scholarly journals On the Review and Setup of Security Audit using Kali Linux

Author(s):  
Teddy Surya Gunawan ◽  
Muhammad Kassim Lim ◽  
Nurul Fariza Zulkurnain ◽  
Mira Kartiwi

The massive development of technology especially in computers, mobile devices, and networking has bring security issue forward as primarily concern. The computers and mobile devices connected to Internet are exposed to numerous threats and exploits. With the utilization of penetration testing, vulnerabilities of a system can be identified and simulated attack can be launched to determine how severe the vulnerabilities are. This paper reviewed some of the security concepts, including penetration testing, security analysis, and security audit. On the other hand, Kali Linux is the most popular penetration testing and security audit platform with advanced tools to detect any vulnerabilities uncovered in the target machine. For this purpose, Kali Linux setup and installation will be described in more details. Moreover, a method to install vulnerable server was also presented. Further research including simulated attacks to vulnerable server on both web and firewall system will be conducted.

2009 ◽  
pp. 279-289
Author(s):  
Emerson Loureiro ◽  
Frederico Bublitz ◽  
Loreno Oliveira ◽  
Nadia Barbosa ◽  
Angelo Perkusich ◽  
...  

The fast development on microelectronics has promoted the increase on the computational power of hardware components. On the other hand, we are facing a significant improvement on energy consumption as well as the reduction of the physical size of such components. These improvements and the emergence of wireless networking technologies are enabling the development of small and powered mobile devices. Due to this scenario, the so-called pervasive computing paradigm, introduced by Mark Weiser in 1991 (Weiser, 1991) is becoming a reality. Such a paradigm envisions a world where environments are inhabited by computing devices, all of them seamlessly integrated into peoples’ lives, and effectively helping to carry on their daily tasks. Among others, one major characteristic of Weiser’s vision is that each device in an environment becomes a potential client or provider of resources. Not surprisingly, pervasive computing environments are becoming dynamic repositories of computational resources, all of them available to mobile users from the palm of their hands. However, devices can unpredictably join and leave such environments. Thus, resources can be dynamically made available or unavailable. Such a scenario has a great impact on the way that resources are found and used. In the case of static environments, such as the Web, it is reasonable to look up and access resources, such as Web pages, knowing the address of their providers beforehand. On the other hand, for dynamic environments, such as the pervasive computing ones, this is not a reasonable approach. This is due to the fact that one cannot guarantee that the provider of a resource will be available at any moment, because it may have left the environment or simply turned off. A better approach would be to discover these resources based on their descriptions, or any other feature that does not require the client to know the specific address of their providers. To this end, some of the current pervasive computing solutions, like Wings (Loureiro, Bublitz, Oliveira, Barbosa, Perkusich, Almeida, & Ferreira, 2006), Green (Sivaharan, Blair, & Coulson, 2005), RUNES (Costa, Coulson, Mascolo, Picco, & Zachariadis, 2005), and Scooby (Robinson, Wakeman, & Owen, 2004), are making use of a novel approach from the branch of distributed applications, the service-oriented computing paradigm (Papazoglou, 2003; Huhns & Singh, 2005). This is due to the fact that such a paradigm provides a crucial element for pervasive computing systems, the ability for dynamically binding to remote resources (Bellur & Narenda, 2005), which enables mobile devices to find needed services on demand. However, pervasive environments may be structured in different ways. They can range from wired networks to completely wireless ones, where communication among the devices is performed in an ad hoc way. Such a characteristic indicates that the way services are provisioned in a pervasive computing environment should fit in its organization, in order to enhance the access to the services available. Considering the above discussion, in this article we provide a review on service provision and its applicability in pervasive computing. More precisely, we will list the existing service provision approaches and discuss the characteristics and problems associated with each one, as well as their usage in pervasive computing environments. We start by providing introductory concepts of service-oriented and pervasive computing, respectively in the service-oriented computing and pervasive computing sections. Next, we present the service provision techniques available and how they can be applied for pervasive computing environments. The main current solutions within this scope will be introduced in the service oriented technologies section. Some of the future trends associated with research for service provision in pervasive computing environments will be presented in the future research trends section. Finally, in the conclusions sect


