Skip to main content

Posts

Showing posts from 2012

Cell Phone Virus and Security

Cell Phone Virus and Security ABSTRACT cel of our life so do the threats imposed to them is also on the increase. Like the internet, today even the cell phones are going online with the technologies like the edge, GPRS etc. This online network of cellphones has exposed them to the high risks caused by malwares viruses, worms and Trojans designed for mobile phone environment. The security threat caused by these malwares are so severe that a time would soon come that the hackers could infect mobile phones with malicious software that will delete any personal data or can run up a victim s phone bill by making toll calls. As cell phones become a part and par All these can lead to overload in mobile networks, which can eventually lead them to crash and then the financial data stealing which poises risk factors for smart phones. As the mobile technology is comparatively new and still on the developing stages compared to that of internet technology, the anti virus companies along with ...

Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony

Audio CAPTCHA: Existing solutions assessment and a new implementation  for VoIP telephony ABSTRACT SPam over Internet Telephony (SPIT) is a potential source of future annoyance in Voice over IP (VoIP) systems. A typical way to launch a SPIT attack is the use of an automated procedure (i.e., bot), which generates calls and produces unsolicited audio messages. A known way to protect against SPAM is a Reverse Turing Test, called CAPTCHA (Completely Automated Public Turing Test to Tell Computer and Humans Apart). In this paper, we evaluate existing audio CAPTCHA, as this type of format is more suitable for VoIP systems, to help them fight bots. To do so, we first suggest specific attributes-requirements that an audio CAPTCHA should meet in order to be effective. Then, we evaluate this set of popular audio CAPTCHA, and demonstrate that there is no existing implementation suit-able enough for VoIP environments. Next, we develop and implement a new audio CAPTCHA, which is suitable for...

Confidential Data Storage and Deletion

Confidential Data Storage and Deletion ABSTRACT With the decrease in cost of electronic storage media, more and more sensitive data gets stored in those media. Laptop computers regularly go missing, either because they are lost or because they are stolen. These laptops contain confidential information, in the form of documents, presentations, emails, cached data, and network access credentials. This confidential information is typically far more valuable than the laptop hardware, if it reaches right people. There are two major aspects to safeguard the privacy of data on these storage media/laptops. First, data must be stored in a confidential manner. Second, we must make sure that confidential data once deleted can no longer be restored. Various methods exist to store confidential data such as encryption programs, encryption file system etc. Microsoft BitLocker Drive Encryption provides encryption for hard disk volume and is available with Windows Vista Ultimate and Enterprise edit...

Zone Based Ant Colony Routing In MANET

Zone Based Ant Colony Routing In MANET  ABSTRACT Ant colony optimization (ACO) is a stochastic approach for solving combinatorial optimization problems like routing in computer networks. The idea of this optimization is based on the food accumulation methodology of the ant community. Position based routing algorithms (POSANT) had some significant loopholes to find route like it never guarantees the route would be the shortest one, in cases while it is able to find it. The routing algorithms which are based on ant colony optimization find routing paths that are close in length to the shortest paths. The drawback of these algorithms is the large number of control messages that needs to be sent or the long delay before the routes are established from a source to a destination.This paper presents a new routing algorithm for mobile ad hoc network by combining the concept of Ant Colony approach and Zone based routing approach using clustering to get shortest path with small number of ...

Self Defending network

some brief explanation about the self defending network from cisco is :::-- Cisco Self-Defending Network: Combining Best-of-Breed Products and Services with a Systems Approach A new generation of interactive business communication and collaboration technologies provides tremendous productivity and flexibility gains for organizations of all kinds. But this unprecedented connectivity also unleashes new, complex  security  risks, including: ● Increased exposure to security threats—Ubiquitous access to Web-enabled applications and services enables users to work from anywhere, anytime—but also places businesses at risk anywhere, anytime. ● An eroding network perimeter—The traditional network barriers that separated trusted from untrusted and “inside” from “outside” are now disappearing. As more applications become directly accessible to remote users and systems, the concept of the network perimeter becomes increasingly vague and more difficult to protect. ● Evolv...

Android OS

ABSTRACT Android is a software stack for mobile devices that includes an  operating system , middleware and key  applications . Android is a software platform and operating system for mobile devices based on the Linux operating system and developed by Google and the Open Handset Alliance. It allows developers to write managed code in a Java-like language that utilizes Google-developed Java libraries, but does not support programs developed in native code. The unveiling of the Android platform on 5 November 2007 was  announced  with the founding of the Open Handset Alliance, a consortium of 34 hardware, software and telecom  companies  devoted to advancing open standards for mobile devices. When released in 2008, most of the Android platform will be made available under the Apache free-software and open-source license. 1. INTRODUCTION Android is a software stack for mobile devices that includes an operating system, middleware a...

cloud computing

Cloud based on demand web-services such as databases, queues, identity management, data on-demand, widgets, etc. are meeting with browser based thick-client frameworks such as AJAX, Adobe Flex, MS Silverlight, etc. to create a new breed of applications, built on a resuscitated Client/Server (Client/Server 2.0) SOA-based paradigm. The traditional "business logic" application server middle-tier is ceding the way to cloud based pay-per-use SOA. The increasing sophistication of cloud web-services platforms, the increase in browser sophistication and the availability of advanced client side IDEs will reinforce this trend. The new paradigm will simplify the development of web applications, simplify the creation of SaaS, provide better maintainability and lower TCO. Read more:  A Technical Seminar Report on “CLOUD COMPUTING'' - | FaaDoOEngineers.com   http://www.faadooengineers.com/threads/1253-A-Technical-Seminar-Report-on-“CLOUD-COMPUTING#ixzz1ngEvhplM