916 resultados para remote login


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Tässä insinöörityössä tutkittiin kolmannen osapuolen etäkäyttöyhteyksien toteuttamismahdollisuuksia. Työ tehtiin Fingrid Oyj:lle, joka vastaa Suomen päävoimansiirtoverkosta. Työn ensimmäisessä vaiheessa opiskeltiin yksityisten virtuaaliverkkojen teoriaa. Virtuaaliverkkotekniikoiden käyttömahdollisuudet opiskeltiin käytännön kokemuksen kautta. Tämän jälkeen työssä selvitettiin SSL VPN -tekniikan teoriaa ja sen todellista toimintaa. Lisäksi tutkittiin kolmannen osapuolen yhteyksien heikkouksia ja vahvuuksia. Tämä työ mahdollisti myös tutustumisen tietoturvastandardeihin ja käytännön SSL VPN -toteutukseen. Työn tuloksena todettiin SSL VPN -arkkitehtuurin toiminta- ja käyttömahdollisuudet. SSL VPN todettiin tehokkaimmaksi ja joustavimmaksi tavaksi tehdä palveluntoimittajien etäkäyttöyhteydet. Lisäksi työssä on pohdittu palveluntoimittajien etäkäyttöyhteyksien ongelmien ratkaisuja. Työn ohella toteutettiin käytännön SSL VPN toteutus Fingrid Oyj:lle.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciare a due segmenti di LAN aventi due maschere di sotto-rete differenti. L'attacco viene analizzato mediante vari software. Si può infatti definire una terza parte del lavoro, la parte dove vengono analizzati i file catturati dalle due interfacce con i software che prima si occupano di analizzare i dati di contenuto completo, come Wireshark, poi dei software che si occupano di analizzare i dati di sessione che sono stati trattati con Argus, e infine i dati di tipo statistico che sono stati trattati con Ntop. Il penultimo capitolo, quello prima delle conclusioni, invece tratta l'installazione di Nagios, e la sua configurazione per il monitoraggio attraverso plugin dello spazio di disco rimanente su una macchina agent remota, e sui servizi MySql e DNS. Ovviamente Nagios può essere configurato per monitorare ogni tipo di servizio offerto sulla rete.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Many existing encrypted Internet protocols leak information through packet sizes and timing. Though seemingly innocuous, prior work has shown that such leakage can be used to recover part or all of the plaintext being encrypted. The prevalence of encrypted protocols as the underpinning of such critical services as e-commerce, remote login, and anonymity networks and the increasing feasibility of attacks on these services represent a considerable risk to communications security. Existing mechanisms for preventing traffic analysis focus on re-routing and padding. These prevention techniques have considerable resource and overhead requirements. Furthermore, padding is easily detectable and, in some cases, can introduce its own vulnerabilities. To address these shortcomings, we propose embedding real traffic in synthetically generated encrypted cover traffic. Novel to our approach is our use of realistic network protocol behavior models to generate cover traffic. The observable traffic we generate also has the benefit of being indistinguishable from other real encrypted traffic further thwarting an adversary's ability to target attacks. In this dissertation, we introduce the design of a proxy system called TrafficMimic that implements realistic cover traffic tunneling and can be used alone or integrated with the Tor anonymity system. We describe the cover traffic generation process including the subtleties of implementing a secure traffic generator. We show that TrafficMimic cover traffic can fool a complex protocol classification attack with 91% of the accuracy of real traffic. TrafficMimic cover traffic is also not detected by a binary classification attack specifically designed to detect TrafficMimic. We evaluate the performance of tunneling with independent cover traffic models and find that they are comparable, and, in some cases, more efficient than generic constant-rate defenses. We then use simulation and analytic modeling to understand the performance of cover traffic tunneling more deeply. We find that we can take measurements from real or simulated traffic with no tunneling and use them to estimate parameters for an accurate analytic model of the performance impact of cover traffic tunneling. Once validated, we use this model to better understand how delay, bandwidth, tunnel slowdown, and stability affect cover traffic tunneling. Finally, we take the insights from our simulation study and develop several biasing techniques that we can use to match the cover traffic to the real traffic while simultaneously bounding external information leakage. We study these bias methods using simulation and evaluate their security using a Bayesian inference attack. We find that we can safely improve performance with biasing while preventing both traffic analysis and defense detection attacks. We then apply these biasing methods to the real TrafficMimic implementation and evaluate it on the Internet. We find that biasing can provide 3-5x improvement in bandwidth for bulk transfers and 2.5-9.5x speedup for Web browsing over tunneling without biasing.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Supervisory Control & Data Acquisition (SCADA) systems are used by many industries because of their ability to manage sensors and control external hardware. The problem with commercially available systems is that they are restricted to a local network of users that use proprietary software. There was no Internet development guide to give remote users out of the network, control and access to SCADA data and external hardware through simple user interfaces. To solve this problem a server/client paradigm was implemented to make SCADAs available via the Internet. Two methods were applied and studied: polling of a text file as a low-end technology solution and implementing a Transmission Control Protocol (TCP/IP) socket connection. Users were allowed to login to a website and control remotely a network of pumps and valves interfaced to a SCADA. This enabled them to sample the water quality of different reservoir wells. The results were based on real time performance, stability and ease of use of the remote interface and its programming. These indicated that the most feasible server to implement is the TCP/IP connection. For the user interface, Java applets and Active X controls provide the same real time access.