National Repository of Grey Literature 49 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Network Game: Destroy the Submarine
Jašek, Petr ; Mlích, Jozef (referee) ; Szőke, Igor (advisor)
This Bachelor's Thesis describes development of a simple network computer game. This thesis describes basic scheme of computer game development. Also an analysis of various implementation of network is made in this thesis. The output of this work is a computer program written in the C++ language. For implementation of the network the Boost 1.50.0 library was used. Network communication was implemented as client-server architecture with usage of the UDP protocol. For implementation of graphics and sound, the Allegro 5.0.7 library was used.
Design and Creation of Proxy for Penetration Testing
Válka, Michal ; Bláha, Lukáš (referee) ; Dydowicz, Petr (advisor)
This bachelor’s thesis is aimed at design and development of proxy for penetration testing. The thesis is divided into three main parts and begins with a theoretical part, which is focused on fundamental technologies and principles on which the application is based. The second part is focused on comparison of currently available solutions. The third part contains the creation of the proxy itself. The last chapter contains a summary of this thesis and the benefits of the developed product for penetration testing.
iPhone as a Universal PC Input Device
Mataj, Lukáš ; Řezníček, Ivo (referee) ; Ševcovic, Jiří (advisor)
This bachelor thesis is concerned with making of an application, which enables to use mobile appliance iPhone as a wirelles universal input device of a computer. With this application we can simulate a keyboard, a numeric keyboard, a computer mouse, a touchpad and a game controller. We also shortly introduce an appliance iPhone and we get acquainted with the process of application development for this platform.
Network Protocol Analyzer
Hlísta, Juraj ; Žádník, Martin (referee) ; Tobola, Jiří (advisor)
Bachelor's thesis is concerned with methods of protocol detection at seventh layer of ISO/OSI network model. It focuses on proposal and implementation of a system which is able to identify aplication protocols from packet's data field. This part of packet contains signatures that the analyzer searches for using regular expressions. The application was written in C programming language using libpcap library that provides API for capturing network communication.
XMPP protocol Jabber features and its utilization for multimedia transmission
Havlena, Petr ; Průša, Zdeněk (referee) ; Šmirg, Ondřej (advisor)
Master’s thesis is trying to create opensource IM application for communication in Jabber network. In nowadays it is getting more and more popularity as at providers, so mainly at end users. In first half of thesis are explained basics of whole issues and in second half is described resulting application, which has been created by using of object oriented programming language Java. Java is very extended between programmers for her simplicity and great support. Thanks this is available a many external libraries and extensions. Application has been written on Smack library in version 3.04 and VoIP module on JMF (Java Media Framework). Graphic interface has been created by using of standard Java visual components (javax.swing).
Advanced proxy for penetration testing
Válka, Michal ; Vilém,, Šlesinger (referee) ; Sedlák, Petr (advisor)
This master’s thesis focuses on improving the open-source proxy tool for penetration testing of thick clients. The thesis is divided into three main chapters, the first of which is focused on the theoretical background on which the thesis is based. The second chapter describes the analysis of the current state and defines user requirements, which must be met. The third chapter deals with increasing the quality and expanding the functionality based on user requirements. At the same time, a testing methodology is created and a vulnerable application is developed as a teaching material for the methodology. The chapter concludes with a summary of the economic costs and benefits of the application for the penetration testing process.
Acquisition of data on network communication from terminal devices
Obršlík, Lukáš ; Šedý, Jakub (referee) ; Krkoš, Radko (advisor)
The bachelor’s thesis deals with collecting statistical information about network communication in terminal equipment devices. Theoretical part of this project aims to gather methods and application tools on Windows and Unix platforms and support them by well chosen third party solution to gain more detailed informations. Tools were chosen based on ease of deployment and usage. Practical part of bachelor’s thesis directs to find suitable solution to gather detailed informations about network traffic. Important fact must be to not bother the end-users. Next part is to develop own application for collecting information about network usage and communication. Output format structure of the solution was designed with future data manipulation in mind.
Identifying P2P Users Using Traffic Analysis
Jalsovszky, Zoltán ; Tobola, Jiří (referee) ; Žádník, Martin (advisor)
Bachelor's thesis deals with methods of detection of P2P users like BitTorrent, DC++, Gnutella and others. An application was created, which is able to detect these users using multiple ways. This method combines analysis of packet payload and analysis of network traffic and flows, so more exact detection is possible. Application is written in C++ programming language, and is built on open-source tool L7-filter.
Costs of Running a Car Administration - an Android Application
Kleštinec, Vladimír ; Řezníček, Ivo (referee) ; Kubíček, Radek (advisor)
This work deals with creation of an application for an Android operating system, which will provide effective management of car costs. The important part of this work is communication and synchronization with a remote server.Whole application aims to provide friendly user inteface, which will be very effective to use.
IEC 61850 industrial communication simulator
Srp, Jakub ; Pospíšil, Ondřej (referee) ; Blažek, Petr (advisor)
This thesis is focused on IEC 61850 communication protocols SMV, GOOSE and MMS and their implementation in SCADA systems. There is a simulator, run on Raspberry Pi, that generates data according to IEC 61850 and transmits the data using protocols in question. The simulation consist of various virtual devices e.g. surge protection, undervoltage protection, circuit breaker, disconnector, HMI. The MMS protocol is used for station control. Simulation can be user-defined from textual configuration file.

National Repository of Grey Literature : 49 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.