Mobile Malware Analysis

PURPOSE

The goal of this post is to identify and analyze mobile malware file: mmc.jar. Thereby please follow the following steps for completing the task:

  • Unpack the file (hint – using zip on .jar)
  • Examine .class files using tool available here (local copies for Mac and Linux and Win
  • Find ...
more ...

Regular Expression

This post delivers solution of advance regular expression. In the following lines we describe the goal and the rules of the task, whereby follows with the working solution.

Task

Write a regular expression for matching the names which follow the following rules:

  1. Each name consists of one or more parts ...
more ...

Testing IDS

SCENARIO

The objective of this laboratory test, scenario is to create a solution and instructions for testing an IDS\^1 systems usefulness for detecting attacks against a wordpress site. In addition, a repeatable process to evaluate vendor claims. Whatever passive IDS system sample delivered as a VM or a dedicated ...

more ...

Script Kiddie

PURPOSE and SCENARIO

The goal of this laboratory test is to make effort to attack server and to deface website. Here is the scenario: your client is worried about some stuff posted on a blog. They ask You to take care of it. They have a throwaway “script kiddie”[Script ...

more ...


Influence of Virtual life

Authors: Predrag Tasevski, Marco Gavazzi and Lasse Hyyrynen

Introduction

Any computer user who is engaged in a virtual world has a virtual life. Virtual life is a catchall term used to describe the involvement and presence of an individual in any chosen virtual world or simulated digital environment. Virtual world ...

more ...

Password Attacks and Generation Strategies

Abstract

Nowadays, attacking the passwords is one of the most straightforward attack vectors, which authorize access to information system. There are numerous feasible methods, attempt to guess or crack passwords, with a different methods, approaches and tools. This paper analyzes the possibilities of using the tools and gives an example ...

more ...

Future of human communication

On the basis of how the communication possibilities have changed (for) most people during last decades, what’s my idea of the normal human interaction in 10..20…50 years?

To understand the present we must first understand the past. The Internet has revolutionized the computer and communications world like ...

more ...

Digital divide or not?

Digital divide or not?

Is there a psychological “digital divide”? Are people who often use the Internet psychologically different from those who do not and in what ways?

The Internet is changing the average citizens as much as did other technologies, for instance: telephone, TV, computers, mobile phones etc. The ...

more ...

Internet and collectivistic cultures

Internet and collectivistic cultures. How the Internet affects the psyche of the people from collectivistic cultures?

Nowadays everyone has a computer at home, work and even a carrying device, example: laptop, notebook, mobile phones, IPod etc. All the devices that are making our life easy in everyday tasks are able ...

more ...

Major changes in warfare from antiquity to modern

Analyse the major changes in warfare from antiquity to modern days. What are the most significant changes? What has remained unchanged?

Before we start the discussion about the major changes in warfare from antiquity to present day we will precede with definition of War and its significant and remained unchanged ...

more ...

WordPress CMS acceleration and optamization

PURPOSE

The goal of this laboratory test is to evaluate speed-up solution for already mounted clean, by default wordpress CMS platform. The measures were made by custom script for Linux operating system, in our case the server side is Ubuntu server 10.04 LTS running on 32 bit system with ...

more ...

Human Computer Interaction in 2020

In March 2007, Microsoft Research organised the “HCI 2020” meeting at the El Bulli Hacienda Hotel near Seville, Spain. The event’s title expressed its key question: what will Human-Computer Interaction (HCI) be like in the year 2020? (Harper, Tom, Yvonne, & Abigail, 2008, p. 8) The report that I have ...

more ...

IP Responsibility and abuse reporting procedure

PURPOSE

The main goal of laboratory report is to identify the responsibilities for the IP addresses below and how we can make connection to them. IP addresses are randomly chosen by the lecture.

IP addresses:

​1. 69.163.171.238

​2. 31.44.184.101

​3. 188.72.228.69 ...

more ...

Information society and information warfare

Meaning of victory in conflict in the information age. What has changed? What has remained unchanged? How information society and information warfare influences achieving the victory?

The rapid development of information technology (IT) over the past three decades has led to many changes for example in military and defense circles ...

more ...