National Repository of Grey Literature 21 records found  previous11 - 20next  jump to record: Search took 0.01 seconds. 
Malware and comparison of antivirus products
Hamouzová, Aneta ; Luc, Ladislav (advisor) ; Novotný, Jakub (referee)
This bachelor thesis deals with the issue of possible danger in the Internet environment, namely malicious software. It is a variety of computer viruses, worms and Trojans that are comprehensively called malware. This risk should be closely monitored because its development is constantly moving forward and everyone should be familiar with this topic. The theoretical part includes the characteristics of malware - clarification of the concept and definition. The following part is history, which is described from initial ideas, the first malicious code in the 70's, and other well-known programs. It is led to the present day which is mainly focused on today's goals and direction of development of further malware. Next part involves the distribution of malware to basic, other special types and other such related forms. The final part describes the preventive and protective measures, and how to reveal and what to do if computer is infected. On this last section follows up a practical part, in which is analyzed antivirus protection, which is available in Czech and world market. Based on this analysis is done comparison of selected free antivirus programs. These are compared according to established criteria, such as web pages, installation, the use, user settings, appearance and ability to detect malware. The goal is to determine the safest and most comfortable user program. The result is used for ordinary users as possible support when they are choosing antivirus to their own computer.
Modern ways to design fully distributed, decentralized and stealthy worms
Szetei, Norbert ; Krištofič, Milutín (advisor) ; Balyo, Tomáš (referee)
The thesis deals with the study of the computer worm meeting several criteria (it should be fully distributed, decentralized and stealthy). These conditions lead to anonymity, longevity and better security of our worm. After presenting the recently used architectures and new technologies we analyse the known implementations. We propose the solutions with the new design together with the possible ways of improvements. In the next chapter we study biological concepts suitable for the new replication mode, where we implement the key concepts of functionality in a higher programming language. At design we have considered as important to be platform independent, so it is possible for the worm to spread in almost every computer environment, in dependence of implementation of the required modules. Powered by TCPDF (www.tcpdf.org)
Vertical worm conveyor
Sordyl, Martin ; Pokorný, Přemysl (referee) ; Malášek, Jiří (advisor)
The aim of this thesis is realization of functional calculation, design creation of vertical worm conveyor according to required parameters and consideration of transported materials. Here is realized calculation of main parts of the conveyor, approximate transport performance, design of propulsion, gear, conjuction and regulatory unit, emplacement of worm and strength control of functional parts of the machine. This thesis is composed of technical report and drawings.
Security inspection of network traffic
Kult, Viktor ; Havránek, Martin (advisor) ; Ladislav, Ladislav (referee)
Thesis topic concerns the issue of information security in corporate environments. Literature search includes information obtained by studying articles and literature in the field of information security. Resources were selected with a focus on the security risks, security technologies and legislative regulation. Attention is focused on technology that supports monitoring of communication flows in the data network. Overview of traffic operating a data network provides important information for the prevention or investigation of security incidents. Monitoring also serves as a source of information for the planning of the network infrastructure. It can detect faults or insufficient transmission capacity. The practical part is dedicated to implementation of the monitoring system in the real corporate networks. Part of the experience is the analysis of the network structure and choice of appropriate tools for actual implementation. When selecting tools, you can use the scoring method of multicriterial analysis options. The integration of the monitoring system is also the configuration of active network elements. Subsequent analysis of network traffic provides information about the most active users, most used applications or on the sources and targets of data transmitted. It provides a source of valuable information that can be used in case of failure on the network or security incident. The conclusion is a summary of the results and workflow.
Vorm conveyor
Mazálek, Karel ; Jonák, Martin (referee) ; Škopán, Miroslav (advisor)
This bachelor thesis consists of calculations, design and drawings of an inclined screw conveyor used for transporting ash from the powerplant. The technical report contains basic calculations as well as selected strength calculations. Drawing part consists of assebly drawing and welding subassembly of trough end. KEYWORDS
An equipment for PET filament producing for 3D printing usage
Kotačka, Petr ; Knoflíček, Radek (referee) ; Kočiš, Petr (advisor)
This thesis deals with design of equipment for the production of PET termoplastic fibre to be used in 3D printing by means of FDM method. Concise survey of plastics processing methods is presented herein, furthermore, structural design of equipment with necessary engineering calculations is included as well. Drawing documents with the total economic evaluation is a part of this thesis too.
Organization protection against malware design
Vykydal, Tomáš ; Vykydal, Miloslav (referee) ; Ondrák, Viktor (advisor)
The object of this bachelor work is to design a solution for places, where any imperfection were found.in an analysis of the current state of malware protection in a monitored company. solutions are designed for individual places, where any Result of this work is a design, which significantly increases the level of protection against malware and a description of the current situation in the problematics of malware and protection against it.
Cryptovirology and Future of Malware
Prchal, Josef ; Říha, Zdeněk (referee) ; Cvrček, Daniel (advisor)
Malware is connected to information technology. They influence each other. The aim of this thesis is to describe various types of this software and give a brief account of its history and development. It also discusses main trends of this area and tries to foretell the future development.
Modern computer viruses
Malina, Lukáš ; Malý, Jan (referee) ; Pust, Radim (advisor)
Bachelor’s thesis “Modern computer’s viruses” is composed from two mainly object (analysis computer’s viruses and suggestion of security middle computer network), separated for three parts: Analysis computer’s viruses, Personal suggestion of security personal computer end-user (computer terminal) and Personal suggestion of security middle computer network. Methods of transmission and infection, specific properties of viruses and impact upon personal computers are examined in the first part. Resolution of personal suggestion of security personal computer with help of antivirus software, personal firewall and antispam software is inducted in the second part. Futher, results of testing some free AV software and other security software are summarized with possible progress of configuration and recommendation for correct running this software. Complex suggestion of security middle computer network is adduced in the third part, where is inducted structure of security network. Configuration progression and recommendation for maximum security is indicated on particular used components. Structure is adapted for active network Cisco components, which are most used around these days. Completely suggestion of security network is directed on hardware firewall Cisco PIX, where is unfolded potential possibility of options. Futher, the third part contain some important tips and recommendation for completely working network, including setting security preference, security passwords and data encryption. Also, there is described various techniques monitoring and supervision working security network using complex monitoring software MARS (Cisco security monitoring, analyzing and response system) from Cisco company.
Worm conveyor
Sedláček, Martin ; Jonák, Martin (referee) ; Malášek, Jiří (advisor)
This bachelor thesis deals with calculation and construction of worm conveyor for slightly sloping transport. The whole work is divided into two main sections, which include structural and textual parts. The text contains analysis of option for single parts of conveyor, functional and strength calculations, which are necessary for proposal of worm conveyor. The structural part includes mechanical drawings, which consists of drawing of configuration and drawings of details for worm shaft.

National Repository of Grey Literature : 21 records found   previous11 - 20next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.