26,053 research outputs found

    Ransomware in High-Risk Environments

    Get PDF
    In today’s modern world, cybercrime is skyrocketing globally, which impacts a variety of organizations and endpoint users. Hackers are using a multitude of approaches and tools, including ransomware threats, to take over targeted systems. These acts of cybercrime lead to huge damages in areas of business, healthcare systems, industry sectors, and other fields. Ransomware is considered as a high risk threat, which is designed to hijack the data. This paper is demonstrating the ransomware types, and how they are evolved from the malware and trojan codes, which is used to attack previous incidents, and explains the most common encryption algorithms such as AES, and RSA, ransomware uses them during infection process in order to produce complex threats. The practical approach for data encryption uses python programming language to show the efficiency of those algorithms in real attacks by executing this section on Ubuntu virtual machine. Furthermore, this paper analyzes programming languages, which is used to build ransomware. An example of ransomware code is being demonstrated in this paper, which is written specifically in C sharp language, and it has been tested out on windows operating system using MS visual studio. So, it is very important to recognize the system vulnerability, which can be very useful to prevent the ransomware. In contrast, this threat might sneak into the system easily, allowing for a ransom to be demanded. Therefore, understanding ransomware anatomy can help us to find a better solution in different situations. Consequently, this paper shows a number of outstanding removal techniques to get rid from ransomware attacks in the system

    Ransomware in High-Risk Environments

    Get PDF
    In today’s modern world, cybercrime is skyrocketing globally, which impacts a variety of organizations and endpoint users. Hackers are using a multitude of approaches and tools, including ransomware threats, to take over targeted systems. These acts of cybercrime lead to huge damages in areas of business, healthcare systems, industry sectors, and other fields. Ransomware is considered as a high risk threat, which is designed to hijack the data. This paper is demonstrating the ransomware types, and how they are evolved from the malware and trojan codes, which is used to attack previous incidents, and explains the most common encryption algorithms such as AES, and RSA, ransomware uses them during infection process in order to produce complex threats. The practical approach for data encryption uses python programming language to show the efficiency of those algorithms in real attacks by executing this section on Ubuntu virtual machine. Furthermore, this paper analyzes programming languages, which is used to build ransomware. An example of ransomware code is being demonstrated in this paper, which is written specifically in C sharp language, and it has been tested out on windows operating system using MS visual studio. So, it is very important to recognize the system vulnerability, which can be very useful to prevent the ransomware. In contrast, this threat might sneak into the system easily, allowing for a ransom to be demanded. Therefore, understanding ransomware anatomy can help us to find a better solution in different situations. Consequently, this paper shows a number of outstanding removal techniques to get rid from ransomware attacks in the system

    STUDI PERENCANAAN SISTEM DISTRIBUSI AIR BERSIH PADA GEDUNG DITRESKRIMSUS KEPOLISIAN DAERAH JAWA TIMUR

    Get PDF
    The plumbing system is an inseparable part of a high-rise building. The plumbing system is used for various purposes such as providing clean water and distributing sewage and waste water. To meet the needs of clean water in the Ditreskrimsus Building of the East Java Regional Police, requires planning a clean water distribution system, a 5-storey building with the type and number of plumbing equipment required clean water amounting to 58.996 m3 / day. The capacity of the lower water reservoir (Ground Water Tank) used is 8 m3, the upper water tank (Roof Tank) is used as a water reservoir of 7 m3. Based on the results of the calculation, a transfer pump is used to drain water from the lower water tank (Ground Water Tank) to the upper water tank (Roof Tank) with a flowing capacity of 16.2 m3 / hour and a transfer pump head of 7-54 m. for clean water distribution, you can use the thrust of the potential height of the water from the upper reservoir to the sanitary equipment on each floor. The pump used is the Ebara 50x40 FSHA brand

    Addendum: A Classification of Plane Symmetric Kinematic Self-similar Solutions

    Full text link
    In our recent paper, we classified plane symmetric kinematic self-similar perfect fluid and dust solutions of the second, zeroth and infinite kinds. However, we have missed some solutions during the process. In this short communication, we add up those missing solutions. We have found a total of seven solutions, out of which five turn out to be independent and cannot be found in the earlier paperComment: 7 pages Late

    On Physical Properties of Cylindrically Symmetric Self-Similar Solutions

    Full text link
    This paper is devoted to discuss some of the features of self-similar solutions of the first kind. We consider the cylindrically symmetric solutions with different homotheties. We are interested in evaluating the quantities acceleration, rotation, expansion, shear, shear invariant and expansion rate. These kinematical quantities are discussed both in co-moving as well as in non-co-moving coordinates (only in radial direction). Finally, we would discuss the singularity feature of these solutions. It is expected that these properties would help in exploring some interesting features of the self-similar solutions.Comment: 16 pages, accepted for publication in Int. J. of Mod. Phys.

    Weakly coupled two slow- two fast systems, folded node and mixed mode oscillationsM

    Full text link
    We study Mixed Mode Oscillations (MMOs) in systems of two weakly coupled slow/fast oscillators. We focus on the existence and properties of a folded singularity called FSN II that allows the emergence of MMOs in the presence of a suitable global return mechanism. As FSN II corresponds to a transcritical bifurcation for a desingularized reduced system, we prove that, under certain non-degeneracy conditions, such a transcritical bifurcation exists. We then apply this result to the case of two coupled systems of FitzHugh- Nagumo type. This leads to a non trivial condition on the coupling that enables the existence of MMOs
    • …
    corecore