58,046 research outputs found

    I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users' Privacy

    Get PDF
    In this paper, we show how to exploit real-time communication applications to determine the IP address of a targeted user. We focus our study on Skype, although other real-time communication applications may have similar privacy issues. We first design a scheme that calls an identified targeted user inconspicuously to find his IP address, which can be done even if he is behind a NAT. By calling the user periodically, we can then observe the mobility of the user. We show how to scale the scheme to observe the mobility patterns of tens of thousands of users. We also consider the linkability threat, in which the identified user is linked to his Internet usage. We illustrate this threat by combining Skype and BitTorrent to show that it is possible to determine the file-sharing usage of identified users. We devise a scheme based on the identification field of the IP datagrams to verify with high accuracy whether the identified user is participating in specific torrents. We conclude that any Internet user can leverage Skype, and potentially other real-time communication systems, to observe the mobility and file-sharing usage of tens of millions of identified users.Comment: This is the authors' version of the ACM/USENIX Internet Measurement Conference (IMC) 2011 pape

    Model ochrony dóbr niematerialnych na uczelniach polskich

    Get PDF
    The article provides an analysis of intangible goods protection at polish universities. The paper focuses on two main issues: who, by virtue of law, is entitled to intangible good created at university and whether or how to protect it. While the first aspect is regulated by law, the second one is left to decision of entitled person as a part of his IP policy. Establishing the owner of invention/ copyrights, author concentrates on main notions that require in-depth analysis: coauthorship, employee invention, work for hire, scope of employment at universities. Further, the article gives brief review of IP management policies at polish universities including possible modes of IP protection and university commercialization regulations. The analysis is based on relevant polish legal acts and exemplary universities internal regulations concerning IP management. Were needed comparative remarks to German, French and United States legal solutions were givenZaprezentowana analiza ochrony dóbr niematerialnych, w pierwszym rzędzie stawia pytanie: kto jest twórcą i komu z mocy ustawy przysługuje prawo do dobra niematerialnego? Istotne jest tutaj ustalenie, czy dokonanie dobra mieści się w zakresie obowiązków pracowniczych, co nie zawsze jest oczywiste. W dalszej kolejności omówione są kwestie związane z przeniesieniem praw oraz dylematy, jak i w ogóle „czy” dane dobro chronić, jak z prawa korzystać. O ile rozwiązanie kwestii podmiotu pierwotnie uprawnionego do dobra niematerialnego należy do ustawodawcy, o tyle problematyka eksploatacji prawa i jego przeniesienia należy już do decyzji uprawnionego. Problem jest szczególnie złożony w przypadku dóbr własności przemysłowej, gdyż tutaj, w przeciwieństwie do prawa autorskiego, prawo wyłączne nie powstaje ex lege z chwilą stworzenia dobra.Druk materiałów sfinansowano ze środków Ministerstwa Nauki i Szkolnictwa Wyższego w ramach projektu „Kreator innowacyjności – wsparcie innowacyjnej przedsiębiorczości akademickiej”

    Perancangan Sistem Konektifitas Intranet-internet Dengan Menggunakan Konsep Nat

    Full text link
    Intranet can be related to the Internet, and vice versa. To connect your intranet to the internet a lot of things to watch for the efficient and effective connectivity. Some important things that are addressing and internet security. Internet protocol used in the TCP / IP (Transmission Control Protocol / Internet Protocol), requires that every host or intend to connect computers into a network must have a unique IP address. So that when the intranet was about to be connected to the internet or any host computer that is connected must have an IP address in accordance with the rules of the addressing used in the internet. The concept of NAT (Network Address Translator) provides a solution to overcome the limitations of available IP addresses. Masquereding IP is the internet service which is the application of the concept of NAT that can reduce the demand for new IP addresses connecting ourselves into the internet and intranet can improve security. Masquereding IP is one of the additional capabilities on LINUX operating system
    corecore