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examines the role of parent rock, pedogenetic processes and airborne pollution in heavy metal accumulation in soils from a remote oceanic island, Fernando de Noronha, Brazil. We studied five soil profiles developed from different volcanic rocks. Mineralogical composition and total concentrations of major and trace elements were determined in 43 samples. The obtained concentrations range for heavy metals were: Co: 26-261 ppm; Cu: 35-97 ppm; Cr: 350-1446 ppm; Ni: 114-691 ppm; Zn: 101-374 ppm; Hg: 2-150 ppb. The composition of soils is strongly affected by the geochemical character of the parent rock. Pedogenesis appears to be responsible for the accumulation of Zn, Co, and, to a lesser extent, of Ni and Cu, in the upper, Mn- and organic carbon-enriched horizons of the soil profiles. Pedogenic influence may also explain the relationship observed between Cr and the Fe. Hg is likely to have been added to the soil profile by long-range atmospheric transport. Its accumulation in the topsoil was further favoured by the formation of stable complexes with organic matter. Clay minerals do not appear to play an important role in the fixation of heavy metals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Hemorrhage in regions remote from the site of initial intracranial operations is rare, but may be fatal. Postoperative cerebellar hemorrhage as a complication of supratentorial surgery, with a radiological appearance known as zebra sign, is an increasingly recognized clinical entity and is associated mainly with vascular neurosurgery or temporal lobe resection. The pathophysiology remains unclear. Three cases of remote cerebellar hematoma occurred after neck clipping of anterior communicating artery aneurysms. All patients had similar clinical findings and underwent pterional craniotomy with the head in accentuated extension. One patient died and the two were discharged without symptoms. Cerebellar hemorrhage probably has a multifactorial origin involving positioning associated with abundant cerebrospinal fluid drainage causing cerebellar sag with resultant vein stretching and bleeding, and use of aspirin or other antiplatelet agents.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: In areas with limited structure in place for microscopy diagnosis, rapid diagnostic tests (RDT) have been demonstrated to be effective. Method: The cost-effectiveness of the Optimal (R) and thick smear microscopy was estimated and compared. Data were collected on remote areas of 12 municipalities in the Brazilian Amazon. Data sources included the National Malaria Control Programme of the Ministry of Health, the National Healthcare System reimbursement table, hospitalization records, primary data collected from the municipalities, and scientific literature. The perspective was that of the Brazilian public health system, the analytical horizon was from the start of fever until the diagnostic results provided to patient and the temporal reference was that of year 2006. The results were expressed in costs per adequately diagnosed cases in 2006 U. S. dollars. Sensitivity analysis was performed considering key model parameters. Results: In the case base scenario, considering 92% and 95% sensitivity for thick smear microscopy to Plasmodium falciparum and Plasmodium vivax, respectively, and 100% specificity for both species, thick smear microscopy is more costly and more effective, with an incremental cost estimated at US$ 549.9 per adequately diagnosed case. In sensitivity analysis, when sensitivity and specificity of microscopy for P. vivax were 0.90 and 0.98, respectively, and when its sensitivity for P. falciparum was 0.83, the RDT was more cost-effective than microscopy. Conclusion: Microscopy is more cost-effective than OptiMal (R) in these remote areas if high accuracy of microscopy is maintained in the field. Decision regarding use of rapid tests for diagnosis of malaria in these areas depends on current microscopy accuracy in the field.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cloud-aerosol interaction is a key issue in the climate system, affecting the water cycle, the weather, and the total energy balance including the spatial and temporal distribution of latent heat release. Information on the vertical distribution of cloud droplet microphysics and thermodynamic phase as a function of temperature or height, can be correlated with details of the aerosol field to provide insight on how these particles are affecting cloud properties and their consequences to cloud lifetime, precipitation, water cycle, and general energy balance. Unfortunately, today's experimental methods still lack the observational tools that can characterize the true evolution of the cloud microphysical, spatial and temporal structure in the cloud droplet scale, and then link these characteristics to environmental factors and properties of the cloud condensation nuclei. Here we propose and demonstrate a new experimental approach (the cloud scanner instrument) that provides the microphysical information missed in current experiments and remote sensing options. Cloud scanner measurements can be performed from aircraft, ground, or satellite by scanning the side of the clouds from the base to the top, providing us with the unique opportunity of obtaining snapshots of the cloud droplet microphysical and thermodynamic states as a function of height and brightness temperature in clouds at several development stages. The brightness temperature profile of the cloud side can be directly associated with the thermodynamic phase of the droplets to provide information on the glaciation temperature as a function of different ambient conditions, aerosol concentration, and type. An aircraft prototype of the cloud scanner was built and flew in a field campaign in Brazil. The CLAIM-3D (3-Dimensional Cloud Aerosol Interaction Mission) satellite concept proposed here combines several techniques to simultaneously measure the vertical profile of cloud microphysics, thermodynamic phase, brightness temperature, and aerosol amount and type in the neighborhood of the clouds. The wide wavelength range, and the use of multi-angle polarization measurements proposed for this mission allow us to estimate the availability and characteristics of aerosol particles acting as cloud condensation nuclei, and their effects on the cloud microphysical structure. These results can provide unprecedented details on the response of cloud droplet microphysics to natural and anthropogenic aerosols in the size scale where the interaction really happens.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

