Essays about: "linux users"

Showing result 1 - 5 of 35 essays containing the words linux users.

  1. 1. Creating a graphical user interface for cross-platform devices with a user-centered agile process

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Meriton Bytyqi; [2022]
    Keywords : Cross-Platform; User Interface; Linux; Android; User Centered Design; Agile Process; Contextual Design;

    Abstract : PC-Dart is a software that the Swedish Armed Forces use to communicate when active on the field. They are limited to using the program only on Windows operating system, and their devices are not suitable for challenging contexts. READ MORE

  2. 2. Web Penetration testing : Finding and evaluating vulnerabilities in a web page based on C#, .NET and Episerver

    University essay from KTH/Datavetenskap

    Author : Ameena Lundquist Amir; Ivan Khudur; [2022]
    Keywords : Ethical hacking; Penetration testing; Cybersecurity; DREAD; HTTP; HTTPS; Episerver; Kali Linux; Burp Suite; SQL injection; XSS; HTTP Method Tampering; Directory Traversal; HSTS; IDOR; Authentication; MFA;

    Abstract : Today’s society is highly dependent on functional and secure digital resources, to protect users and to deliver different kinds of services. To achieve this, it is important to evaluate the security of such resources, to find vulnerabilities and handle them before they are exploited. This study aimed to see if web applications based on C#, . READ MORE

  3. 3. Masquerader Detection via 2fa Honeytokens

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Anton Wiklund; [2021]
    Keywords : Cyber security deception; two-factor authentication 2fa ; honeytoken; misinformation; intrusion detection;

    Abstract : Detection of insider threats is vital within cybersecurity. Techniques for detection include honeytokens, which most often are resources that, through deception, seek to expose intruders. One kind of insider that is detectable via honeytokens is the masquerader. READ MORE

  4. 4. Visualizing large page mappings : A tool to understand memory mappings of program

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Robin Olsson; [2021]
    Keywords : ;

    Abstract : Larger page file sizes were introduced to increase the TLB's reach. Although using large pages might improve performance, it might also introduce performance degradation. READ MORE

  5. 5. Building and Evaluating a Full Disk Encrypted Secure Multi-user Operating Platform in Linux

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Peter Boström; [2021]
    Keywords : ;

    Abstract : Security is more important than ever, and since we are storing much of our sensitive data on hard drives, the demand for security systems is high. Full disk encrypted systems where multiple users can decrypt the same hard drive using the same secret but with different credentials are not common and is something that the military and various companies demand. READ MORE