3,659 research outputs found

    Gabriel-Ulmer duality for topoi and its relation with site presentations

    Full text link
    Let κ\kappa be a regular cardinal. We study Gabriel-Ulmer duality when one restricts the 2-category of locally κ\kappa-presentable categories with κ\kappa-accessible right adjoints to its locally full sub-2-category of κ\kappa-presentable Grothendieck topoi with geometric κ\kappa-accessible morphisms. In particular, we provide a full understanding of the locally full sub-2-category of the 2-category of κ\kappa-small cocomplete categories with κ\kappa-colimit preserving functors arising as the corresponding 2-category of presentations via the restriction. We analyse the relation of these presentations of Grothendieck topoi with site presentations and we show that the 2-category of locally κ\kappa-presentable Grothendieck topoi with geometric κ\kappa-accessible morphisms is a reflective sub-bicategory of the full sub-2-category of the 2-category of sites with morphisms of sites genearated by the weakly κ\kappa-ary sites in the sense of Shulman [37].Comment: 25 page

    PENTESTING VOIP PARA DETERMINAR LAS VULNERABILIDADES DEL SERVIDOR DE COMUNICACION DEL AREA DE SOPORTE DE LA EMPRESA CHAPACUETE DE LA CIUDAD DE HUÁNUCO PERIODO 2019

    Get PDF
    La investigación se enfocó que en análisis de las vulnerabilidades del servidor VOIP de la empresa Chapacuete de la ciudad de Huánuco. El proceso de pentesting consistió en la aplicación de una serie de herramientas bajo software libre para la determinación de vulnerabilidades del servidor de telefonía bajo el sistema operativo GNU/Linux usando la distribución Asterisk. Se realizaron pruebas de ataque usando técnicas como Man In The Middle y ARP spoofing, y se llegaron a descubrir una serie de vulnerabilidades como por ejemplo: puertos abiertos en el servidor, servicios innecesarios habilitados, contraseña del root débil, extensiones con la configuración por defecto, y la vulnerabilidad más importante fue que en el servidor se estaba utilizando como protocolo de comunicación a SIP un protocolo con muchas vulnerabilidad en relación al cifrado de la comunicación. Se pudo advertir a tiempo y corregir las vulnerabilidades, como por ejemplo de utilizar el protocolo IAX para mejorar la seguridad en cuanto al transporte de las comunicaciones por la red de datos. Las pruebas se realizaron en diferentes escenarios, tanto virtual como físico, así mismo se implementó un cronograma de pruebas para llevar a cabo la aplicación de estas herramientas y determinar el proceso o la repetición de las vulnerabilidades en el servidor. En la fase de ataque se simulo un agente en la cual se asumió un cliente conectado a la red para interceptar las llamadas realizadas por los usuarios, con las herramientas especificas se pudo obtener dichas llamadas y guardarlas como archivo para su posterior análisis.Tesi

    L’aplicació Bioatles: orígens, evolució i perspectives futures del SIG de distribució d’espècies a les Illes Balears

    Get PDF
    En els darrers decennis la tecnologia ha passat a formar part indefectible de les nostres vides. El hardware és cada vegada més potent, el software, més intuïtiu i amb moltes més possibilitats, i la transmissió de dades, extremadament ràpida. D’altra banda, la informació geogràfica, abans difícilment accessible, es troba ara a l’abast de qualsevol usuari a través de la xarxa, que en pot fer un ús lliure. La conseqüència natural d’aquests fets i de l’actual conjuntura és l’aparició en els darreres temps dels Sistemes d’Informació Geogràfica (SIG), que integren hardware, software i cartografia i permeten vincular la informació amb el territori i fer-hi anàlisi. El Bioatles és el SIG que conté la informació sobre la distribució d’espècies terrestres de les Illes Balears. Els seus inicis es remunten a 2004, i de llavors ençà ha patit canvis substancials que han millorat el funcionament, adaptant-lo a les noves necessitats. Es descriu tot aquest procés i es fa una previsió de quina ha de ser la línia que ha de seguir l’aplicació en el futur

    O corpo esportivo e o nacionalismo brasileiro durante a II Guerra Mundial : Uma análise a partir de um jornal da cidade de Vitória/ES/Brasil

