108 research outputs found

    A Concise Study of Web Filtering

    Get PDF
    Cybercriminals are constantly developing techniques to infect computers by embedding malicious code on innocent websites and luring victims to them. To prevent data loss in a mobile connected world, corporations are employing a variety of techniques. These include filters, anti-virus software, encryption and firewalls, access control, written policies and improved employee training. This paper conducts a concise study of web filtering vis-Ã -vis their installed positions, deployment layers, employed filter technologies and comparison between Web Filters that are in place in Canada, United Kingdom, and China

    Drag and Drop Image CAPTCHA

    Get PDF
    The massive and automated access to Web resources through robots has made it essential for Web service providers to make some conclusion about whether a user is human or robot. A Human Interaction Proof (HIP) like Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) offers a way to make such a distinction. CAPTCHA is essentially a modern implementation of Turing test, which carries out its job through a particular text based, image based or audio based challenge response system. In this paper we present a new image based CAPTCHA technique. Properties of the proposed technique offer all of the benefits of image based CAPTCHAs; grant an improved security control over the usual text based techniques and at the same time improve the user-friendliness of the Web page. Further, the paper briefly reviews various other existing CAPTCHA techniques

    System Analysis of SPAM

    Get PDF
    Increasing reliance on the electronic mail (e-mail) has attracted spammers to send more and more spam e-mails in order to maximizing their financial gains. These unwanted e-mails are not only clogging the Internet traffic but are also causing storage problems at the receiving servers. Besides these, spam e-mails also serve as a vehicle to a variety of online crimes and abuses. Although several anti-spam procedures are currently employed to distinguish spam e-mails from the legitimate e-mails yet spammers and phishes obfuscate their e-mail content to circumvent anti-spam procedures. Efficiency of anti-spam procedures to combat spam entry into the system greatly depend on their level of operation and a clear insight of various possible modes of spamming. In this paper we investigate directed graph model of Internet e-mail infrastructure and spamming modes used by spammers to inject spam into the system. The paper outlines the routes, system components, devices and protocols exploited by each spamming mode

    Digital Library - An Inevitable Resource for Modern Day Research in Developing Countries

    Get PDF
    Research in any area requires an extensive collection and study of relevant literature. The research literature may be found in different libraries dispersed at different geographical locations. The conventional library systems pose some potential difficulties in acquiring timely information and therefore impede the research activity. This paper presents use of digital libraries in carrying out cost-effective and quality research. With technology innovations, a commensurate progress is required in the development and maintenance of the knowledge base. Statistics have shown that the research activity has increased with the digitization of the information and its easy availability to the researchers especially in developing countries. The digital library has thus become an inevitable source of information for researchers around the globe especially in developing countries to maintain the pace of research in a highly competitive world

    A Practical Study of E-mail Communication through SMTP

    Get PDF
    Simple Mail Transfer Protocol (SMTP) is an application layer protocol for e-mail communication. It has been adopted as a standard by Internet Engineering Task Force (IETF). SMTP has set conversational and grammatical rules for exchanging messages between connected computers. It has evolved through several revisions and extensions since its formation by Jon Postel in 1981. In SMTP, the sender establishes a full-duplex transmission channel with a receiver. The receiver may be either the ultimate destination or an intermediate forwarding agent. SMTP commands are issued by the sender and are sent to the receiver, which responds to these commands through codes. Each SMTP session between the sender and the receiver consists of three phases namely: connection establishment, mail transactions and connection termination. This paper describes and illustrates the process of e-mail communication through SMTP by issuing the individual SMTP commands directly to transmit e-mail messages. It also describes individual SMTP commands and extensions with practical implementation using a Telnet client

    Study of Botnets and Their Threats to Internet Security

    Get PDF
    Among all media of communications, Internet is most vulnerable to attacks owing to its public nature and virtually without centralized control. With the growing financial dealings and dependence of businesses on Internet, these attacks have even more increased. Whereas previously hackers would satisfy themselves by breaking into someone’s system, in today\u27s world hackers\u27 work under an organized crime plan to obtain illicit financial gains. Various attacks than include spamming, phishing, click fraud, distributed denial of services, hosting illegal material, key logging, etc. are being carried out by hackers using botnets. In this paper a detailed study of botnets vis-a-vis their creation, propagation, command and control techniques, communication protocols and relay mechanism is presented. The aim of this paper is to gain an insight of security threats that users of Internet are facing from hackers by the use of malicious botnets

    Reducing machining distortion in AA 6061 alloy through re-heating technique

    Get PDF
    Solution-treated AA 6061 alloy contains residual stresses which cause unwanted deformation during the machining operation rendering the parts unacceptable for use. Usually for AA 6061 alloy, stress relieving is performed by re-heating the parts at 343°C for 1 h. This stress relieving is however accompanied by a considerable loss of material strength which subsequently reduces the functionality of the parts. This paper is based on an effort to evaluate the effectiveness of lower re-heating temperatures for stress relieving without significant loss of strength. Temperatures within the range of 200–343°C were used and treated samples were tested for both the strength and machining distortion. The experimental results indicate 60% reduction in machining distortions with 21% decrease in the strength

    PREVALENCE AND RISK FACTORS OF GASTROESOPHAGEAL REFLUX DISEASE (GERD) IN ADULT KASHMIRI POPULATION

    Get PDF
    Objective: The study was conducted with the objective of studying the prevalence of gastroesophageal reflux disease (GERD) and to study various factors associated with it in adult Kashmiri population.Methods: It was a community based prospective cross-sectional observational study conducted by the Department of Medicine and Gastroenterology, GMC Srinagar over a period of 24 mo upon native Kashmiris from urban as well as rural areas as a study group. A total of 2600 subjects above the age of 18 y were studied and the overall prevalence of disease was calculated and also the associated (risk) factors were looked for.Results: The overall prevalence of 20.3% was seen in the study population with female gender being more prone to the development of disease (p<0.001). Other factors of greater significance included body mass index (BMI), smoking, physical activity, intake of spicy foods, posture after meals, dinner to sleep time, non-steroidal anti-inflammatory drug (NSAID) intake and some underlying ailments like asthma and history of abdominal surgery.Conclusion: The overall prevalence of GERD in Kashmiri community is 20.3% with females being more prone with a definite role of factors like BMI, smoking, physical activity, posture after meals, dinner to sleep time interval, intake of spicy foods, drugs and also the co-morbidities
    • …
    corecore