919 research outputs found

    Wie repräsentativ sind die Messdaten eines Honeynet?

    Get PDF
    Zur Früherkennung von kritischen Netzphänomenen wurden in der Vergangenheit viele Arten von verteilten Sensornetze im Internet etabliert und erforscht. Wir betrachten das Phänomen Verteilung von bösartiger Software im Netz'', das punktuell etwa mit dem InMAS-Sensorsystem gemessen werden kann. Unklar war jedoch immer die Frage, wie repräsentativ die Daten sind, die durch ein solches Sensornetz gesammelt werden. In diesem Dokument wird ein methodisches Rahmenwerk beschrieben, mit dem Maßzahlen der Repräsentativität an Messungen von Malware-Sensornetzen geheftet werden können. Als methodischer Ansatz wurden Techniken der empirischen Sozialforschung verwendet. Als Ergebnis ist festzuhalten, dass ein Sensornetz mit mindestens 100 zufällig über den Netzbereich verteilten Sensoren notwendig erscheint, um überhaupt belastbare Aussagen über die Repräsentativität von Sensornetz-Messungen machen zu können

    Zur Nutzung von Verkehrsdaten im Rahmen der Vorratsdatenspeicherung

    Full text link
    Dieser Bericht entstand aus Anlass einer Anfrage des Bundesverfassungsgerichts im Rahmen der Verfassungsbeschwerden 1 BvR 256/08, 263/08, 586/08. Teil der Anfrage war ein Fragenkatalog, zu dem ich als sachkundiger Dritter Stellung nehmen sollte. Statt einer listenhaften Beantwortung der Fragen habe ich mir erlaubt, die technischen Hintergründe in einer zusammenhängenden Diskussion darzustellen. Der Bezug zu den Fragen aus dem Fragenkatalog, zu denen ich mich sachkundig fühlte, wird im Anhang explizit hergestellt

    New Service Ventures – Struggling for Survival

    Get PDF

    Toward General Purpose 3D User Interfaces: Extending Windowing Systems to Three Dimensions

    Get PDF
    Recent growth in the commercial availability of consumer grade 3D user interface devices like the Microsoft Kinect and the Oculus Rift, coupled with the broad availability of high performance 3D graphics hardware, has put high quality 3D user interfaces firmly within the reach of consumer markets for the first time ever. However, these devices require custom integration with every application which wishes to use them, seriously limiting application support, and there is no established mechanism for multiple applications to use the same 3D interface hardware simultaneously. This thesis proposes that these problems can be solved in the same way that the same problems were solved for 2D interfaces: by abstracting the input hardware behind input primitives provided by the windowing system and compositing the output of applications within the windowing system before displaying it. To demonstrate the feasibility of this approach this thesis also presents a novel Wayland compositor which allows clients to create 3D interface contexts within a 3D interface space in the same way that traditional windowing systems allow applications to create 2D interface contexts (windows) within a 2D interface space (the desktop), as well as allowing unmodified 2D Wayland clients to window into the same 3D interface space and receive standard 2D input events. This implementation demonstrates the ability of consumer 3D interface hardware to support a 3D windowing system, the ability of this 3D windowing system to support applications with compelling 3D interfaces, the ability of this style of windowing system to be built on top of existing hardware accelerated graphics and windowing infrastructure, and the ability of such a windowing system to support unmodified 2D interface applications windowing into the same 3D windowing space as the 3D interface applications. This means that application developers could create compelling 3D interfaces with no knowledge of the hardware that supports them, that new hardware could be introduced without needing to integrate it with individual applications, and that users could mix whatever 2D and 3D applications they wish in an immersive 3D interface space regardless of the details of the underlying hardware

    Modern condition of labor migration from Ukraine to the EU and the prospects for its regulation

    Get PDF
    The analysis of state and development dynamics of labour migration from Ukraine to the EU made in the context of: gender, age, level of education, country of destination, sector of employment and so on. Special attention is paid to the migration to Poland as the host country of the highest, among EU countries, of labour migrants from Ukraine. It also evaluated individual aspects of migration of Ukrainian youth in the EU countries with the aim of obtaining higher education. The obtained results can be used as an information base for the development of a system of measures of state poliks in the field of labour migration

    Using Memory Management to Detect and Extract Illegitimate Code for Malware Analysis

    Full text link
    Exploits that successfully attack computers are mostly based on some form of shellcode, i.e., illegitimate code that is injected by the attacker to take control of the system. Detecting and extracting such code is the first step to detailed analysis of malware containing illegitimate code. The amount and sophistication of modern malware calls for automated mechanisms that perform such detection and extraction. In this paper we present a novel generic and fully automatic approach to detect the execution of illegitimate code and extract such code upon detection. The basic idea of the approach is to flag critical memory pages as non-executable and use a modified page fault handler to dump corresponding memory pages. We present an implementation of the approach for the Windows platform called CWXDetector. Evaluations using malicious PDF documents as example show that CWXDetector produces no false positives and has a similarly low false negative rate

    Fee hunting - extra income?

    Get PDF
    Date taken from stamp on cover page"In times of economic uncertainty, it makes good sense for Missouri farmers to consider alternative sources of income from their land. One such income source is fee hunting, or the leasing of hunting rights on private property. Although popular in a number of other states, fee hunting is not a common practice in Missouri. In this booklet, we will present the latest information on the subject and try to offer a balanced view of this alternative enterprise for Missouri farms."--IntroductionBarbara Bassett (Writing Consultant), Deretha Freiling (Extension Fish and Wildlife Specialist), Cooperative Extension ; University of Missouri--ColumbiaIncludes bibliographical reference

    Der Bestand der Ringeltaube (Columba palumbus) in der Innenstadt von Münster/Westfalen 1989 und 2008

    Get PDF
    Eine Erfassung der Ringeltaubennester im Herbst 2008 ergab 1134 Nester auf einer Fläche von 3,4 km² in der Innenstadt von Münster. Das entspricht einer durchschnittlichen Dichte von etwa 334 Nestern / km². Zuvor waren auf gleicher Fläche von Scharlau & Scharlau (1990) 1214 Nester gefunden worden. Diese geringfügige Abnahme um ca. 7 % des Ringeltaubenbestandes liegt im Fehlerbereich der Erhebung. Die hohe Dichte wird auf die Lage der Solitärstadt Münster in landwirtschaftlich geprägtem Umfeld zurückgeführt. Die Auswahl der Nistbäume entspricht weitgehend dem Angebot. Linden sind der häufigste Nistbaum.In the centre of Münster 1134 nests of Woodpigeons were counted in autumn 2008. In a former survey Scharlau & Scharlau (1990) found in the same area 1214 nests. A probable decline of 7 % of the estimated breeding stock is within the range of error. High breeding density is supported by the situation of Münster within an agricultural hinterland. Most nests of the Woodpigeon were found in lime trees, but dispersion of nests corresponds to the abundance of tree species
    corecore