78 resultados para Password


Relevância:

10.00% 10.00%

Publicador:

Resumo:

La tesi, come da titolo, progettazione e sviluppo di un ecosistema per la gestione di studi dentistici, tratta propriamente di un insieme di programmi software per gestire al meglio uno studio dentistico. Uno dei due software dell'ecosistema, consente al medico dentista di effettuare una gestione dei pazienti e dei relativi trattamenti svolti all'interno dello studio dentistico dal personale medico. I dati sono conseguentemente salvati all'interno di un database centrale. Il secondo software, più nello specifico un sito web, consente ai pazienti, mediante username e password, di accedere all'area riservata e monitorare i propri dati personali ed i trattamenti effettuati dal personale medico all'interno dello studio. Il software in uso nello studio del dentista consente quindi sia lettura che scrittura dei dati sul database. Il sito consente solamente la lettura dei dati stessi.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Individual Video Training iVT and Annotating Academic Videos AAV: two complementing technologies 1. Recording communication skills training sessions and reviewing them by oneself, with peers, and with tutors has become standard in medical education. Increasing numbers of students paired with restrictions of financial and human resources create a big obstacle to this important teaching method. 2. Everybody who wants to increase efficiency and effectiveness of communication training can get new ideas from our technical solution. 3. Our goal was to increase the effectiveness of communication skills training by supporting self, peer and tutor assessment over the Internet. Two technologies of SWITCH, the national foundation to support IT solutions for Swiss universities, came handy for our project. The first is the authentication and authorization infrastructure providing all Swiss students with a nationwide single login. The second is SWITCHcast which allows automated recording, upload and publication of videos in the Internet. Students start the recording system by entering their single login. This automatically links the video with their password. Within a few hours, they find their video password protected on the Internet. They now can give access to peers and tutors. Additionally, an annotation interface was developed. This software has free text as well as checklist annotations capabilities. Tutors as well as students can create checklists. Tutor’s checklists are not editable by students. Annotations are linked to tracks. Tracks can be private or public. Public means visible to all who have access to the video. Annotation data can be exported for statistical evaluation. 4. The system was well received by students and tutors. Big numbers of videos were processed simultaneously without any problems. 5. iVT http://www.switch.ch/aaa/projects/detail/UNIBE.7 AAV http://www.switch.ch/aaa/projects/detail/ETHZ.9

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Digital Rights Management Systems (DRMS) are seen by content providers as the appropriate tool to, on the one hand, fight piracy and, on the other hand, monetize their assets. Although these systems claim to be very powerful and include multiple protection technologies, there is a lack of understanding about how such systems are currently being implemented and used by content providers. The aim of this paper is twofold. First, it provides a theoretical basis through which we present shortly the seven core protection technologies of a DRMS. Second, this paper provides empirical evidence that the seven protection technologies outlined in the first section of this paper are the most commonly used technologies. It further evaluates to what extent these technologies are being used within the music and print industry. It concludes that the three main Technologies are encryption, password, and payment systems. However, there are some industry differences: the number of protection technologies used, the requirements for a DRMS, the required investment, or the perceived success of DRMS in fighting piracy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The aim of this project is to create a website which is useful both employees and students of a university, so employees can add information, if they log in with username and password access, and students can view this information . Employees may modify and display information such as title, room, or their faculty (from a list defined by the administrator), and most importantly, their schedule, whether class, tutoring, free time, or any of tasks that the administrator define. There will be a manager, responsible for managing employees, the availables faculties and the types of tasks that employees can use on their schedule. Students may see the employees schedules and rooms on the homepage. They differentiate between differents tasks of employees, because these are in different colors. They can also filter information for faculty, employee or day. To achieve our goal, we decided to program in Java using Servlets, which we will use to generate response to requests coming from users from the website. We will also use JSP, allowing us to create different websites