Essays about: "macOS"

Showing result 1 - 5 of 7 essays containing the word macOS.

  1. 1. A Cross-Platform Always On VPN Solution for Ensuring Online Security

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Adam Thiede; Josef Samen; [2023]
    Keywords : Always On; VPN; Cross-Platform; Palo Alto;

    Abstract : This thesis examines the implementation of an Always On VPN solution for Windows 10 and macOS, focusing on the configuration of a Palo Alto Firewall to enable their GlobalProtect VPN as Always On. This means that the VPN solution is enabled on a device at all times. READ MORE

  2. 2. Transformation of a single-user system into a multi-user system with Swift

    University essay from KTH/Hälsoinformatik och logistik

    Author : Karl Janrik; Oscar Ekenlöw; [2022]
    Keywords : Swift; Vapor; Kitura; Perfect; Concurrency Control; Locking; Swift; Vapor; Kitura; Perfect; Samtidighetskontroll; Låsning;

    Abstract : Headlong Developments' application HeadmasterDev is currently adapted for a single user. To turn their application into a multi-user system the programming language Swift will be used. READ MORE

  3. 3. A performance evaluation of concurrent programming with the Swift actor model

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alex Diaz; [2022]
    Keywords : Concurrent programming; performance analysis; Swift; the actor model; Samtidig programkörning; prestandautvärdering; Swift; actor-modellen;

    Abstract : The Swift programming language recently introduced the actor model alongside Swift concurrency as a first-class citizen. Previously, concurrent programming in Swift required importing modules, e.g., Grand Central Dispatch. READ MORE

  4. 4. Building and Evaluating a Full Disk Encrypted Secure Multi-user Operating Platform in Linux

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Peter Boström; [2021]
    Keywords : ;

    Abstract : Security is more important than ever, and since we are storing much of our sensitive data on hard drives, the demand for security systems is high. Full disk encrypted systems where multiple users can decrypt the same hard drive using the same secret but with different credentials are not common and is something that the military and various companies demand. READ MORE

  5. 5. Towards Extending Probabilistic Attack Graphs with Forensic Evidence : An investigation of property list files in macOS

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Olle Hovmark; Emma Schüldt; [2020]
    Keywords : ;

    Abstract : Cyber-attacks against all types of systems is a growing problem in society. Since the Mac operating systems are becoming more common, so are the attacks against them. Probabilistic attack graphs are a way to model cyber- attacks. READ MORE