During the last few years, the evolution of fieldbus and computers networks allowed the integration of different communication systems involving both production single cells and production cells, as well as other systems for business intelligence, supervision and control. Several well-adopted communication technologies exist today for public and non-public networks. Since most of the industrial applications are time-critical, the requirements of communication systems for remote control differ from common applications for computer networks accessing the Internet, such as Web, e-mail and file transfer. The solution proposed and outlined in this work is called CyberOPC. It includes the study and the implementation of a new open communication system for remote control of industrial CNC machines, making the transmission delay for time-critical control data shorter than other OPC-based solutions, and fulfilling cyber security requirements.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper. the authors examine a wide range of recent research into the preparation and support for teachers working in rural and remote schools. The paper reviews many preservice and inservice initiatives which highlight issues affecting:teaching and learning in schools outside the major metropolitan centres. The work is reviewed from an Australian perspective but evaluates research from throughout the world. The paper concludes that despite a large body of research (Gibson, 1994), that has identified the need for specialised pre-service preparation which accommodates the social and professional differences associated with work in rural and remote areas, the implementation of such programs by teacher training institutions has been sparse, lacking in cohesion and in many cases non-existent. (C) 1998 Elsevier Science Ltd. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Because higher-than-average turnover rates for nurses who work in remote and rural areas are the norm, the authors conducted a study to identify professional and personal factors that influenced rural nurses' decisions to resign. Using a mail survey, the authors gathered qualitative and quantitative data from nurses who had resigned from rural and remote areas in Queensland, Australia. Their findings, categorized into professional and rural influences, highlight the importance of work force planning strategies that capitalize on the positive aspects of rural and remote area practice, to retain nurses in nonmetropolitan areas.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The prevalence and risk factors associated with canine gastrointestinal parasitic zoonoses and the role of dogs in the mechanical transmission of human Ascaris infection was examined in three tea estates in Assam, India. Nearly all (99%) dogs harbored one or more zoonotic species of gastrointestinal parasites, with hookworm infection being most common (94%). Parasitic stages presumed to be host-specific for humans such as Ascaris spp. (31%), Trichuris trichiura (25%), and Isospora belli (2%) were also recovered from dog feces. A polymerase chain reaction-linked restriction fragment length polymorphism technique was used to differentiate the species of Ascaris eggs in dog feces. The results of this study demonstrate the role of the dog as a significant disseminator and environmental contaminator of Ascaris lumbricoides in communities where promiscuous defecation by humans occurs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Canine parasitic zoonoses pose a continuing public health problem, especially in developing countries and communities that are socioeconomically disadvantaged. Our study combined the use of conventional and molecular epidemic, logical tools to determine the role of dogs in transmission of gastrointestinal (GI) parasites such as hookworms, Giardia and Ascaris in a parasite endemic teagrowing community in northeast India. A highly sensitive and specific molecular tool was developed to detect and differentiate the zoonotic species of canine hookworm eggs directly from faeces. This allowed epidemiological screening of canine hookworm species in this community to be conducted with ease and accuracy. The zoonotic potential of canine Giardia was also investigated by characterising Giardia duodenalis recovered from humans and dogs living in the same locality and households at three different loci. Phylogenetic and epidemiological analysis provided compelling evidence to support the zoonotic transmission of canine Giardia. Molecular tools were also used to identify the species of Ascaris egg present in over 30% of dog faecal samples. The results demonstrated the role of dogs as a significant disseminator and environmental contaminator of Ascaris lumbricoides in communities where promiscuous defecation practices exist. Our study demonstrated the usefulness of combining conventional and molecular parasitological and epidemiological tools to help solve unresolved relationships with regards to parasitic zoonoses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Medication errors are a leading cause of unintended harm to patients in Australia and internationally. Research in this area has paid relatively little attention to the interactions between organisational factors and violations of procedures in producing errors, although violations have been found to increase the likelihood of these errors. This study investigated the role of organisational factors in contributing to violations by nurses when administering medications. Data were collected using a self-report questionnaire completed by 506 nurses working in either rural or remote areas in Queensland, Australia. This instrument was used to develop a path model wherein organisational variables predicted 21% of the variance in self-reported violations. Expectations of medical officers mediated the relationship between working conditions of nursing staff and violation behaviour.