2017 ◽  
Vol 869 ◽  
pp. 244-262
Author(s):  
Johannes Schwank ◽  
Franca Alexandra Rupprecht ◽  
Sebastian Schöffel

Nowadays, mobile devices, such as smartphones, tablets or smartwatches, are essential items in our daily life. Further, more and more people use smart mobile devices in their everyday work for remote controlling, observing diagrams, performing web analytics, etc. However, the full potential of mobile devices is not tapped yet; built-in sensors such as accelerometers or gyroscopes offer a wide range of interaction capabilities, which are still often not fully used in nowadays mobile applications. On the other hand, desktops are still the dominating working device, but with significantly differing interaction means. With additional hand tracking devices capturing the user's gestures additional input possibilities are available but still often unused. In this paper, we investigate on a concept for orientation-based touch-less interaction. Depending on the type of device - traditional desktop or a mobile device - we use an interaction metaphor called "Waggle"; utilizing of tilting and turning of either the user's hand or the mobile device itself for additional input possibilities. Based on the results of two pilot studies for both environments, basic parameters for future design decisions are derived: on the one hand, the maximum angle for basic rotation axes are evaluated. On the other hand, different discretizations of tilt and turn angles are investigated. Based on the outcome of both studies the optimal configuration for the use of the Waggle interaction metaphor in future applications on both mobile and desktop environments are defined.


2021 ◽  
Vol 13 (1) ◽  
pp. 108-122
Author(s):  
Nobertus Ribut Santoso

Public relations professionals have been dominated by females since they have good communication skills and abilities in persuading and engaging in the conversation and listening the stakeholders to build and harmonize relationships them. However, male public relations practitioners dominate in the top positions since they have been participated in the managerial roles while female are in the technical roles. In the organization, female public relations practitioners face inequalities in social, professional, and economic areas and they also find it difficult to achieve higher position because the traditional patriarchy is still strongly practiced. It harder for them to break this barrier. Family and children, on the other hand, become big considerations for females to climb the higher position since it will give bigger responsibilities. Moreover, the massive development of digital technologies provides more opportunities for female public relations professionals to intensively engage with the stakeholders. On the other hand, these technologies bring privilege for males since they are more digital technical skills. To compete with males in digital public relations, females should enhance their digital skills, wisely manage their time, learn to take new challenges making them one step ahead, and actively participate in every organizational activity to voice their ideas and straighten up false assumptions and misconceptions about females.  Meanwhile, males should be versatile public relations professionals in the digital era by combining masculine and feminine values to find the best public relations practices.


2020 ◽  
Vol 15 ◽  
pp. 56-77
Author(s):  
Aleksander Piecuch ◽  

Global digitization has changed the way of societies function, but, above all, has changed interpersonal relationships. Opportunities that arose with the development of IT, on the one hand, have become an important contribution to economic and social development, on the other hand, they have rapidly entered to the private sphere. A lot of free applications available for stationary and mobile devices has opened up new opportunities for IT giants. The offer they make to users of their products is theoretically free, but reality points to other practices. We pay for the facilities provided to us by losing our privacy.


2019 ◽  
Author(s):  
Drajad Wiryawan ◽  
Joni Suhartono ◽  
Surjandy . ◽  
Yudi Fernando ◽  
Idris Gautama So ◽  
...  

The number of mobile devices and information technology supporting applications is currently very diverse. Ranging from expensive to cheap, even new and used. On the other hand, the increase in connections needed every year always increases along with its development. Both of these are always accompanied by increasing crime in cyberspace so that the level of risk and threats that arise will also always spread threats from time to time. Many people do not understand what cyber risk is, its impact and how minimal handling is needed to overcome the above. This research was conducted to provide an overview of cybersecurity information to anyone about the amount of malware on existing and scattered devices and the user behavior itself. It starts with scanning network traffic, type of malware, then the patterns and its characteristics. On the other hand, this also provides input on how to make minimal handling as a way to control cybersecurity. The aim of the work is to focus on establishing the basic behavior of a user on mobile malware for user profiling analysis.


