National Repository of Grey Literature 35 records found  beginprevious26 - 35  jump to record: Search took 0.00 seconds. 
STalk - zabezpečená aplikace pro komunikaci
Gróf, Szabolcs ; Lukeš, Dan (referee) ; Forst, Libor (advisor)
In the present work we study the methods of using cryptographic algorithms to ensure the security of communication over computer networks and give a new perspective on the classic UNIX console chat program called talk. The thesis starts by describing the various protocols of the TCP/IP protocol suite, and a brief cryptographic overview. The following part describes the architecture of stalk. Finally, the program's implementation and usage is described.
H.323 Gatekeeper
Kratochvíl, Daniel ; Obdržálek, David (referee) ; Forst, Libor (advisor)
The purpose of this work is to design and implement a Gatekeeper service (a server for H.323 RAS protocol) with an integrated H.323 proxy. Thesis includes also a H.323 RAS protocol tester that can act both as a server and a client. The application is implemented in the C++ language using OpenH323, PWlib and readline libraries and is designed to run as a daemon on the Linux operating system. Strict usage of the platform independent libraries provides the ability to run on other operating systems. Linux and FreeBSD were successfully tested but another Unices, Windows or MacOS X should be suitable as well.
Internet Trade Center
Zápotocký, Radoslav ; Vrána, Jakub (referee) ; Forst, Libor (advisor)
The goal of this project is to create Internet Trade Center, a place, where users can create their own shop with custom products and categories. This shops will be independent on each other. It is designed to be easy modified, so theoretically it could be customized for completely different purposes. Moreover it will count with multiple languages from the beginning, so they will be working without any problems, and also with support for search engine optimization. The work can be eventually used as a guide to create similar applications.
STalk - zabezpečená aplikace pro komunikaci
Gróf, Szabolcs ; Forst, Libor (advisor) ; Lukeš, Dan (referee)
In the present work we study the methods of using cryptographic algorithms to ensure the security of communication over computer networks and give a new perspective on the classic UNIX console chat program called talk. The thesis starts by describing the various protocols of the TCP/IP protocol suite, and also gives a brief description of how these protocols are used from the viewpoint of a UNIX programmer. It is followed by a cryptographic overview, mainly the description of the RSA and DES algorithms. Finally, the program's implementation and usage is described.
Information Security Management System for Small Network
Princ, František ; Děcký, Martin (referee) ; Forst, Libor (advisor)
In the present work we study aspects of the security policy development for the speci c computer network. The work documents complete development of the security policy. It includes complete analysis of the environment, where is the network located, the draft of security statement and formation of security policy as a document. The work includes also some tips to improve the network infrastructure. These tips are results of the work.
Environment for Master Orienteering Ranking Analysis
Kovářová, Lenka ; Schlesinger, Pavel (referee) ; Forst, Libor (advisor)
I accomplished analyse of potential formula schemes for veteran competitors ranking evaluation and I suggested their parameterisation. Next, I created an environment for the evaluation of veteran ranking that enables the competitors ranking calculation in accordance with the variables formulae that supports the proposed parameterisation and I, therefore, collected the results of orienteering races that were held in the last 4 years to get some data for the ranking evaluation. To display the calculated ranking I constructed a website. I computed the ranking of veteran orienteering competitors by use of selected formulae and then I suggested a modification of the Spearman correlation coefficient to prove the accuracy of each formula.
Remote services control systems
Knop, Dušan ; Lukeš, Dan (advisor) ; Forst, Libor (referee)
In the present work we study possibilities of network monitoring system creation. We will audit computers in networks and services running on them. System must allow adding new kinds of tests into it. So if some test is not yet implemented it should be possible to add it into the system. As a result there is a implementation of such a system (modular with coordinator) written in C languague for FreeBSD operating system. Concrete testing methods are implemented as standalone modules which comunicate with coordinator by network protocol. In the case of error location the coordinator will send information by given way to set persons. Concrete methods for sending information are also implemented as modules.
Unsupervised learning based on images
Krupička, Radim ; Forst, Libor (referee) ; Hlaváč, Václav (advisor)
The aim of the project was to create an experimental environment for solving the children puzzle shape sorter . This environment serve as a testbed for various learning tasks of cognitive nature with image feedback. This puzzle is a demonstrator of the EU project COSPAL, IST-004176. The industrial robot CRS A-465 with six degrees of freedom and its control system is used. The scene is observed by one static camera. The system processes the images from the camera and the further robot movement is based on the reinforcement learning.
Wireless Networks Security
Turek, Lukáš ; Forst, Libor (advisor) ; Jirovský, Václav (referee)
This thesis compares the security of several wireless technologies and studies the security of networks based on IEEE 802.11 standard more in detail. Methods of securing are assessed in the view of resistance against eavesdropping, unauthorized access, DoS attacks and also attacks from inside of the network. Examples of configuration and in some cases also ways of attack are demonstrated. The thesis also studies related problems of secure passwords selection of and stored login data protection. At the end it suggests a way of securing a home network, a company network and a network of Internet service provider.
Trusted proxy in SSL/TLS connection
Smolík, Jiří ; Forst, Libor (advisor) ; Lukeš, Dan (referee)
The problem of SSL/TLS interception ("trusted proxy in SSL/TLS connection") has been known for years and many implementations exist. However, all of them share a single technical solution which is based solely on the PKI authentication mechanism and suffers from multiple serious disadvantages. Most importantly, it is not compatible with several aspects or future trends of SSL/TLS and PKI, there's almost no space for improvement and its real use may spawn legal issues. After we analyze technical background and the current solution, we will propose another one, based not only on PKI but SSL/TLS too. Both solutions will be compared and general superiority of the new one will be shown. Basic implementation and analysis will follow, along with deployment requirements and ideas for future development. Powered by TCPDF (www.tcpdf.org)

National Repository of Grey Literature : 35 records found   beginprevious26 - 35  jump to record:
See also: similar author names
2 FORST, Lukáš
Interested in being notified about new results for this query?
Subscribe to the RSS feed.