Essays about: "debian"

Showing result 1 - 5 of 11 essays containing the word debian.

  1. 1. Japanese Translation of Technical Terms in Debian

    University essay from Högskolan Dalarna/Institutionen för språk, litteratur och lärande

    Author : Andreas Gustafsson; [2022]
    Keywords : Catford’s probabilistic notion of textual equivalence; technical term translation; Debian; quantitative translation; Japanese translation; information technology translation;

    Abstract : The notion that consistency is important when translating technical terms is nothing new in itself. Despite this, it is not uncommon to see the very same technical terms being translated into a multitude of words, even when various efforts to unify the process have been proposed. READ MORE

  2. 2. Doc-Overdue – An Automated Configuration File State Finder for Debian Systems

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Tobias Björkdahl; [2022]
    Keywords : Configuration files; config; Debian; Ubuntu; detection; Linux; python; configuration file detection;

    Abstract : Configuration files are a vital part of any server setup. Knowing what configuration files have been manipulated is vital in knowing what services are running and how they are configured on a system. Changes made to these configuration files must be manually documented or collected using some automated documentation tool. READ MORE

  3. 3. Building and Evaluating a Full Disk Encrypted Secure Multi-user Operating Platform in Linux

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Peter Boström; [2021]
    Keywords : ;

    Abstract : Security is more important than ever, and since we are storing much of our sensitive data on hard drives, the demand for security systems is high. Full disk encrypted systems where multiple users can decrypt the same hard drive using the same secret but with different credentials are not common and is something that the military and various companies demand. READ MORE

  4. 4. Security Assessment and *nix Package Vulnerabilities

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Per Sandgren; [2018]
    Keywords : *nix; Vulnerabilities; Parsing; IT-security; Mitigation;

    Abstract : Background. Vulnerabilities in software provides attackers with the means to fulfill unlawful behavior. Since software has so much power, gaining control over vulnerabilities can mean that an attacker gains unauthorized powers. Since vulnerabilities are the keys that let attackers attack, vulnerabilities must be discovered and mitigated. READ MORE

  5. 5. One kernel to rule them all : An experimental study inspecting the Meltdown patch effects on the costs of system calls in systemd-nspawn containers

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Ben Kooijman; [2018]
    Keywords : Linux; containers; systemd-nspawn; Meltdown; KAISER; system calls; Linux; containers; systemd-nspawn; Meltdown; KAISER; systemanrop;

    Abstract : Context. The paradigm of virtualization is rapidly changing due to hardware optimization and capabilities, while also due to rapid development and deployment strategies used in the modern day IT industry. Just like the positive changes, negative effects are necessary to occur in order to improve modern day technologies. READ MORE