files. We use JSP files and not HTML, because we need that the pages are dynamic, since not only want to show specific information, we like that information can change depending on user requests. The JSP file allows us to generate HTML, but also using JAVA language, which is necessary for our purpose. As the information we store is not fixed. We want this information can be modified at any time by employees and admin, so we need a database, which can be accessed from anywhere. We decided SQLite databases because are integrated quite well in our application, and offer a quick response. To access the database from our program, we simply connect it to the database, and with very few lines of code, add, delete or modify entries in different tables that owns the database. To facilitate the initial creation of the database, and the first tables, we use a Mozilla Firefox browser plugin, called SQLite Manager, which allows us to do so from a more friendly interface. Finally, we need a server that supports and implements specifications Servlets and JSP. We decided on the TomCat server, which is a container Servlets, because is free, easy to use, and compatible with our program. We realized all the project with Eclipse environment, also free program that allows integrating database, server and program the JSP and Servlets. Once submitted all the tools we used, we must first organize the structure of the web, relating each Servlets with JSP files. Next, create the database and the different Servlets, and adjust the database accesses to make sure we do it right. From here simply is to build up the page step by step, showing in each place we need, and redirect to different pages. In this way, we can build a complex website, free, and without being an expert in the field. RESUMEN. El objetivo de este proyecto, es crear una página web que sirva tanto a empleados como a alumnos de una universidad, de tal manera que los empleados podrán añadir información, mediante el acceso con usuario y contraseña, y los alumnos podrán visualizar está información. Los empleados podrán modificar y mostrar información como su título, despacho, facultad a la que pertenecen (de entre una lista definida por el administrador), y lo más importante, sus horarios, ya sean de clase, tutorías, tiempo libre, o cualquiera de las tareas que el administrador defina. Habrá un administrador, encargado de gestionar los empleados existentes, las facultades disponibles y los tipos de tareas que podrán usar los empleados en su horario. Los alumnos, podrán visualizar los horarios y despacho de los empleados en la página principal. Diferenciarán entre las distintas tareas de los profesores, porque estas se encuentran en colores diferentes. Además, podrán filtrar la información, por facultad, empleado o día de la semana. Para conseguir nuestro objetivo, hemos decidido programar en Java, mediante el uso de Servlets, los cuales usaremos para generar respuesta antes las peticiones que llegan de los usuarios desde la página web. También usaremos archivos JSP, que nos permitirán crear las diferentes páginas webs. Usamos archivos JSP y no HTML, porque necesitamos que las diferentes páginas sean dinámicas, ya que no solo queremos mostrar una información concreta, si no que esta información puede variar en función de las peticiones de usuario. El archivo JSP nos permite generar HTML, pero a la vez usar lenguaje JAVA, algo necesario para nuestro cometido. Como la información que queremos almacenar no es fija, si no que en todo momento debe poder ser modificada por empleados y administrador, necesitamos una base de datos, a la que podamos acceder desde la web. Nos hemos decidido por bases SQLite, ya que se integran bastante bien en nuestra aplicación, y además ofrecen una rápida respuesta. Para acceder a la base de datos desde nuestro programa, simplemente debemos conectar el mismo a la base de datos, y con muy pocas líneas de código, añadir, eliminar o modificar entradas de las diferentes tablas que posee la base de datos. Para facilitar la creación inicial de la base de datos, y de las primeras tablas, usamos un complemento del navegador Mozilla Firefox, llamado SQLite Manager, que nos permite hacerlo desde una interfaz más amigable. Por último, necesitamos de un servidor que soporte e implemente las especificaciones de los Servlets y JSP. Nos decidimos por el servidor TomCat, que es un contenedor de Servlets gratuito, de fácil manejo, y compatible con nuestro programa. Todo el desarrollo del proyecto, lo realizamos desde el entorno Eclipse, programa también gratuito, que permite integrar la base de datos, el servidor y programar los JSP y Servlets. Una vez presentadas todas las herramientas que hemos utilizado, primero debemos organizar la estructura de la web, relacionando cada archivo JSP con los Servlets a los que debe acceder. A continuación creamos la base de datos y los diferentes Servlets, y ajustamos bien los accesos a la base de datos para comprobar que lo hacemos correctamente. A partir de aquí, simplemente es ir construyendo la página paso a paso, mostrando en cada lugar lo que necesitemos, y redirigiendo a las diferentes páginas. De esta manera, podremos construir una página web compleja, de manera gratuita, y sin ser un experto en la materia.