
Sökresultat:
115 Uppsatser om The X-Files - Sida 4 av 8
Försvarsenhetens arkiv : Examensarbete på länsstyrelsen i Södermanlands län
The defence unit´s archive stretches over a time limit between the middle of 1971 to the end of 1987. The records the archive mainly contains are concerning the civil defence, inspection and construction of shelters, war- and crisis planning. The majority of the records are registered record, as often is the case with an authority?s archives. The main problems that occurred concerned what should or shouldn´t be public, the principle of provenance and what to prioritize; finish the project before deadline or make sure the records are prepared for a storage that ideally should last for several lifetimes..
Digitala objekt i neutralt format
Today there are many different Cad-applications on the market for engineers. Because of big building projects it has become more and more important to work with the same application or to have access to a neutral file type to be able to transfer files between different ones.This report studies the single objects and how they react when transferring them between ADT and ArchiCAD via the neutral type IFC. We have also been looking at problems during the transfer between and if there are some connections between these problems. Afterwards we created a neutral object model of a small country house to see if the objects appeared different. The result shows no differences.But looking at the problems that appeared during the transmissions they felt small and no logical.Today it is not possible to save in a neutral type without facing small problems.
Talltimmeraptering - påverkande faktorer
In this work, I describe the factors that affect the bucking of pine logs on the basis of the machine operator. The aim is to find an explanation why the bucking differs so greatly between requested length results and the actual length results in pine bucking. The used methods in this study were data from simulated pine outcomes, data from earlier length outcomes and analysis of the harvesters' PRI files. This is to identify the problem. To explain the background to the problems a qualitative research interview was used.
Minnet sviker Aldrig : Att utnyttja volatil data i Krypterade system
When the use of encryption amongst the regular computer user grows morewidespread than ever it makes the life of the IT-forensics experts difficult.Hampering the judicial investigations that otherwise could have lead to convictions.In this report we will treat the subject of crypto analysis with a focus on decrypting files and devices encrypted with the software TrueCrypt. A solution will be presented that can facilitate the future work involving encryption. The application DFEAT that has been developed during the writings of this report is faster than the corresponding software EFDD, and attacks both partitions and bitwise copies of entire harddrives where PKF fails.DFEAT is a lightweight application that is almost 50 times smaller compared to EFDD and 200 times smaller than PKF's portable version..
OPAC - på Märsta folkbibliotek
The purpose of this Bachelor thesis is to examine how user-friendly the OPAC of the Märsta public library is considered to be.Theoretical basis are HCI and Allwoods definition of usability. Issues are: Is the OPAC suited to its task? Is the OPAC user-friendly? How well does a user accept the OPAC? and What degree of competence is shown by users of the OPAC? The source material consists of six interviews in the form of .avi files. The method I have chosen is qualitative semi-structured interview form. The result is that, based on Carl Martin Allwood?s defini-tion and with exception for the using of help-resources, the usability of Märsta?s library OPAC can be considered less good..
Downloading and filesharing through Peer-to-peer networks: the copyright versus the free access to the cultural products
The “peer to peer†(P2P) is a technology of downloading and filesharing between online - Internet - users by the mean of specified software. Since June 1999, the Napster software has made the happiness of millions of individuals who used it to obtain and share free audio files Mp3.
Rapidly, the major recording companies have prosecuted the Napster Company and managed to force it to close down. They were arguing against it for it is supporting the development on a large scale traffic of files protected by copyright and thus was threatening the whole music and movies economic world. Since fast Internet connections multiplied, "peer to peer" software and networks improved, so that this mode of exchange became an unprecedented success.
Today all cultural products, in particular films and music, are concerned with this free –of– charge distribution without any financial counterpart for the copyright holders. Two tools hold
today the top ranks and concentrate large traffic: eDonkey and eMule.
Downloading and filesharing through Peer-to-peer networks: the copyright versus the free access to the cultural products
The ?peer to peer? (P2P) is a technology of downloading and filesharing between online - Internet - users by the mean of specified software. Since June 1999, the Napster software has made the happiness of millions of individuals who used it to obtain and share free audio files Mp3. Rapidly, the major recording companies have prosecuted the Napster Company and managed to force it to close down. They were arguing against it for it is supporting the development on a large scale traffic of files protected by copyright and thus was threatening the whole music and movies economic world.
En undersökning i datasäkerhet för hemanvändare - Är det nödvändigt att använda brandvägg?