    Get PDF
    Este artigo discute a relaçao entre esporte e nacionalismo, investigando a importância atribuída às práticas esportivas decorrentes desse vínculo. A análise se materializou entre os anos de 1939 e 1945, por meio do jornal "A Tribuna", publicaçao diária da cidade de Vitória, capital do Espírito Santo. Além de o esporte se configurar como uma escola de cultura física, constituiu-se, também, em uma escola de formaçao cívica da juventude, materializando os desejos do governo para a construçao da Naçao brasileir

    Exponentiable Grothendieck categories in flat Algebraic Geometry

    Full text link
    We introduce and describe the 22-category Grt\mathsf{Grt}_{\flat} of Grothendieck categories and flat morphisms between them. First, we show that the tensor product of locally presentable linear categories \boxtimes restricts nicely to Grt\mathsf{Grt}_{\flat}. Then, we characterize exponentiable objects with respect to \boxtimes: these are continuous Grothendieck categories. In particular, locally finitely presentable Grothendieck categories are exponentiable. Consequently, we have that, for a quasi-compact quasi-separated scheme XX, the category of quasi-coherent sheaves Qcoh(X)\mathsf{Qcoh}(X) is exponentiable. Finally, we provide a family of examples and concrete computations of exponentials.Comment: Minor revision. The proofs of Sec 5 have been expanded to make the paper self containe

    Choosing a TCP Version over Static Ad Hoc Wireless Networks: Wired TCP or Wireless TCP?

    Get PDF
    International audienceThe Transmission Control Protocol (TCP) was originally designed to operate on wired networks. However, nowadays the traffic on wireless networks has grown to a point where one must take into account the specific characteristics of such networks when setting up a particular TCP implementation on them. Particularly, the TCP performance has been studied over ad hoc wireless networks leading to several new implementations for TCP. The main issue for TCP on ad hoc wireless networks is to differentiate between losses due to congestion and losses occurred at lower network layers. In this paper, we analyze the TCP performance on two different scenarios of static ad hoc wireless networks over the DSDV routing protocol. Our findings show that choosing the right TCP version for ad hoc wireless networks is a key factor for their performance. We show for the scenarios we study, that TCP Reno outperforms TCP Westwood on the average loss rate as well as on the throughput

    Moving to Portugal: Conditions for Refugees' Identity (Re)Configuration Processes

    Get PDF
    This research seeks to explore how mobility interacts with identity (re)configuration processes. We take a comprehensive look at the impact of mobility on refugees' adaptation of their own social identity in diasporas. To build our analytical standpoint, we will discuss theories of mobilities and identity studies and explore points of intersection between relational approaches to collective identities, theories of co-constitution of social formations, and mobile subjectivities and narratives about diasporans' experiences, refugee hosting, and conditions for identity (re)configuration. Next, we apply our analytical perspective to a selection of existing empirical research on refugees in Portugal. We were able to identify some clues that indicate the relevance of our approach and suggest two lines for further empirical research in the Portuguese context

    The Success of Online Passport Queue Registration Applications Using Delone and Mclean Models

    Get PDF
    Advancement in sophisticated information technology can be used for innovation in access to public services. In this study, the public service studied was the Online Passport Queue Registration Application (APAPO) at the Class I Non-TPI Bogor Immigration Office. This study aims to analyze the effect of system quality, information quality, service quality, user characteristics, usage rate, user satisfaction on net benefits APAPO using DeLone and McLean and find out the priority factors for improvement using the Important-Performance Analysis (IPA) method. The sampling technique used was convenience sampling where the sample was people who had applied for a passport using APAPO at the Immigration Office Class I Non TPI Bogor taken as many as 200 respondents with data collection using an online google form questionnaire, and then analyzed using the SEM method. The results of this study indicate that the quality of the system has no significant effect on usage and user satisfaction. The quality of information has no significant effect on usage and user satisfaction. Service quality has a significant effect on usage and has no significant effect on user satisfaction. User characteristics have a significant effect on usage. Usage has a significant effect on user satisfaction and net benefits. And user satisfaction has a significant effect on net benefits. From the results of the IPA analysis, system integration, format of output and assurance are indicators that services need to be improved. Keywords: DeLone and Mclean Model, APAPO, IPA, SEM, Bogor Immigration Offic
    corecore