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Se ha descrito en la literatura como el fútbol es un deporte en cuya práctica existe una alta incidencia de lesión. Sin embargo, en España, hasta el momento no se había llevado a cabo ningún estudio que analizara la incidencia de lesión de los jugadores de fútbol profesional. Para poder prevenir lesiones, en primer lugar debemos de identificar la magnitud del problema, así como conocer aquellos factores que pueden influir sobre la producción de lesiones, Éste es principal objetivo de nuestro estudio para, a partir de él, poder diseñar e introducir en la práctica deportiva medidas preventivas con el objetivo de disminuir la incidencia de lesión en el fútbol. Hay que considerar que nos encontramos ante un estudio descriptivo, el cual se caracteriza, por no tener una hipótesis previa. En él nos planteamos como principal objetivo el conocer la influencia de los diferentes factores que influyen en la posibilidad de sufrir una lesión en el fútbol, además de realizar un análisis que describiera las lesiones sufridas, así como sus periodos de recuperación, en el fútbol profesional español, En esta investigación, participaron 27 equipos pertenecientes a la primera y segunda división española (728 jugadores), registrándose durante la temporada 2008- 2009 un total de 2184 lesiones. Para el registro de las lesiones, se utilizó el cuestionario REINLE cumplimentado de forma confidencial por miembros del equipo técnico de los clubes colaboradores, a través de la base de datos LEFUTPRO con acceso vía internet. Como dato general, encontramos que en la práctica del fútbol profesional existe una elevada incidencia de lesión con 8,92 les.*1000h. de exposición, siendo ésta mayor en competición (41,33 les.*1000h.) que en entrenamiento (6,02 les.*1000h.), valores muy acordes a los encontrados en la literatura científica especifica. Se registraron un promedio de 81 lesiones que causaron baja por equipo y temporada, provocando una ausencia media por lesión de 11,3 días. De estas lesiones, el 11,9% de ellas fueron de carácter recidivante, las cuales causaron periodos de baja superiores a las lesiones iníciales, alcanzando un valor promedio de 17,9 días de baja por lesión. El 84,4% las lesiones que se registraron, se localizaron en la extremidad inferior, siendo el muslo, con un 30,5% de todas las lesiones, la región corporal más afectada. A su vez, dentro del muslo, el 53% de las lesiones se localizaron en la región posterior, dentro de la cual, en el 73% de los casos la lesión afectó al bíceps femoral. Además, se encontró una mayor frecuencia de lesión en la pierna dominante (54,4% de las todas las lesiones) frente a la no dominante (36,5% de las todas las lesiones). Desde el punto de vista de la tipología de la lesión, las lesiones de carácter muscular con un 49,1% de los casos, fueron las más frecuentes, seguidas de las lesiones ligamentosas con un 15,1% de los casos. Los mecanismos de producción de lesiones en el jugador sin contacto, fueron más frecuentes (69,1% de todos los casos), que aquellos mecanismos de lesión en los que si hubo contacto (30,9%). En relación al momento de producción de lesión a lo largo de la temporada, se encontró que las lesiones sufridas en entrenamiento fueron progresivamente menos frecuentes con el transcurso de la temporada, mientras que en la competición se fueron incrementando, siendo los últimos meses de la temporada cuando se registraron la mayor parte de las lesiones. A partir de este estudio, proponemos ampliar la investigación en esta línea, concretando algunos de los aspectos que hemos podido identificar a través de nuestros resultados, y que en un futuro puedan tener alguna aplicación práctica en el objetivo común de reducir la incidencia de lesión existente en la práctica deportiva del fútbol. ABSTRACT Football has been described in literature as a sport in which there is a high incidence of injuries. Nevertheless, in Spain, to date, not a single study analyzing the incidence of lesions in professional football players has been carried out. In order to prevent lesions, in the first place we must identify the magnitude of the problem, as well as discover those factors that may influence on the production of lesions, being the latter the main objective of our study, and hence, starting from this point, be able to design and introduce in sports practice preventive measures with the aim of decreasing the incidence of lesions. We must take into consideration that we are before a study characterized by the fact of not having a previous hypothesis. In the present study, our main areas of focus is finding out the different factors that have influence on the possibility of suffering a lesion in this sports practice, as well as carrying out an analysis that describes the lesions suffered in professional football, as well as the necessary recovery periods. 