Evaluation of tools for protection of interest against hacking and cracking

نویسندگان

  • Hossein Jahankhani
  • Branko Antonijevic
  • Terry Walcott
  • Hossein Jahankani
چکیده

The internet considered a tool that effectively ensures communication globally has been hindered by hackers and crackers continuously. In so doing, a multitude of network facilitated tools such as firewalls, virtual private networks (VPN) and a variety of antivirus software packages has been enabled for dealing with such predicaments. However, more often than not these facilitated tools are marketed as perfect solutions to the ever culminating problems such as loss of data and privacy in networked and world wide intercommunications. We provide a forum for addressing these perceived problems in this paper.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protection of Web Application against Sql Injection Attack

Web applications are used by many users.web applications are consist of web forms, web server and backend. These applications are vulnerable due to attacks and scripts as the number of web application users are increasing. Web application can have sensitive and confidential data which is stored in database.web applications accepts the data from the users. This data is retrieved from the databas...

متن کامل

Next Generation of Terrorism: Ubiquitous Cyber Terrorism with the Accumulation of all Intangible Fears

It is an urgent, imminent and present danger that we have to focus on the traditional terrorists, who are transforming ICT into the modern attacking tools that can devastate the metropolitan areas with the deconstruction of critical infrastructures via the computer network using state-of-the-art hacking and cracking technologies. The cyber terrorists could inflict catastrophic loss or damage on...

متن کامل

An Analysis of Markov Password Against Brute Force Attack for Effective Web Applications

Computer is omnipresent. With massive growth in the field of computers, advancement in digital technology, development in software’s gives improvement to computer field on one side. Hacking the systems and cracking the login Passwords makes the field in endure on the other hand. Authentication to access an application in networks is mostly based on alphanumeric Password. A novel method of Alpha...

متن کامل

Evaluation of microstructure and mechanical properties of 410NiMo as an overlay layer on low alloy steel

The aim of this study is to reach an increased service life for parts using in sour environment by weld overlaying process. In this investigation, two successive layers of ER410NiMo were clad on low alloy steel substrates. To reduce the likelihood of Hydrogen Induced Cracking (HIC) and producing stable hydrogen traps, Post Weld Heat Treatment (PWHT) was conducted. Microstructural analysis, X-ra...

متن کامل

Evaluation of microstructure and mechanical properties of 410NiMo as an overlay layer on low alloy steel

The aim of this study is to reach an increased service life for parts using in sour environment by weld overlaying process. In this investigation, two successive layers of ER410NiMo were clad on low alloy steel substrates. To reduce the likelihood of Hydrogen Induced Cracking (HIC) and producing stable hydrogen traps, Post Weld Heat Treatment (PWHT) was conducted. Microstructural analysis, X-ra...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012