1,243 research outputs found

    Samba Openldap Performance in a Simulated Environment

    Get PDF
    The Information Technology world is developing so fast and it is been reported that Open Source tools will eventually take over proprietary tools in no to distant future. The Open Source Community is integrating its products with that of the proprietary ones and the integration of Windows machines into Linux network is evident of such practices. The purpose of this project is to implement Samba with OpenLDAP in a simulated environment. This implementation is conducted within a virtual environment by simulating the setup of Linux and Windows Operating systems by reducing physical setup of machines. Samba will act as an interface between Linux and Windows, files will be accessible to both server and client. OpenLDAP stores the user accounts and configuration files. A performance test carried out on Samba determining effect on CPU power and Memory usage shows a decrease in the CPU power and an increase in Memory usage

    On the genesis of computer forensis

    Get PDF
    This thesis presents a coherent set of research contributions to the new discipline of computer forensis. It analyses emergence of computer forensis and defines challenges facing this discipline, carries forward research advances in conventional methodology, introduces novel approach to using virtual environments in forensis, and systemises the computer forensis body of knowledge leading to the establishment of tertiary curriculum. The emergence of computer forensis as a separate discipline of science was triggered by evolution and growth of computer crime. Computer technology reached a stage when a conventional, mechanistic approach to collecting and analysing data is insufficient: the existing methodology must be formalised, and embrace technologies and methods that will enable the inclusion of transient data and live systems analysis. Further work is crucial to incorporate advances in related disciplines like computer security and information systems audit, as well as developments in operating systems to make computer forensics issues inherent in their design. For example: it is proposed that some of the features offered by persistent systems could be built into conventional operating systems to make illicit activities easier to identify and analyse. The analysis of permanent data storage is fundamental to computer forensics practice. There is very little finalised, and a lot still to be discovered in the conventional computer forensics methodology. This thesis contributes to formalisation and improved integrity of forensic handling of data storage by: formalising methods for data collection and analysis in NTFS (Microsoft file system) environment: presenting safe methodology for handling data backups in order to avoid information loss where Alternate Data Streams (ADS) are present: formalising methods of hiding and extracting hidden and encrypted data. A significant contribution of this thesis is in the field of application of virtualisation, or simulation of the computer in the virtual environment created by the underlying hardware and software, to computer forensics practice. Computer systems are not easily analysed for forensic purpose, and it is demonstrated that virtualisation applied in computer forensics allows for more efficient and accurate identification and analysis of the evidence. A new method is proposed where two environments used in parallel can bring faster and verifiable results not dependent on proprietary, close source tools and may lead to gradual shift from commercial Windows software to open source software (OSS). The final contribution of this thesis is systemising the body of knowledge in computer forensics, which is a necessary condition for it to become an established discipline of science. This systemisation led to design and development of tertiary curriculum in computer forensics illustrated here with a case study of computer forensics major for Bachelor of Computer Science at University of Western Sydney. All genesis starts as an idea. A natural part of scientific research process is replacing previous assumptions, concepts, and practices with new ones which better approximate the truth. This thesis advances computer forensis body of knowledge in the areas which are crucial to further development of this discipline. Please note that the appendices to this thesis consist of separately published items which cannot be made available due to copyright restrictions. These items are listed in the PDF attachment for reference purposes

    System z and z/OS unique Characteristics

    Get PDF
    Many people still associate mainframes with obsolete technology. Surprisingly, the opposite is true. Mainframes feature many hardware, software, and system integration technologies, that are either not at all, or only in an elementary form, available on other server platforms. On the other hand, we know of no advanced server features which are not available on mainframes. This paper lists some 40 advanced mainframe technologies. There is a short description of each item together with a literature reference for more information

    Computer forensics methodology and praxis.

    Get PDF
    This thesis lays the groundwork for creation of a graduate-level computer forensics course. It begins with an introduction explaining how computing has invaded modern life and explains what computer forensics is and its necessity. The thesis then argues why universities need to be at the forefront of educating students in the science of computer forensics as opposed to proprietary education courses and the benefits to law enforcement agencies of having a computer scientist perform forensic analyses. It continues to detail what computer forensics is and is not. The thesis then addresses legal issues and the motivation for the topic. Following this section is a review of current literature pertaining to the topic. The last half of the thesis lays a groundwork for design of a computer forensics course at the graduate level by detailing a methodology to implement which contains associated laboratory praxis for the students to follow

    Customization and automation in the future of digital forensics: live OS forensics with FENIX (forensic examiner unix)

