Essays about: "what is linux"

Showing result 1 - 5 of 35 essays containing the words what is linux.

  1. 1. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort

    University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Author : Peter Stegeby; [2023]
    Keywords : Intrusion detection; HIDS; NIDS; Signature-based; Linux; Windows; Sniffing packets; Upptäcka intrång; HIDS; NIDS; Signatur-baserad; Linux; Windows; Paketsniffing.;

    Abstract : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. READ MORE

  2. 2. P-cores and E-cores in virtual machines

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Philip Andersson; [2023]
    Keywords : ;

    Abstract : In 2021, Intel released a new generation of consumer processors that had two different types of cores; they called them the efficiency-cores and the performance-cores, or for short, the E-cores and the P-cores. The release of these processors sparked interest in the potential impact if they were introduced into the enterprise market. READ MORE

  3. 3. Analyzing the Performance of Linux Networking Approaches for Packet Processing : A Comparative Analysis of DPDK, io_uring and the standard Linux network stack

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Maximilian Vorbrodt; Isak Toivanen; [2023]
    Keywords : linux computer dpdk kernel io_uring network packets processing;

    Abstract : This thesis investigates the network performance of DPDK, io_uring, and the standard Linux network stack in terms of latency, packet loss, throughput, and packet rate. DPDK is widely adopted in the telecommunication industry and has been for several years. READ MORE

  4. 4. Howthe difficulty of obtaining intrusion artifacts can influence threat modeling : An experiment that shows how IT forensics can be used preventingly

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oscar Meyer; [2022]
    Keywords : Threat modeling; IT Forensics; Linux; IT Defense; Risk assessment; Opensource; Volatility; Hotmodellering; IT Forensik; Linux; IT Försvar; Risk-bedömning; Opensource; Volatility;

    Abstract : IT system intrusions are a problem today and the belief that all you need is a strong outer defense has faded. Today continuous monitoring of the IT infrastructure is widespread and alerts are continuously investigated. READ MORE

  5. 5. Doc-Overdue – An Automated Configuration File State Finder for Debian Systems

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Tobias Björkdahl; [2022]
    Keywords : Configuration files; config; Debian; Ubuntu; detection; Linux; python; configuration file detection;

    Abstract : Configuration files are a vital part of any server setup. Knowing what configuration files have been manipulated is vital in knowing what services are running and how they are configured on a system. Changes made to these configuration files must be manually documented or collected using some automated documentation tool. READ MORE