نتایج جستجو برای: penetration

تعداد نتایج: 35603  

Journal: :JDCTA 2010
Ming-Hour Yang

To diagnose the vulnerabilities of target system using a remote penetration test approach needs to avoid the modification of the security configuration of the target network. So the carrier of test codes needs to hide from the IDS filter out of our penetrating test codes. Hence, we proposed a polymorphic carrier which carries encrypted test codes and diversified decrypters, and, the proposed ca...

2015
Bangaly Kaba

Africa needs access to the powerful information and communication tools of the internet in order to obtain the resources and efficiency essential for its sustainable development. Unfortunately, in 2014, the data from internetlivestats.com showed only 9.8% of African populations have access to the internet. This relative low internet penetration rate signals a problem that may threaten the econo...

2006
Martin Mössner Dieter Heinrich Kurt Schindelwig Peter Kaps Peter Lugner Heinz-Bodo Schmiedmayer Herwig Schretter Werner Nachbauer

Carved turns with alpine skis are investigated. During the movement of a ski, snow is loaded and unloaded. Compacted snow is not elastic, i.e. deformations remain. Such effects are modeled by a hypoplastic constitutive equation. During a turn the shovel digs into the snow and the tail maintains nearly the same penetration depth as the part under maximum load. This results in a higher resistance...

2007
Xin Yue Jijun Zhao Jieshan Qiu

Density functional theory calculations were performed to investigate the endohedral and exohedral adsorption of a H2 molecule on the classical and nonclassical fullerenes Cx (x=58, 59, 60, 62) with seven-, eight-, and ninemembered rings. The amplitude of adsorption energies are within 0.03eV and the molecule-fullerene interaction belongs to van der Waals type. Penetration of a H2 molecule throu...

Journal: :Computers & Security 2015
Francois Mouton Mercia M. Malan Kai Kimppa Hein S. Venter

Social engineering is deeply entrenched in the fields of both computer science and social psychology. Knowledge is required in both these disciplines to perform social engineering based research. Several ethical concerns and requirements need to be taken into account when social engineering research is conducted to ensure that harm does not befall those who participate in such research. These c...

2015
J. Llop E. Gil M. Gallart J. Llorens

Hand-held spray guns and lances are the most widely used methods of crop protection in greenhouses despite the heavy workload and high risk of operator exposure associated with these techniques (Foqué 2012). These spray application techniques have also proved to be less effective than spray boom equipment under many conditions while the advantages of using vertical boom sprayers compared with u...

2012
Daan Raman Bjorn De Sutter Bart Coppens Stijn Volckaert Koen De Bosschere Pieter Danhieux Erik Van Buggenhout

Most networks are connected to the Internet through firewalls to block attacks from the outside and to limit communication initiated from the inside. Because of the limited, supposedly safe functionality of the Domain Name System protocol, its traffic is by and large neglected by firewalls. The resulting possibility for setting up information channels through DNS tunnels is already known, but a...

Journal: :CoRR 2013
Mohammed Ennahbaoui Said El Hajji

Security has become, nowadays, a major concern for the organizations as the majority of its applications are exposed to Internet, which increases the threats of security considerably. Thus, the solution is to improve tools and mechanisms to strengthen the protection of applications against attacks and ensure the different security objectives. Among solutions we will talking about, in this paper...

1999
A. N. F. Aleixo A. B. Balantekin M. A. Cândido Ribeiro

Exact reflection and transmission coefficients for supersymmetric shapeinvariant potentials barriers are calculated by an analytical continuation of the asymptotic wave functions obtained via the introduction of new generalized ladder operators. The general form of the wave function is obtained by the use of the F(−∞,+∞)-matrix formalism of Fröman and Fröman which is related to the evolution of...

Journal: :CoRR 2013
Karthik R Raghavendra Karthik Pramod S. Sowmya Kamath

Web Application finger printing is a quintessential part of the Information Gathering phase of (ethical) hacking. It allows narrowing down the specifics instead of looking for all clues. Also an application that has been correctly recognized can help in quickly analyzing known weaknesses and then moving ahead with remaining aspects. This step is also essential to allow a pen tester to customize...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید