Sök:

Sökresultat:

317 Uppsatser om Authentication Server - Sida 1 av 22

Säkerhetsanalys av Windos Server 2008 i militära system

This analysis recommends not to use Windows Server 2008 without properevaluation in any system containing classified information. The reasons are too lowassurance and too weak authentication. If Windows Server 2008 is to be used itshould be supplemented with a stronger authentication mechanism. The installationshould preferably be of Server Core type and the server should be maximallyhardened..

Säkerhetsutvärdering certifikatserver i stället för aktiva kort

Business and organizations use computer network in a greater extension than ever before, especially for business-critical use. That increase the demand of security for all systems, both against internal and external threats. The demand on the authentication method used today increases. Today they normally uses password or some kind of smart card. I will performa literature study that will investigate the possibility to increase the security in authentication of users without the use of extra hardware.

Hur hanterar institutioner en miljö med blandade Operativsystem?

The purpose of this thesis is to investigate if there are environments that use some kind of central authentication system within institutions/schools. The hypothesis is that an institution not using a form of central authentication service has more need for maintenance and as such is considered a higher cost for the organization. The gathering of data has been done through interviews with technical personal at Blekinge Tekniska Högskola and Linköpings Universitet. Based on the technical background of the authors, and the system limited to discussing Windows and UNIX operating systems, a discussion and analysis of the systems working today has been done, with emphasize on the hypothesis..

Hur hanterar institutioner en miljö med blandade Operativsystem?

The purpose of this thesis is to investigate if there are environments that use some kind of central authentication system within institutions/schools. The hypothesis is that an institution not using a form of central authentication service has more need for maintenance and as such is considered a higher cost for the organization. The gathering of data has been done through interviews with technical personal at Blekinge Tekniska Högskola and Linköpings Universitet. Based on the technical background of the authors, and the system limited to discussing Windows and UNIX operating systems, a discussion and analysis of the systems working today has been done, with emphasize on the hypothesis..

Kriterier för säkra betaltjänster på nätet

This report has a purpose to identify the payment methods available for e-commerce, tosee if they fulfill certain requirements. By investigating thirty of the most popular webshops, a few primary services have been found and revised. Security requirements fore-payment systems include authentication, non-repudiation, integrity and confidentiality.Other requirements considered to be important are usability, flexibility, affordability,reliability, availability, speed of transaction and interoperability. Advantages and disadvantageshave been identified to see if the services fulfill the requirements. Also surveysof consumer payment habits have been investigated to identify the factors of decisive importanceto the usage of payment services.

Inloggning : Lösenordskryptering och Brute force attack

This report is the result of a sub-project of a larger project to create a platform formathematical education. The sub-project focuses on authentication with associ-ated security, where security is emphasized. The project environment is Java EE 6where GlassFish 4.0 acts as the server. The project has been divided into threeparts; password encryption, Java EE authentication and brute force attack. Thepassword encryption part focuses on examining different hash functions executionspeed, the result shows that none of the examined hash algorithms is suitable fordirect use.

Mobilt övervakningssystem : System för internetkommunikation mellan sensorer, webbsida, server och databas

This thesis has been carried out in cooperation with a company which develops mobile sensor platforms. The sensors measure different types of data such as temperature, pressure etc.. They will communicate through the internet with a server that stores data in a database. This system will be controlled and monitored through a web page. The project's aim has been to develop this system and to implement a server, a database, a website and a client application that simulates sensor signals.

Lagringsmätning för AD-information

Målet med detta projekt var att hjälpa IT-Mästaren att kunna fakturera sina kunder på ett smidigare sätt. Deras dåvarande lösning av kundernas dataanvändning var tidskrävande och ineffektivt, därför ville de automatisera systemet. Det nya systemet skulle användas för att administrera kundernas servrar med hjälp av ett grafiskt gränssnitt och sedan kontakta dem för att få fram olika värden för respektive kund som ska presenteras på IT-Mästarens hemsida. På så sätt skulle de kunna fakturera sina kunder på ett mer effektivt sätt och även få bättre överblick av kundernas användning. I och med utvecklingen utav detta system så fördjupande jag mig dels i egna kända områden men jag lärde mig också nya kunskaper. Det gällde inte enbart teknisk utveckling utan också undersökning av exempelvis hämtningen av alla data som skulle göras.

