19 research outputs found

    Bardet-Biedl syndrome with end-stage kidney disease in a four-year-old Romanian boy: a case report

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Bardet-Biedl syndrome is a significant genetic cause of chronic kidney disease in children. Kidney abnormalities are a major cause of morbidity and mortality in Bardet-Biedl syndrome, but the onset of end-stage renal disease at an early age and continuous ambulatory peritoneal dialysis, however, are not commonly mentioned in the literature.</p> <p>Case presentation</p> <p>We present the case of a four-year-old Romanian boy who presented to our department with 'febrile seizures'. After an initial evaluation, we diagnosed our patient as having hypertension, severe anemia and end-stage renal disease. He met the major and minor criteria for the diagnosis of Bardet-Biedl syndrome and underwent continuous ambulatory peritoneal dialysis.</p> <p>Conclusions</p> <p>Close follow-up for renal involvement in patients with Bardet-Biedl syndrome and Alström syndrome from an early age is highly recommended to prevent end-stage renal disease and so renal replacement therapy can be started immediately.</p

    Implementation of Honeypots

    No full text
    Providing security to the server data is the greatest challenge. Security activities range from keeping intruders out of the network or system, preventing the interception of information sent via the Internet and damage caused by computer viruses. Countermeasures are developed to detect or prevent attacks. Most of these measures are based on known facts, known attack patterns. Countermeasures such as firewalls and network intrusion detection systems are based on prevention, detection and reaction mechanism. But they are not able to gather much information about attackers. An Intrusion Detection System (IDS) is a device or software application that monitors network and system activities for malicious activities or policy violations. Then it produces reports to a Management station. Intrusion prevention is the process of performing intrusion detection and attempting to stop detected possible incidents. The main problem with current intrusion detection systems is high rate of false alarms. Use of honeypots provides effective solution to increase the security and reliability of the network. Honeypots are easy to use, capture the required information and mainly used by the corporate companies to secure their networks from the online hackers and unauthorized users

    Implementation of Honeypots

    Full text link
    Providing security to the server data is the greatest challenge. Security activities range from keeping intruders out of the network or system, preventing the interception of information sent via the Internet and damage caused by computer viruses. Countermeasures are developed to detect or prevent attacks. Most of these measures are based on known facts, known attack patterns. Countermeasures such as firewalls and network intrusion detection systems are based on prevention, detection and reaction mechanism. But they are not able to gather much information about attackers. An Intrusion Detection System (IDS) is a device or software application that monitors network and system activities for Malicious activities or policy violations. Then it produces reports to a Management station. Intrusion prevention is the process of performing intrusion detection and attempting to stop detected possible incidents. The main problem with current intrusion detection systems is high rate of false alarms. Use of honeypots provides effective solution to increase the security and reliability of the network. Honeypots are easy to use, capture the required information and mainly used by the corporate companies to secure their networks from the online hackers and unauthorized users

    Reply

    No full text
    corecore