Compromising Systems: Implementing Hacking Phases
نویسندگان
چکیده
منابع مشابه
Hacking Video Conferencing Systems
High-end videoconferencing systems are widely deployed at critical locations such as corporate meeting rooms or boardrooms. Many of these systems are reachable from the Internet or via the telephone network while in many cases the security considerations are limited to the secure deployment and configuration. We conducted a case study on Polycom HDX devices in order to assess the current state ...
متن کاملImplementing Object and Feature Detection Without Compromising the Performance
This thesis will cover how some computationally heavy algorithms used in digital image processing and computer vision are implemented with WebGL and computed on the graphics processing unit by utilizing GLSL-shaders. This thesis is based on an already implemented motion detection plug-in used in web based games. This plug-in is enhanced with new features and some already implemented algorithms ...
متن کاملCognitive Hacking
In this chapter, we define and propose countermeasures for a category of computer security exploits which we call "cognitive hacking." Cognitive hacking refers to a computer or information system attack that relies on changing human users' perceptions and corresponding behaviors in order to be successful. This is in contrast to denial of service (DOS) and other kinds of well-known attacks that ...
متن کاملHacking Davidson
Scheme,” Donald Davidson argues against the logical possibility of conceptual schemes. Believing it a remnant of the incomplete eradication of dogma in the empiricist tradition, Davidson wishes to undermine what he believes is the source of talk of conceptual relativism: the third dogma of scheme-content duality. Building on Quine, he constructs an argument intended to illustrate the peculiar p...
متن کاملHacking Cyberspace
Knowledge about cyberspace is shaped and delimited by the questions we ask and the kinds of inquiries we pursue. Questioning, of course, is never objective or neutral. As Martin Heidegger demonstrates, a question, no matter how carefully articulated, necessarily harbors preconceptions and pre-understandings that direct and regulate inquiry (24). When we ask, for example, whether cyberspace port...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Science and Information Technology
سال: 2019
ISSN: 0975-4660,0975-3826
DOI: 10.5121/ijcsit.2019.11203