Unauthorized Access via the IRIX Telnetd Exploit in a College
نویسنده
چکیده
منابع مشابه
Secrecy of Communications in Data Transmission by Impulses with Unknown Moments of Appearance and Disappearance
We carried out a comparative analysis of the algorithms for detecting a rectangular impulse against Gaussian white noise under either authorized or unauthorized access to the transmitted data. We presupposed that for data transmission the binary communication system is used and that the useful information in the data is whether the signal is present or absent. The case is that unauthorized acce...
متن کاملAn automatic test case generator for evaluating implementation of access control policies
One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...
متن کاملUsing Digital Right Management technology in IRANDOC ETD System
Background and Aim: Easing the probability of violation of intellectual property rights and unauthorized access of digital resources is one of the most important consequences of information and communication technologies like Internet. The purpose of this research is to identify the state of Using Digital Right Management technology in IRANDOC ETD system. Method: This research is an applied re...
متن کاملoverview of ways to enhance the security of video surveillance networks using blockchain
In recent decades, video surveillance systems have an increasing development that are used to prevent crime and manage facilities with rapid diffusion of (CCTV)cameras to prevent crime and manage facilities. The video stored in the video surveillance system should be managed comfortably, but sometimes the movies are leaking out to unauthorized people or by unauthorized people, thus violating i...
متن کاملWebsite Penetration via Search
By using a search engine such as Google, a security breach in a website can be located. There are two types of vulnerabilities, software vulnerabilities and misconfigurations. Majority of the hackers try to exploit already known misconfigurations and locate a system that has a similar security flaw. The aim of this report is to examine such vulnerabilities by practically trying to penetrate a w...
متن کامل