National Repository of Grey Literature 7 records found  Search took 0.02 seconds. 
Distributed Brute Force Attacks Protection
Richter, Jan ; Čejka, Rudolf (referee) ; Lampa, Petr (advisor)
This project deals with analysis of brute force attacks focused on breaking authentication of common services (especially ssh) of Linux and xBSD operating systems. It also examines real attacks, actual tools and ways of detection of theese attacks. Finaly there are designed new mechanisms of coordination and evaluation of distributed brute force attacks in distributed environment. These mechanisms are then implemented in distributed system called DBFAP.
Analysis of possible threats in old OS Linux version
Chovancová, Emília ; Dejdar, Petr (referee) ; Tomašov, Adrián (advisor)
The bachelor thesis is focused on the security aspect of an older version of a Linux based machine. The document is split into a theoretical part which contains a description of what operating system, kernel, UNIX, GNU/LINUX and Linux OS are in general. Then the description proceeds to explanation of active and passive attacks such as replay, masquarade, denial of service, man in the middle or listening and analysing the network. Afterwards it continues with description of potentially vulnerable spots that are common on operating systems. With the help provided from scanning software, especially Nmap and Lynis, the document proceeds to the practical part which contains various types of successful and unsuccesfful attacks such as password recovery, denial of service, spectre, brute force of a password and cross-site scripting. The last part covers the protection against succesfull attacks and adds a little bit more of additional protection in general in a form of an ansible script.
Realistic Visualization of Environment in Computer Games
Jozefov, David ; Bartoň, Radek (referee) ; Mikolov, Tomáš (advisor)
This bachelor thesis shows the basics of landscape rendering in computer games. It explains fundamental principles of computer graphics creation and implementation of the three parts of the landscape - terrain, water surface and the sky. In more detail it describes Brute force and ROAM algorithms for terrain rendering and compares the achieved results of the both of them.
Analysis of possible threats in old OS Linux version
Chovancová, Emília ; Dejdar, Petr (referee) ; Tomašov, Adrián (advisor)
The bachelor thesis is focused on the security aspect of an older version of a Linux based machine. The document is split into a theoretical part which contains a description of what operating system, kernel, UNIX, GNU/LINUX and Linux OS are in general. Then the description proceeds to explanation of active and passive attacks such as replay, masquarade, denial of service, man in the middle or listening and analysing the network. Afterwards it continues with description of potentially vulnerable spots that are common on operating systems. With the help provided from scanning software, especially Nmap and Lynis, the document proceeds to the practical part which contains various types of successful and unsuccesfful attacks such as password recovery, denial of service, spectre, brute force of a password and cross-site scripting. The last part covers the protection against succesfull attacks and adds a little bit more of additional protection in general in a form of an ansible script.
Large Terrain Rendering
Bondarenko, Boris ; Nečas, Ondřej (referee) ; Kajan, Rudolf (advisor)
Realization of large terrain rendering is well-known problem in modern applications which covers this topic. Large terrain rendering can be found in large scale of programs from video games to professional tools used for environment rendering and visual effects processing. For implementation of such programs exists much algorithms, using different techniques for storing, processing and rendering of data. Important subject in domain of graphics data rendering are system limits and also distinctive capacity of human eye. Next important part is the pick of API through which program will communicate with graphics card. In this thesis Direct3D interface from DirectX9 package have been chosen. For comparison in approach to large terrain rendering realization, following algorithms are going to be used : brute force, quadtree and ROAM algorithm.
Distributed Brute Force Attacks Protection
Richter, Jan ; Čejka, Rudolf (referee) ; Lampa, Petr (advisor)
This project deals with analysis of brute force attacks focused on breaking authentication of common services (especially ssh) of Linux and xBSD operating systems. It also examines real attacks, actual tools and ways of detection of theese attacks. Finaly there are designed new mechanisms of coordination and evaluation of distributed brute force attacks in distributed environment. These mechanisms are then implemented in distributed system called DBFAP.
Realistic Visualization of Environment in Computer Games
Jozefov, David ; Bartoň, Radek (referee) ; Mikolov, Tomáš (advisor)
This bachelor thesis shows the basics of landscape rendering in computer games. It explains fundamental principles of computer graphics creation and implementation of the three parts of the landscape - terrain, water surface and the sky. In more detail it describes Brute force and ROAM algorithms for terrain rendering and compares the achieved results of the both of them.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.