    Get PDF
    FENIX (Forensic Examiner uNIX) is a Linux based live OS (Operating System) created to be used in remote environments for incident response and digital forensics. Between a joint effort between the Center for Information Protection (CIP) and the Iowa State University Police Department (ISUPD), FENIX has been tailored to suit the needs and requests of law enforcement forensic specialists. The very basis for FENIX is to allow ISU police officers the ability to carry an easy to operate and customize forensic toolkit with them at the scene of a crime allowing for better acquisitions and a deeper analysis to be conducted in an investigation. FENIX isn\u27t a standard forensic toolkit as others are. FENIX is a custom build of the Linux kernel with several of its own applications created for specific OS and forensic purposes and designed for a user friendly interface. However, since most users will be more familiar with existing tools those tools have the ability to interface easily with FENIX

    A basic web-based distance education model

    Get PDF
    Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2005Includes bibliographical references (leaves: 147)Text in English; Abstract: Turkish and Englishxv, 201 leavesDuring the recent years, the rapid growth of the Web and multimedia technologies urged a shift of Computer-Based Educational Technology towards the Web. In the leading universities of the developed countries, studies on Web-Based Education have started and in an increasing manner are going strong. In the last few years, the leading universities of Turkey are also greatly interested in Web-Based Education and have started their re-structuring accordingly.The goal of this study is to design a basic model to be utilized by a university aiming to offer web-based distance education. In achieving this; by the use of system approach, a model comprising of three subsystems, namely system analysis, system design and evaluation&control, working in coordination with each other, has been tried to be proposed. There may be only one missing point of this study, that is; since preparing a lesson or program according to this model was not foreseen in this thesis, the effectiveness evaluations suggested in the evaluation&control subsystem could not be realized. It is recommended to realize such an evaluation in a further study to make it possible to reveal the effectiveness of web-based education by preparing a lesson or program according to this model.On the other hand, a survey has been conducted in Turkey in some of the universities either offering web-based education or are interested in studies in this field.The aim of this survey is to analyze from system design point of view the studies carried out in our universities on this matter and to get a picture of the existing situation.The directed questions aiming this were prepared by taking into consideration of the three stages of system design subsystem, i.e. administrative design, educational design, and technological design. It is intended for the result of this survey to shed light to the new-coming institutions in this field. As a matter of fact, each stage of this subsystem is a survey item itself and should be researched one by one in other studies.Furthermore, for individuals interested in distance education and web-based distance education and for people newly involved in this matter, this thesis is intended to be a reference material and to serve this purpose the sections are prepared containing the basic information accordingly. Nevertheless, since most of the information regarding system design are prepared without taking into consideration the disabled people, the relevant information are not complete. In another study, the offering of the web-based education to the disabled people, especially for deaf, hard of hearing or speech impaired, and blind students, has to be investigated.Finally, in this thesis the proposed model for the Web-Based Distance Education, as being a basic and conceptual model, has a flexible structure; i.e., suitable for all the institutions and establishments intending to offer the web-based education.What is important here, is to exploit the potential sources within the institution that will display the required systematic approach

    Using neural networks for detection of anomalous traffic in automation networks

    Get PDF
    Opening of local communication means of technological devices towards networks available to public, supervision of devices, and remote technological devices administration are the characteristics of modern automation. As a result of this process the intrusion of unwanted elements from the Internet to control networks is seen. Therefore, in communication and control networks we have to build in active means to ensure the access to individual technological process components. The contribution is focused on the insurance of control systems data communication via neural networks technologies in connection with classical methods used in expert systems. The solution proposed defines the way of data elements identification in transfer network, solves the transformation of their parameters for neural network input and defines the type and architecture of a suitable neural network. This is supported by the experiments with various architecture types and neural networks activation functions and followed by subsequent real environment tests. A functional system proposal with possible practical application is the result

    Developing a Methodology for Creating Flexible Instructional Information Technology Laboratories

    Get PDF
    Many schools - particularly the more dynamic segments of high schools and community colleges - have begun to undertake instruction in the areas of PC repair, networking (vendor-neutral and specific alike), operating systems, wireless technologies, and so forth. For some schools, however, this leap forward has come only with a later realization that there are tremendous startup costs and ongoing expenses associated with such endeavors, especially considering that many of these instructional elements have historically called for independent instructional facilities. From this perspective, institutions may find they have to cut their programmatic vision short in the face of harsher budgetary realities of supporting so many laboratories, or abandon their efforts altogether. In this paper, it is suggested that this scenario does not have to become a reality. Instead, it is proposed that affordable, functional, and practical multipurpose Information Technology (IT) classrooms can be developed when a combination of good initial design and planning, affordable technologies, and mature business models are practiced. With the application of certain methodologies, a system can be created for any institution wishing to develop facilities and the means to support and mature them over time. Often faced with budgetary constraints, space limitations, or uncertain financial support mechanisms, it is becoming important that higher education institutions engaging in the instruction of advanced computing and networking develop a process and methodology for establishing and maintaining computing laboratories that can service a variety of diverse and complex instructional needs
    corecore