Essays about: "linux users"
Showing result 1 - 5 of 35 essays containing the words linux users.
-
1. Creating a graphical user interface for cross-platform devices with a user-centered agile process
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : PC-Dart is a software that the Swedish Armed Forces use to communicate when active on the field. They are limited to using the program only on Windows operating system, and their devices are not suitable for challenging contexts. READ MORE
-
2. Web Penetration testing : Finding and evaluating vulnerabilities in a web page based on C#, .NET and Episerver
University essay from KTH/DatavetenskapAbstract : Today’s society is highly dependent on functional and secure digital resources, to protect users and to deliver different kinds of services. To achieve this, it is important to evaluate the security of such resources, to find vulnerabilities and handle them before they are exploited. This study aimed to see if web applications based on C#, . READ MORE
-
3. Masquerader Detection via 2fa Honeytokens
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Detection of insider threats is vital within cybersecurity. Techniques for detection include honeytokens, which most often are resources that, through deception, seek to expose intruders. One kind of insider that is detectable via honeytokens is the masquerader. READ MORE
-
4. Visualizing large page mappings : A tool to understand memory mappings of program
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Larger page file sizes were introduced to increase the TLB's reach. Although using large pages might improve performance, it might also introduce performance degradation. READ MORE
-
5. Building and Evaluating a Full Disk Encrypted Secure Multi-user Operating Platform in Linux
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Security is more important than ever, and since we are storing much of our sensitive data on hard drives, the demand for security systems is high. Full disk encrypted systems where multiple users can decrypt the same hard drive using the same secret but with different credentials are not common and is something that the military and various companies demand. READ MORE