Trådlös överföring av media från mobil enhet till lokal server

Denna rapport beskriver arbetet med att utveckla en iPhone app och ett serverprogram till Mac. Programmet är tänkt att användas av besökare på festivaleroch liknande evenemang. Så de kan dela med sig av vad de ser med andrabesökare. Appen använder den inbyggda kameran för att ta bilder som sedanautomatiskt laddas upp till en lokal server om en finns tillgänglig. Serverprogrammet sparar bilderna och visar dem sedan på en skärm eller med envideo projektor eller något liknande.

Klient-server och Peer-to-Peer applikationer : En prestandajämförelse

An increasing number of applications are becoming more or less network based today.The traditional architecture for network based applications is client-server, but as usageof download services are going up, so is the Peer-to-Peer architecture. This report is acomparison between the Peer-to-Peer and client-server model, and can serve as a basiswhen a decision between them needs to be taken. In the report, the performancebetween the different architectures is compared in different contexts. Our basis is ageneral implementation of both architectures in a test that is derived from a previousreport. On top of this, the performance of the different architectures are measured,implemented in a gaming-context.

Migration of a very large database with Swedish demographic data, using Microsoft SQL Server

SMC is in the process of developing a micro simulation model. The existing micro simulation model developed at Cornell University for US data, CorSim, is one of the fundamental parts for the new micro simulation at SMC. To develop the Swedish model, Swedish data on all individuals in Sweden during 11 years are also available. These data are organized in a database. This paper describes the process of rebuilding the database to a more useful structure.

Utvärdering av produkter för säker autentisering i Windowsmiljö

In this report hardware based alternatives to password authentication in a Windows domain are evaluated for the needs of a certain company. In order to investigate the demands on such alternatives interviews with people concerned have been carried out. The demands which resulted from the interviews have been used to select types of hardware tokens for evaluation. Two products which offer authentication with smart cards and USB tokens have been selected and closer evaluated. These are RSA Passage which offers both hardware options and Rainbow iKey which uses USB tokens.

Jämförelse av klientlösningar

In this report I have made various comparisons between different client solutions; a standard client solution (PC-server), to use as a comparison and look at various differences in costs against the other client solutions that I have compared, which is Windows Thin PC, Dell Wyse, Red Hat Enterprise Virtualization and FSData terminal server/thin clients. All these solutions require a form of server to work against, which also the standard solution uses, but the main difference is that most of the data and computing power is on the server instead of the client.Window Thin PC, Dell Wyse, Red Hat EV and FSData all use some kind of thin client as hardware. Some of the main differences is that Windows Thin PC can be installed on almost any hardware. Dell Wyse is a special hardware group from Dell, that uses its own proprietary software, and Red Hat EV which is based on linux, is the cheapest option where the only cost is for support. FSData terminal server/thin client use as the name suggest a terminal server and a form of thin client to connect to it, the solution essentially means that your rent the complete hardware from FSData.The comparisons are made with the view of different scenarios based of the number of clients, where costs and licenses, as well as time spent on installation, upgrades, monitoring and managing are some of the main points raised..

Server Message Block : En undersökning av potentiella prestandavinster mellan SMB 2.1 och SMB 3.0 i ett befintligt nätverk

Examensarbetet behandlar en jämförelse av Server Message Block 3.0 och föregångaren 2.1 i ett befintligt nätverk. Jämförelsen utfördes i fyra laborationsmiljöer bestående av fyra operativsystem: Windows Server 2008 R2, Windows Server 2012, Windows 7 ochWindows 8. Sammanlagt har fyra tester utförts: Förstudie, Test 1, Test 2 och Test 3. Förstudien utfördes för att testa nätverksprestanda mellan två datorer. De andra testerna satte SMB 2.1 och SMB 3.0 på prov.I Test 1 ansågs SMB 3.0 prestera sämre än SMB 2.1, för att bekräfta resultaten kontaktades Jose Barreto på Microsoft.

Polisiär provokation: En studie av gällande rätt och analys av rättsläget

Denna rapport beskriver arbetet med att utveckla en iPhone app och ett serverprogram till Mac. Programmet är tänkt att användas av besökare på festivaleroch liknande evenemang. Så de kan dela med sig av vad de ser med andrabesökare. Appen använder den inbyggda kameran för att ta bilder som sedanautomatiskt laddas upp till en lokal server om en finns tillgänglig. Serverprogrammet sparar bilderna och visar dem sedan på en skärm eller med envideo projektor eller något liknande.

1 Nästa sida ->