the costs paid for IP addresses. NAT description, IPSec, VPN and basic attacks are described in this section. The second chapter of the thesis presents set of Perl scripts for network security checking. The purpose of the project is not to check the whole network security. It is designed for contemporary needs of IBM Global Services Delivery Centrum Brno. The first script checks running applications on target object. The aim is to detect services that are not necessary to run or that are not updated. The second one checks the security of the Cisco device configuration. There is a list of rules that has to be kept. The third script inspects the Nokia firewall configuration which is on the border of IBM network. If some of the rule is broken, it shows the command that has to be proceeded at the particular device. The output of the first and the second script is an HTML file. The third script uses the command line for the final report. The last part of this chapter gives advice to configure Cisco devices. It is a list of security recommendations that can be used by configuring e.g. routers. The appendix presents two laboratory exercises. The aim is to give students an opportunity to learn something about programs and technologies which are used in practise by IT experts to check the weaknesses of their networks.
Design of user authentication for small and medium networks
Hajný, Jan ; Pust, Radim (referee) ; Burda, Karel (advisor)
The main focus of this Master’s thesis is user authentication and access control in a computer network. I analyze the TCP/IP model in connection with security and describe main stepping stones of authentication protocols (mainly hash functions). The authentication protocol analysis follows. I begin with LANMAN protocol analysis for the reason of a security comparison. The NTLM, Kerberos and Radius follows. The focus is on the Kerberos which is chosen as a main authentication protocol. This is also a reason why the modification used in MS domains is described. The implementation and functional verification is placed in the second part which is more practical. The virtualization technology is used for an easier manipulation. The result is a computer network model requiring user authentication and minimizing the possibility of an attack by unauthorized clients.
Censorship of internet in Russia
David, Jakub ; Veber, Jaromír (advisor) ; Klíma, Tomáš (referee)
The target of the thesis to reveal how much is possible to find out the truth about sensitive governmental topics from Russian mass media. In thesis will be compared results from Google and another search engine with results from another countries where that search engines is located. The thesis will be supported by citizen of Russian Federation and employee of anti propagandistic department in Brussels. Theoretical part of thesis will be dealing with censorship on the internet in general and ways how it could be realized. In thesis will be outline opportunities how censorship could be ignored. In practical part will be compared results from Russian search engine with Czech and another theirs American and European versions. Trough tracing will try to find out where exactly come about blocking of data retrieval and handling with results in case it will be manifested
Aplikace pro vyhledávání a ukládání proxy serverů
Záklasník, Martin
This Bachelor thesis describes the types of anonymous access to web pages and solves how to effectively defend against them. The work is divided into four main parts. The first part describes the company which the application is created for. The second part deals with the theory of how the anonymity on the Internet works, what is it and what the proxy types exists. The third section solves the methodology for the proxy detection. The fourth part deals where you can get proxy servers and the fifth part solves the application itself to catch proxy servers.

National Repository of Grey Literature : 31 records found   beginprevious21 - 30next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.