27 teams (728 players), belonging to Spain’s First and Second Football (soccer) Divisions took part in this research. During the 2008-2009 season, a total of 2,184 lesions were registered. To register the lesions, a REINLE questionnaire, of the LEFUTPRO database was used, with access via internet. Each of the participating teams was given a password in a totally confidential manner. In the first place, we found that in the practice of professional football there exists a high incidence of lesions, with 8.92 lesions per 1000 h. of exposure. We found an increase in lesions during competitions (41.33 lesions per 1000 h.) with respect to those occurring during training (6.02 lesions per 1000 h.); these values being in accordance with those found in specific scientific literature. An average of 81 lesions that implied sick leaves were registered per team and season, causing an average of 11.3 days of absence per lesion. Of these, 11.9% of all the lesions studied were recurrent, causing longer sick leave periods than the ones due to the initial lesions and reaching an average of 17.9 days of sick leave per lesion. 84.4% of the lesions registered were located in the inferior extremities, the thigh being the anatomical region, with 30.5% of all the lesions, the most affected body region. In turn, 53% of the lesions to the thigh occurred in the posterior area, and within the latter, in 73% of the cases, the lesion affected the femoral biceps. In addition, we found a greater frequency of lesions in the dominant leg (54.4% of all the lesions), in contrast with the non dominant leg (36.5% of all the lesions). From the point of view of lesion type the most frequent lesions were muscular (49.1% of all cases), followed by ligament lesions (15.1%). Most of the lesions were produced during moments in which the players were not in physical contact at the moment of suffering the injury (69.1%), in comparison with those produced when there was physical contact (30.9%). With relation to the instance in which the injuries were produced along the season, we found that those lesions suffered during training were progressively less frequent as the season wore on, whilst those suffered during competitions gradually incremented, being the last months of the season when most of the injuries were registered. From the research of this study, we propose the need to carry out more research in this same line, focalizing on some more concrete aspects, which, through our results, we have been able to realize that would be interesting to study in greater depth, and that in the future, our results may have a practical application, helping reduce the incidence of injuries that exist in this sport practice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Este documento apresenta o Lyra, um novo esquema de derivação de chaves, baseado em esponjas criptográficas. O Lyra foi projetado para ser estritamente sequencial, fornecendo um nível elevado de segurança mesmo contra atacantes que utilizem múltiplos núcleos de processamento, como uma GPU ou FPGA. Ao mesmo tempo possui uma implementação simples em software e permite ao usuário legítimo ajustar o uso de memória e tempo de processamento de acordo com o nível de segurança desejado. O Lyra é, então, comparado ao scrypt, mostrando que esta proposta fornece um nível se segurança mais alto, além de superar suas deficiências. Caso o atacante deseje realizar um ataque utilizando pouca memória, o tempo de processamento do Lyra cresce exponencialmente, enquanto no scrypt este crescimento é apenas quadrático. Além disto, para o mesmo tempo de processamento, o Lyra permite uma utilização maior de memória, quando comparado ao scrypt, aumentando o custo de ataques de força bruta.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Trabalho Final do Curso de Mestrado Integrado em Medicina, Faculdade de Medicina, Universidade de Lisboa, 2014

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The principal methods of compression and different types of non-encrypted objects are described. An analysis is made of the results obtained from examinations of the speed of compression for objects when using passwords with different length. The size of the new file obtained after compression is also analyzed. Some evaluations are made with regard to the methods and the objects used in the examinations. In conclusion some deductions are drawn as well as recommendations for future work.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Ensuring the security of computers is a non-trivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emerged in the form of networks of hijacked zombie machines used to perform complex distributed attacks such as denial of service and to obtain sensitive data such as password information. These zombie machines are said to be infected with a dasiahotpsila - a malicious piece of software which is installed on a host machine and is controlled by a remote attacker, termed the dasiabotmaster of a botnetpsila. In this work, we use the biologically inspired dendritic cell algorithm (DCA) to detect the existence of a single hot on a compromised host machine. The DCA is an immune-inspired algorithm based on an abstract model of the behaviour of the dendritic cells of the human body. The basis of anomaly detection performed by the DCA is facilitated using the correlation of behavioural attributes such as keylogging and packet flooding behaviour. The results of the application of the DCA to the detection of a single hot show that the algorithm is a successful technique