National Repository of Grey Literature 4 records found  Search took 0.01 seconds. 
Application for prevention of illegal and unwanted software using
Popovský, Jakub ; Heriban, Pavel (referee) ; Roupec, Jan (advisor)
The aim of this thesis is to develop an application for MS Windows, that will prevent using of unwanted and / or illegal software in the local computer network. Application must be as least demanding on system resources as possible.
Rootkits Classification
Plocek, Radovan ; Křoustek, Jakub (referee) ; Hruška, Tomáš (advisor)
This paper describes information about current most widespread methods, which are used by rootkits. It contains basic information connected with development of rootkits, such as process registers, memory protection and native API of Windows operation system. The primary objective of this paper is to provide overview of techniques, such as hooking, code patching and direct kernel object modification, which are used by rootkits and present methods to detect them. These methods will be then implemented by detection and removal tools of rootkits based on these techniques.
Rootkits Classification
Plocek, Radovan ; Křoustek, Jakub (referee) ; Hruška, Tomáš (advisor)
This paper describes information about current most widespread methods, which are used by rootkits. It contains basic information connected with development of rootkits, such as process registers, memory protection and native API of Windows operation system. The primary objective of this paper is to provide overview of techniques, such as hooking, code patching and direct kernel object modification, which are used by rootkits and present methods to detect them. These methods will be then implemented by detection and removal tools of rootkits based on these techniques.
Application for prevention of illegal and unwanted software using
Popovský, Jakub ; Heriban, Pavel (referee) ; Roupec, Jan (advisor)
The aim of this thesis is to develop an application for MS Windows, that will prevent using of unwanted and / or illegal software in the local computer network. Application must be as least demanding on system resources as possible.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.