1999 ◽  
Vol 173 ◽  
pp. 249-254
Author(s):  
A.M. Silva ◽  
R.D. Miró

AbstractWe have developed a model for theH2OandOHevolution in a comet outburst, assuming that together with the gas, a distribution of icy grains is ejected. With an initial mass of icy grains of 108kg released, theH2OandOHproductions are increased up to a factor two, and the growth curves change drastically in the first two days. The model is applied to eruptions detected in theOHradio monitorings and fits well with the slow variations in the flux. On the other hand, several events of short duration appear, consisting of a sudden rise ofOHflux, followed by a sudden decay on the second day. These apparent short bursts are frequently found as precursors of a more durable eruption. We suggest that both of them are part of a unique eruption, and that the sudden decay is due to collisions that de-excite theOHmaser, when it reaches the Cometopause region located at 1.35 × 105kmfrom the nucleus.


Author(s):  
A. V. Crewe

We have become accustomed to differentiating between the scanning microscope and the conventional transmission microscope according to the resolving power which the two instruments offer. The conventional microscope is capable of a point resolution of a few angstroms and line resolutions of periodic objects of about 1Å. On the other hand, the scanning microscope, in its normal form, is not ordinarily capable of a point resolution better than 100Å. Upon examining reasons for the 100Å limitation, it becomes clear that this is based more on tradition than reason, and in particular, it is a condition imposed upon the microscope by adherence to thermal sources of electrons.


Author(s):  
K.H. Westmacott

Life beyond 1MeV – like life after 40 – is not too different unless one takes advantage of past experience and is receptive to new opportunities. At first glance, the returns on performing electron microscopy at voltages greater than 1MeV diminish rather rapidly as the curves which describe the well-known advantages of HVEM often tend towards saturation. However, in a country with a significant HVEM capability, a good case can be made for investing in instruments with a range of maximum accelerating voltages. In this regard, the 1.5MeV KRATOS HVEM being installed in Berkeley will complement the other 650KeV, 1MeV, and 1.2MeV instruments currently operating in the U.S. One other consideration suggests that 1.5MeV is an optimum voltage machine – Its additional advantages may be purchased for not much more than a 1MeV instrument. On the other hand, the 3MeV HVEM's which seem to be operated at 2MeV maximum, are much more expensive.


2005 ◽  
Vol 19 (3) ◽  
pp. 129-132 ◽  
Author(s):  
Reimer Kornmann

Summary: My comment is basically restricted to the situation in which less-able students find themselves and refers only to literature in German. From this point of view I am basically able to confirm Marsh's results. It must, however, be said that with less-able pupils the opposite effect can be found: Levels of self-esteem in these pupils are raised, at least temporarily, by separate instruction, academic performance however drops; combined instruction, on the other hand, leads to improved academic performance, while levels of self-esteem drop. Apparently, the positive self-image of less-able pupils who receive separate instruction does not bring about the potential enhancement of academic performance one might expect from high-ability pupils receiving separate instruction. To resolve the dilemma, it is proposed that individual progress in learning be accentuated, and that comparisons with others be dispensed with. This fosters a self-image that can in equal measure be realistic and optimistic.


Author(s):  
Stefan Krause ◽  
Markus Appel

Abstract. Two experiments examined the influence of stories on recipients’ self-perceptions. Extending prior theory and research, our focus was on assimilation effects (i.e., changes in self-perception in line with a protagonist’s traits) as well as on contrast effects (i.e., changes in self-perception in contrast to a protagonist’s traits). In Experiment 1 ( N = 113), implicit and explicit conscientiousness were assessed after participants read a story about either a diligent or a negligent student. Moderation analyses showed that highly transported participants and participants with lower counterarguing scores assimilate the depicted traits of a story protagonist, as indicated by explicit, self-reported conscientiousness ratings. Participants, who were more critical toward a story (i.e., higher counterarguing) and with a lower degree of transportation, showed contrast effects. In Experiment 2 ( N = 103), we manipulated transportation and counterarguing, but we could not identify an effect on participants’ self-ascribed level of conscientiousness. A mini meta-analysis across both experiments revealed significant positive overall associations between transportation and counterarguing on the one hand and story-consistent self-reported conscientiousness on the other hand.


Sign in / Sign up

Export Citation Format

Share Document