National Repository of Grey Literature 3 records found  Search took 0.01 seconds. 
Implementation of virtualization technology and replication of physical server for medium size company
Kováč, Matej ; Kindlová, Dita (referee) ; Ondrák, Viktor (advisor)
The purpose of master’s thesis is to project virtualization solution together with replication of the servers. Thesis is divided into the three parts and that it theoretical, analytical and projection part. In analytical part there are basic information about virtualization technologies, in analytical part there is analysis of the present status of the company and mainly about status of the IT infrastructure and in the end projection part there is realization of the virtualization solution from choosing the right type of cluster to choosing hardware solution.
Implementation of virtualization technology and replication of physical server for medium size company
Kováč, Matej ; Kindlová, Dita (referee) ; Ondrák, Viktor (advisor)
The purpose of master’s thesis is to project virtualization solution together with replication of the servers. Thesis is divided into the three parts and that it theoretical, analytical and projection part. In analytical part there are basic information about virtualization technologies, in analytical part there is analysis of the present status of the company and mainly about status of the IT infrastructure and in the end projection part there is realization of the virtualization solution from choosing the right type of cluster to choosing hardware solution.
Analysis of Virtual Machine based obfuscation
Středa, Adolf ; Boháček, Milan (advisor) ; Bálek, Martin (referee)
Software systems may contain sensitive data that should be protected. In a scenario, where an analyst has full access to the system, it may be desirable to transform the program to become harder to understand and reverse-engineer, while preserving the original functionality of the program. Machine code obfuscation tackles this problem by adding complexity to the pro- gram's control flow, a programming idiom removal, and various abstractions. Specifically, WProtect is an obfuscation engine that utilises a stack virtual ma- chine and its own instruction set to achieve these properties. In this thesis, I will analyse WProtect obfuscation engine, its obfuscation algo- rithms and present a generic approach to an extraction of a code protected by WProtect. Furthermore, I will design a generic framework for a static code ex- traction that is tweakable in order to support different WProtect configurations. Several improvements to WProtect, both in terms of configuration and design, will also be proposed. These proposals mostly intend to mitigate vulnerabilities that are exploited in the code extraction, however, several proposals shall also include improvements specifically targeting static analysis prevention. 1

Interested in being notified about new results for this query?
Subscribe to the RSS feed.