for the detection of such malicious software without responding to normally running programs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Malicious users try to compromise systems using new techniques. One of the recent techniques used by the attacker is to perform complex distributed attacks such as denial of service and to obtain sensitive data such as password information. These compromised machines are said to be infected with malicious software termed a “bot”. In this paper, we investigate the correlation of behavioural attributes such as keylogging and packet flooding behaviour to detect the existence of a single bot on a compromised machine by applying (1) Spearman’s rank correlation (SRC) algorithm and (2) the Dendritic Cell Algorithm (DCA). We also compare the output results generated from these two methods to the detection of a single bot. The results show that the DCA has a better performance in detecting malicious activities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The ever-increasing number and severity of cybersecurity breaches makes it vital to understand the factors that make organizations vulnerable. Since humans are considered the weakest link in the cybersecurity chain of an organization, this study evaluates users’ individual differences (demographic factors, risk-taking preferences, decision-making styles and personality traits) to understand online security behavior. This thesis studies four different yet tightly related online security behaviors that influence organizational cybersecurity: device securement, password generation, proactive awareness and updating. A survey (N=369) of students, faculty and staff in a large mid-Atlantic U.S. public university identifies individual characteristics that relate to online security behavior and characterizes the higher-risk individuals that pose threats to the university’s cybersecurity. Based on these findings and insights from interviews with phishing victims, the study concludes with recommendations to help similat organizations increase end-user cybersecurity compliance and mitigate the risks caused by humans in the organizational cybersecurity chain.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Este artículo explica los cambios que Internet ha introducido en la lectura de textos juveniles y en la promoción de estos a partir de epitextos públicos virtuales u onlines como los blogs, los foros de lectura y los Booktrailers. Estas nuevas formas de lectura suponen un nuevo tipo de interacción entre el autor del texto y el lector, quienes comparten informaciones en espacios digitales de lectura sobre el contenido e interpretación de la obra literaria. Un ejemplo concreto de este nuevo tipo de interacción lectora es la obra literaria, publicada en Portugal, A revolta dos sátiros (2014), de Ana Soares y Bárbara Wong. A partir de un password, el lector de este texto juvenil puede acceder a un espacio virtual en el que conocerá la continuación de esta, accederá a informaciones muy diversas sobre el texto literario y podrá interaccionar con el autor y los lectores de este texto juvenil.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The usage of version control systems and the capabilities of storing the source code in public platforms such as GitHub increased the number of passwords, API Keys and tokens that can be found and used causing a massive security issue for people and companies. In this project, SAP's secret scanner Credential Digger is presented. How it can scan repositories to detect hardcoded secrets and how it manages to filter out the false positives between them. Moreover, how I have implemented the Credential Digger's pre-commit hook. A performance comparison between three different implementations of the hook based on how it interacts with the Machine Learning model is presented. This project also includes how it is possible to use already detected credentials to decrease the number false positive by leveraging the similarity between leaks by using the Bucket System.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Caso clínico do Curso de Atualização do Manejo Clínico da Dengue, ofertado pela Secretaria de Vigilância em Saúde e Universidade Aberta do Sistema Único de Saúde - UNASUS. Descreve o manejo clínico de um paciente classificado como A, ou seja, de um paciente que não apresentava comorbidades, risco social, ou situação clínica especial, sua prova do laço era negativa e também não apresentava sinais de alerta, nem sinais de choque. O caso apresenta também a discussão da metodologia mais apropriada para realização da prova do laço e sua interpretação. Por fim, aborda o momento de realização da sorologia da dengue.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Caso clínico do Curso de Atualização do Manejo Clínico da Dengue, ofertado pela Secretaria de Vigilância em Saúde e Universidade Aberta do Sistema Único de Saúde - UNASUS. Discute uma paciente sem comorbidades, sem risco social, sem sinais de alarme ou choque, mas que apresenta a prova do laço positiva. Neste caso, a conduta recomendada é a realização de hematócrito e plaquetas e início imediato de hidratação oral, preferencialmente supervisionada, enquanto aguarda-se o resultado do exame.