scholarly journals IMPLEMENTASI KATOOLIN SEBAGAI PENETRASI TOOLS KALI LINUX PADA LINUX UBUNTU 16.04 (STUDI KASUS: REVERSE ENGINEERING FILE .APK)

2018 ◽  
Vol 1 (2) ◽  
pp. 86-93
Author(s):  
I Putu Agus Eka Pratama ◽  
Anak Agung Bagus Arya Wiradarma

The Linux Operating System is known for its open-source characteristic which means everyone is free to develop Linux with the use of available source code. The result of Linux development is called Linux distribution (Distro). There are various Linux distributions in accordance with their respective uses, one of them is Kali Linux. Kali Linux is a Linux distro that is developed to penetrate the security of computer systems. Kali Linux uses a variety of tools to perform its functions. However, for users who want to use the functionality of Kali Linux without having to change the Linux distro that has been used, the user can use Katoolin. Katoolin can provide the convenience and flexibility for users who want to use Kali Linux as a special Linux distro for the purpose of penetrating computer system security without having to replace the distro that has been used or do a full install of Kali Linux. One case study that can be solved using the Kali Kali Linux based tool on Katoolin is Reverse Engineering. The case study was solved using one of the tools in the Reverse Engineering category named apktool that available on Katoolin.

2015 ◽  
Vol 734 ◽  
pp. 916-920
Author(s):  
Wei Song Chen ◽  
Jian Ping Wang

In view of current network RFID reader, a solution is given based on LWIP and FreeRTOS in this paper. FreeRTOS is chosen as its operating system . LWIP is chosen as its network protocol, which can upload the RFID card number to the server as soon as getting the new RFID card number. LWIP and FreeRTOS are free and open source code so that we need not consider the use of copyright issues.Also,STM32F107VC based on the framework of Cortex-M3 is selected as the RFID reader processor and DP83848 chip produced by TI is used as the network card in the hardware solution.


2002 ◽  
Vol 4 (4) ◽  
pp. 219-234 ◽  
Author(s):  
Hamish Harvey ◽  
Dawei Han

Open Source, in which the source code to software is freely shared and improved upon, has recently risen to prominence as an alternative to the more usual closed approach to software development. A number of high profile projects, such as the Linux operating system kernel and the Apache web server, have demonstrated that Open Source can be technically effective, and companies such as Cygnus Solutions (now owned by Red Hat) and Zope Corporation have demonstrated that it is possible to build successful companies around open source software. Open Source could have significant benefits for hydroinformatics, encouraging widespread interoperability and rapid development. In this paper we present a brief history of Open Source, a summary of some reasons for its effectiveness, and we explore how and why Open Source is of particular interest in the field of hydroinformatics. We argue that for technical, scientific and business reasons, Open Source has a lot to offer.


2020 ◽  
Author(s):  
Rajasekhar Ponakala ◽  
Matthew N. Dailey

This study report is aimed at identifying opportunities and challenges in developing a completely free and opensource mobile operating system based on AOSP. In this report, I describe the installation of LineageOS on a OnePlus One mobiledevice. I first describe the installation of a pre-built LineageOS image to the device, andthen I explain how i compiled the available source to build my own LineageOS image forthe device. Source compilation provides a more complete understanding of device-level OSbuilds. I also discuss various alternatives to Google Mobile Services. All the available alternative services are in the development stage. A promising approach is the reverse engineering mi-croG project, which is a free and open source re-implementation of Google Mobile Services. Such alternatives to Google’s services, meaning client-side free and open source applications and libraries, provide an excellent base upon which can build completely free and opensource background services as well as applications on mobile devices.


2017 ◽  
Vol 19 (3) ◽  
pp. 218-225 ◽  
Author(s):  
Malgorzata Ciesielska

This case study explores the origins of Nokia’s decline in the mobile technology market, as an unsuccessful attempt to introduce an open-source strategy into the business. Nokia created a hybrid model, which codified conflicting principles taken from closed and open mode of collaboration. A series of implementation problems resulted in Nokia struggling to attract open-source partners, growing issues with managing in-house staff and ultimately failing to develop a new mobile operating system fast enough to stay competitive. Key learning outcomes: At the completion of the case study, students will understand the complexity of open innovation implementation when paradigmatic differences between businesses and/or partners are not resolved.


2021 ◽  

Abstract Many security vulnerabilities can be detected by static analysis. This paper is a case study and a performance comparison of four open-source static analysis tools and plugins (PMD, SpotBugs, Find Security Bugs, and SonarQube) on Java source code. Experiments have been conducted on the widely used Juliet Test Suite with respect to six selected weaknesses from the official Top 25 list of Common Weakness Enumeration. In this study, analysis metrics have been calculated for helping Java developers decide which tools can be used when checking their programs for security vulnerabilities. It turned out that particular weaknesses are best detected with particular tools.


2019 ◽  
Author(s):  
Cosmas Eko Suharyanto

The operating system is a vital part of the computer system. Windows users still occupies the top position in the operating system user statistics. The popular Windows operating system, Windows 7 and Windows 8, they still have loyal users. The issue of information security becomes important with the increasing use of today's technology in various aspects. This study aims to analyze system security in Windows 7 and Windows 8. The results of this study prove the security system of Windows 8 is superior to its predecessor Windows 7. However, the primacy of security system Windows 8 can not be separated from some of notes that should be of concern to the user


2020 ◽  
Vol 26 (1) ◽  
Author(s):  
A.D. Suleiman ◽  
M.I. Mukhtar ◽  
B.S. Galadanci ◽  
S.A. Muaz

Computer viruses are generally malicious, detrimental to data and system integrity as well as a number-one method of computer vandalism. Users of computer systems have different perception of the effect these viruses can cause to a computer system. This paper presents the results of a questionnaire survey carried out in Bayero University Kano to investigate the students’ perception of the effect of computer virus. A total of 120 respondents participated in the study. The data collected was analyzed using descriptive tools such as percentages and charts. Chi-square is then used as inferential tool. The results showed that the frequency of virus attack is statistically significant with exchange of flash drives (p=0.026), browsing in the café (p=0.006) and backing up data (p=0.000). However no significant statistically association was found between frequency of virus attack with type of operating system (p=0.51) and usage of external memory (p=0.726).This research will help in enlightening users especially students on what attract virus to the computer system and how to control the spread and effect of these viruses.Keywords: Virus, Students, SurveyVol. 26, No. 1, June, 2019


Author(s):  
Roman Kápl ◽  
Pavel Parízek

Abstract Computers store numbers in two mutually incompatible ways: little-endian or big-endian. They differ in the order of bytes within representation of numbers. This ordering is called endianness. When two computer systems, programs or devices communicate, they must agree on which endianness to use, in order to avoid misinterpretation of numeric data values. We present Endicheck, a dynamic analysis tool for detecting endianness bugs, which is based on the popular Valgrind framework. It helps developers to find those code locations in their program where they forgot to swap bytes properly. Endicheck requires less source code annotations than existing tools, such as Sparse used by Linux kernel developers, and it can also detect potential bugs that would only manifest if the given program was run on computer with an opposite endianness. Our approach has been evaluated and validated on the Radeon SI Linux OpenGL driver, which is known to contain endianness-related bugs, and on several open-source programs. Results of experiments show that Endicheck can successfully identify many endianness-related bugs and provide useful diagnostic messages together with the source code locations of respective bugs.


Sign in / Sign up

Export Citation Format

Share Document