The emphasize of this study is to evaluate security issues for home users
having a personal computer connected to the Internet. It focus on the usage of
advantages and disadvantages when using a firewall while connected to the
Internet.
The hypothesis is that it gives a better protection to install and use a
firewall compared not to do so, due to security flaws in the operating system.
The prediction was tested on a home user's personal computer. The testwork was
divided into two major tests, each of them performed with, respectively
without, a firewall. These major tests were divided into five smaller semi
tests. The first semitest without a firewall suffered from a virus or worm
attack resulting in loss of data and log files.
En undersökning i datasäkerhet för hemanvändare : Är det nödvändigt att använda brandvägg?
The emphasize of this study is to evaluate security issues for home users having a personal computer connected to the Internet. It focus on the usage of advantages and disadvantages when using a firewall while connected to the Internet. The hypothesis is that it gives a better protection to install and use a firewall compared not to do so, due to security flaws in the operating system. The prediction was tested on a home user's personal computer. The testwork was divided into two major tests, each of them performed with, respectively without, a firewall.
Energikloka hus i Järinge - energiteknisk uppföljning
Energy-wise houses in Järinge - technical follow-up The company JM built energy-efficient houses in Tensta in Stockholm. They have built a total of 16 houses divided into two parts of A-houses and B-houses. The buildings are an attempt by JM to minimize energy-use of the buildings without affecting the comfort and living standards. The project aims to examine the data for the 16 houses on the basis of data and produce a report showing how the buildings worked through a technical perspective. JM approximates that the purchased energy will not be higher than 95 kWh/m2 per year.
Fyrkantiga klossar i runda hål? En undersökning av vissa berörda parters inställning gällande delandet av musikfiler över Internet
The aim of this study has been to investigate the views concerning the sharing of music files over the Internet as expressed by some of the parties engaged in the current debate in Sweden concerning these issues. The purpose of this study has also been to scrutinize the views about music filesharing as expressed by the parties in question, as well as the conclusions possible to extrapolate from these opinions. The method used to gather information from the parties subjected to this study has been by conducting and recording interviews with representatives from the organizations and companies entities in question. Those entities are: the Record Company Sony/BMG, The Swedish branch of the organization IFPI International Federation of the Phonographic Industry and the Swedish organization the Pirate Bureau. The method used to analyze the empirically gathered material has been inspired by a method common in the discipline of philosophy of education known as Phenomenography.
Integritet och skydd av persondata - en fallstudie av Uppsala kommun ur ett internationellt perspektiv
Vår studie granskar personuppgiftshanteringen i Uppsala kommun och undersöker hur internationella dataskyddsriktlinjer påverkar deras arbete. Vår forskningsmetod är fallstudie och som datainsamlingsmetod utförde vi semistrukturerade intervjuer med personuppgiftsombudet på Uppsala kommun. Vi har sedan analyserat och diskuterat resultaten kvalitativt. De internationella riktlinjer vi studerat mest ingående är EU:s dataskyddsdirektiv, EU:s kommande dataskyddsförordning, OECD:s ?Privacy Framework? och FN:s ?Guidelines Concerning Computerized Personal Data Files?.
Konstruktion rörklammer
This report describes the development process of a pipe clamp used on exhaust system for cars. It is made based on the manufacturers desire to improve and make the clamp easier to manufacture and to reduce its price to their customers. This should be done either by manufacturing the clamp in one piece without an expensive and work intensive welding process, or by generating ideas of how to develop a brand new type of clamp. Investigating the market for similar products was done to eliminate intrusion of other manufacturers? patents but also to generate ideas.
Mobilstudio för ShiShi TV
During the fall of 2007 Uppsala University gave the course ?Projekt DV?. As a result of this class a publishing tool for real-time media came to be ShiShi TV. The purpose of this application was to introduce a new way to reach out to people. This was done with a video player on the Internet and a second one placed in a regular mobile phone.
Nesligt våld mot kvinna : En undersökning kring synen på kvinnor som blivit våldtagna i Karlstad perioden år 1900-1943
The purpose of this paper is to examine the early 1900s approach to women who have been raped in Karlstad and how you looked at rape during this period. I have used criminal case files from the Karlstad criminal police to examine. The actual study is set up in that way that I have tried to answer my questions through case studies that have been categorized in three type?s perpetrators and three types of victims. The three types of offenders who I am using are the "the naughty young man," "the violent worker" and "the drunken man".