Essays about: "spyware"

Showing result 1 - 5 of 13 essays containing the word spyware.

  1. 1. Scalable Methods for Spam Protection in Decentralized Peer-to-Peer Networks

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Jonathan Wernberg; [2016]
    Keywords : Spam Protection; Decentralized Peer-to-Peer Networking; Scalability; Public Key Infrastructure; Trust Graph; Trust List; Distributed Hash Table; Kademlia; Technology and Engineering;

    Abstract : Decentralized peer-to-peer networks offer several benefits over the today more commonly employed centralized client-server networks. Peer-to-peer networks allow for seamless distribution of web content over all participating nodes. This makes the hosting and access of web content much more fault tolerant, secure, faster and cheaper. READ MORE

  2. 2. Evaluate Security on the Internet Cafe

    University essay from Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE)

    Author : Azeez Paul Akinola; Chong Zhang; [2013]
    Keywords : network security; WPA WPA2; WEP; WIFI; BACKTRACK; CRACKING;

    Abstract : Internet security (Network security) is a big topic that is very important in our society communication system, but it is extremely dynamic and wide in scope. This is the reason that many companies and organizations invest heavily in a dedicated infrastructure security and highly trained specialists. READ MORE

  3. 3. Automated Analysis of End User License Agreements

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Faisal Mateen & Irfan Hussain; [2011]
    Keywords : Spyware; End User License Agreement; Legitimate illegitimate Software; Unpack Installer;

    Abstract : Context Spyware is “computer software that obtains information from a user's computer without the user's knowledge or consent” [25]. Spyware is often embedded in another application and is usually stated in End User License Agreement (EULA) [20]. However it is quite common to accept the EULA without even reading it. READ MORE

  4. 4. System Integrity for Smartphones : A security evaluation of iOS and BlackBerry OS

    University essay from Informationskodning

    Author : Fredrik Hansson; [2011]
    Keywords : Smartphone; Integrity; iOS; BlackBerry OS; Risk analysis;

    Abstract : Smartphones are one of the most popular technology gadgets on the market today. The number of devices in the world is growing incredibly fast and they have today taken an important place in many person's everyday life. READ MORE

  5. 5. An implementation of a DNS-based malware detection system

    University essay from Karlstads universitet

    Author : Markus Fors; Christian Grahn; [2010]
    Keywords : DNS; malware; implementation; IDS; Botnet; DMDS; detection system; spyware.;

    Abstract : Today’s wide usage of the Internet makes malicious software (malware) and botnets a big problem. While anti-virus software is commonplace today, malware is constantly evolving to remain undetected. Passively monitoring DNS traffic on a network can present a platform for detecting malware on multiple computers at a low cost and low complexity. READ MORE